Check Point NG[s]AI

Introduction

Once the VPN-1/FW-1 software is installed and configured, you are ready to log into the graphical user interface (GUI) and start composing your objects and rule bases. This chapter walks you through all of the options available for creating various objects, and shows you some of the features that you can utilize in the SmartDashboard to manipulate your rules.

This chapter also shows you how to access the firewall s implied rules, and explains the global properties that affect every security policy you create. It is important to know why your firewall is allowing pings if you have not explicitly defined them in your rule base.

After examining your policy options, you are shown how to access your firewall logs and system status. The Track options you choose in your policy will affect the outcome of your logs. You may choose to log some rules and not others. This chapter also describes ways to make selections in your SmartView Tracker so that you can view only logs for a specific source Internet Protocol (IP) address or logs for a specific user. The Check Point SmartView Tracker has a high quality interface and is easy to understand.

Категории