Eicon Networks S92 Uživatelský manuál Strana 87

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 209
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 86
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 87
ConfiguringtheOtherDevices
ConfiguringtheN orton1_IDSFirewall:
Refertot he“ProductsPreparation”section forinformationonNortonPersonalFirewall2002.
Refertot he“ProductsPreparation”section forinformationonWindows2000hardening.
Norton1_IDSsitsbetweentheinternal coreswitch andtheInternal_Clientssegment.
SecurityPolicy:
Thepoliciestobeenforcedhereare:
1. NoconnectiontowardsInternal_Clientscaneverbeinitiatedfromanyother
segment(exceptfromInternal_Admin).
2. OutboundaccessrequestsmadebyInternal_Clientsarenotrestrictedbythis
firewall,butbyotherfirewallsonthenetwork.
3. Whentheclientsaccesstheinternet,JavaandActiveXcodesareblocked.
4. Dropandlogeverythingelse.
TheconfigurationofNortonFirewall2002requiresemphasisontheconceptof
trustedzonesandsecurity levels.Thereisnosophisticatedmechanismfordefining
individualrules.Thegoodthingaboutthisapproachisthesimplicityofconfiguration
andadministration.Thedrawbackisthelackofflexibilityandprecisecontrol.
Therefore,thisfirewallisonlyusedatthedepartmentallevelforprotectingusers,not
services.
DefiningtheZones:
ToproperlyconfiguretheNortonFirewallatthislocation,thekeyistodefinethe
TrustedZonesandtheRestrictedZones. TrustedZonescanenjoyalmostallsortsof
access,andaretypicallytheinternalnetworksegments.RestrictedZones,ontheother
hand,aretheexternalnetworksthatarenottobetrusted.Connectionscannotbe
initiatedfromthesezonestopass through thefirewall.
Zobrazit stránku 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 208 209

Komentáře k této Příručce

Žádné komentáře