Firewall Configuration Quick Start Checklist
Firewall Configuration Quick Start Checklist
This checklist is designed to assist network administrators in the beginning stages of their firewall
hardware configuration process. This is not an exhaustive list of all possible options, services, &
considerations and as such should not be utilized as a finalized text for network security documentation.
The purpose of this checklist is to help in gathering the necessary preliminary data that will be required
while configuring your network.
If you have any questions about something you find in this checklist, contact our Firewalls.com
Professional Services Support team at 317-225-4117 for personalized assistance.
Get Secure.
Stay Secure.
Pre-Configuration
The specific goals of your firewall configuration will be highly shaped by the applications actually being
utilized on your network and the users that access them. Therefore, the wisest first step in any
configuration process should be to audit all of the variable details that the real-world usage of your
network dictate. Use the space provided below to record relevant information about your applications
and users, as these details will be referenced throughout the checklist.
Users/Groups/Zones
Application Name Internally Hosted?
That Require Access
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Yes ☐ No ☐
Pre-Configuration
Number of
Group/Zone Restricted Applications Special Notes
Users
Dynamic (DHCP)
Static IP
Outbound Policies
Inbound Policies
GeoIP Blocking
Enable:
Yes ☐ No ☐
Enable:
Yes ☐ No ☐
Allow: __________________________________________________________________
________________________________________________________________________
Monitor: ________________________________________________________________
________________________________________________________________________
Block: __________________________________________________________________
________________________________________________________________________
Enable:
Yes ☐ No ☐
Allow: __________________________________________________________________
________________________________________________________________________
Prioritize: _______________________________________________________________
________________________________________________________________________
Block: __________________________________________________________________
________________________________________________________________________
Gateway AntiVirus:
Yes ☐ No ☐
Anti-Spyware:
Yes ☐ No ☐
Enable DPI/SSL:
Yes ☐ No ☐
Email SMTP:
Yes ☐ No ☐
High Availability:
Yes ☐ No ☐
VOIP Configuration:
Yes ☐ No ☐
Best practices dictate that admins maintain dynamic documentation for all of the rules active on a
network firewall. The next two pages of this document will help outline the types of rules and their
functions implemented during this configuration.
While all previous sections of this document covered the virtual attack vectors of a network firewall, it is
also critically important that physical security of the appliance be considered and documented. Who has
access to your server rack, what times and days of the week your appliances are accessible, and
procedures for physical access can play as important a role in network security as any service
subscription or configuration setting.
Which Days of the Week & Times Is Server Rack Accessible: ____________________________
______________________________________________________________________________
______________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
_____________________________________________________________________________________
Professional Services