IBM Software
SearchHomeProgramProcessCertificationsNewsNavigatorFeedback
Professional Certification Program from IBM
Home
Test 558:Edu. & Pubs.Sample Test

Planning, Implementing and Supporting the IBM Firewall Version 3 Product 
Test 558 Objectives


  • Given the business need for a firewall and a documented security plan, install and configure the IBM Firewall product and test the firewall for correct operation using analytical and industry standard rules. 
  • Given a company's projected network application list, determine the required services needed to allow applications to communicate through the firewall. 
  • Given information on the current network hardware and software, generate configuration maps of the existing network architecture that reflect the existing architecture. 
  • Given security requirements and existing network configuration(s), document a secure network structure proposal whose accuracy is based upon a firewall implementation test. 
  • Given a set of user and security requirements, configure firewall hardware to meet the stated usage protection and response requirements which will be verified by system modeling (Snapshot). 
  • Given an existing network, develop or document both the internal and external DNS policy and structure to enable proper resolution of names internally and externally. 
  • Given a DNS policy, configure the firewall DNS services so that internal hosts can resolve external names, but no internal information is propagated to the outside. 
  • Given a set of service requirements, write and validate a set of filtering rules to support the given requirements and the organization's security policies. 
  • Given the network environment and security policy, confirm proper IP routing to, from, and through the firewall, as verified by log entries from testing. 
  • Given the need to control traffic through the firewall using socks, modify socks server configuration (/etc/sockd.conf) to allow or deny specific clients, users, and/or services. 
  • Given a security policy and request for a proxy account, create or update a secure account and verify its defined access by internal and external login and operation of shell functions. 
  • Given a request to remove a secure account, remove it, preserve evidence, test for removal by attempted login, and validate removal via logs and audit reports. 
  • Given a population of users requiring E-Mail access, develop and implement the necessary configuration for secure E-Mail service, and validate mail transport and delivery. 
  • Given the need for a network link between two enterprise networks over a public network, define and install a point to point link between two firewalls so that data traversing the link is authenticated and/or encrypted. 
  • Given a security policy and completed firewall configuration, validate the firewall configuration using analytical and industry standard tools until the implemented policy represents an acceptable level of risk to the customer, or until a plan has been identified to resolve the differences. 
  • Given a perceived or actual intrusion into a "secured network", document the event and provide input to the other processes to close the exposure so that similar intrusions are prevented. 
  • Given an enterprise network containing two or more IBM Firewalls, describe the Enterprise Firewall Manager functions and identify functions required to manage remote IBM Firewalls from a central IBM Firewall Manager. 

  •  

     



CERTIFICATION NAVIGATOR:
Select Certification, or Test Number and Topic, or a Site Page
Site Map   Help

AND

IBM Home PageSupportContact IBMEmploymentPrivacyLegal
©1998 IBM Corporation