Eicon Networks S92 Bedienungsanleitung Seite 87

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 209
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen
Seitenansicht 86
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 87
ConfiguringtheOtherDevices
ConfiguringtheN orton1_IDSFirewall:
Refertot he“ProductsPreparation”section forinformationonNortonPersonalFirewall2002.
Refertot he“ProductsPreparation”section forinformationonWindows2000hardening.
Norton1_IDSsitsbetweentheinternal coreswitch andtheInternal_Clientssegment.
SecurityPolicy:
Thepoliciestobeenforcedhereare:
1. NoconnectiontowardsInternal_Clientscaneverbeinitiatedfromanyother
segment(exceptfromInternal_Admin).
2. OutboundaccessrequestsmadebyInternal_Clientsarenotrestrictedbythis
firewall,butbyotherfirewallsonthenetwork.
3. Whentheclientsaccesstheinternet,JavaandActiveXcodesareblocked.
4. Dropandlogeverythingelse.
TheconfigurationofNortonFirewall2002requiresemphasisontheconceptof
trustedzonesandsecurity levels.Thereisnosophisticatedmechanismfordefining
individualrules.Thegoodthingaboutthisapproachisthesimplicityofconfiguration
andadministration.Thedrawbackisthelackofflexibilityandprecisecontrol.
Therefore,thisfirewallisonlyusedatthedepartmentallevelforprotectingusers,not
services.
DefiningtheZones:
ToproperlyconfiguretheNortonFirewallatthislocation,thekeyistodefinethe
TrustedZonesandtheRestrictedZones. TrustedZonescanenjoyalmostallsortsof
access,andaretypicallytheinternalnetworksegments.RestrictedZones,ontheother
hand,aretheexternalnetworksthatarenottobetrusted.Connectionscannotbe
initiatedfromthesezonestopass through thefirewall.
Seitenansicht 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 208 209

Kommentare zu diesen Handbüchern

Keine Kommentare