The Utm-1 Firewall Security Policy - Check Point UTM-1 Edge User Manual

Internet security appliance
Hide thumbs Also See for UTM-1 Edge:
Table of Contents

Advertisement

The UTM-1 Firewall Security Policy

This chapter includes the following topics:
The UTM-1 Firewall Security Policy ...................................................... 326
Default Security Policy............................................................................ 327
Setting the Firewall Security Level ......................................................... 328
Configuring Servers................................................................................. 331
Using Rules ............................................................................................. 334
Using Port-Based Security....................................................................... 347
Using Secure HotSpot ............................................................................. 351
Using NAT Rules .................................................................................... 357
Using Web Rules ..................................................................................... 365

The UTM-1 Firewall Security Policy

What Is a Security Policy?
A security policy is a set of rules that defines your security requirements, including (but not
limited to) network security. By themselves, the network security-related rules comprise
the network security policy.
When configured with the necessary network security rules, the UTM-1 appliance serves
as the enforcement agent for your network security policy. Therefore, the UTM-1
appliance's effectiveness as a security solution is directly related to the network security
policy's content.
Security Policy Implementation
The key to implementing a network security policy is to understand that a firewall is
simply a technical tool that reflects and enforces a network security policy for accessing
network resources.
A rule base is an ordered set of individual network security rules, against which each
attempted connection is checked. Each rule specifies the source, destination, service, and
action to be taken for each connection. A rule also specifies how a communication is
tracked, logged, and displayed. In other words, the rule base is the implementation of the
security policy.
326
Check Point UTM-1 Edge User Guide

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the UTM-1 Edge and is the answer not in the manual?

Table of Contents

Save PDF