Your users have some issues connecting with Mobile Access VPN to your gateway. How can you debug the tunnel establishment?
Correct Answer:C
How does Identity Collector connect to Windows Server?
Correct Answer:D
What command would you run to verify the communication between the Security Gateway and the Identity Collector?
Correct Answer:B
Check Point provides tools & commands to help you to identify issues about products and applications. Which Check Point command can help you to display status and statistics information for various Check Point products and applications?
Correct Answer:B
What file contains the RAD proxy settings?
Correct Answer:D