- CheckMates
- :
- Products
- :
- Quantum
- :
- Security Gateways
- :
- SecureXL Forward to Virtual Machine
Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Mute
- Printer Friendly Page
Are you a member of CheckMates?
×
Sign in with your Check Point UserCenter/PartnerMap account to access more great content and get a chance to win some Apple AirPods! If you don't have an account, create one now for free!
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
Jump to solution
SecureXL Forward to Virtual Machine
Hi, all.
Anyone could me explain how F2V works? In which cases should I use? I can't find this detailed information on SecureXL documentation.
Regards.
Valter Junior
1 Solution
Accepted Solutions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You are correct that the F2V path that was introduced in R80.20 is not really documented. I had to chat with R&D to figure out what it was when I was researching my third book, and here is the result:
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
now available at maxpowerfirewalls.com
2 Replies
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You don't choose to use the F2V path, this is a somewhat dynamic path in R80.20+ used as we decide or reevaluate if a connection should be accelerated.
CCSM R77/R80/ELITE
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
You are correct that the F2V path that was introduced in R80.20 is not really documented. I had to chat with R&D to figure out what it was when I was researching my third book, and here is the result:
Gateway Performance Optimization R81.20 Course
now available at maxpowerfirewalls.com
now available at maxpowerfirewalls.com