© Copyright IBM Corp. 2001 vii
Figures
1. Simplest classic firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Classic DMZ firewall environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Modern firewall environment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4. Network plan for stand-alone configuration. . . . . . . . . . . . . . . . . . . . . . . 25
5. VPN-1/FireWall-1 GUI login pop-up box . . . . . . . . . . . . . . . . . . . . . . . . . 87
6. Adding a rule to the bottom . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 88
7. Changing action to accept. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
8. Changing track to account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 90
9. Opening the Network Objects menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
10. Creating a new workstation object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
11. Workstation Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 93
12. Interfaces tab of the firewalls Workstation Properties. . . . . . . . . . . . . . . 94
13. Icon of a firewall gateway object . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 94
14. Installing the Security Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
15. Implied rules warning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
16. Install Security Policy target selection . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
17. IP spoofing warning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
18. Install Security Policy results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
19. Modified Check Point log viewer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
20. VPN-1/FireWall-1 Log Viewer: options . . . . . . . . . . . . . . . . . . . . . . . . . . 99
21. Deactivating implied rules in policy properties. . . . . . . . . . . . . . . . . . . . 100
22. Making the implied pseudo rules visible . . . . . . . . . . . . . . . . . . . . . . . . 101
23. More implied rules in Policy -> Properties -> Services tab . . . . . . . . . . 102
24. IP Options Drop Track in Policy -> Properties -> Log and Alert tab . . . 103
25. A sample workstation type network object . . . . . . . . . . . . . . . . . . . . . . 104
26. A sample network type network object . . . . . . . . . . . . . . . . . . . . . . . . . 105
27. A sample group type network object . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
28. A sample group that includes a group type network object. . . . . . . . . . 107
29. Sample panel of IP spoofing configuration . . . . . . . . . . . . . . . . . . . . . . 108
30. The ruleset we used for our examples . . . . . . . . . . . . . . . . . . . . . . . . . 110
31. Creating a new user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
32. Entering the new users data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 112
33. Choosing an authentication scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
34. Changing the HTTP rule to user authentication . . . . . . . . . . . . . . . . . . 114
35. Enabling VPN-1/FireWall-1 password as authentication scheme . . . . . 115
36. Enabling user authenticated access to allow all HTTP servers. . . . . . . 115
37. Changing the ICMP rule to client authentication . . . . . . . . . . . . . . . . . . 117
38. Client Authentication Action Properties: Limits . . . . . . . . . . . . . . . . . . . 118
39. Client Authentication using Web browser: Login. . . . . . . . . . . . . . . . . . 119
40. Client Authentication using Web browser: Password . . . . . . . . . . . . . . 120

Get Check Point VPN-1 / FireWall-1 on AIX: A Cookbook for Stand-Alone and High Availability Solutions now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.