Summary


We've just completed a marathon look at the GUI provided for access to VPN-1/FW-1. We looked at the process to create each of the possible object types available for use within your enterprise security policy. This includes network objects, as well as servers and resources. You should now feel comfortable creating objects to support your own implementations.

We also looked at the Policy Editor, and saw how to use these newly created objects to create rules. These rules will be the embodiment of your written security policy, and are the definitions that FW-1 enforces. We also saw how FW-1 has included something called an implied rule, how to edit them, and how to view them. Speaking of editing, we covered the various methods of editing our rule base, including adding new rules, deleting existing ones, and rearranging the rule base with cut/paste functions.

We also looked briefly at the Global Properties, and learned a little about how these settings impact the behavior of the firewall. We finished with a peek into some of the additional tools provided with VPN-1/FW-1. We saw the Log Viewer and the System Status view, as well as the SecureUpdate tool.

We hope that you feel more at ease with what can often be a daunting and complex task, specifically the representation of your network and the creation of rules to protect it.




The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net