Eicon Networks S92 Manuel d'utilisateur Page 87

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 209
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 86
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 87
ConfiguringtheOtherDevices
ConfiguringtheN orton1_IDSFirewall:
Refertot he“ProductsPreparation”section forinformationonNortonPersonalFirewall2002.
Refertot he“ProductsPreparation”section forinformationonWindows2000hardening.
Norton1_IDSsitsbetweentheinternal coreswitch andtheInternal_Clientssegment.
SecurityPolicy:
Thepoliciestobeenforcedhereare:
1. NoconnectiontowardsInternal_Clientscaneverbeinitiatedfromanyother
segment(exceptfromInternal_Admin).
2. OutboundaccessrequestsmadebyInternal_Clientsarenotrestrictedbythis
firewall,butbyotherfirewallsonthenetwork.
3. Whentheclientsaccesstheinternet,JavaandActiveXcodesareblocked.
4. Dropandlogeverythingelse.
TheconfigurationofNortonFirewall2002requiresemphasisontheconceptof
trustedzonesandsecurity levels.Thereisnosophisticatedmechanismfordefining
individualrules.Thegoodthingaboutthisapproachisthesimplicityofconfiguration
andadministration.Thedrawbackisthelackofflexibilityandprecisecontrol.
Therefore,thisfirewallisonlyusedatthedepartmentallevelforprotectingusers,not
services.
DefiningtheZones:
ToproperlyconfiguretheNortonFirewallatthislocation,thekeyistodefinethe
TrustedZonesandtheRestrictedZones. TrustedZonescanenjoyalmostallsortsof
access,andaretypicallytheinternalnetworksegments.RestrictedZones,ontheother
hand,aretheexternalnetworksthatarenottobetrusted.Connectionscannotbe
initiatedfromthesezonestopass through thefirewall.
Vue de la page 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 208 209

Commentaires sur ces manuels

Pas de commentaire