c1011.4.1.cp2k.pdf

(7899 KB) Pobierz
I n t r o d u c t i o n t o F i r e Wa l l - 1
Management
Student User Guide
Check Point 2000 Edition
Evaluation Copy — Not For
Classroom Use
Document # CPTS-DOC-C1011.4.1
CP2K
Evaluation Copy — Not For
Classroom Use
© Copyright 1999 Check Point Software Technologies Ltd.
All rights reserved. This product and related documentation are protected by copyright
and distribution under licensing restricting their use, copy, and distribution. No part of
this documentation may be reproduced in any form or by any means without prior
written authorization of Check Point Software Inc. While every precaution has been
taken in the preparation of this document, Check Point assumes no responsibility for
errors or omissions. This document and features described herein are subject to
change without notice.
Trademarks:
FireWall-1, SecuRemote/SecureClient, Stateful Inspection, INSPECT, Check Point
and the Check Point logo are trademarks or registered trademarks of Check Point
Software Technologies Ltd. Sun, SPARC, Solaris, and SunOS are trademarks of Sun
Microsystems, Inc. UNIX and OPEN LOOK are registered trademarks of UNIX
System Laboratories.
All other products or services mentioned herein are trademarks or registered
trademarks of their respective owners.
Check Point Software Technology Ltd.
Contacts:
International Headquarters:
3A Jabotinsky Street
Ramat Gan 52520 Israel
Tel: 972-3-613 1833
Fax: 972-3-575 9256
U.S. Headquarters:
Three Lagoon Drive, Suite 400
Redwood City, CA 94065
Tel: 650-628-2000
Fax: 650-654-4233
Dallas Courseware Development:
2505 N. Highway 360, Suite 700
Grand Prairie, TX. 75050
Tel: 817-606-6600
Fax: 817-652-4757
E-mail: courseware@ts.checkpoint.com
HTTP://www.checkpoint.com/services/education
CP2K
Document # CPTS-DOC-C1011
Evaluation Copy — Not For
Classroom Use
Document # CPTS-DOC-C1011.4.1
CP2K
i
Introduction To FireWall-1 Management
1
Course Description ............................................................................................... 1
Course Objectives ........................................................................................................................ 1
Course Layout ...................................................................................................... 2
Course Requirements .................................................................................................................. 2
Prerequisites ................................................................................................................................ 2
Check Point Certification Exams .......................................................................... 3
Check Point Certified Security Administrator ............................................................................... 3
Check Point Certified Security Engineer ...................................................................................... 3
Check Point Certified Security Instructor ..................................................................................... 3
Course Map .......................................................................................................... 4
Day 1 ............................................................................................................................................ 4
Day 2 ............................................................................................................................................ 4
Additional Check Point Courses ........................................................................... 6
Lab Setup ............................................................................................................. 7
Lab Topology ............................................................................................................................... 8
IP Addresses ................................................................................................................................ 9
Lab Terms .................................................................................................................................... 9
Site-Number Table ....................................................................................................................... 9
Optional DMZ Setup .................................................................................................................. 10
What’s New in Check Point 2000 ....................................................................... 11
New Operating System Support ................................................................................................ 11
Encryption .................................................................................................................................. 11
Authentication ............................................................................................................................ 12
Client Authentication .................................................................................................................. 12
Support for New Services .......................................................................................................... 12
Unit I — Chapter 1: FireWall-1 Architecture
15
Introduction ......................................................................................................... 15
Objectives .................................................................................................................................. 15
Key Terms .................................................................................................................................. 15
Defining a Firewall .............................................................................................. 17
What is a Firewall? ..................................................................................................................... 17
TCP/IP ....................................................................................................................................... 18
Packets ...................................................................................................................................... 18
CP2K
Document # CPTS-DOC-C1011.4.1
Zgłoś jeśli naruszono regulamin