20. VPN-1/FireWall-1 ignores other protocol packets such as IPX, DecNET. These protocols are processed by other protocols stacks. Note that, if you install an IPX protocol stack, for example, the IPX packets are processed by IPX stack independent of VPN-1/FireWall-1. This could be a security risk and need to be thoroughly evaluation for need before installing the same.
21. FireWall-1 rule base:
a. Implicit (Pseudo) rules are those that are derived from the security properties. Explicit rules are those created in the Rule Base. The implicit rules are NOT shown by default in the NAT Rule Base. However, you can select Implied Pseudo Rules" from the View menu .
b. Implicit Drop Rule is added by VPN-1/FireWall-1 at the bottom of the Rule Base. The purpose of this rule is to drop all packets that are not described by earlier rules in the Rule Base.
c. Stealth rule is the first rule in the Rule Base. The purpose of the Stealth rule is to prevent traffic from directly accessing the firewall itself
d. The correct order that Rule Base rules are defined are:
- IP Spoofing
- Security Policy "First" Rule
- Rule Base
- Security Policy "Before Last" Rule
- Security Policy "Last" Rule
- Implicit Drop
e. To disable a rule in Rule Base,
- Select the rule in the Rule Base
- Right click the rule number and select 'Disable rule'
- The policy need to be re-installed for the changes to take effect.
22. Using the Security Policy Editor, four types of policies can be defined:
- Security Policy: This policy specifies how the communication is allowed to enter or leave the network. This also specifies, how the authentication and/or encryption are handled.
- Address_Translation Policy: An Address_Translation Policy specifies how invalid internal IP addresses will be translated to valid Ip addresses.
- Anti-Spoofing: Anti-Spoofing feature ensures that the IP addresses of the packets entering the FireWall are valid.