LBRY Block Explorer

LBRY Claims • Check-Point-Firewall-Policy-Build-using-API

fe9776e1c23e5bef35658c8ee5a2508473fe6386

CONFI
Published By
Created On
5 Mar 2021 17:09:44 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Configuring the Check Point Firewall policy for the first time using the Check Point SmartConsole built in API interface
In this video you can watch the default Check Point Policy Package, named Standard, being configured with a new set of rules.
Before that is done new objects must be created.
The objects will be used in the rules and they represent the internal networks/subnets and hosts that will be explicitly allowed access through the firewall.

The rules should be easy to read and self-explanatory.
The API commands should also be easy to interpret.


The API commands used during this demonstration were:
add host name A-GUI ip-address 10.1.1.201 color brown
add host name A-LDAP ip-address 192.168.11.101 color "violet red"
add host name A-DMZ ip-address 192.168.12.101 color orange
add network name "A-MGMT-NET" subnet "10.1.1.0" subnet-mask "255.255.255.0" color brown
add network name "A-INT-NET" subnet "192.168.11.0" subnet-mask "255.255.255.0" color "violet red"
add network name "A-DMZ-NET" subnet "192.168.12.0" subnet-mask "255.255.255.0" color orange

add-group name Alpha-Net members.1 A-MGMT-NET members.2 A-INT-NET members.3 A-DMZ-NET

set access-rule layer "Network" name "Cleanup rule" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "LDAP" source.1 Alpha-Net destination.1 "A-LDAP" service.1 "ldap" service.2 "ldap-ssl" action "Accept" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "Outgoing" source.1 "A-INT-NET" source.2 "A-MGMT-NET" service.1 "http" service.2 "https" service.3 "ftp" action "Accept" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "DMZ" destination.1 A-DMZ action "Accept" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "DNS" source.1 Alpha-Net service.1 DNS action "Accept" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "Stealth" destination.1 "A-GW-Cluster" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "Management" source.1 "A-GUI" destination.1 "A-SMS" destination.2 "A-GW-Cluster" service.1 "https" service.2 "ssh_version_2" action "Accept" track "Log" install-on A-GW-Cluster
add access-rule layer "Network" position 1 name "Do Not Log" service.1 "bootp" service.2 "NBT" action "drop" install-on A-GW-Cluster

add access-section layer Network position 1 name Management
add access-section layer Network position 4 name "Network Traffic"
add access-section layer Network position 8 name Cleanup
Author
Content Type
Unspecified
video/mp4
Language
English
Open in LBRY

More from the publisher

Controlling
VIDEO
UPGRA
Controlling
VIDEO
RUNNI
Controlling
VIDEO
SECUR
Controlling
VIDEO
USING
Controlling
VIDEO
R80.1
Controlling
VIDEO
PROMO
Controlling
VIDEO
UPGRA
Controlling
VIDEO
USING
Controlling
VIDEO
SECUR