Page 196 / 428 Scroll up to view Page 191 - 195
Using Firewall Rules
182
Check Point ZoneAlarm User Guide
In this field…
Do this…
Destination
Select the destination of the connections you want to allow or block.
To specify an IP address, select
Specified IP
and type the desired IP address
in the text box.
To specify an IP address range, select
Specified Range
and type the desired
IP address range in the fields provided.
To specify the ZoneAlarm IP address, select
This Gateway
.
To specify any destination
except
the ZoneAlarm Portal and network
printers, select
ANY
.
If the current time
is
Select this option to specify that the rule should be applied only during
certain hours of the day.
You must then use the fields and drop-down lists provided, to specify the
desired time range.
Forward the
connection to
Select the destination to which matching connections should be forwarded.
To specify an IP address, select
Specified IP
and type the desired IP address
in the text box.
This field only appears when defining an Allow and Forward rule.
Redirect to port
Select this option to redirect the connections to a specific port.
You must then type the desired port in the field provided.
This option is called Port Address Translation (PAT), and is only available
when defining an Allow and Forward rule.
Page 197 / 428
Using Firewall Rules
Chapter 10: Setting Your Security Policy
183
In this field…
Do this…
Log accepted
connections /
Log blocked
connections
Select this option to log the specified blocked or allowed connections.
By default, accepted connections are not logged, and blocked connections
are logged. You can modify this behavior by changing the check box's state.
Enabling/Disabling Firewall Rules
You can temporarily disable a user-defined rule.
To enable/disable a firewall rule
1.
Click
Security
in the main menu, and click the
Rules
tab.
The
Rules
page appears.
2.
Next to the desired rule, do one of the following:
To enable the rule, click
.
The button changes to
and the rule is enabled.
To disable the rule, click
.
The button changes to
and the rule is disabled.
Page 198 / 428
Using Firewall Rules
184
Check Point ZoneAlarm User Guide
Changing Firewall Rules' Priority
To change a firewall rule's priority
1.
Click
Security
in the main menu, and click the
Rules
tab.
The
Rules
page appears.
2.
Do one of the following:
Click
next to the desired rule, to move the rule up in the table.
Click
next to the desired rule, to move the rule down in the table.
The rule's priority changes accordingly.
Viewing and Deleting Firewall Rules
To view or delete an existing firewall rule
1.
Click
Security
in the main menu, and click the
Rules
tab.
The
Rules
page appears with a list of existing firewall rules.
2.
To view a rule's description, mouse-over the information icon in the desired
rule's row.
A tooltip displays the rule's description.
3.
To delete a rule, do the following.
a.
In the desired rule's row, click the Erase
icon.
A confirmation message appears.
b.
Click
OK
.
The rule is deleted.
Page 199 / 428
Configuring Servers
Chapter 10: Setting Your Security Policy
185
Configuring Servers
Note:
If you do not intend to host any public Internet servers in your network (such
as a Web Server, Mail Server, or an exposed host), you can skip this section.
The ZoneAlarm router enables you to configure the following types of public Internet
servers:
Servers for specific services
You can allow all incoming connections of a specific service and forward them to a
particular host in your network. For example, you can set up your own Web server,
Mail server, or FTP server.
Note:
Configuring servers is equivalent to creating simple Allow and Forward rules
for common services, where the destination is
This Gateway
. For information on
creating more complex rules, see
Using Rules
on page 172.
Exposed host
If you need to allow
unlimited
incoming and outgoing connections between the
Internet and a particular host, you can define an exposed host. An exposed host is not
protected by the firewall, and it receives all traffic that was not forwarded to another
computer by use of Allow and Forward rules.
Warning:
Defining an exposed host is not recommended unless you are fully aware of
the security risks. For example, an exposed host may be vulnerable to hacker
attacks.
Page 200 / 428
Configuring Servers
186
Check Point ZoneAlarm User Guide
To allow services to be run on a specific host
1.
Click
Security
in the main menu, and click the
Servers
tab.
The
Servers
page appears, displaying a list of services and a host IP address for each
allowed service.
2.
Complete the fields using the information in the following table.
3.
Click
Apply
.
A success message appears.
Table 34: Servers Page Fields
In this
column…
Do this…
Allow
Select the check box next to the public server you want to configure. This
can be either of the following:
A specific service or application (rows 1-9)
An exposed host (row 10)

Rate

3.5 / 5 based on 2 votes.

Popular ZoneAlarm Models

Bookmark Our Site

Press Ctrl + D to add this site to your favorites!

Share
Top