User Manual Part 1
Table Of Contents
- Check Point Safe@Office User Guide 8.0
- Copyright & Trademarks
- Contents
- About This Guide
- Introduction
- About Your Check Point Safe@Office Appliance
- Safe@Office 500 Product Family
- Product Features
- Wireless Features
- Optional Security Services
- Software Requirements
- Getting to Know Your Safe@Office 500 Appliance
- Getting to Know Your Safe@Office 500W Appliance
- Getting to Know Your Safe@Office 500 ADSL Appliance
- Getting to Know Your Safe@Office 500W ADSL Appliance
- Contacting Technical Support
- Safe@Office Security
- Installing and Setting Up Safe@Office
- Getting Started
- Configuring the Internet Connection
- Managing Your Network
- Using Bridges
- Configuring High Availability
- Using Traffic Shaper
- Working with Wireless Networks
- Viewing Reports
- Viewing Logs
- Setting Your Security Policy
Setting the Firewall Security Level
Chapter 13: Setting Your Security Policy 355
This
level…
Does this… Further Details
High Enforces strict control on all
incoming and outgoing
connections.
All inbound traffic is blocked.
Restricts all outbound traffic except for the
following: Web traffic (HTTP, HTTPS), email (IMAP,
POP3, SMTP), ftp, newsgroups, Telnet, DNS,
IPSEC IKE and VPN traffic.
Block All Blocks all access between
networks.
All inbound and outbound traffic is blocked
between the internal networks.
This does not affect traffic to and from the
gateway itself.
The definitions of firewall security levels provided in this table represent the Safe@Office
appliance’s default security policy.
You can easily override the default security policy, by creating user-defined firewall rules.
For further information, see Using Rules on page 360.
Note: If the security policy is remotely managed, this lever might be disabled.
Note: Security updates downloaded from a Service Center may alter the security
policy and change these definitions.