cpts-doc-c1012.cp2k.reva.pdf

(6689 KB) Pobierz
A d v a n c e d F i r e Wa l l - 1
Management
Student Guide
C h e c k P o i n t 2 0 0 0 R e v. A E d i t i o n
Document # CPTS-DOC-C1012.4.1 Rev. A
CP2K
3
© Copyright 2000 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright
and distribution under licensing restricting their use, copy, and distribution. No part of
this documentation may be reproduced in any form or by any means without prior
written authorization of Check Point Software Technologies Inc. While every
precaution has been taken in the preparation of this document, Check Point assumes
no responsibility for errors or omissions. This document and features described herein
are subject to change without notice.
Trademarks:
FireWall-1, SecuRemote/SecureClient, Stateful Inspection, INSPECT, Check Point
and the Check Point logo are trademarks or registered trademarks of Check Point
Software Technologies Ltd. Sun, SPARC, Solaris, and SunOS are trademarks of Sun
Microsystems, Inc. UNIX and OPEN LOOK are registered trademarks of UNIX
System Laboratories.
All other products or services mentioned herein are trademarks or registered
trademarks of their respective owners.
Check Point Software Technologies Ltd.
Contacts:
International Headquarters:
3A Jabotinsky Street
Ramat Gan 52520 Israel
Tel: 972-3-613 1833
Fax: 972-3-575 9256
U.S. Headquarters:
Three Lagoon Drive, Suite 400
Redwood City, CA 94065
Tel: 650-628-2000
Fax: 650-654-4233
Dallas Courseware Development:
2505 N. Highway 360, Suite 800
Grand Prairie, TX. 75050
Tel: 817-606-6600
Fax: 817-606-6552
E-mail: courseware@ts.checkpoint.com
HTTP://www.checkpoint.com/services/education
CP2K
Document # CPTS-DOC-C1012.4.1 Rev. A
Document # CPTS-DOC-C1012.4.1 Rev. A
CP2K
i
Introduction to Advanced FireWall-1 Management
1
Advanced FireWall-1 Management Course Description ....................................... 1
Course Objectives ........................................................................................................................ 1
Course Layout ...................................................................................................... 2
Course Requirements .................................................................................................................. 2
Prerequisites ................................................................................................................................ 2
Course Map .......................................................................................................... 3
Day 1 ............................................................................................................................................ 3
Day 2 ............................................................................................................................................ 3
Additional Check Point Courses ........................................................................... 4
Check Point Certification Exam ................................................................................................... 5
Lab Setup ............................................................................................................. 6
Lab Topology ............................................................................................................................... 7
IP Addresses ................................................................................................................................ 8
Lab Terms .................................................................................................................................... 8
Site-Number Table ....................................................................................................................... 8
Optional DMZ Setup .................................................................................................................... 9
What’s New in Check Point 2000 ....................................................................... 10
New Operating System Support ................................................................................................ 10
Encryption .................................................................................................................................. 10
Authentication ............................................................................................................................ 11
Client Authentication .................................................................................................................. 11
Support for New Services .......................................................................................................... 11
Unit I — Chapter 1: FireWall-1 Architecture Overview
15
FireWall-1 Architecture ....................................................................................... 15
FireWall-1 Advantages ............................................................................................................... 15
How FireWall-1 Works ........................................................................................ 16
INSPECT Engine in the Kernel Module ..................................................................................... 16
Packet Inspected in Kernel Module ........................................................................................... 17
INSPECT Allowing Packets ....................................................................................................... 17
CP2K
Document # CPTS-DOC-C1012.4.1 Rev. A
Zgłoś jeśli naruszono regulamin