Cover image for Check point VPN-1/firewall-1 NG : administration
Title:
Check point VPN-1/firewall-1 NG : administration
Personal Author:
Publication Information:
New York : McGraw-Hill/Osborne, 2003
ISBN:
9780072223422
Added Author:

Available:*

Library
Item Barcode
Call Number
Material Type
Item Category 1
Status
Searching...
30000010025469 TK5105.59 S52 2003 Open Access Book Book
Searching...

On Order

Summary

Summary

Shows network administrators and engineers the essentials of installing, running, and troubleshooting the Nokia VPN-1/FireWall-1 enterprise system. This work includes case studies and ready-to-use applications, and a CD-ROM with sample software and solutions.


Table of Contents

Acknowledgmentsp. xvii
Introductionp. xix
1 The Internet and the Need for Securityp. 1
History of the Internetp. 2
TCP/IPp. 4
Internet Securityp. 15
Checklist: Key Points in the Internet and the Need for Securityp. 25
2 What's New in VPN-1/FireWall-1 NGp. 27
What's Changed Since 4.1p. 28
Feature Packsp. 32
Checklist: Key Points in What's New in VPN-1/FireWall-1 NGp. 43
3 VPN-1/FireWall-1 NG Architecturep. 45
Fundamentals of Extranet Securityp. 46
Using Firewalls for Extranet Protectionp. 47
Securing Networks, Systems, Applications and Usersp. 49
Firewalls: from Packet Filters to Stateful Inspectionp. 52
Selecting a Firewall for Today's Networksp. 57
How VPN-1/FireWall-1 NG Worksp. 61
The Virtual Private Networkp. 67
Checklist: Key Points in VPN-1/FireWall-1 NG Architecturep. 71
4 Solaris VPN-1/FireWall-1 NG Installation and Setupp. 73
Installing a VPN-1/FireWall-1 NG on Solarisp. 74
Installing VPN-1/FireWall-1 NGp. 86
Locating the Installation Directoriesp. 95
Checklist: Key Points in Solaris VPN-1/FireWall-1 NG Installation and Setupp. 97
5 Windows NT/2000 VPN-1/FireWall-1 NG Installation and Setupp. 99
Installing VPN-1/FireWall-1 NG on Windowsp. 101
Installing VPN-1/FireWall-1 NGp. 107
Locating the Installation Directoriesp. 115
Checklist: Key Points in Windows NT/2000 VPN-1/FireWall-1 NG Installation and Setupp. 116
6 Red Hat Linux VPN-1/FireWall-1 NG Installation and Setupp. 117
Backgroundp. 118
Installing VPN-1/FireWall-1 on Linuxp. 120
Installing VPN-1/FireWall-1 NGp. 127
Checklist: Key Points in Red Hat Linux VPN-1/FireWall-1 NG Installation and Setupp. 135
7 Nokia Appllance VPN-1/FireWall-1 NG Installation and Setupp. 137
Backgroundp. 138
Installing VPN-1/FireWall-1 NG on Nokiap. 139
Locating the Installation Directoriesp. 154
Checklist: Key Points in Nokia Appliance VPN-1/FireWall-1 NG Installation and Setupp. 154
8 Setting Up Security Policy Rule Base and Propertiesp. 157
Security Policy Definedp. 158
Checklist: Key Points in Setting Up a Security Policy Rule Base and Propertiesp. 185
9 Working with the Security Policyp. 187
Assessing Fiction Corporation's Securityp. 189
Masking Rulesp. 194
Querying the Rule Basep. 196
Naming Sectionsp. 200
Tracking and Revision Controlp. 200
Disabling Rules and Negating Objectsp. 202
Uninstalling the Security Policyp. 205
Improving Performance with the Security Policyp. 205
A Word about Visual Policy Editorp. 206
Checklist: Key Points in Working with the Security Policyp. 208
10 Log Viewer and System Status Viewerp. 209
Log Viewerp. 210
Reducing the Noise in Logsp. 219
Activity Logged as Rule 0p. 222
SmartView Tracker (FP3)p. 222
System Status Viewerp. 225
SmartView Statusp. 227
Integration with Enterprise Network Managementp. 229
Checklist: Key Points in Log Viewer and System Status Viewerp. 229
11 Tracking and Alertsp. 231
Trackingp. 232
Checklist: Key Points in Tracking and Alertsp. 238
12 VPN-1/FireWall-1 NG Authenticationp. 239
Supported Authentication Schemesp. 240
Creating Users and Groupsp. 240
External Authentication Serversp. 241
Stealth Authenticationp. 242
User Authenticationp. 242
Client Authenticationp. 244
Session Authenticationp. 246
Fiction Corporation Examplep. 246
UserAuthorityp. 248
Checklist: Key Points in VPN-1/FireWall-1 NG Authenticationp. 249
