
Appendix — Network Infrastructure Checklists
A-4
Hewlett-Packard VPN Server Appliance SA3110/SA3150/SA3400/SA3450 Installation Guide
Firewall Checklists
Firewall Checklists
Firewall Checklists
Firewall Checklists
Firewall rules determine:
•
Who can communicate from the corporate network to the
Internet, and who can communicate from the Internet to the
corporate network (by their IP addresses and subnet masks)
•
What specific applications any individual user may access
With unrestricted access, a user’s IP address and subnet mask is
0.0.0.0, and the user can gain access to any application (http, ftp,
and so on).
The outbound and inbound firewall checklists ask for IP
addresses, subnet masks, and the applications each user can
access.
Outbound
Outbound
Outbound
Outbound
Firewall Access
Firewall Access
Firewall Access
Firewall Access
Rights
Rights
Rights
Rights
Complete the following outbound and inbound firewall access
rights checklists:
Outbound
Outbound
Outbound
Outbound
Users
Users
Users
Users
IP Address
IP Address
IP Address
IP Address
Subnet Mask
Subnet Mask
Subnet Mask
Subnet Mask
Accessible
Accessible
Accessible
Accessible
Applications
Applications
Applications
Applications