Proxy Servers Configuration Form
131
Proxy Servers Configuration Form
The proxy server configuration form (Figure 17-10 and Figure 17-11) allows you to
control network services that are available through the Gauntlet firewall. You can enable
and disable particular services, specify timeout values and port numbers, and so on.
Each service can be configured separately.
Remote (Network) Connections
If you want to allow network logins to the firewall, check “Do you want connections
allowed to the firewall itself?” If this box is not checked, you must configure the firewall
at the system console—not from a remote location. Remote logins are convenient, but
they can lessen the security of the firewall.
When logins are enabled, administrators can connect to the firewall by accessing the
rlogin or TELNET proxies. Example 17-1 illustrates a sample TELNET session.
Note:
The preferred method for managing the firewall remotely is described in
“Introductory Management Form” on page 118 and “Configuring Gauntlet for Secure
Remote Administration” on page 170.
Example 17-1
Administrative TELNET Connection to Firewall
Trying 204.254.155.253
Connected to firewall.yoyodyne.com.
Escape characther is ^]
tn-gw> connect localhost
Trying 127.0.0.1 port 23...
Connected to localhost.
IRIX System V.4 (firewall)
login: root
Password:
IRIX Release 6.1 IP22 firewall
Copyright 1987-1994 Silicon Graphics, Inc. All Rights Reserved.
Last login: Wed Aug 16 14:05:49 PDT 1995 by UNKNOWN@localhost
You have mail.
firewall 1# setenv DISPLAY magnolia.yoyodyne.com:0
firewall 2# gauntlet-admin
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......