![]() |
|
![]() |
NO | NAME | SOURCE | DESTINATION | VPN | SERVICE | ACTION | TRACK | INSTALL ON | TIME | COMMENT |
---|---|---|---|---|---|---|---|---|---|---|
1 | ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
||
2 | ![]() |
![]() |
![]() |
![]() ![]() ![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
Allow site to site VPN traffic |
|
3 | ![]() |
![]() |
![]() |
![]() ![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
Allow remote access VPN users access to file, web, and print services |
|
4 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow clientless (SSL based) VPN access using certificates from the VPN-1 Internal Certificate Authority |
|
5 | ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow partners using Microsoft Windows VPN clients or customers to access Remote 1's web server |
|
6 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Audit all outbound user HTTP connection from remote-2-internal using UserAuthority |
|
7 | ![]() |
![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Log traffic to critical subnets - only enforce this rule on the Corporate-gw |
|
8 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow technical support access to web server - only enforce this rule on Remote-1-gw |
|
9 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Audit all traffic from terminal server using UserAuthority |
|
10 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow domain name queries to external DNS server |
|
11 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow only selected SOAP methods - block all others |
|
12 | servers |
![]() |
![]() |
![]() |
![]() ![]() ![]() |
![]() |
![]() |
![]() |
![]() |
Allow incoming connections to the mail and web servers |
13 | ![]() |
![]() ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Allow outgoing SMTP connections, but don't allow the mail server to initiate connections to the internal networks, in case it is compromised |
|
14 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
User access to DMZ servers and Internet |
|
15 | ![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
Clean up rule - block all other connections |
Inbound Rules | ||||||
---|---|---|---|---|---|---|
NO | SOURCE | DESKTOP | SERVICE | ACTION | TRACK | COMMENT |
1 | ![]() |
![]() |
![]() |
![]() |
![]() |
Block incoming connections from the Internet |
Outbound Rules | ||||||
---|---|---|---|---|---|---|
NO | DESKTOP | DESTINATION | SERVICE | ACTION | TRACK | COMMENT |
2 | ![]() |
![]() |
![]() |
![]() |
![]() |
Allow outgoing connections to the Internet |
host from being scanned or attacked