26
Developing a pre-installation security plan
Defining your security policy
■
Networking and applications software
■
Information in files and databases
Symantec Gateway Security 400 Series is the main tool for enforcing security, letting you define a security
policy that allows or denies access to specific resources throughout your network.
Before writing your security plan
Before you write rules to implement your plan using the
Symantec Gateway Security 400 Series
Administrator’s Guide
and
Symantec Advanced Manager and Symantec Event Manager Administrator’s
Guide
, answer the following questions:
■
How many points of entry exist into your network?
■
A security gateway defends a single point of entry. Every point of entry should be protected by a
security gateway.
■
A Virtual Private Network (VPN) server also defends a single point of entry. You must decide what
access the VPN server is going to provide for resources that exist behind the security gateway.
■
Any desktop or laptop connected to the network is a potential point of entry.
■
What types of services do you want to allow for internal users?
■
To what hosts, subnets, and users do you want to allow these services?
■
What external users will you allow to access your network? Which hosts or subnets will you allow them
to access? During what hours? For what period of time?
■
What types of services do you want to allow for external users?
■
What type of authentication will you require for external users? (Symantec recommends strong
authentication for any access from public networks.)
■
If you are implementing VPN tunnels between internal and external hosts, what types of traffic will be
allowed over these tunnels?
■
Will you place your Web server inside or outside of your protected network?
Becoming security-conscious
Developing and implementing a security plan for the security gateway you are installing should be only one
part of your overall security policy. The security gateway offers the best protection against uninvited entry
into your network. However, the security gateway cannot guard against entry by people who pirate
passwords, any more than a sophisticated lock can stop a thief in possession of the right key.
Formulate goals
Take the time to formulate the specific goals of your security plan. Identify the resources you are
protecting and all possible threats. Protecting your resources from unauthorized external
users may be
only one of your goals. You may also need to limit internal
access to certain systems to specific users and
groups, within specific time periods. You will need to define these users and groups for the firewall and how
to configure special services to be passed through these systems.
Symantec Gateway Security 400 Series
Administrator’s Guide
explains how to define users and user groups.
Review issues
Review your organization’s specific issues in detail before you configure the server. Your network’s
security depends on planning sound policies, implementing them carefully, and verifying that they work as
intended.