Hi, Thats not exactly right. You could restrict the topology download, so that only authenticated Users can download the topo. Just go undere Policy Properties Desktop Security of your Policy Editor and uncheck "respond to unauthenticated topology requests". After installing the Policy only authenticated Users could download the Topology. The only reason why you have to check this is when your clients whants to use FWZ encryption. Christian -- ICON Systems GmbH - 85399 Hallbergmoos, Am Söldnermoos 37, Germany Zentrale: 0811-55515-0 Fax: 0811-55515-15 Hotline: 0811-55515-90 Check Point NG Preisliste: http://icon-sys.com/preise/checkpoint/NG/index.htm KNOW-HOWpur Seminare 2. Halbjahr: http://www.icon-sys.com/dienstleistungen/seminare-uebersicht.htm The content of this E-Mail is confidential. It is intended solely for the addressee.For any unauthorized recipient, please delete this E-Mail to avoid unlawful usage.
This archive was generated by hypermail 2b30 : Wed Jul 18 2001 - 09:17:31 PDT