![]() |
|
![]() |
| NO | NAME | SOURCE | DESTINATION | VPN | SERVICE | ACTION | TRACK | INSTALL ON | TIME | COMMENT |
|---|---|---|---|---|---|---|---|---|---|---|
| 1 | ||||||||||
| 2 | Allow site to site VPN traffic |
|||||||||
| 3 | Allow remote access VPN users access to file, web, and print services |
|||||||||
| 4 | Allow clientless (SSL based) VPN access using certificates from the VPN-1 Internal Certificate Authority |
|||||||||
| 5 | Allow partners using Microsoft Windows VPN clients or customers to access Remote 1's web server |
|||||||||
| 6 | Audit all outbound user HTTP connection from remote-2-internal using UserAuthority |
|||||||||
| 7 | Log traffic to critical subnets - only enforce this rule on the Corporate-gw |
|||||||||
| 8 | Allow technical support access to web server - only enforce this rule on Remote-1-gw |
|||||||||
| 9 | Audit all traffic from terminal server using UserAuthority |
|||||||||
| 10 | Allow domain name queries to external DNS server |
|||||||||
| 11 | Allow only selected SOAP methods - block all others |
|||||||||
| 12 | servers |
Allow incoming connections to the mail and web servers |
||||||||
| 13 | Allow outgoing SMTP connections, but don't allow the mail server to initiate connections to the internal networks, in case it is compromised |
|||||||||
| 14 | User access to DMZ servers and Internet |
|||||||||
| 15 | Clean up rule - block all other connections |
|||||||||
| Inbound Rules | ||||||
|---|---|---|---|---|---|---|
| NO | SOURCE | DESKTOP | SERVICE | ACTION | TRACK | COMMENT |
| 1 | Block incoming connections from the Internet |
|||||
| Outbound Rules | ||||||
|---|---|---|---|---|---|---|
| NO | DESKTOP | DESTINATION | SERVICE | ACTION | TRACK | COMMENT |
| 2 | Allow outgoing connections to the Internet |
|||||
host from being scanned or attacked