Check Point NG[s]AI

F

F-Secure, 322

failover methods , 543 “545

.FC files, 251

File and Print Sharing Worm Catcher, 564

File Transfer Protocol. See FTP

files

See also specific file

firewall configuration, 256

security policy, 251 “252

filtering broadcasts from security logs, 256

fingerprint of server, 44, 92

fingerprint scrambling options, 558

Finjan Software s SurfinGate, 322

FireWall-1 (FW-1)

See also VPN-1/Firewall-1

administering for effectiveness, 386 “401

authentication schemes, 286 “292

backing up configuration, 401 “402

command-line interface (CLI), 248

default and initial security policy, 229

described, 4 “8

file editing capability, 392 “393

Inspection Engine, 34 “35

monitoring logs, 394 “400

performance and scalability, 36 “37

state table limit, 383

stopping and starting for maintenance, 403

throughput on different platforms (table), 377

FireWall-1 GX, configuring, 204

firewall objects, defining, 231 “237

firewalls

See also FW-1, VPN-1/Firewall-1

architecture, 223 “224

Check Point solution, 36

defining users on, 192

displaying licenses, 23

installing policy server on two, 513

and OSI reference model, 31 “33

security policy. See Security Policy

synchronizing, 525 “528

technology, 43

FloodGate-1

configuring, 204

described, using, 14 “15, 42

installation, 60

logging option (table), 399

Foundry SeverIron XL, 544

fragmented packet handling, 45

FTP (File Transfer Protocol)

and CVP resources, 324, 326

resource, using, 188

resources, content filtering, 357 “359

running on firewall, 53

user authentication, 299

FW-1. See FireWall-1

FW-1 daemon, controlling, 404 “405

FW-1/VPN-1. See VPN-1/FireWall-1

fw tab command, 383

fw unloadlocal command, 153

fwalert command, 417

fwauthd.conf, 380

$FWDIR/conf/local.scv.file, 490, 547

fw.log, 395

fwpolicy command, 160

fwstart command, 403

fwstop command, 403

FWZ firewall encryption scheme, 437

Категории