56
Chapter 7: Managing Gopher and WWW Services
If you are using the authenticating HTTP proxy, users must use a proxy-aware browser.
It must support persistent connections if you wish to use strong authentication. Once
you have configured their web browser, they are aware of the proxy because they must
authenticate to access outside sites.
Using Proxy-Aware Browsers
Many Web browsers, such as Netscape and Mosaic are aware of application proxies for
different types of Web services. Once you configure these browsers, the browser sends
the request to the appropriate proxy.
If you are using the authenticating HTTP proxy, ensure that the browser supports proxy
authentication and persistent connections.
Configuring Web Browsers
The steps vary depending upon the browser, operating system, and version. Some
browsers allow you to indicate the information using a dialog box from a preferences
menu, while others require you to edit a configuration file, and others use environment
variables.
If you are using the authenticating HTTP proxy, ensure that the browser supports proxy
authentication and persistent connections.
To configure the browser, follow these steps:
1.
Specify that you can only have one network connection at a time if you are using the
authenticating HTTP proxy with strong authentication.
2. Specify the name of the firewall for the HTTP proxy and port 8080 as the HTTP port.
3. Specify the name of the firewall for the Gopher proxy and port 8080 as the Gopher
port.
4. Specify the name of the firewall for the FTP proxy and port 8080 as the FTP port.
Note that this is not the standard FTP port 23. When the firewall receives an FTP
request on port 8080, the http-gw proxy does the actual FTP processing, not the
ftp-gw proxy. This is because Web browsers use the HTTP protocol to communicate
with the firewall proxy, not the FTP protocol.
5. Specify the name of the firewall for the security proxy and port 8080 as the security
port.
Summary of Contents for Gauntlet
Page 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Page 16: ......
Page 26: ......
Page 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Page 28: ......
Page 43: ...PART TWO Configuring and Using Proxies II ...
Page 44: ......
Page 50: ......
Page 56: ......
Page 64: ......
Page 72: ......
Page 94: ......
Page 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Page 110: ......
Page 140: ......
Page 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Page 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Page 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Page 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Page 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Page 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Page 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Page 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Page 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Page 214: ......
Page 232: ......
Page 233: ...Appendixes IV ...
Page 234: ......
Page 294: ......
Page 305: ......