Check Point Firewall Security Solution
Creating a Strong Firewall Security Policy
Using the Firewall Rule Base
Creating a Secure Firewall Rule Base
Defining Security Zones
Preventing IP Spoofing
Analyzing the Rule Base (Hit Count)
Enabling or Disabling Hit Count
Configuring the Hit Count Display
Remote Access to the Network
Creating VPN Policies
Adding Users to the Security Policy
Defining an Internet Access Policy
Threat Prevention Policies
Securing Data
Maximizing Network Performance
Configuring the NAT Policy
Monitoring and Logging
Index
|