Chapter 13: Using the Graphical Interface


Introduction

Once you have the VPN-1/FW-1 software installed and configured, you are ready to log into the graphical user interface (GUI) and start composing your objects and rule bases. In this chapter we will walk you through all the options you have for creating various objects and we will show you some of the nice features that you can use in the policy editor to manipulate your rules.

We will show you how to access the firewall's implied rules, and we will explain the global properties that affect every security policy you create. It's important to know why your firewall is allowing pings, if you have not explicitly defined them in your rule base.

After paying a lot of attention to your policy options, we will then show you how to access your firewall logs and system status. The Track options you choose in your policy will affect the outcome of your logs. You may choose to log some rules and not others. We will also describe ways to make certain selections in your Log Viewer so that you can view only logs for a specific source IP address, or logs for a specific user. The Check Point Log Viewer has a really high quality interface, and is easy to understand.




The Best Damn Firewall Book Period
The Best Damn Firewall Book Period
ISBN: 1931836906
EAN: 2147483647
Year: 2003
Pages: 240

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net