Ccsa Unit3
Ccsa Unit3
Ccsa Unit3
Unit III-1
Security Policy
Rule Base and
Properties Setup
Page 173 s2
Security Policy Rule Base and
Properties Setup: Objectives
Explain why it is important to correctly
set up a security policy
Explain the order FireWall-1 matches policies
and rules
Be able to name and define the rule base
elements
Show how to create a rule base
Show how to add rules to the rule base
(continued)
Page 173 s3
Objectives (continued)
Select New
from the
File Menu
Page 176 s5
Name the Security Policy
Type the
name of the
new policy
Page 176 s6
Security Policy with No Rules
Number
Source
Destination
Services
Track
Install On
Time
Comment
Page 181 s8
Install On Element
Select Firewall
and click OK.
Page 188 s16
Defining Implicit (Pseudo) Rules
Explicit Rules:
Created in the rule base
Matched to packets in numerical order
Page 188 s18
Viewing Implicit (Pseudo)
and Explicit Rules
Page 190 s19
1 IP Spoofing / IP Options
3 2 local-net Any
Rule Base
Any accept Short fw
7 Implicit Drop
Page 191 s21
Understanding Interface Direction
Related to the firewall, not the network and
regardless of the packet’s source or destination
• INBOUND: Entering the machine
• OUTBOUND: Leaving the machine
• EITHERBOUND: Entering and leaving the machine
Outbound Inbound
Security Security
Policy Policy
Page 191 s22
Inbound Packet Filtering Direction
Internet
INSPECTED HERE
Outer Inner Inbound
Packet
NIC NIC
Page 192 s24
Outbound Packet Filtering Direction
INSPECTED HERE
Outer Outbound Inner
Packet
NIC NIC
Page 193 s25
Outbound Packet Filtering Direction
INSPECTED HERE
INSPECTED HERE
INSPECTED HERE
INSPECTED HERE
Security Policy
tab: properties
relating to the
Security Policy
as a whole
Page 198 s31
Services
Services tab:
properties
enabling
Services
Page 199 s32
Log and Alert
Security
Servers tab: to
be covered in
CCSE
Page 204 s34
Authentication
Authentication
tab: properties
relating to User
and Client
Authentication
Page 205 s35
SYNDefender
SYNDefender
tab: properties
controlling the
SYN Attack
Defender
Page 207 s36
LDAP
LDAP: to be
covered in
CCSE
Page 209 s37
Encryption
Encryption: to
be covered in
CCSE
Page 212 s38
Miscellaneous
Miscellaneous
tab: properties
relating to load
balancing and
encryption
Page 213 s39
Access Lists
Access Lists
tab: properties
relating to
Router Control
Page 219 s40
Unit III-2
Administering
Security Policy
with Rule Base
Page 219 s41
Administering Security Policy
with Rule Base: Objectives
Select Install
from the Policy
Menu to apply the
Security Policy.
Page 221 s43
Install Security Policy Screen
Select Firewall
and click OK.
Page 222 s44
Spoofing in Action
Internal Network
FORGED SOURCE IP: 192.168.1.0
Packet
Source IP: 192.168.1.10
Destination IP:
207.158.64.10
Router
Internet
DMZ
www.company.com
207.158.64.10