To The Student Training Course of Firewall-1 Version 4.0: C C S A
To The Student Training Course of Firewall-1 Version 4.0: C C S A
To The Student Training Course of Firewall-1 Version 4.0: C C S A
s1
Check Point
Certified
Security
Administrator
Page 1 s2
Introduction to
CCSA
Page 1 s3
Course: Objectives
Chapter Layout
Unit I — Overview
Introduction
Chapter 1: Authentication
Final Scenario
Page 8 s12
What’s New...
New Platforms
Encryption
Enterprise Management
Authentication
Client Authentication
Security Servers
Support for New Services
Check your CCSA User Guide for specifics!
Page 9 s13
What Is A Firewall?
Connects internal and external networks with
varying levels of trust by implementing security
policy regarding network communication
Untrusted
Trusted Firewall Networks & Servers
Networks
Untrusted
Router Users
Intranet Internet
Server
Segment Public Accessible
Servers & Networks
Trusted
Users
Page 11 s16
TCP/IP Stack
Page 12 s18
Packets
Application
TCP/IP uses a data
Presentation
OSI
Reference
envelope called an
Session
Model Internet Protocol (IP)
Transport packet to transmit bits
Network
(data) from one place
Data Link
Physical
to another.
TCP/IP Packet
Stateful Inspection
Data Link • FireWall-1:
Physical Before Network Level
Page 13 s20
Application Application
Presentation Presentation
Session Session
Transport Transport
Network Network
DataLink DataLink DataLink
Router
Page 13 s21
Application
Presentation Pros
Session • Inexpensive
• Application Transparency
Transport
Network
Data Link
Physical
Page 13 s22
Application
Presentation Cons
Session •Low Security
•Subject to IP Spoofing
Transport •Difficult to manage ACLs
Network •Not Scaleable
Data Link •No Screening above the
Physical Network Layer
Page 15 s23
Application Layer Gateway
(Proxy) Path
Router
Page 15 s24
Application
Presentation Pros
Session • Good Security
Transport • Full application-layer
Network awareness
Data Link
Physical
Page 15 s25
Application
Presentation Cons
Session • Poor Performance
Transport • Limited Application Support
Network • Poor Scalability
Data Link • Non-transparent
Physical
Page 16 s26
Application
Network Network
INSPECT Engine
Dynamic
State Tables
Page 17 s27
Stateful Inspection
Application Pros
Presentation • Good Security
Session • High Performance
Transport • Full Application-layer
Awareness
Network
• Scalability
• Extensible
• Transparency
Allow
base.
Drop or Reject
INSPECT ENGINE
Page 21 s33
Flow of Packets through Inspect Engine
Page 22 s34
FireWall-1 Products
Enterprise Products
Multiple network security solutions that include
multiple Firewall Modules, Management
Modules and GUIs
Management
Module
Firewall
Module
Inspection GUI
Module
Connect Control
Module
Router Security
Management
Encryption
Module
Page 23 s36
Firewall Module
Firewall
Firewall Module:
Module
• Includes Inspection
Module and Daemons
Inspection
• Controls and monitors Module
firewall modules Connect Control
Module
• Inspection Module
– Implements the security policy and logs events
– Communicates with the Management Module using the
daemons
• Connect Control Module
– Enables server load balancing
Page 24 s37
Management Module
Management
Module
Encryption Module
Encryption
Module
Encryption
Module
Enables secure, encrypted
communications between machines
protected by FireWall-1
Page 24 s39
Router Security
Management
GUI
Security
Policy Editor System
Status
Log Viewer