SunScreen 3.2 Installation Guide

NAT

Network address translation (NAT) enables you to map from unregistered addresses to registered addresses allocated by your Internet service provider (ISP). The NAT function in SunScreen uses this translation to replace the IP addresses in a packet with other IP addresses. This allows you to use unregistered addresses to number your internal networks and hosts and yet have full connectivity to the Internet. Using this approach with a small Class C network, which supports only 254 hosts (externally), you can use a private Class B network, which supports as many as 65,000 hosts or 255 networks of 254 hosts (internally).

The following worksheets include:

NAT Map

Use the NAT Map worksheet to list type, address, and the translated address.

Type 

Address 

Translated Address 

Static Dynamic 

Source 

Destination 

Source 

Destination 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Screen Interfaces

Use the Screen Interfaces worksheet to list:

   

Logging Details 

Type 

Interface Name 

Group Address 

SNMP Alert 

Logging 

ICMP Reject 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Authorized Users

Use the Authorized Users worksheet to list:

Name 

Authorized User 

Details 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Administration Stations

Use the Administration Station Interface worksheet to list:

Name of Certificate Associated With Admin Station 

Address of Admin Station 

Key Algorithm 

Data Algorithm 

MAC Algorithm 

Admin User Name 

Access Level 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Rules

You use rules to control access to your computer network and to control encryption for access to your data. In preparing to implement rules, you must determine:


Note -

By default, the Screen drops any packets that do not specifically match a rule. This means you can more easily create rules, since you only have to write a rule for the services you want to pass.


Use the Rules worksheet to organize the individual rules you want to use. Space is provided for you to create your own service groups. Make copies of the worksheet, as necessary.

Following the Rules worksheet is a completed sample of a worksheet that includes the requisite services that you may want for a particular network.

Ordered Rule Index 

Service or Service Group 

Source Address 

Destination Address 

Action 

Encryption 

User or Groups of Users (Optional) 

Time of Day (Optional) 

Screen (Optional) 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ordered Rule Index 

Service or Service Group 

Source Address 

Destination Address 

Action 

Encryption 

ftp 

Internal-net 

Internet 

ALLOW 

NONE 

ftp 

ftp Server 

ALLOW 

NONE 

ftp 

Internet 

Internal-net 

DENY 

NONE 

Four Action Types

The following shows the four action types: ALLOW, DENY, ENCRYPT, and SECURE.

After you define and map out your network and decide on your security policy, use data objects, such as services and addresses, to configure SunScreen with the policy rules to control access to your network. At installation, the SunScreen software automatically creates a policy named Initial that you can use to build your own security policies.

Additional information on creating security policies can be found at: http://www.sun.com/software/white-papers/wp-security-devsecpolicy/