Index_I


I

IANA (Internet Assigned Numbers Authority), 183, 260
ICANN, IP address allocation, 260
ICMP (Internet Control Message Protocol)
attacks, defending against, 569
codes, configuring, 183 “185
packets, field information (table), 422
ping testing VPNs, 455
proxy firewall problems with, 32
IDS (Intrusion Detection System), 28 “29, 424, 550
ifconfig command, 265
IKE (Internet Key Exchange)
authentication timeouts, setting, 483
authentication, VPN, 459
configuring VPN in Simplified mode, 447 “453
configuring VPN in Traditional mode, 441 “446
described, using, 437 “438
over TCP, configuring, 485, 503
IMAP (Internet Message Access Protocol), permitting LAN access, 240
implementing security policies, 228 “242
implied rules, Global Properties, 231
importing installation configuration, 60
in-place encryption, 438
Inbound Rules, Desktop Security, 481, 482
incident response procedures, testing, 388
inetd.conf, 54 “55
information security policy, 218 “221
InitialPolicy, 125 “126
INSPECT
engine, URL retrieval, 334
script, 251
updates, 565 “566
INSPECT XL described, using, 373
Inspection Engine, FW-1, 34 “35, 45
installation
completed, rebooting, 94
disabling services on firewall host, 53 “55
options, 59 “60
order of installation, 157
pre-installation considerations, 48 “67
securing host, 52 “58
security policies, 247, 250 “251, 393 “394
silent, 506
Installation Wizard, 70, 152
installing
Check Point VPN-1/FW-1 NG AI on Solaris, 104 “129
policy server on two firewalls, 513
policy servers, 476 “478
SecureClient software, 495 “498
SecuRemote client software, 464 “469
security policy, 249 “251
VPN-1/FW-1 on Nokia, 138 “146
VPN-1/FW-1 on SecurePlatform, 146 “151
VPN-1/FW-1 on Windows, 68 “80
InstallShield Wizard, 73
instant messengers, 566
Intel Xeon processor, 158
interfaces
defining on Check Point objects, 168
firewall, defining, 234
local, spoofing, 559
Security Dashboard, 4
Internet
hiding network objects from, 260 “264
interruption and outage prevention, 516
Internet Assigned Numbers Authority (IANA), 183, 260
Internet Control Message Protocol. See ICMP
Internet Engineering Task Force (IETF), 437
Internet Information Server (IIS), running on firewall, 53
Internet Key Exchange. See IKE
Internet Message Access Protocol (IMAP), permitting LAN access, 240
Internet Security Association and Key Management Protocol (ISAKMP), 437 “438
Internet Service Providers. See ISPs
Internetwork Packet Exchange/Sequenced Packet Exchange (IPX/SPX), 491
interoperable devices, configuring, 172
interruptions and outages, preventing, 516
Intrusion Detection System (IDS)
mapping, 28 “29
and SmartDefense, 424, 550
Intrusion Prevention System (IPS), 424
IP addresses
configuring firewall interface with, 56
firewall, 232
hiding with NAT, 260 “264
selecting, 174
Source field, rule creation, 196
IP addressing, managing with Meta IP, 16 “18
IP compression, 485
IP forwarding, enabling, 57
IP fragments , allowing, 554
IP Pool NAT, using, 543
IP scanning, defending against, 550
IPSec and VPN connections, 513
IPSO, upgrading images, 139
ipsofwd command, 157
IPX/SPX (Internetwork Packet Exchange/Sequenced Packet Exchange), client configuration, 491
ISAKMP (Internet Security Association and Key Management Protocol), 437 “438
ISPs (Internet Service Providers)
interruptions and outages, 516
and IP address allocation, 260



Check Point NG[s]AI
Check Point NG[s]AI
ISBN: 735623015
EAN: N/A
Year: 2004
Pages: 149

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net