Eicon Networks S92 Manual de usuario Pagina 87

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 209
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 86
YuChakTinMichael‘sGIACGCFWProjectAssignment
Page 87
ConfiguringtheOtherDevices
ConfiguringtheN orton1_IDSFirewall:
Refertot he“ProductsPreparation”section forinformationonNortonPersonalFirewall2002.
Refertot he“ProductsPreparation”section forinformationonWindows2000hardening.
Norton1_IDSsitsbetweentheinternal coreswitch andtheInternal_Clientssegment.
SecurityPolicy:
Thepoliciestobeenforcedhereare:
1. NoconnectiontowardsInternal_Clientscaneverbeinitiatedfromanyother
segment(exceptfromInternal_Admin).
2. OutboundaccessrequestsmadebyInternal_Clientsarenotrestrictedbythis
firewall,butbyotherfirewallsonthenetwork.
3. Whentheclientsaccesstheinternet,JavaandActiveXcodesareblocked.
4. Dropandlogeverythingelse.
TheconfigurationofNortonFirewall2002requiresemphasisontheconceptof
trustedzonesandsecurity levels.Thereisnosophisticatedmechanismfordefining
individualrules.Thegoodthingaboutthisapproachisthesimplicityofconfiguration
andadministration.Thedrawbackisthelackofflexibilityandprecisecontrol.
Therefore,thisfirewallisonlyusedatthedepartmentallevelforprotectingusers,not
services.
DefiningtheZones:
ToproperlyconfiguretheNortonFirewallatthislocation,thekeyistodefinethe
TrustedZonesandtheRestrictedZones. TrustedZonescanenjoyalmostallsortsof
access,andaretypicallytheinternalnetworksegments.RestrictedZones,ontheother
hand,aretheexternalnetworksthatarenottobetrusted.Connectionscannotbe
initiatedfromthesezonestopass through thefirewall.
Vista de pagina 86
1 2 ... 82 83 84 85 86 87 88 89 90 91 92 ... 208 209

Comentarios a estos manuales

Sin comentarios