16
Introducing the security gateway
Key components of the security gateway
■
High availability/load balancing
■
■
Network security best practices
Firewall technology
The security gateway’s firewall component uses a unique architecture to provide strong, transparent
firewall protection against unwanted intrusion without slowing the flow of approved traffic on
enterprise networks. Some key firewall features include:
Virtual Private Network (VPN) server technology
Symantec Gateway Security 5000 Series v3.0 includes VPN technology that lets organizations securely
extend their network perimeters beyond the enterprise.
The security gateway uses VPN tunnels to send encrypted and encapsulated IP packets over public
networks securely to another VPN server. VPN tunnels can be created for connections from IPsec-
compliant clients or clientless VPN access.
Note:
The base license that is included with your appliance includes support for one concurrent VPN
user connection and unlimited gateway-to-gateway VPN connections.
Standard application
proxies
The standard proxies that are built into the security gateway work in conjunction with the
firewall driver to handle common services, such as Telnet, HTTP, FTP, and RealAudio.
Standard proxies offer the highest level of protocol checking and logging, as well as ease of
use.
The security gateway uses proxies with both standard and custom protocols:
■
Standard protocols
The most commonly used protocols, such as FTP, HTTP, NNTP, POP3, and SMTP, are
predefined on the security gateway. Over 150 protocols are included.
Unless specifically stated otherwise, when this manual describes how traffic is
passed, it uses standard proxies.
■
Custom protocols
You can add custom protocols for generic services provided by the hosts residing on
either side of the security gateway.
These protocols can represent services that are not supported by the standard proxies
that are provided with the security gateway. A configurable Generic Service Proxy
(GSP) is used with custom protocols.
Security gateway rules You enforce your corporate security policies by creating rules to control traffic through the
security gateway. Rules can include alert thresholds, and content security protection such
as antispam and antivirus configuration. Rules also let you authenticate users through the
use of authentication servers.
Address transforms
and service redirection
You can hide internal addresses by using address transforms and service redirection. You
can assign Network Address Translation (NAT) pool addresses to designate replacement
addresses for client IP addresses that are used in tunneled or non-tunneled connections.
With redirected services, you can redirect connections to non-published destinations.
Firewall log and IDS/
IPS alert viewing
The security gateway’s log and IDS/IPS alert viewing capabilities let you identify threats.
The information from log messages and alerts can help you reconfigure the security
gateway to stop attacks.
Configuration reports You can generate and print reports for every configurable feature of the security gateway.
Summary of Contents for Security 5600 Series, Security 5400 Series,Clientless VPN 4400 Series
Page 76: ...76 Managing administrative access Enabling SSH for command line access to the appliance...
Page 242: ...242 Defining your security environment Controlling full application inspection of traffic...
Page 243: ...243 Defining your security environment Controlling full application inspection of traffic...
Page 269: ...268 Limiting user access Authenticating using Out Of Band Authentication OOBA...
Page 373: ...372 Preventing attacks Enabling protection for logical network interfaces...
Page 509: ...508 Generating reports Upgrade reports...
Page 553: ...552 Advanced system settings Configuring advanced options...
Page 557: ...556 SSL server certificate management Installing a signed certificate...
Page 861: ...860 Index...