Eicon Networks S92 Manuel d'utilisateur Page 67

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 66
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 67
PRIMARYFirewallConfiguration
Tutorial–Che ckPointFW1
ConfiguringtheR ulebaseforFW1_B2C
Refertot he“ProductsPreparation”section forinformationonFW1and WindowsNT hardening.
SecurityPolicies:
FW1_B2CisthefrontlinefirewallagainstoutsideintrusionalongtheB2Clink.The
securitypolicyherecontainstheelementslistedbelow(intheorderspecifiedbelow
aswell):
1. Ecommercewebservice– TCPport80(HTTP)and443(SSL)allowedIN
2. Emailservicefortheexternalworld– TCPport25(SMTP)allowedIN
3. DNSservicefortheexternalworld–UDPport53(DNSrequest)allowedIN
4. Dropandlogeverythingelse
RuleProcessingandOrders:
FW1hasafriendlyyetpowerfulrulebaseinterface.Asasecurityadministrator,a
centralizedinterfacefordefiningallthesecurityelementsisgood.However,FW1
introducesconfusionsbyallowingsomeofthesecurityelementstobeactivatedvia
separatepropertiesdialogs.Thisisnotonlyconfusing,butisalsogivingroomfor
conflicts.Totrulydeterminetheeffectivesecuritypolicies,thecombinationof
SecurityPolicyPropertiessettingsandRuleBasemustbetakenaccountinto.
InFW1,packetsarematchedinthefollowingorder:
1. AntiSpoofing
2. PropertiesmarkedFIRSTintheSecurityPolicyProperties
3. Rulebaseorderexceptforthelastrule
Vue de la page 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 208 209

Commentaires sur ces manuels

Pas de commentaire