Using Terminal Services
37
In this example, Scooter, working at a client site (blaze.clientsite.com), needs TELNET
access to the dimension.yoyodyne.com system behind the firewall. He first telnets to the
firewall for Yoyodyne (firewall.yoyodyne.com). The TELNET proxy on firewall prompts
him to authenticate. Scooter provides his authentication user ID (scooter). When the
proxy prompts, he enters the response to the authentication challenge. The proxy
authenticates scooter.
Scooter now indicates the host he needs to access (dimension). The TELNET proxy
connects Scooter to dimension, and the TELNET daemon running on that machine. The
TELNET daemon on dimension prompts Scooter for his user name and password on
dimension. The TELNET daemon on dimension verifies Scooter’s user name and
password, and logs him in.
TN3270 With Authentication
If you have configured terminal services to require authentication, users need to follow
different procedures to use TN3270. To use TN3270 with authentication:
1.
TN3270 to the firewall itself, disabling true TN3270 support for the initial
handshake
2. Authenticate to the proxy
3. Connect to the desired 3270 host
4. Continue as before
The corporate policy that requires authentication before using TELNET from untrusted
hosts to trusted hosts also applies to using TN3270. Generally, the only difference is in
starting the TN3270 client:
blaze-55: X3270 -model 2 -efont 3270-12 a: fire-out.yoyodyne.com
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......