Hello to all. I have use this forum a lot to solve some issues with CP products but this is the first time to post here. Yesterday I upgraded our customers 6200 from R81.10 to R81.20 take 41 I also upgrade the lom firmware from 6.10 to 6.20 Then I started to wonder what is the actual idea of the lom security. I read a lot documents but haven't found anything how to restrict the access to the lom. If we just connect it to the internet anyone can access to the login page of lom. But what is the point having lom just connected behind the firewall when it comes useless if the firewall fails for some reason and customer needs remote support.
Or maybe I just have missed something or haven't found anything to restirct the traffic.
Working with Check Point Products since 1998