Eicon Networks S92 Bedienungsanleitung Seite 67

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 66
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 67
PRIMARYFirewallConfiguration
Tutorial–Che ckPointFW1
ConfiguringtheR ulebaseforFW1_B2C
Refertot he“ProductsPreparation”section forinformationonFW1and WindowsNT hardening.
SecurityPolicies:
FW1_B2CisthefrontlinefirewallagainstoutsideintrusionalongtheB2Clink.The
securitypolicyherecontainstheelementslistedbelow(intheorderspecifiedbelow
aswell):
1. Ecommercewebservice– TCPport80(HTTP)and443(SSL)allowedIN
2. Emailservicefortheexternalworld– TCPport25(SMTP)allowedIN
3. DNSservicefortheexternalworld–UDPport53(DNSrequest)allowedIN
4. Dropandlogeverythingelse
RuleProcessingandOrders:
FW1hasafriendlyyetpowerfulrulebaseinterface.Asasecurityadministrator,a
centralizedinterfacefordefiningallthesecurityelementsisgood.However,FW1
introducesconfusionsbyallowingsomeofthesecurityelementstobeactivatedvia
separatepropertiesdialogs.Thisisnotonlyconfusing,butisalsogivingroomfor
conflicts.Totrulydeterminetheeffectivesecuritypolicies,thecombinationof
SecurityPolicyPropertiessettingsandRuleBasemustbetakenaccountinto.
InFW1,packetsarematchedinthefollowingorder:
1. AntiSpoofing
2. PropertiesmarkedFIRSTintheSecurityPolicyProperties
3. Rulebaseorderexceptforthelastrule
Seitenansicht 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare