How does VPN-1/Firewall-1 NG implement Transparent authentication?

How does VPN-1/Firewall-1 NG implement Transparent authentication?

How does VPN-1/Firewall-1 NG implement Transparent authentication?

A.
Unknown user receive error messages indicating that the firewalled gateway does not know the
user names on the gateway.

B.
VPN-1/Firewall-1 NG prompts for user names even through the authentication data may not be
recognized by the firewall’s user database.

C.
VPN-1/Firewall-1 NG allows connections, but hides the firewall from authenticated users.

D.
Unknown users error messages indicating that the host does not know the users names on the
server.

E.
VPN-1/Firewall-1 NG does not allow connections from users who do not know the name of the
firewall.

Explanation:
the concept of transparent authentication for Checkpoint Systems relies in making the Firewall
authenticate the connections from the user, but make the user experience transparent, in other
words, they don’t know that the firewall is authenticating their connections.
Incorrect Answers:
A: This is not the essence of transparent authentication, we will not get error messages, we will
just not go through with our requests.
B: This authentication fashion does not prompt for user input, remember, this is “transparent”
authentication.
D: This is not the way transparent authentication works, you can check the transparent
authentication behavior at the Knowledge base of Checkpoint.
E: The user doesn’t need to know the name of the firewall, it is usually configured by the
administrator, the user doesn’t need to know.



Leave a Reply 0

Your email address will not be published. Required fields are marked *