Summary

Authentication is an important part of any security infrastructure. You now know the three methods used by FireWall-1 to provide authentication, the conditions under which you can apply each method, how to configure each method, and how to troubleshoot when things go wrong. You can also integrate FireWall-1 with various external authentication servers.