Check Point NG[s]AI

T

TACACS, configuring, 190

TCP (Transmission Control Protocol)

and CVP resources, 324

and FW-1 s Inspection Engine, 34 “35

logging options, 416

resources, content filtering, 359 “361

vulnerabilities, protecting, 556 “558

TCP Dump, 257

TCP/IP attacks, 550

TCP/IP properties window, 57 “58

TCP service objects, 179 “181

TCP Tunneling, 514

TearDrop attack, 553

Telnet

timeouts, 257

user authentication, 299

templates for user authentication, 293 “297

TACACS (Terminal Access Controller Access Control Server), configuring, 190

testing

firewalls, 387 “368

security policy, 247

VPNs, 453 “454

.tgz files, 496

time objects, 193

timeouts

authentication, setting, 295 “296, 483

downloaded policies, 484

logging, SmatView Tracker resolution, 417

SYN attack identification, 557

topologies

gateway clusters, 529

managing VPN, 469

network, viewing, 28 “29

remote user configuration, 504 “505

resolving mechanism for VPN configuration, 487

SmartDefense, configuring, 553

synchronizing SecuRemote server with client, 466

Topology window, Workstation Properties, 233 “234

Track Options, log and alert menu, 415 “416

tracking. See monitoring

traffic

allowed under security policy, 227

monitoring firewall, 414

network, reporting on, 10

routing satellites to gateways, 449

rule to allow outbound, 264

rules for incoming, to Web server, 270

weighting individual types of, 14

training personnel about security policy, 220

Transactional Signatures (TSIGs), 17

translation rule base, 261 “264

Transmission Control Protocol. See TCP

Transparent mode, 465, 501, 510

transparent user authentication, 316 “317

Trend Micro, 322, 491

Triple Data Encryption Standard (3DES), 9

Trivial File Transfer Protocol (TFTP), 334

troubleshooting

debugging VPNs, 454 “456

log corruption, 399

NAT configuration, 282

slow firewall, 410

SmartConsole clients on Nokia platforms, 157

upgrade installation, 68

URI specification file, 366

tunneling-mode encryption, 437

Категории