EasyManua.ls Logo

Check Point UTM-1 Edge - The UTM-1 Firewall Security Policy

Check Point UTM-1 Edge
707 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
The UTM-1 Firewall Security Policy
326 Check Point UTM-1 Edge User Guide
This chapter includes the following topics:
The UTM-1 Firewall Security Policy...................................................... 326
Default Security Policy............................................................................ 327
Setting the Firewall Security Level ......................................................... 328
Configuring Servers................................................................................. 331
Using Rules ............................................................................................. 334
Using Port-Based Security....................................................................... 347
Using Secure HotSpot ............................................................................. 351
Using NAT Rules .................................................................................... 357
Using Web Rules..................................................................................... 365
The UTM-1 Firewall Security Policy
What Is a Security Policy?
A security policy is a set of rules that defines your security requirements, including (but not
limited to) network security. By themselves, the network security-related rules comprise
the network security policy.
When configured with the necessary network security rules, the UTM-1 appliance serves
as the enforcement agent for your network security policy. Therefore, the UTM-1
appliance's effectiveness as a security solution is directly related to the network security
policy's content.
Security Policy Implementation
The key to implementing a network security policy is to understand that a firewall is
simply a technical tool that reflects and enforces a network security policy for accessing
network resources.
A rule base is an ordered set of individual network security rules, against which each
attempted connection is checked. Each rule specifies the source, destination, service, and
action to be taken for each connection. A rule also specifies how a communication is
tracked, logged, and displayed. In other words, the rule base is the implementation of the
security policy.

Table of Contents

Related product manuals