Watch Video :- https://youtu.be/iIEgRQIovqY
Check Point
Firewall Security Solution
Firewalls control the
traffic between the internal and external networks and are the core of a strong
network security policy. Check Point Software Blades are a set of security
features that makes sure that the Security Gateway or Security Management Server
gives the correct functionality and performance. The Check Point Firewall is
part of the Software Blade architecture that supplies
"next-generation" firewall features, including:
o
VPN and mobile device connectivity
o
Identity and computer awareness
o
Internet access and filtering
o
Application control
o
Intrusion and threat prevention
o
Data Loss Prevention
Item
|
Description
|
1
|
Internet and external
networks
|
2
|
Security Gateway
|
3
|
SmartDashboard
|
4
|
Security Management
Server
|
5
|
Internal network
|
These are the primary
components of a Check Point solution:
o
Security Gateway - The engine that enforces the organization’s
security policy, is an entry point to the LAN, and is managed by the Security
Management Server.
o
Security Management Server - The application that manages, stores,
and distributes the security policy to Security Gateways.
o
SmartDashboard - A Check Point client used to create and manage
the security policy.
You can easily configure
the Firewall to support a dual stack network that uses IPv4 and IPv6 addresses.
Configure one or more interfaces with the applicable IPv4 and IPv6 addresses.
Item
|
|||
1
|
Security Gateway for dual
stack network
|
||
2
|
Internal network (IPv6
traffic)
|
||
3
|
Dual stack web server in
the DMZ
|
||
4
|
Security Gateway for IPv4
network
|
||
5
|
Security Gateway for IPv6
network
|
||
6
|
Mobile device (IPv4
traffic)
|
||
7
|
Mobile devices (IPv6
traffic)
|
||
A primary goal of a
firewall is to control access and traffic to and from the internal and external
networks. The Firewall lets system administrators securely control access to
computers, clients, servers and applications. The Firewall Rule Base defines the
quality of the access control and network performance. Rules that are designed
correctly make sure that a network:
o
Only allows authorized connections and prevents vulnerabilities in
a network
o
Gives authorized users access to the correct internal networks
o
Optimizes network performance and efficiently inspects connections
Some LTE features require
special licenses installed on the Security Gateways. The management server does
not require special licenses.
o
GTP features require a Carrier license, or the
earlier GX/GTP license.
o
CGNAT requires the Carrier license.
o
SCTP and Diameter inspection require the Carrier license.
If there is no Carrier
license on the Security Gateway, you cannot install a policy that has these
rules:
o
CGNAT rules
o
Rules with SCTP or Diameter services
o
Rules with Service = Any and Match
for any attribute is enabled for an SCTP service.
Notes
o
Services defined in Services > Other do
not require a Carrier license.
o
SCTP Connections matching Other services are not
inspected.
When you configure a
Firewall, it is necessary that you understand how it is connected to the other
Software Blades. For example, you must add a rule for the Firewall to allow
remote users to connect to the internal network. In addition, you can enable
Software Blades to supply advanced protection for the network, such as IPS and
Anti-Bot.
Some of the sections in
this guide tell you how to enable a sample configuration of a Software Blade.
Make sure that you read the applicable Administration Guide for the Software
Blade before you configure the feature for a production environment. Each
section also explains rules that you must add to the Firewall Rule Base to
complete the configuration for that feature.
Software Blades in this Guide
Software
|
Blade
|
|
Firewall
|
Creating a Strong Firewall Security Policy
Configuring
the NAT Policy
|
|
Mobile Access
|
Remote
Access to the Network
|
|
IPsec VPN
|
Creating
VPN Policies
|
|
Identity Awareness
|
Adding Users to the Security Policy
|
|
URL Filtering
|
Defining an Internet Access Policy
|
|
Application Control
|
||
IPS
|
Defending against Network Intrusions
|
|
Anti-Bot
|
||
Anti-Virus
|
Threat
Prevention Policies
|
|
Anti-Spam
|
||
Data Loss Prevention
|
Securing
Data
|
|
Advanced Networking &
Clustering
|
Maximizing Network Performance
|
|
SmartEvent
|
Monitoring
and Logging
|
|
SmartLog
|
You can use the
SmartDashboard toolbar to do these actions:
Icon
|
Description
|
Open the SmartDashboard
menu. When instructed to select menu options, click this button to show the
menu.
For example, if you are
instructed to select Manage > Users and
Administrators, click this button to open the Manage menu and then select
the Users and Administrators option.
|
|
Save current policy and
all system objects.
|
|
Open a policy package,
which is a collection of Policies saved together with the same name.
|
|
Refresh policy from the
Security Management Server.
|
|
Open the Database
Revision Control window.
|
|
Change global properties.
|
|
Verify Rule Base
consistency.
|
|
Install the policy on
Security Gateways or VSX Gateways.
|
|
Open SmartConsole.
|
No comments:
Post a Comment