SmartConsole Hands-On eBook - page 26

22
Check Point Products & Solutions
Check Point SmartConsole
16. Rules are a collection of objects, services (like HTTP), and actions. Let’s look
at a few. Consider rules 6 - 8 in the Rules for Specific Sites group:
Figure 6 — Rule for Specific Sites
17. By looking at these rules, can you see what the security administrator intends
to accomplish? Here are a few tips:
The first rule requires users on an internal network who want to surf the Internet
(http) to authenticate and keeps a record of that traffic.
The second rule, Rule7, allows any traffic from the internal corporate network
to the finance, HR, and R&D networks and keeps a log.
The third rule in this example alerts the security administrator if someone in
Tech Support uses HTTP to access the Remote-1 Web server but allows the
traffic to continue through the firewall.
Note:
As a Security Gateway, the machine on which this policy is installed uses
these rules, objects, and settings to determine whether or not to open the
door to specific traffic wanting to pass through. Sometimes the traffic is
allowed, sometimes it’s not.
1...,16,17,18,19,20,21,22,23,24,25 27,28,29,30,31,32,33,34,35,36,...82
Powered by FlippingBook