Firewall Wizards mailing list archives

This should answer the Gauntlet part of the firewall questions


From: "Mellon, Ty" <Ty_Mellon () NAI com>
Date: Wed, 16 Jun 1999 12:46:45 -0700

Please see below <snip> for original question.

The Enterprise Firewall Manager is an optional Gauntlet component that
provides configuration functions for an enterprise of managed firewalls.
It is available for use if you selected the "Enterprise" install option
during installation (not the "Typical" option).
You can use it to:
        * Extract the configuration data of one firewall to an independent
file
 (that resides in a working database of extracted configuration files),
modify
 the configuration copy, and apply it as a template to as many managed
 firewalls as you like
        * Copy one of the extracted configuration files in the database and
apply
it to a managed firewall, perhaps a new one you have just added to your
enterprise
* Apply "packages", such as new Gauntlet proxy releases or patches, to
your
enterprise of firewalls, without needing to wait for the next
comprehensive
Gauntlet release
* Use the NetTools PKI feature to define access certificates for
managed
firewalls
The following illustration shows that the GUI software can run on a PC
(separately from the workstation software.)

Ty Mellon
    Account Manager - Active Security, Network Associates, Inc.
4 Voice: (800)338-8754x7918     4 Fax:  (972)855-2664
4 Email: ty_mellon () nai com
www.nai.com
http://www.nai.com/activesecurity/
Gauntlet Firewall - Virtual Private Networks(VPN) - PGP (encryption) -
CyberCop Scanner (Vulnerability & Risk Assessment) - CyberCop Monitor
(Real-time Intrusion Detection)      
Who's Watching Your Network?
"The purpose of a security device is to protect a network, not to be fast.
Fast is what airline travelers want when passing through airport security.
Secure is what they want when they tumble through the air after their plane
blows up."' -Bill Stout


        <snip>

At 05:17 PM 6/10/99 -0500, Steven W. Engle wrote:
Can these firewalls
o    Borderware
o    Guantlet
o    Checkpoint Firewall-1
o    Raptor

transfer in "real-time" their audit trails to some other system (via
'syslogd' or something equivelent)?

For those that have set-up this this type of functionality, what
processes
and/or automation are you performing on the receipient system to make
use
of the audit trails? What is/are the end result(s) of this processing
/
automation?

Thanks!

Steve Engle
--
sengle () dhtinc com






The Enterprise Firewall Manager is an optional Gauntlet component
that
provides configuration functions for an enterprise of managed
firewalls.
It is
available for use if you selected the "Enterprise" install option
during
installation (not the "Typical" option).
You can use it to:
* Extract the configuration data of one firewall to an independent
file
(that
resides in a working database of extracted configuration files),
modify
the
configuration copy, and apply it as a template to as many managed
firewalls as you like
* Copy one of the extracted configuration files in the database and
apply
it
to a managed firewall, perhaps a new one you have just added to your
enterprise
* Apply "packages", such as new Gauntlet proxy releases or patches,
to
your
enterprise of firewalls, without needing to wait for the next
comprehensive
Gauntlet release
* Use the NetTools PKI feature to define access certificates for
managed
firewalls
The following illustration shows that the GUI software can run on a
PC
(separately from the workstation software.)


 <<...>> 

Jason S. Leonardi
Sr. Systems Engineer
PGP Fingerprint: 862D CCE2 77E6 9A59 781C  19C2 004F 2EAA 7B3D FA74
http://www.nai.com


"The purpose of a security device is to protect a network, not to be
fast.
Fast is what airline travelers want when passing through airport
security,
secure is what they want when they tumble through the air after their
plane blows up."' -Bill Stout


        <snip>

At 05:17 PM 6/10/99 -0500, Steven W. Engle wrote:
Can these firewalls
o    Borderware
o    Guantlet
o    Checkpoint Firewall-1
o    Raptor

transfer in "real-time" their audit trails to some other system (via
'syslogd' or something equivelent)?

For those that have set-up this this type of functionality, what
processes
and/or automation are you performing on the receipient system to
make
use
of the audit trails? What is/are the end result(s) of this
processing /
automation?

Thanks!

Steve Engle
--
sengle () dhtinc com



--------------------------------------------------------------------------
--
-------------------------
Richard Rees                          email:  richard_rees () ins com
International Network Services                pager:  (800) 467-1467
or
Network Systems Consultant            page_richard_rees () ins com
Network Security Services             fax:  (847) 995-7701
1100 E. Woodfield Road, Suite 437
Schaumburg, IL 60196
Do not interfere in the affairs of dragons, for you are crunchy and
taste
good with ketchup.
"The choices we make dictate the life we lead.  To thine own self be
true"


--
Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
work - http://www.nfr.net
home - http://www.clark.net/pub/mjr

--
Marcus J. Ranum, CEO, Network Flight Recorder, Inc.
work - http://www.nfr.net
home - http://www.clark.net/pub/mjr



Current thread: