Alice was asked by Bob to implement the Check Point Mobile Access VPN blade – therefore are some basic configuration steps required – which statement about the configuration steps is true?
Alice was asked by Bob to implement the Check Point Mobile Access VPN blade – therefore are some basic configuration steps required – which statement about the configuration steps is true?
The correct steps to implement the Check Point Mobile Access VPN blade are: first, enable the Mobile Access blade on the Security Gateway object and complete the wizard. After that, configure the Mobile Access parameters in the Security Gateway object. Then, add a rule in the Access Control Policy and install the policy. Finally, connect to the Mobile Access Portal. This sequence ensures that necessary configurations and policies are set before attempting to connect to the portal, making option A the accurate choice.
https://sc1.checkpoint.com/documents/R81.20/WebAdminGuides/EN/CP_R81.20_MobileAccess_AdminGuide/Content/Topics-MABG/Getting-Started.htm?tocpath=Getting%20Started%20with%20Mobile%20Access%7C_____0#Getting_Started_with_Mobile_Access
Obviously A
A seems to be correct