
126
Chapter 17: The Graphical Management Interface
The Gauntlet networks and interfaces configuration form allows you to specify trusted
and untrusted networks. Until you make changes on this form, all networks are
considered untrusted, and only the Gauntlet system itself is trusted.
You can use a terminating asterisk as a wild card to represent “all” in network addresses.
These examples illustrate the use of the asterisk:
•
192.168.128.*—all IP addresses beginning with “192.168.128”
•
192.168.*—all IP addresses beginning with “192.168”
•
*—all IP addresses
Note:
Only a terminating asterisk is allowed: an entry such as 192.*.128.* is not valid.
The default subnet mask automatically provided by the GUI for trusted and untrusted
networks is 0xFFFFFF00, which is the correct mask for a non-subnetted Class C network.
If this mask is not correct for your configuration, click Edit and modify the mask field to
change it.
Trusted Networks
The Gauntlet firewall supports the concept of “trusted networks,” networks whose users
are permitted to access firewall services without user authentication (see “Authorizing
Users Form” on page 163). Typically, trusted networks are your internal, local networks.
To add networks to the trusted list, click the ADD button; then specify the IP address of
each network that you want to add to the trusted list.
Trusted Interfaces
Specifying trusted interfaces (interfaces where trusted networks are connected) allows
the firewall to guard against IP address spoofing, a ruse in which network packets are
tagged with a falsified trusted network address. When you designate trusted interfaces,
Gauntlet verifies that packets tagged with a trusted network address actually arrived on
a trusted interface.
Note:
Specifying trusted interfaces is required if you have any trusted networks.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......