Thanks for your advice. I believe network
object means the CheckPoint Host (Firewall) and opened it to Topology tab in
Policy Editor. There were two interfaces: eth-s1p1co and
eth-s2p1co inside the table.
[Bill] In the "topology" sectin there is
a summary section which lists the interfaces. In the columns to the
right, you will see what anti-spoofing option (if any) is already selected
for each interface.
The first one is connected to internet using a
public IP and the second one to the local LAN using a private IP for the
firewall. After I clicked "Get Topology .." button, a caution showed
that "Topology and anti-spoofing settings that are already defined will be
overwritten by results of this operation that contradict them, if any.
Do you want to continue?" It seems the anti-spoofing has been set
before. I have a query about the IPs to be filled in before I continue
and seek your further advice.
[Bill] First of all, that message is a
default. You will always see it "just in case." Anyway, you can
view or edit settings by selecting the interface (i believe you can
double-click or hit the "edit" button after selecting). This will
allow you to select an interface and view the current configuration.
From here you can change the options without "getting" your interfaces
again. You will only need to "get" the interfaces again if they are
not correct. Use your Nokia Voyager to verify that the interfaces are
correct.
1. For the interface to internet, what
should I put in the IP column?
[Bill] You should choose the "external
interface" option in general. This is what most people would do.
If the firewall is only used for limited purposes AND external ip
addresses, you could limit this further by creating a network object which
contains the necessary ip addresses and select that.
2. For local LAN interface, our
workstations are in the range of 192.168.0.11 to 192.168.0.40. How can
I put a range of IP as there is only one space available? Other IPs,
i.e., network printer IPs, are not needed to be included here since
they do not need to pass thru the firewall.
[Bill] There are various ways to deal
with interfaces in general. You can choose the option which allows for
all ip addresses contained within the configuration of the interface.
If for example your interface was configured as 192.168.0.1/24 it would
allow any 192.168.0.1 through 192.168.0.255 addresses through. You can
also choose the option which allws for selecting a "single" network
object. I am not sure about the total list of what type of objects can
be used here maybe somebody else can help you there. One option
though, is to create a group with all the individual workstations (in your
case 11 through 40) and select that group. This does not scale well,
but it is an option. Another option might be able to create an "ip
address range" object and use that here. I am not sure if this
option is allowed. The "ip address range object" had very specific
uses in the past. Another option would be to create a network object
or objects which is/are a subset of the actual network which would account
for the necessary ip addresses. This can also be tedious and is
probably not necessary. In your case, I would probably recommend using
the network interface option and using the policy rulebase to further limit
that to necessary objects. No point in making your life more difficult
than necessary for minimal gains ;~}. Use your common sense
here. Use the principle of least privilege where
possible.
Thanks,
Ray
From:
Bill
Sent: Wednesday, 25 September, 2002
03:27 a
Open up the network object in the policy manager. Click on the topology
tab. "Get" all your interfaces and verify that they are correct. Then drill
down into each interface and choose from the options. I believe they are
(not necessarily in the same order or words):
--network defined by your interface configuration
--a network object or group which would define all allowable
networks
--external interface
The anti-spoofing is used to tell the firewall what source ip addresses
are valide for traffic INBOUND on the port/interface in question. Be very
careful and make sure that you are accounting for all necessary networks. I
would recommend that you log this information as well so you can "see" when
something is not being allowed through and determine the cause -- right or
otherwise.
----- Original Message -----
From:
Ray
Li
To:
[EMAIL PROTECTED]
Sent: Tuesday, September 24, 2002
12:38 PM
Subject: [FW-1] Anti-spoofing
warning
I notice that my Nokia firewall shows a warning that "The 2 interface is
not protected by the anti-spoofing feature. Your network may be at risk. In
the future, it is recommended that you define anti-spoofing protection
before installing the Security Policy." during bootup. I am using CheckPoint
VPN Pro NG. To fix this problem, can someone help me configure the
anti-spoofing on the CheckPoint NG version.
Thanks,
Ray