EasyManua.ls Logo

Check Point UTM-1 U-5 - Define a Network; Create the Firewall Rules; Configuring Content Inspection

Check Point UTM-1 U-5
41 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
UTM-1 Getting Started Guide | 27
4. From the Translation Method drop down menu, select Hide, and the option Hide behind
Gateway, and click OK.
Define a Network
Define the networks to be used in the Firewall Rule Base.
To define a network:
1. Click Manage > Network Objects > New > Network.
2. Enter the Name and Network Address (for example, 10.10.10.0) and Net Mask.
3. On the NAT tab, select Add Automatic Address Translation rules.
4. From the Translation Method drop down menu, select Hide, and the option Hide behind
Gateway, and click OK.
Create the Firewall Rules
Define the Firewall rules. To define a rule:
1. From the menu, select Rules > Add Rule and choose one of Bottom, Top, Below, Above.
2. In the Source column, right click and select Add..., choose an object and click OK.
3. In the Service column, right click, select Add..., choose a service and click OK.
4. In the Action column, right click and select Accept. The last rule in the rule base should be
drop.
5. In the Track column, right click, select Add... and choose Log.
6. To view all activity that is being logged, click Window > SmartView Tracker.
Configuring Content Inspection
When content inspection is configured on the UTM-1 gateway, traffic for the appropriate
protocols is forwarded to the security server. The security server forwards the data stream to
the inspection engine an Anti-Virus server, for example. The data is allowed or blocked
based on the response of the inspection engine.
Content inspection is performed only on traffic that has been allowed by the Security Policy.
To enable content inspection on the gateway, in the General Properties page of the gateway,
select one or more of the following Network Security Blades:
URL Filtering
Anti-Virus & Anti-Malware
Anti-Spam & Email Security.
For more information about content inspection, see the "Anti-Virus and URL filtering" chapter
and the "Anti-Spam and Mail" chapter in the Firewall Administration Guide
(http://supportcenter.checkpoint.com).

Table of Contents

Related product manuals