Chapter 11: Building Your First Policy
We have learned a lot over the course of the previous chapters. Now, it’s time to put that knowledge to the test and construct our first fully functional access control policy.
We’ll be following the process of defining a policy structure, trying to account for the most common scenarios likely to be encountered in any infrastructure. Once that is done, we’ll proceed with the creation of the rules and, when necessary, additional objects. As we progress, we’ll be periodically testing the behavior of our policy to ascertain that it is performing as intended.
Additionally, we will gradually expand its capabilities with HTTPS Inspection, application control, URL filtering, and Identity Awareness to experience ...
Get Check Point Firewall Administration R81.10+ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.