Eicon Networks S92 Uživatelský manuál Strana 67

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 66
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 67
PRIMARYFirewallConfiguration
Tutorial–Che ckPointFW1
ConfiguringtheR ulebaseforFW1_B2C
Refertot he“ProductsPreparation”section forinformationonFW1and WindowsNT hardening.
SecurityPolicies:
FW1_B2CisthefrontlinefirewallagainstoutsideintrusionalongtheB2Clink.The
securitypolicyherecontainstheelementslistedbelow(intheorderspecifiedbelow
aswell):
1. Ecommercewebservice– TCPport80(HTTP)and443(SSL)allowedIN
2. Emailservicefortheexternalworld– TCPport25(SMTP)allowedIN
3. DNSservicefortheexternalworld–UDPport53(DNSrequest)allowedIN
4. Dropandlogeverythingelse
RuleProcessingandOrders:
FW1hasafriendlyyetpowerfulrulebaseinterface.Asasecurityadministrator,a
centralizedinterfacefordefiningallthesecurityelementsisgood.However,FW1
introducesconfusionsbyallowingsomeofthesecurityelementstobeactivatedvia
separatepropertiesdialogs.Thisisnotonlyconfusing,butisalsogivingroomfor
conflicts.Totrulydeterminetheeffectivesecuritypolicies,thecombinationof
SecurityPolicyPropertiessettingsandRuleBasemustbetakenaccountinto.
InFW1,packetsarematchedinthefollowingorder:
1. AntiSpoofing
2. PropertiesmarkedFIRSTintheSecurityPolicyProperties
3. Rulebaseorderexceptforthelastrule
Zobrazit stránku 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 208 209

Komentáře k této Příručce

Žádné komentáře