Talk With an Expert

Improving Firewall Security post Acquisition

Improving Firewall Security post Acquisition (PDF, 2.74MB)Published: 18 Jan, 2005
Created by:
Leona Conolly

This paper aims to discuss the challenges in putting together a secure Check Point Firewall-1 solution to protect our existing information and assets and that of our new acquisition. It is assumed that the reader will have a generic knowledge of firewalls, related terms and their use. In the paper the word 'policy' refers to the security document and the word 'rulebase' refers to the Check Point rules.