Using the Firewall with Check Point Firewall-1
135
selected for Firewall VPN. If
SecuRemote
is used,
FWZ
must also be
selected.
2
Create the Remote Object(s). These are the resources behind the remote
Firewall (Workstations, Network or Group Objects). Refer to the following
example:
a
From the
Manage
menu select
Network Objects.
b
Press the
New
button and select
Network
.
c
Give the Network Object a unique name: (for example
“Firewall-Network”)
d
Give the Network Object an IP Address Range (for example
“10.1.1.0”)
e
Give the Network Object a Subnet Mask (for example
“255.255.255.0”)
f
Give the Network Object a Comment (optional)
g
Select
External
for the Location Option
h
Press the
OK
button when finished.
3
For easier management, you should create a group and place all objects
that are protected by the remote Firewall in that group.
a
Press the
New
button and select the
Group
option.
b
Give the
Group
object a unique Name (for example
“Encrypt-Firewall”)
c
Give the
Group
object a Comment (optional)
d
Select the objects that are behind the remote Firewall and
Add
them
to the group.
e
Press the
OK
button when finished.
4
Create a remote Firewall object.
a
Press the
New
button and select the
Workstation
option.
b
Give the workstation object a unique name (for example
“Firewall-Remote”).
c
Give the workstation object the external IP address of the Remote
Firewall (for example “111.111.111.111”).
d
Give the workstation object a comment (optional).
e
Select
External
for the Location.
DUA1611-0AAA02.book Page 135 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...