Planning, Implementing and Supporting the IBM Firewall Version 3 Product
Test 558 Objectives
-
Given the business need for a firewall and a documented security plan,
install and configure the IBM Firewall product and test the firewall for
correct operation using analytical and industry standard rules.
-
Given a company's projected network application list, determine the required
services needed to allow applications to communicate through the firewall.
-
Given information on the current network hardware and software, generate
configuration maps of the existing network architecture that reflect the
existing architecture.
-
Given security requirements and existing network configuration(s), document
a secure network structure proposal whose accuracy is based upon a firewall
implementation test.
-
Given a set of user and security requirements, configure firewall hardware
to meet the stated usage protection and response requirements which will
be verified by system modeling (Snapshot).
-
Given an existing network, develop or document both the internal and external
DNS policy and structure to enable proper resolution of names internally
and externally.
-
Given a DNS policy, configure the firewall DNS services so that internal
hosts can resolve external names, but no internal information is propagated
to the outside.
-
Given a set of service requirements, write and validate a set of filtering
rules to support the given requirements and the organization's security
policies.
-
Given the network environment and security policy, confirm proper IP routing
to, from, and through the firewall, as verified by log entries from testing.
-
Given the need to control traffic through the firewall using socks, modify
socks server configuration (/etc/sockd.conf) to allow or deny specific
clients, users, and/or services.
-
Given a security policy and request for a proxy account, create or update
a secure account and verify its defined access by internal and external
login and operation of shell functions.
-
Given a request to remove a secure account, remove it, preserve evidence,
test for removal by attempted login, and validate removal via logs and
audit reports.
-
Given a population of users requiring E-Mail access, develop and implement
the necessary configuration for secure E-Mail service, and validate mail
transport and delivery.
-
Given the need for a network link between two enterprise networks over
a public network, define and install a point to point link between two
firewalls so that data traversing the link is authenticated and/or encrypted.
-
Given a security policy and completed firewall configuration, validate
the firewall configuration using analytical and industry standard tools
until the implemented policy represents an acceptable level of risk to
the customer, or until a plan has been identified to resolve the differences.
-
Given a perceived or actual intrusion into a "secured network", document
the event and provide input to the other processes to close the exposure
so that similar intrusions are prevented.
-
Given an enterprise network containing two or more IBM Firewalls, describe
the Enterprise Firewall Manager functions and identify functions required
to manage remote IBM Firewalls from a central IBM Firewall Manager.
|
CERTIFICATION NAVIGATOR:
Select Certification, or Test Number and Topic, or a
Site Page |
Site
Map
Help |
|
|