|
NO | NAME | SOURCE | DESTINATION | VPN | SERVICE | ACTION | TRACK | INSTALL ON | TIME | COMMENT |
---|---|---|---|---|---|---|---|---|---|---|
1 | ||||||||||
2 | Allow site to site VPN traffic |
|||||||||
3 | Allow remote access VPN users access to file, web, and print services |
|||||||||
4 | Allow clientless (SSL based) VPN access using certificates from the VPN-1 Internal Certificate Authority |
|||||||||
5 | Allow partners using Microsoft Windows VPN clients or customers to access Remote 1's web server |
|||||||||
6 | Audit all outbound user HTTP connection from remote-2-internal using UserAuthority |
|||||||||
7 | Log traffic to critical subnets - only enforce this rule on the Corporate-gw |
|||||||||
8 | Allow technical support access to web server - only enforce this rule on Remote-1-gw |
|||||||||
9 | Audit all traffic from terminal server using UserAuthority |
|||||||||
10 | Allow domain name queries to external DNS server |
|||||||||
11 | Allow only selected SOAP methods - block all others |
|||||||||
12 | servers |
Allow incoming connections to the mail and web servers |
||||||||
13 | Allow outgoing SMTP connections, but don't allow the mail server to initiate connections to the internal networks, in case it is compromised |
|||||||||
14 | User access to DMZ servers and Internet |
|||||||||
15 | Clean up rule - block all other connections |
Inbound Rules | ||||||
---|---|---|---|---|---|---|
NO | SOURCE | DESKTOP | SERVICE | ACTION | TRACK | COMMENT |
1 | Block incoming connections from the Internet |
Outbound Rules | ||||||
---|---|---|---|---|---|---|
NO | DESKTOP | DESTINATION | SERVICE | ACTION | TRACK | COMMENT |
2 | Allow outgoing connections to the Internet |
host from being scanned or attacked