22
Developing a security plan
Security policy worksheets
To define your allowed TCP/IP services
1
Use
Table 2-2
and check the access type (if any) you will allow for the following services.
2
Use
Table 2-3
to list your TCP/IP services.
Over time, you will likely refine these permissions. You should make periodic updates to this list.
3
Do you need transparent inbound access from the Internet (VPN)?
Table 2-2
Allowed TCP/IP access type
Access group
Te
ln
et
SMTP
HT
TPS
CIF
S
HT
TP
NN
TP
Re
alAud
io
RT
SP
PI
N
G
Other
All users
All internal users
Selected group
No access
Table 2-3
TCP/IP services
Group
Authentication
Access times
FTP
______________________
__ _ _ _________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
Telnet
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
HTTP
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
Other
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
______________________
_______________________
_______________________
_______________________
_____ Yes
_____ No
Содержание SGM 1600
Страница 1: ...Symantec Gateway Security 1600 Series v3 0 Installation Guide Supported platforms 1620 1660 ...
Страница 4: ......
Страница 6: ...6 Contents ...
Страница 28: ...28 Developing a security plan Security policy worksheets ...