[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [FW-1] License schema question
Hmm.. don't know how they interpret that, I mean, indirectly, the outer firewall is also protecting your internal network, no matter how you look at it, though it's far from obivous whether you fall in under this: "It is a violation of this End User License Agreement to create, set up, or design any hardware, software or system which alters the number of readable IP-addresses presented to the Product with the intent, or resulting effect, of circumventing the Licensed Configuration." The words "or resulting effect" seems to bind you, even if your intention in the design is not to circumvent the number of licensed IP's. My guess: If there is never any traffic from the internal network through the bastion, then you wouldn't need the licenses. If your internal hosts communicate through the outer firewall, though, I would guess you need an according number of licenses. What do you experts out there say? Cheers, Anders :) > -----Original Message----- > From: Jacky Liu [mailto:[email protected]] > Sent: 15. november 2001 08:16 > To: [email protected] > Subject: [FW-1] License schema question > > > Hi all, > > I would like to ask a question about license calculation for > this design > > > Intrusion Detection > System > | > | > Internet --- FW (Bastion) --- Email&WWW --- FW (Choke) --- > Internal Network > > > For FW (Choke), I will order unlimited license. I am just > wondering which > kind of license schema I should pick for FW (Bastion) in order to save > money. Can I just pick 25-user license schema, because the FW > (Bastion) is > only protect the servers between itself and FW (Choke). > > Best Regards, > JL > > =============================================== > To unsubscribe from this mailing list, > please see the instructions at > http://www.checkpoint.com/services/mailing.html > =============================================== > =============================================== To unsubscribe from this mailing list, please see the instructions at http://www.checkpoint.com/services/mailing.html ===============================================
|