SunScreen 3.1 Lite Installation Guide

Addresses

SunScreen 3.1 Lite uses IP addresses to define the network elements that make up the configuration. These addresses are then used in defining the Screen's network interfaces and as the source and destination addresses for rules and NAT.

The address can be for a single computer, or it can be for a whole network or subnetwork. Additionally, addresses (individual and network) can be grouped together to form an address group. SunScreen 3.1 Lite allows you to define address groups that specifically include or exclude other defined addresses (single IP hosts, ranges, or groups).

Table 2-2 Address Explanations
 Host addresses For individual elements, such as the router and individual computers, you need to know the IP address, in standard dotted Internet-address notation (w.x.y.z format), and the name of the host.
 Address Ranges For networks and subnetworks, you need to know the beginning and ending addresses of the network or subnetwork, both in standard dotted Internet-address notation (w.x.y.z format).
 Address GroupsGroups of host addresses, network addresses, and other address groups can be combined to form logical groups of addresses that can then be manipulated as a single element. Groups may be inclusive or exclusive or a combination of both, but may not be cyclic as in cases where dress Group "A" includes (references) Address Group "B" which in turn includes Address Group "A".

The following figure shows an example of various types of addresses and can be used as a reference when completing your own network map.

Figure 2-1 Example of a Network Map

Graphic

In this figure, the following examples of different types of addresses can be seen:

The Internet is an example of a group of addresses, in this case defined as all. The ftp-www server is an example of a single address. The corporate, sales, and engineering hosts are examples of ranges of addresses.

The following worksheets can help you organize the IP addresses. Expand them as necessary. Group the IP addresses and names for the following network elements:

Rules are used to control access to your computer network and to control encryption for access to your data. In preparing to implement rules, you have:

Table 2-3 Host Addresses

Name 

IP Address 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 2-4 Address Ranges

Name 

Address 

 

Beginning 

Ending 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Table 2-5 Address Group

Name 

Address 

 

Include 

Exclude