This is a step by step guide on how to install Checkpoint Firewall NGX on a secureplatform device. This article covers the basic installation part of the Firewall of the Firewall including the Enforcement Module and the Smart Center. A standalone installation is covered in this article, which means that enforcement module and the smartcenter are on the same machine.
Firewalls are one of the fastest growing technical tools in the field of information security. However, a firewall is only as secure as the operating system it resides upon. This article will take a step by step look at how you can best armor your Solaris box, both Sparc and x86. These steps can apply to any situation, however I will be using Check Point FireWall-1 on Solaris 2.6 as an example. At the end of this article is a script that you can download that will automate most of the armoring process, to include implementing TCP Wrappers.
This white paper shows how to meet the challenge of low fiscal impact by using open source tools and re-purposing equipment in-hand. The challenge of low service impact was met through three layers of analysis before cutover. The methods used to develop this analysis are structured for re-use in other firewall projects and presented for use by others with similar challenges.
There are times when you have to restart the fwd deamon. You might have to restart this in case the firewall starts logging locally, or you encounter a runaway process where the firewall experiences high CPU, or other instances where the firewall might start dropping packets for not so well known reasons.You can use this command to restart the Firewall deamon, fwd process using the watchdog services.
Use this to find out the speed of the interface of the solaris box.
ndd -set /dev/qfe instance 0
ndd -get /dev/qfe link_speed
This article will give you the steps to establish SIC in a Checkpoint Firewall.
Troubleshooting Checkpoint firewall issues involving RSA securid authentication Method:
If there is any problem in the authentication process then you might have to add a rule on the firewall:
This article discusses the Top ten tips that you can implement to best manage and fine tune your firewall. The purpose of this article is to get the best performance out of your firewall and increased security to your network.
This article would show you how to use DHCP Relay Usage using a Cisco Pix Firewall.
Scenario: You are adding a new DHCP server and would like it permitted as a DHCP relay through the firewall. The address is 192.168.2.1.
This article will show you how to configure Fortigate 60 from the Command Line Interface.