

Mobile Access enabled cluster member Security Gateway that is part of a cluster. A cluster can be deployed in any of the deployments described above. If you have large numbers of concurrent remote access users and continuous, uninterrupted remote access is crucial to your organization, you may choose to have Mobile Access active on a cluster Two or more Security Gateways that work together in a redundant configuration - High Availability, or Load Sharing. The Security Gateway forwards requests to the internal servers. You must configure the Access Control Policy to allow traffic from the user to the Mobile Access server, where SSL termination, IPS and Anti-Virus inspection, authentication, and authorization take place.

Remote users initiate an SSL connection to the Mobile Access Security Gateway. By deploying Mobile Access in the DMZ, the need to enable direct access from the Internet to the LAN is avoided. When a Mobile Access enabled Security Gateway is put in the DMZ, traffic initiated both from the Internet and from the LAN to Mobile Access is subject to Firewall restrictions. Security Gateway with Mobile Access enabled It is also the least expensive and easiest to configure as it only requires one Security Gateway machine for easy and secure remote access. The Security Gateway can be on the network perimeter. and Anti-Virus Check Point Software Blade on a Security Gateway that uses real-time virus signatures and anomaly-based protections from ThreatCloud to detect and block malware at the Security Gateway before users are affected. IPS Check Point Software Blade on a Security Gateway that inspects and analyzes packets and data for numerous types of risks (Intrusion Prevention System). inspects all traffic, including all Mobile Access traffic. In the simplest Mobile Access deployment, one Mobile Access enabled Security Gateway Dedicated Check Point server that runs Check Point software to inspect traffic and enforce Security Policies for connected network resources. can be deployed in a variety of ways depending on an organization's system architecture and preferences.

Mobile Access Check Point Software Blade on a Security Gateway that provides a Remote Access VPN access for managed and unmanaged clients. Getting Started with Mobile Access Recommended Deployments
