SunScreen 3.2 Installation Guide

Rules

You use rules to control access to your computer network and to control encryption for access to your data. In preparing to implement rules, you must determine:


Note -

By default, the Screen drops any packets that do not specifically match a rule. This means you can more easily create rules, since you only have to write a rule for the services you want to pass.


Use the Rules worksheet to organize the individual rules you want to use. Space is provided for you to create your own service groups. Make copies of the worksheet, as necessary.

Following the Rules worksheet is a completed sample of a worksheet that includes the requisite services that you may want for a particular network.

Ordered Rule Index 

Service or Service Group 

Source Address 

Destination Address 

Action 

Encryption 

User or Groups of Users (Optional) 

Time of Day (Optional) 

Screen (Optional) 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Ordered Rule Index 

Service or Service Group 

Source Address 

Destination Address 

Action 

Encryption 

ftp 

Internal-net 

Internet 

ALLOW 

NONE 

ftp 

ftp Server 

ALLOW 

NONE 

ftp 

Internet 

Internal-net 

DENY 

NONE 

Four Action Types

The following shows the four action types: ALLOW, DENY, ENCRYPT, and SECURE.

After you define and map out your network and decide on your security policy, use data objects, such as services and addresses, to configure SunScreen with the policy rules to control access to your network. At installation, the SunScreen software automatically creates a policy named Initial that you can use to build your own security policies.

Additional information on creating security policies can be found at: http://www.sun.com/software/white-papers/wp-security-devsecpolicy/