CCSE-VPN1-FW1 Management II Instructor Guide.pdf

(6920 KB) Pobierz
9 3 1 ) L U H :D O O 0 D Q D J H P H Q W , ,
,QVWUXFWRU *XLGH
&KHFN 3RLQW (GLWLRQ
Document # CPTS-DOC-C1012-I-V41
CP2K
© Copyright 2000 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright
and distribution under licensing restricting their use, copy, and distribution. No part of
this documentation may be reproduced in any form or by any means without prior
written authorization of Check Point Software Technologies Inc. While every
precaution has been taken in the preparation of this document, Check Point assumes
no responsibility for errors or omissions. This document and features described herein
are subject to change without notice.
Trademarks:
VPN-1/FireWall-1, SecuRemote/SecureClient, Stateful Inspection, INSPECT, Check
Point and the Check Point logo are trademarks or registered trademarks of Check
Point Software Technologies Ltd. Sun, SPARC, Solaris, and SunOS are trademarks of
Sun Microsystems, Inc. UNIX and OPEN LOOK are registered trademarks of UNIX
System Laboratories.
All other products or services mentioned herein are trademarks or registered
trademarks of their respective owners.
Check Point Software Technologies Ltd.
Contacts:
International Headquarters:
3A Jabotinsky Street
Ramat Gan 52520 Israel
Tel: 972-3-613 1833
Fax: 972-3-575 9256
U.S. Headquarters:
Three Lagoon Drive, Suite 400
Redwood City, CA 94065
Tel: 650-628-2000
Fax: 650-654-4233
Dallas Courseware Development:
2505 N. Highway 360, Suite 800
Grand Prairie, TX. 75050
Tel: 817-606-6600
Fax: 817-606-6552
E-mail: courseware@ts.checkpoint.com
HTTP://www.checkpoint.com/services/education
CP2K
Document # CPTS-DOC-C1012-I-V41
Document # CPTS-DOC-C1012-I-V41
CP2K
v
VPN-1/FireWall-1 Management II
1
Course Description ............................................................................................... 1
Course Objectives ........................................................................................................................ 1
Course Layout ...................................................................................................... 2
Course Requirements .................................................................................................................. 2
Prerequisites ................................................................................................................................ 2
Course Map .......................................................................................................... 3
Day 1 ............................................................................................................................................ 3
Unit I — Tracking and Access ...............................................................................................................3
Unit II — Management and Security .....................................................................................................3
Day 2 ............................................................................................................................................ 3
Unit III — Advanced Security ................................................................................................................3
Unit IV — Virtual Private Networks ......................................................................................................3
Lab Setup ............................................................................................................. 4
Lab Topology ............................................................................................................................... 5
IP Addresses ................................................................................................................................ 6
Lab Terms .................................................................................................................................... 8
Site-Number Table ....................................................................................................................... 8
What’s New in Check Point 2000 ......................................................................... 9
New Operating System Support .................................................................................................. 9
Encryption .................................................................................................................................... 9
Authentication ............................................................................................................................ 10
Client Authentication .................................................................................................................. 10
Support for New Services .......................................................................................................... 10
Unit I — Chapter 1:
Tracking and Alerts
13
Introduction ......................................................................................................... 13
Objectives .................................................................................................................................. 13
Key Terms .................................................................................................................................. 13
Tracking .............................................................................................................. 14
Configuring a Rule ..................................................................................................................... 15
The Log and Alert Tab ............................................................................................................... 16
Setting up User Defined Tracking .............................................................................................. 18
Adding User Defined Tracking to the Security Policy ................................................................ 18
alertf ........................................................................................................................................... 18
Lab 1: User Defined Tracking with alertf ............................................................ 20
CP2K
Document # CPTS-DOC-C1012-I-V41
Zgłoś jeśli naruszono regulamin