
Nortel Switched Firewall 2.3.3 User’s Guide and Command Reference
26
Introduction
213455-L, October 2005
The networks
Trusted networks
These represent internal network resources that must be protected from unauthorized
access. Trusted networks usually provide internal services such as a company’s intranet,
as well as valued applications made available to external clients, such as public e-
commerce web sites.
Semi-trusted networks
To increase security, services intended primarily for external clients are often placed on a
separate network so that a hostile intrusion would not affect the company’s internal
networks. A network isolated in this way is also known as a De-Militarized Zone (DMZ).
For more information, see your Check Point documentation.
Untrusted networks
These are the external networks that are presumed to be potentially hostile, such as the
Internet.
The Firewall
Nortel Switched Firewall
The Nortel Switched Firewall is placed in the path between your various trusted, semi-
trusted, and untrusted networks. It examines all traffic moving between the connected
networks and either allows or blocks that traffic, depending on the security policies
defined by the administrator.
The management interfaces
NSF local console
A local console is used for entering basic network information during initial configuration.
Once the system is configured, the local console can be used to access the text-based
Command Line Interface (CLI) for collecting system information and performing
additional configuration. The NSF console is not used to manage or install firewall
policies.
NSF remote console/Check Point SMART Clients
For a list of trusted users, the administrator can separately allow or deny Telnet or
Secure Shell (SSH) access to the NSF CLI, and HTTP or SSL access to the NSF
Browser-Based Interface. Remote access features can be used for collecting system
information and performing additional configuration, but not to manage or install
firewall policies.
Содержание 5100 Series Release 2.3.3
Страница 18: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 18 Preface 213455 L October 2005...
Страница 20: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 20 Getting started 213455 L October 2005...
Страница 28: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 28 Introduction 213455 L October 2005...
Страница 90: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 90 Initial setup 213455 L October 2005...
Страница 188: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 188 Redundant Firewalls 213455 L October 2005...
Страница 228: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 228 Applications 213455 L October 2005...
Страница 248: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 248 Basic system management 213455 L October 2005...
Страница 250: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 250 Command reference 213455 L October 2005...
Страница 264: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 264 The Command Line Interface 213455 L October 2005...
Страница 374: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 374 Command reference 213455 L October 2005...
Страница 376: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 376 Appendices 213455 L October 2005...
Страница 406: ...Nortel Switched Firewall 2 3 3 User s Guide and Command Reference 406 Common tasks 213455 L October 2005...