If you wish to manually configure the network, use the Down arrow key to navigate to Network Configuration and DNS Configuration If you have already created a LoginTC Application for your deployment, then you may skip this section and proceed to Installation.
e) that you want to protect with LoginTC.Ĭreate a LoginTC Application in LoginTC Admin Panel, follow Create Application Steps. An Application represents a service (e.g. An application is a service (e.g., VPN or web application) that you want to protect. Start by creating a LoginTC Application for your deployment. Computer virtualization software such as VMware ESXi, VirtualBox, or Hyper-V.Prerequisitesīefore proceeding, please ensure you have the following:
Check Point appliances which have configurable RADIUS authentication are supported.