PIX/ASA Checklist
Số trang: 2
Loại file: pdf
Dung lượng: 18.27 KB
Lượt xem: 4
Lượt tải: 0
Xem trước 2 trang đầu tiên của tài liệu này:
Thông tin tài liệu:
As with configuring any firewall, administrators should develop a checklist that they can use during the installation and implementation of the PIX/ASA firewall in the network
Nội dung trích xuất từ tài liệu:
PIX/ASA ChecklistPIX/ASA ChecklistAs with configuring any firewall, administrators should develop a checklist that they canuse during the installation and implementation of the PIX/ASA firewall in the network.There are really two components to this checklist. First, you want to define theimplementation requirements and determine how the firewall should be configured andwhat options will be enabled. In essence, design and plan your firewall implementationbefore you configure and implement the firewall. To help with the planning of yourPIX/ASA firewall implementation, consider the following items (although not anexhaustive list, it is a good basic checklist for many environments): • Determine how many interfaces will be required. • Determine how the interfaces will need to be configured (for example, interface speed and duplex). • Determine the IP addresses that will be assigned to the firewall interfaces and how the addresses will be assigned (for example, static IP addresses or DHCP configuration). • Determine what type of routing will be used (dynamic or static) and define any static and default routes. • Determine how NAT will be used (for example, static, dynamic, no NAT at all, or any combination of the three). • Define which internal hosts will need to be accessed from the outside, and whether that access will be handled by static NAT or without NAT. • Define which ACLs (both inbound and outbound) will be required. • Define how authentication and command authorization on the PIX will be handled (for example, will a AAA server be required?). • Define the firewall administrator roles and the corresponding access levels that will be required. • Will remote-access or LAN-to-LAN VPNs be configured on the PIX/ASA? If so, define the VPN configuration settings. • Define the passwords that will be used on the firewall. • Define how the PIX will be managed (for example, using Telnet, SSH, ASDM) and from what networks or hosts remote access will be permitted. • Define how logging will be handled (for example, will the PIX/ASA log to a remote syslog server?).After you have completed your planning and defined the requirements and determinedhow the firewall should be configured and what options will be enabled, the second stepof the PIX/ASA checklist is to list out the specific configuration steps required toconfigure the firewall. Whereas the preceding checklist focused on the planning anddesign, this checklist uses that information to define what actually needs to be done forthe actual firewall configuration. A good configuration checklist for the PIX/ASAfirewall consists of the following:1. Configure the firewall interfaces.2. Configure the firewall passwords.3. Configure the firewall name and domain name.4. Assign addresses to the firewall interfaces.5. Configure the appropriate routing.6. Configure the appropriate remote management settings.7. Configure AAA as required.8. Configure the firewall time settings9. Configure the appropriate logging settings.10. If required, configure NAT and any other translations.11. Build and implement the appropriate ACLs and apply them to the appropriate interfaces in the appropriate direction.12. Configure application inspection.13. Configure advanced features such as failover, VPN, or IPS.14. If the firewall is an ASA, configure the advanced antivirus, antispyware, and antiphishing settings.
Nội dung trích xuất từ tài liệu:
PIX/ASA ChecklistPIX/ASA ChecklistAs with configuring any firewall, administrators should develop a checklist that they canuse during the installation and implementation of the PIX/ASA firewall in the network.There are really two components to this checklist. First, you want to define theimplementation requirements and determine how the firewall should be configured andwhat options will be enabled. In essence, design and plan your firewall implementationbefore you configure and implement the firewall. To help with the planning of yourPIX/ASA firewall implementation, consider the following items (although not anexhaustive list, it is a good basic checklist for many environments): • Determine how many interfaces will be required. • Determine how the interfaces will need to be configured (for example, interface speed and duplex). • Determine the IP addresses that will be assigned to the firewall interfaces and how the addresses will be assigned (for example, static IP addresses or DHCP configuration). • Determine what type of routing will be used (dynamic or static) and define any static and default routes. • Determine how NAT will be used (for example, static, dynamic, no NAT at all, or any combination of the three). • Define which internal hosts will need to be accessed from the outside, and whether that access will be handled by static NAT or without NAT. • Define which ACLs (both inbound and outbound) will be required. • Define how authentication and command authorization on the PIX will be handled (for example, will a AAA server be required?). • Define the firewall administrator roles and the corresponding access levels that will be required. • Will remote-access or LAN-to-LAN VPNs be configured on the PIX/ASA? If so, define the VPN configuration settings. • Define the passwords that will be used on the firewall. • Define how the PIX will be managed (for example, using Telnet, SSH, ASDM) and from what networks or hosts remote access will be permitted. • Define how logging will be handled (for example, will the PIX/ASA log to a remote syslog server?).After you have completed your planning and defined the requirements and determinedhow the firewall should be configured and what options will be enabled, the second stepof the PIX/ASA checklist is to list out the specific configuration steps required toconfigure the firewall. Whereas the preceding checklist focused on the planning anddesign, this checklist uses that information to define what actually needs to be done forthe actual firewall configuration. A good configuration checklist for the PIX/ASAfirewall consists of the following:1. Configure the firewall interfaces.2. Configure the firewall passwords.3. Configure the firewall name and domain name.4. Assign addresses to the firewall interfaces.5. Configure the appropriate routing.6. Configure the appropriate remote management settings.7. Configure AAA as required.8. Configure the firewall time settings9. Configure the appropriate logging settings.10. If required, configure NAT and any other translations.11. Build and implement the appropriate ACLs and apply them to the appropriate interfaces in the appropriate direction.12. Configure application inspection.13. Configure advanced features such as failover, VPN, or IPS.14. If the firewall is an ASA, configure the advanced antivirus, antispyware, and antiphishing settings.
Tìm kiếm theo từ khóa liên quan:
công nghệ thông tin an ninh bảo mật fire wall tường lửa Fire wall fundamentals PIX/ASA ChecklistGợi ý tài liệu liên quan:
-
52 trang 431 1 0
-
Top 10 mẹo 'đơn giản nhưng hữu ích' trong nhiếp ảnh
11 trang 316 0 0 -
74 trang 302 0 0
-
96 trang 293 0 0
-
Báo cáo thực tập thực tế: Nghiên cứu và xây dựng website bằng Wordpress
24 trang 289 0 0 -
Đồ án tốt nghiệp: Xây dựng ứng dụng di động android quản lý khách hàng cắt tóc
81 trang 281 0 0 -
EBay - Internet và câu chuyện thần kỳ: Phần 1
143 trang 275 0 0 -
Tài liệu dạy học môn Tin học trong chương trình đào tạo trình độ cao đẳng
348 trang 269 1 0 -
Tài liệu hướng dẫn sử dụng thư điện tử tài nguyên và môi trường
72 trang 265 0 0 -
64 trang 263 0 0