
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 4
ConfiguringtheNorton1_IDSFirewall:........................................................... 87
SecurityPolicy:........................................................................................ 87
DefiningtheZones:.................................................................................. 87
ConfiguretheSecurity Level:.................................................................. 88
ConfiguretheAdvancedOptions:............................................................. 89
ConfigureIntrusionDetection:................................................................. 90
ConfigureLogging:.................................................................................. 90
BasicTesting:........................................................................................... 91
ConfiguringtheNorton2_IDSFirewall:........................................................... 92
SecurityPolicy:........................................................................................ 92
DefiningtheZones:.................................................................................. 92
ConfiguretheSecurityLevel:.................................................................. 93
ConfiguretheAdvancedOptions:............................................................. 93
ConfigureIntrusionDetection:................................................................. 93
ConfigureLogging:.................................................................................. 93
BasicTesting:........................................................................................... 93
ConfiguringtheNorton3_IDSFirewall:........................................................... 95
SecurityPolicy:........................................................................................ 95
DefiningtheZones:.................................................................................. 95
ConfiguretheSecurityLevel:.................................................................. 96
ConfiguretheAdvancedOptions:............................................................. 96
ConfigureIntrusionDetection:................................................................. 96
ConfigureLogging:.................................................................................. 96
BasicTesting:........................................................................................... 96
ConfiguringtheVisNetic_1Firewall:............................................................... 98
SecurityPoliciesandOrders: ................................................................... 98
DefiningtheInterfaces:............................................................................ 99
AnInterfaceConfigurationExample:......................................................100
LocalInterfaceConfiguration: ................................................................103
ExternalInterfaceConfiguration: ............................................................103
BasicTesting:..........................................................................................104
ConfiguringtheProxyServer .........................................................................105
SecurityPolicy:.......................................................................................106
ISAServerConfiguration:.......................................................................107
BasicCachingOptions:...........................................................................107
ProtocolRules:.......................................................................................110
FirewallConfigurationOptions:..............................................................111
AdvancedCachingOptions:....................................................................113
Kommentare zu diesen Handbüchern