Table 2-5
IP address/Fully qualified domain
name
Use
Table 2-6
User name
________________________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
9
Defining your network architecture
In the following section, list all of the entities that comprise your network. Show all routers and
computers systems that will be directly affected by, or connected to, the security gateway and its
directly connected networks. Label each network component with its IP address and netmask.
Entity identification (Continued)
Table 2-6
to list all allowed user identities.
User identification
Do you want the security gateway to keep a record of user passwords for protected resources (single
sign-on)?
_____ Yes
Entity type
_______________________
_______________________
_______________________
Group name
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_______________________
_____ No
Developing a security plan
Security policy worksheets
Internal/external
Client VPN
Clientless VPN
______________
_________
______________
_________
______________
_________
______________
_________
______________
_________
______________
_________
______________
_________
______________
_________
______________
_________
25