The UTM-1 Firewall Security Policy
This chapter includes the following topics:
Configuring Servers................................................................................. 331
Using Rules ............................................................................................. 334
Using Secure HotSpot ............................................................................. 351
Using NAT Rules .................................................................................... 357
Using Web Rules ..................................................................................... 365
The UTM-1 Firewall Security Policy
What Is a Security Policy?
A security policy is a set of rules that defines your security requirements, including (but not
limited to) network security. By themselves, the network security-related rules comprise
the network security policy.
When configured with the necessary network security rules, the UTM-1 appliance serves
as the enforcement agent for your network security policy. Therefore, the UTM-1
appliance's effectiveness as a security solution is directly related to the network security
policy's content.
Security Policy Implementation
The key to implementing a network security policy is to understand that a firewall is
simply a technical tool that reflects and enforces a network security policy for accessing
network resources.
A rule base is an ordered set of individual network security rules, against which each
attempted connection is checked. Each rule specifies the source, destination, service, and
action to be taken for each connection. A rule also specifies how a communication is
tracked, logged, and displayed. In other words, the rule base is the implementation of the
security policy.
326
Check Point UTM-1 Edge User Guide
Need help?
Do you have a question about the UTM-1 Edge and is the answer not in the manual?