Firewall Wizards mailing list archives
This should answer the Gauntlet part of the firewall questions
From: "Mellon, Ty" <Ty_Mellon () NAI com>
Date: Wed, 16 Jun 1999 12:46:45 -0700
Please see below <snip> for original question. The Enterprise Firewall Manager is an optional Gauntlet component that provides configuration functions for an enterprise of managed firewalls. It is available for use if you selected the "Enterprise" install option during installation (not the "Typical" option). You can use it to: * Extract the configuration data of one firewall to an independent file (that resides in a working database of extracted configuration files), modify the configuration copy, and apply it as a template to as many managed firewalls as you like * Copy one of the extracted configuration files in the database and apply it to a managed firewall, perhaps a new one you have just added to your enterprise
* Apply "packages", such as new Gauntlet proxy releases or patches, to
your
enterprise of firewalls, without needing to wait for the next comprehensive Gauntlet release * Use the NetTools PKI feature to define access certificates for
managed
firewalls The following illustration shows that the GUI software can run on a PC (separately from the workstation software.) Ty Mellon
Account Manager - Active Security, Network Associates, Inc. 4 Voice: (800)338-8754x7918 4 Fax: (972)855-2664 4 Email: ty_mellon () nai com www.nai.com http://www.nai.com/activesecurity/ Gauntlet Firewall - Virtual Private Networks(VPN) - PGP (encryption) - CyberCop Scanner (Vulnerability & Risk Assessment) - CyberCop Monitor (Real-time Intrusion Detection) Who's Watching Your Network? "The purpose of a security device is to protect a network, not to be fast. Fast is what airline travelers want when passing through airport security. Secure is what they want when they tumble through the air after their plane blows up."' -Bill Stout
<snip>At 05:17 PM 6/10/99 -0500, Steven W. Engle wrote:Can these firewalls o Borderware o Guantlet o Checkpoint Firewall-1 o Raptor transfer in "real-time" their audit trails to some other system (via 'syslogd' or something equivelent)? For those that have set-up this this type of functionality, whatprocessesand/or automation are you performing on the receipient system to makeuseof the audit trails? What is/are the end result(s) of this processing
/
automation? Thanks! Steve Engle -- sengle () dhtinc com
The Enterprise Firewall Manager is an optional Gauntlet componentthatprovides configuration functions for an enterprise of managedfirewalls.It is available for use if you selected the "Enterprise" install optionduringinstallation (not the "Typical" option). You can use it to: * Extract the configuration data of one firewall to an independentfile(that resides in a working database of extracted configuration files),modifythe configuration copy, and apply it as a template to as many managed firewalls as you like * Copy one of the extracted configuration files in the database andapplyit to a managed firewall, perhaps a new one you have just added to your enterprise * Apply "packages", such as new Gauntlet proxy releases or patches,toyour enterprise of firewalls, without needing to wait for the next comprehensive Gauntlet release * Use the NetTools PKI feature to define access certificates formanagedfirewalls The following illustration shows that the GUI software can run on aPC(separately from the workstation software.) <<...>> Jason S. Leonardi Sr. Systems Engineer PGP Fingerprint: 862D CCE2 77E6 9A59 781C 19C2 004F 2EAA 7B3D FA74 http://www.nai.com "The purpose of a security device is to protect a network, not to befast.Fast is what airline travelers want when passing through airportsecurity,secure is what they want when they tumble through the air after their plane blows up."' -Bill Stout<snip>At 05:17 PM 6/10/99 -0500, Steven W. Engle wrote:Can these firewalls o Borderware o Guantlet o Checkpoint Firewall-1 o Raptor transfer in "real-time" their audit trails to some other system (via 'syslogd' or something equivelent)? For those that have set-up this this type of functionality, whatprocessesand/or automation are you performing on the receipient system tomakeuseof the audit trails? What is/are the end result(s) of thisprocessing /automation? Thanks! Steve Engle -- sengle () dhtinc com---------------------------------------------------------------------------- ------------------------- Richard Rees email: richard_rees () ins com International Network Services pager: (800) 467-1467orNetwork Systems Consultant page_richard_rees () ins com Network Security Services fax: (847) 995-7701 1100 E. Woodfield Road, Suite 437 Schaumburg, IL 60196 Do not interfere in the affairs of dragons, for you are crunchy andtastegood with ketchup. "The choices we make dictate the life we lead. To thine own self betrue" -- Marcus J. Ranum, CEO, Network Flight Recorder, Inc. work - http://www.nfr.net home - http://www.clark.net/pub/mjr-- Marcus J. Ranum, CEO, Network Flight Recorder, Inc. work - http://www.nfr.net home - http://www.clark.net/pub/mjr
Current thread:
- This should answer the Gauntlet part of the firewall questions Mellon, Ty (Jun 20)