252
Appendix B: Netperm Table
Example
This example indicates that the sales group is permitted to TELNET to any destination
between the hours of 8:00 am and 5:00 pm:
authsrv: permit-operation group sales tn-gw * time 08:00 17:00
ourname
•
http-gw
Specifies the host and domain name that the HTTP proxy uses when creating the URLs
(links). Because the firewall may have different host names, this allows you to specify
which host name to use.
service
Specifies the name of a service for which this rule applies. Valid values are:
ftp-gw—FTP proxy
rlogin-gw—Rlogin proxy
rsh-gw—Rsh proxy
tn-gw—TELNET proxy
*—all of these proxies
destination
Specifies the hosts to which the proxies can or cannot send requests. Specify
individual machines, entire networks, or subnets. Use IP addresses or host names.
The wildcard * is valid.
options
Specifies particular operations for each protocol that can be controlled. Valid
values are: ftp-gw (consult the ftpd(1) reference manual page), rlogin-gw, rsh-gw,
tn-gw.
time
Indicates that this rule goes into effect and stops having an effect at a particular
time.
start
Specifies the time at which the proxy begins using this rule. Specify time in hours
and minutes (between 00:00 and 23:59).
end
Specifies the time at which the proxy stops using this rule. Specify time in hours
and minutes (between 00:00 and 23:59).
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......