Eicon Networks S92 Instrukcja Użytkownika Strona 67

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 209
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 66
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 67
PRIMARYFirewallConfiguration
Tutorial–Che ckPointFW1
ConfiguringtheR ulebaseforFW1_B2C
Refertot he“ProductsPreparation”section forinformationonFW1and WindowsNT hardening.
SecurityPolicies:
FW1_B2CisthefrontlinefirewallagainstoutsideintrusionalongtheB2Clink.The
securitypolicyherecontainstheelementslistedbelow(intheorderspecifiedbelow
aswell):
1. Ecommercewebservice– TCPport80(HTTP)and443(SSL)allowedIN
2. Emailservicefortheexternalworld– TCPport25(SMTP)allowedIN
3. DNSservicefortheexternalworld–UDPport53(DNSrequest)allowedIN
4. Dropandlogeverythingelse
RuleProcessingandOrders:
FW1hasafriendlyyetpowerfulrulebaseinterface.Asasecurityadministrator,a
centralizedinterfacefordefiningallthesecurityelementsisgood.However,FW1
introducesconfusionsbyallowingsomeofthesecurityelementstobeactivatedvia
separatepropertiesdialogs.Thisisnotonlyconfusing,butisalsogivingroomfor
conflicts.Totrulydeterminetheeffectivesecuritypolicies,thecombinationof
SecurityPolicyPropertiessettingsandRuleBasemustbetakenaccountinto.
InFW1,packetsarematchedinthefollowingorder:
1. AntiSpoofing
2. PropertiesmarkedFIRSTintheSecurityPolicyProperties
3. Rulebaseorderexceptforthelastrule
Przeglądanie stron 66
1 2 ... 62 63 64 65 66 67 68 69 70 71 72 ... 208 209

Komentarze do niniejszej Instrukcji

Brak uwag