Eicon Networks S92 Uživatelský manuál Strana 68

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 67
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 68
4. PropertiesmarkedBEFORELASTintheSecurityPolicyProperties
5. RuleBaselastrule
6. PropertiesmarkedLASTintheSecurityPolicyProperties
7. ImplicitDropRule
Onewaytocleartheconfusionistodisableallthepropertiesoptionsandbuildevery
rulefromscratch.Withinthecontextoftherulebase,sinceFireWall1examinesthe
RuleBasesequentially,rulesmustbecarefullyarrangedintheappropriateorderto
preventunwantedtrafficfromenteringthenetwork.
InGIAC’sexamplehere,thepolicyforEcommerce,EmailandDNSarenot
conflictingwitheachothers,sotheorderbetweenthemdoesnotmatter.However,
Rule4willdenyeverything,soitmustbeplacedatthebottom,ornothingwillbe
abletopassthroughthefirewall.
Infact,placingthemostfrequentlyencounteredrulesatthetopisgood
performancewide.However,forasmallandpreciserulebaseliketheonewehave
here,itreallydoesnotmatter.
Therearecertainspecialrulesthataretoberetained.Theserulesare:
n Stealthrule,whichispositionedasthefirstruleintherulebasetopreventtraffic
fromaccessingthefirewallitselfdirectly.
n Implicitdroprule,whichisaddedtothebottomoftheRuleBasebydefaultto
dropallcommunicationattemptsnotdescribedbytheotherrules.
RuleElements:
TodefinearuleintheFW1rulebase,thefollowingcomponentsmustfirstbe
defined:
n Source– thesourcenetworkobject(s)
n Destination –thedestinationnetworkobject(s)
n Service–theapplicationprotocol(s)
n Action –drop,accept,alert…etc
n InstallOn thefirewallitself
Zobrazit stránku 67
1 2 ... 63 64 65 66 67 68 69 70 71 72 73 ... 208 209

Komentáře k této Příručce

Žádné komentáře