Eicon Networks S92 Manuale Utente Pagina 87

  • Scaricare
  • Aggiungi ai miei manuali
  • Stampa
  • Pagina
    / 209
  • Indice
  • SEGNALIBRI
  • Valutato. / 5. Basato su recensioni clienti
Vedere la pagina 86
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 87
ConfiguringtheOtherDevices
ConfiguringtheN orton1_IDSFirewall:
Refertot he“ProductsPreparation”section forinformationonNortonPersonalFirewall2002.
Refertot he“ProductsPreparation”section forinformationonWindows2000hardening.
Norton1_IDSsitsbetweentheinternal coreswitch andtheInternal_Clientssegment.
SecurityPolicy:
Thepoliciestobeenforcedhereare:
1. NoconnectiontowardsInternal_Clientscaneverbeinitiatedfromanyother
segment(exceptfromInternal_Admin).
2. OutboundaccessrequestsmadebyInternal_Clientsarenotrestrictedbythis
firewall,butbyotherfirewallsonthenetwork.
3. Whentheclientsaccesstheinternet,JavaandActiveXcodesareblocked.
4. Dropandlogeverythingelse.
TheconfigurationofNortonFirewall2002requiresemphasisontheconceptof
trustedzonesandsecurity levels.Thereisnosophisticatedmechanismfordefining
individualrules.Thegoodthingaboutthisapproachisthesimplicityofconfiguration
andadministration.Thedrawbackisthelackofflexibilityandprecisecontrol.
Therefore,thisfirewallisonlyusedatthedepartmentallevelforprotectingusers,not
services.
DefiningtheZones:
ToproperlyconfiguretheNortonFirewallatthislocation,thekeyistodefinethe
TrustedZonesandtheRestrictedZones. TrustedZonescanenjoyalmostallsortsof
access,andaretypicallytheinternalnetworksegments.RestrictedZones,ontheother
hand,aretheexternalnetworksthatarenottobetrusted.Connectionscannotbe
initiatedfromthesezonestopass through thefirewall.
Vedere la pagina 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 208 209

Commenti su questo manuale

Nessun commento