• Kiếm tiền với Hostinger

    Kiếm Tiền Cùng Hostinger

    Bạn đang tìm kiếm cách kiếm thêm thu nhập online? Hãy tham gia ngay chương trình Affiliate của Hostinger! Với mỗi khách hàng đăng ký thông qua liên kết của bạn, bạn sẽ nhận được khoản hoa hồng hấp dẫn.

    Hostinger cung cấp các dịch vụ lưu trữ web (hosting) chất lượng cao với mức giá cạnh tranh, giúp bạn dễ dàng giới thiệu và thu hút người dùng.

    Đừng bỏ lỡ cơ hội tuyệt vời này để tăng thêm thu nhập thụ động.

    Tham Gia Ngay

(Check Point)Instructions for configuring security policies on the Check Point firewall

TigerDao

Administrator
Thành viên BQT
This article will guide you how to use SmartConsole to create and manage security policies on Check Point firewall devices.

– There are 4 types of security policies:


  • Access Control : Firewall, Application Control & URL Filtering, Content Awareness, and Mobile Access Software Blades.
  • Threat Prevention : IPS, Anti-Virus, Threat Emulation, and Threat Extraction Software Blades.
  • Desktop Security : This is not enabled by default and only relevant for Remote Access VPN clients.
  • QoS : Only relevant if the QoS blade is enabled.



– In this section we only mention Access Control. Access Control policy is the primary security policy, you must install it on the Security gateway, it must be set before other Security Policies such as Threat Prevention, Desktop Security. Access Policy can include multiple Software Blades: Firewall, Application Control, Identity Awareness, and Content Awareness.

– In this article, we only mention the Firewall blade. Before setting up Access Control security policy, we need to perform the following steps:


  • Install Anti-Spoofing and Security Zones for Security Gateway’s Network Interfaces.
  • Create network objects for components in the system: Networks, Hosts, Servers, Groups,…
  • Create Access Control Security Policy rule.

1.Anti-Spoofing and Security Zones:


– Double-click up Security Gateway in SmartConsole and select Network Management tab. Currently there are 3 interfaces eth0, eth1, and eth2.


(IMG)


– Double-click on eth0, select Modify to set up as shown below.


(IMG)

(IMG)


– Select OK, then continue to set up eth1 as shown below.

(IMG)


– Select OK, then continue to set up eth2 as shown below.


(IMG)

2.Network objects :


– Objects are managed through Objects Panel located on the right side of the SmartConsole window.


(IMG)


– We will create network objects called LanNetworkin Object Panel, select New > Network.


(IMG)


– In the window that opens, set object name (LanNetwork), IP address and Mask.


(IMG)


– Part NAT (Network Address Translation) Temporarily not configured.

– Similar creation Host object DMZ-Srv (172.16.20.100)By choosing New > Host. You can change the object’s representative color in the upper left corner.


(IMG)


3.Create Access Control Policy:

– Go Security Policies > Access Control > Policy. Currently there is only one rule called Any > Any > Drop Cleanup rule, usually located at the bottom of the policy table to ensure that all connections that do not comply with the above rules will be dropped. At Track, select Log for Cleanup rule.


(IMG)

(IMG)


– Add new access rule, by selecting Add Rule above icon.


(IMG)


– This rule will allow HTTPS and SSH access from LAN to Security Gateway and SMS.

– Dien “Mgmt” in schools Nameselect LanNetwork object like Sourceand add SMS and SG in Destination,finally added HTTPS and SSH in Services & Applications.


(IMG)

(IMG)


– Change Action arrive Accept and select Track to Log . Once created, we will get something like the image below.


(IMG)


– To protect the Security System from unauthorized access, we will create Stealth rule. Right click up Mgmt Rule and choose New Rule > Below.

– And create a new rule as follows:


  • Name: Stealth
  • Source: Any
  • Destination: SMS, G.W
  • Services & Applications: Any
  • Action: Drop
  • Tracks: Log

– After creating, we will get something like the image below.

(IMG)


– To avoid logging unnecessary services, we can create Trash ruleslocated below Stealth rule with Any for all Source and Destinationmore udp-high-ports, bootp, NBT, and rip services arrive Services & Applications. To avoid logging, set Track to None by default.


(IMG)


– Below Trash ruleadd rule name Internet for Local Networks. Give http, https, ftp, and dns in Services and Applications. After creating, we will get something like the image below.


(IMG)



– Finally create a rule to allow access from LanNetwork to DMZ-Srv with Any service.


(IMG)


– R80.x Security Management Server allows multiple administrators to make changes in parallel. Make your changes visible to other administrators. You need to publish them by clicking Publish at the top of the SmartConsole window.


(IMG)


– We need to apply Security Policy. Select Install Policy in the upper left corner of the SmartConsole window.


(IMG)


– A window appears with information about the configuration number changed by the admin account. Select Publish & Install.


(IMG)



– When the changes are Publishwe will see the window Install Policyunchecked Threat Prevention and click Install.


(IMG)


– You will see the Policy installation process in the lower left corner of the SmartConsole window.


(IMG)


– When the installation process is complete, you will see a success message.


(IMG)


– Then from Lab User PC can access http and ping to DMZ-Srv.


(IMG)


– Select DMZ Access rule in SmartConsole and select Logs tab. You will see access logs for this rule.


(IMG)


– Currently we will not be able to access the internet because we have not configured NAT, we will configure it in the next section.

!!! Thank you for following the article!!!

Xem tiếp...
 

Similar threads

O
Trả lời
0
Lượt xem
106
Osama Bin Javaid
O
Top