
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 3
ACleanFW1Installation................................................................................ 46
SecuringtheFW1Installation......................................................................... 46
HardenedWindows2000 ................................................................................. 48
PerfectingtheWindows2000Installation ........................................................ 48
HardeningtheConfiguration............................................................................ 48
Step1 Removeunusednetworkservices................................................ 49
Step2 DisableNetBIOS. ....................................................................... 49
Step3 ConfigureIPRouting. ................................................................. 49
Step4 Disableunusedservices............................................................... 50
Step5 Strengthentheaccountandauditsettings. ................................... 51
Step6 Removeunusedandpotentiallydangerouscomponents............... 52
Step7– Gothroughthefilesystempermissionsettings. .......................... 53
ISAServerVulnerabilities................................................................................ 54
NortonFirewall2002 ...................................................................................... 54
ConfigureNortonFirewall............................................................................... 54
Vulnerabilities ................................................................................................. 55
DeerfieldVisNeticFirewall.............................................................................. 55
Enlargethelogfile:.................................................................................. 56
Configurethestatuses: ............................................................................. 56
Vulnerabilities ................................................................................................. 58
Microsof tISAServer........................................................................................ 58
PerfectingtheWindows2000Installation ........................................................ 59
HardeningtheConfiguration............................................................................ 59
Vulnerabilities ................................................................................................. 61
DefaultPortAssignmentsf or CommonServicesonaWindows2000Network . 63
PRIMARYFirewallConfigurationTutorial –CheckPointFW1..................... 67
ConfiguringtheRulebaseforFW1_B2C ......................................................... 67
SecurityPolicies: ..................................................................................... 67
RuleProcessingandOrders: .................................................................... 67
RuleElements:......................................................................................... 68
NetworkObjects: ..................................................................................... 69
Rules:...................................................................................................... 73
ConfiguringtheRulebaseforFW2_B2C: ........................................................ 82
SecurityPoliciesandOrders: ................................................................... 82
NetworkObjects: ..................................................................................... 83
RulesandOrders:..................................................................................... 84
BasicTesting:........................................................................................... 86
ConfiguringtheOtherDevices........................................................................ 87
Komentáře k této Příručce