You use rules to control access to your computer network and to control encryption for access to your data. In preparing to implement rules, you must determine:
The overall services that are available on your network
The services available to a particular user or host and user groups over particular IP addresses
The correct action for the services and addresses for that user or host
By default, the Screen drops any packets that do not specifically match a rule. This means you can more easily create rules, since you only have to write a rule for the services you want to pass.
Use the Rules worksheet to organize the individual rules you want to use. Space is provided for you to create your own service groups. Make copies of the worksheet, as necessary.
Following the Rules worksheet is a completed sample of a worksheet that includes the requisite services that you may want for a particular network.
Ordered Rule Index |
Service or Service Group |
Source Address |
Destination Address |
Action |
Encryption |
User or Groups of Users (Optional) |
Time of Day (Optional) |
Screen (Optional) |
---|---|---|---|---|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Ordered Rule Index |
Service or Service Group |
Source Address |
Destination Address |
Action |
Encryption |
---|---|---|---|---|---|
1 |
ftp |
Internal-net |
Internet |
ALLOW |
NONE |
2 |
ftp |
* |
ftp Server |
ALLOW |
NONE |
3 |
ftp |
Internet |
Internal-net |
DENY |
NONE |
The following shows the four action types: ALLOW, DENY, ENCRYPT, and SECURE.
ALLOW options:
LOG_NONE
LOG_SUMMARY
LOG_DETAIL
SNMP_NONE
SNMP
A proxy type can be chosen if the service can be proxied by one of the SunScreen proxies.
DENY options:
LOG_NONE
LOG_SUMMARY
LOG_DETAIL
SNMP_NONE
SNMP
ICMP_NONE
ICMP_NET_UNREACHABLE
ICMP_HOST_UNREACHABLE
ICMP_PORT_UNREACHABLE
ICMP_NET_FORBIDDEN
ICMP_HOST_FORBIDDEN
ENCRYPT options:
NONE
SKIP_Version_1 (for connection to a SunScreen SPF-100 system only)
You must decide on:
SKIP_Version_2 (for connection to all other SKIP-enabled devices) (Optional: Tunnel addresses are allowed)
You must decide on:
Manual IPsec
Forward ESP
Forward AH
Reverse ESP
Reverse AH
Forward and Reverse can be set the same or different. This is designated on the administration GUI by the Asymmetric and Symmetric options.
Transport or Tunnel Mode
Optional:
Source Screen (object)
Destination Screen (object)
Source Tunnel
Destination Tunnel
Solaris IKE
VPN options:
This option is selected only when forming VPN rules using the previously defined VPN gateways.
After you define and map out your network and decide on your security policy, use data objects, such as services and addresses, to configure SunScreen with the policy rules to control access to your network. At installation, the SunScreen software automatically creates a policy named Initial that you can use to build your own security policies.
Additional information on creating security policies can be found at: http://www.sun.com/software/white-papers/wp-security-devsecpolicy/