215
Appendix B
B.
Netperm Table
The network permissions table (/usr/gauntlet/config/netperm-table) contains configuration
information for the Gauntlet Internet Firewall. The kernel, proxies and other applications
read their configuration information from this table. The rules in the table include two
types of information: policy rules and application-specific rules.
Note:
This structure differs from previous versions of the netperm-table file. The proxies
and other applications still recognize netperm-table files from version 2.0 and higher. You
may wish to convert your netperm-table file to the new format soon for two reasons. First,
the new policy-based table is much easier to use because you can use generic rules.
Second, future versions of the proxies and applications will not always support the older
table format. Remember to make a backup copy of your working netperm-table file before
you attempt any conversions.
Note:
Gauntlet uses /usr/gauntlet/config/template.netperm-table to create (thus overwriting)
/usr/gauntlet/config/netperm-table. Any modifications you wish to be permanent must be
made to the template.netperm-table file.
Policy Rules
Policies are collections of general configuration information. These allow you to closely
map your security policy to policies for the Gauntlet Firewall. Gauntlet configuration
policies often include information such as
•
types of proxies that the firewall can start
•
permitted (or denied) destinations for requests
•
authentication requirements
The source address of the request is the basis for a policy. You define policies for a set of
hosts, rather than defining rules on a proxy-by-proxy basis as in previous versions. You
can easily use the same set of rules for a group of hosts by creating a generic policy
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......