13 Network Address Translation (NAT)p. 251
IP Address Issuesp. 254
Efficient Use of Registered IP Addressesp. 256
Address Translation and Routingp. 258
Network Address Translation (NAT) Rulesp. 259
Address Translation and Anti-Spoofingp. 262
Automatic versus Manual Translationp. 264
Overlapping NATp. 266
Checklist: Key Points in Network Address Translation (NAT)p. 267
14 Load Balancingp. 269
The Need for Load Balancingp. 270
How Load Balancing Worksp. 271
Load Balancing Algorithmsp. 271
Logical Server Typesp. 272
Setting Up Load Balancing Algorithmsp. 276
Real World Load Balancing Configurationp. 276
Checklist: Key Points in Load Balancingp. 280
15 Content Security and Content Vectoring Protocolp. 283
Role of the Security Serverp. 284
Extending Data Inspection with Content Securityp. 284
Content Security Changes for Feature Pack 3p. 315
CVP Load Sharing and Chainingp. 316
Upgrading from VPN-1/FireWall-1 4.xp. 316
Checklist: Key Points in Content Security and Content Vectoring Protocolp. 316
16 SYNDefenderp. 319
TCP Three-Way Handshakep. 320
SYN Flood Attackp. 321
Denial of Service Attacksp. 323
Using SYNDefenderp. 325
Feature Pack 3 Changesp. 331
Checklist: Key Points in SYNDefenderp. 333
17 Encryption and Virtual Private Networksp. 335
How Encryption Worksp. 336
Privacyp. 337
Symmetric Encryption (Shared Key)p. 338
Asymmetric Encryptionp. 340
Public Keysp. 344
Creating Certificatesp. 345
VPN-1/FireWall-1 NG Encryption Schemesp. 347
Internet Key Exchange (IKE)p. 348
FWZ VPN-1/FireWall-1 NG Encryption Schemep. 351
Encryption Scheme Comparisonp. 351
Certificate Authorities (CA)p. 352
Implementing Two-Gateway IKE Encryption Configurationp. 357
VPN Communityp. 361
Extranet Managerp. 372
VPN Routingp. 374
NAT and VPNp. 375
Checklist: Key Points in Encryption and Virtual Private Networksp. 376
18 SecuRemote and SecureClientp. 377
SecuRemote/SecureClientp. 378
Secure Connections for Fiction Corporation Finance Gatewayp. 380
IKE or FWZp. 383
Routing Considerationsp. 384
Secure Domain Loginp. 385
Simplified Mode (FP2 and Above)p. 385
Checklist: Key Points in SecuRemote and SecureClientp. 389
19 Policy Serverp. 391
Policy Server Definedp. 392
Client Encryption Rulesp. 400
Desktop Security Rule Basep. 400
The SecureClient GUIp. 402
Fiction Corporationp. 405
Security Configuration Verificationp. 406
SecureClient for Mobile Devicesp. 407
Checklist: Key Points in Policy Serverp. 407
20 High Availability Modulep. 409
The Need for High Availabilityp. 410
How High Availability Worksp. 410
Configuring High Availabilityp. 412
Automatic MAC Address Configurationp. 416
Using High Availability in Virtual Private Networksp. 416
Nokia Firewall Appliancep. 417
High Availability Enhancementsp. 417
Checklist: Key Points in High Availability Modulep. 418
21 Troubleshootingp. 419
VPN-1/FireWall-1 NG Debugging Toolsp. 420
Using the Policy Editor in local Modep. 427
VPN Debuggingp. 427
The Methodology for Troubleshootingp. 428
Make Sure the Server Is Up and Runningp. 429
IP Routingp. 429
Secure Internal Communicationsp. 431
Network Address Translationp. 436
Content Vectoring Protocol Troubleshootingp. 438
Too Many Hostsp. 438
Application Related Issuesp. 440
DBEDITp. 441
Management Console Lockoutp. 443
And Finally ... It's NOT a Firewall Issue!p. 443
Checklist: Key Points in Troubleshootingp. 444
22 Malicious Activity Detection (MAD) and SmartDefensep. 445
Malicious Activity Detection (MAD)p. 446
Enabling MADp. 453
SmartDefensep. 455
Checklist: Key Points in Malicious Activity Detection (MAD)p. 469
A Fiction Corporation's Initial Proposalp. 471
B Upgrading VPN-1/FireWall-1 NG from Previous Versionsp. 485
Nokia Upgradesp. 487
Upgrade Verifier Utilityp. 491
C Backing Up and Restoring VPN-1/FireWall-1 NGp. 493
Backup and Restore on Nokiap. 494
Backup and Restore VPN-1/ FireWall-1 NG Management Serverp. 495
D Using the Check Point Wizard to Create a Security Policyp. 497
Preparing to Use the Wizardp. 498
Using the Rule Base Wizardp. 498
Indexp. 509