Introduction to Firewall
Firewall Components
Secured Internal Communication
Understanding Smart Dash board
Understanding objects
Antispoofing firewall
Global properties
Object specific configurations
Network Address Translation
Configuring Dynamic NAT
Configuring Static NAT
Configuring Manual NAT
Redirecting traffic based on Service
Authentication
User Authentication
Client Authentication
(Manual sign on, Partially Automatic sign on, Fully Automatic sign on
methods
Session Authentication)
Smart Directory (LDAP)
Integrating users from external directories (i.e. Active Directory) to
Firewall
Configuring Virtual Private Network
Transport mode and Tunnel mode
Configuring Site to Site VPN based on Pre-shared keys
Configuring VPN communities
Configuring Encryption and hashing algorithm properties
Phase – I and phase – II VPN Communication and its IKE properties
Site to Client VPN
Configuring Site to Client VPN using Secure client
Connecting to Firewall by Remote client and analyzing VPN security
diagnostics
Configuring Desktop Security
Preventing access to mobile client systems
Introduction to Cryptography
(Value added topic - theory)
Symmetric Cryptosystem
Asymmetric Cryptosystem
(Private Key, Public Key, Hashing algorithm, Message Digest, Digital
signature, Digital Certificate, Diffie Helman Key Exchange)
Clustering (Demo Class)
Overview of Cluster XL
The Cluster Control Protocol (CCP)
Load Sharing – Multicast
Load Sharing - Unicast
Clustering for Redundancy
Failover preferences of clusters
Back up and Restore
Back up and restore of rule base using Database revision control
Migration in Checkpoint Firewall
Taking back up of existing rules and exporting
Importing configuration from back up and restoring Firewall
|
No comments:
Post a Comment