
160
Chapter 17: The Graphical Management Interface
You can also specify which reports you want to receive, their frequency (daily, weekly, or
both), how often you want the report software to run, and how long you want system log
files to be saved. Save the files for at least seven days if you want to receive full weekly
reports.
You should assign either yourself or another trusted user as the system Postmaster. This
user receives any generic mail addressed to “Postmaster” at the Gauntlet host.
Example 17-2 contains an example of Gauntet log file entries (lines have been shortened
for readability). If you do not want certain types of entries to be reported, you can specify
them using egrep syntax in the field provided on this form (see the egrep(1) reference
page). For example, enter “localhost” in the egrep field to keep lines that include the
string “localhost” from appearing in the log file output. Be careful not to specify filters
that are too broad; this might obscure warnings and notices that you want to see.
Example 17-2
Partial Log File Listing
Aug 10 02:00:08 6F:rfwall syslogd: restart
Aug 10 06:56:22 5D:rfwall netacl[1355]: permit host=boston.esd.abc.com...
Aug 10 06:56:22 5D:rfwall tn-gw[1355]: permit host=boston.esd.abc.com/...
Aug 10 06:56:32 5D:rfwall tn-gw[1355]: permit host=boston.esd.abc.com/...
Aug 10 06:56:32 5D:rfwall tn-gw[1355]: connected host=boston.esd.abc.c...
Aug 10 06:56:32 5D:rfwall netacl[1356]: permit host=localhost/127.0.0....
Aug 10 10:45:41 5D:rfwall authsrv[1893]: BADAUTH smith (tn-gw midas.xy...
Aug 10 10:45:45 5D:rfwall authsrv[1893]: BADAUTH exit (tn-gw midas.xyz...
<etc>
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......