Chapter 8: Managing Policies and Logs


Introduction

In this chapter we strive to give you some basic firewall administrator knowledge and show you how to administer the enterprise security software package VPN-1/FW-1 Next Generation with Application Intelligence (NG AI) so that it doesn t get too big for you to handle. It s very easy for several administrators to be involved in policy development and manipulation, but if you have too many people involved in a security system such as a firewall, you need to keep strict vigilance and record who is making changes when and why. Otherwise, you could end up with a misconfigured firewall, which could compromise the security it is meant to provide.

Besides monitoring administrator activities, you should also keep software up to date. You should frequently check Check Point s Web site for the latest security patches and software updates. Sometimes these updates require you to modify configuration files or to stop and start your firewall services, and we discuss how to go about performing those tasks in this chapter.

This chapter covers performance related to your security policy and logs and discusses what to do when you have multiple firewalls in various locations. It tells you about your firewall s log files and some ways to administer your logs so that you don t run into disk space issues. This chapter also equips you with several command-line options that you can use to perform maintenance or troubleshoot your firewall.

As a Check Point NG AI administrator, you have three main goals with respect to administration. They are as follows :

  • Performance Because the Check Point NG AI firewall is the point through which all traffic to or from the unprotected to protected network flows, performance is critical. A poorly performing firewall will quickly bring complaints from users and eventually from your boss.

  • Effectiveness The effectiveness of the firewall is a vital concern. If the firewall isn t doing its job at controlling and monitoring access, it isn t any good. In fact, an ineffective firewall could open up your organization to multiple vulnerabilities.

  • Recovery capability Because the Check Point NG AI firewall is such a crucial piece in your network architecture, forget about rebuilding a firewall from scratch to its pre-crash state, duplicating the many rules and properties from memory. You need to be able to recover your configuration and security policy quickly and effectively should disaster strike.




Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net