114
C
HAPTER
8: A
DVANCED
S
ETTINGS
c
In the
Proxy Web Server Port
field enter the number
8080
d
Click
Update
to save your changes.
3
No configuration is necessary on the client machines. The Firewall will
intercept any HTTP requests for external URLs and will forward the traffic
to the Webcache.
Specifying Intranet
Settings
In some cases, it is desirable to prevent access to certain resources by
unauthorized users on the LAN. For example, a school’s administration
office may be placed behind the Firewall to restrict access to its
computers by users in the Student Computer Lab. Similarly, an
organization’s accounting, research, or other sensitive resources may be
protected against unauthorized access by other users on the same
network. By default, protected LAN users can only access the Internet and
no other devices between the WAN port and the Internet. To enable
access to the area between the Firewall’s WAN port and the Internet
(referred to as the intranet), you must specify intranet settings for the
Firewall.
To achieve internal firewalling, connect a second Firewall between the
unrestricted and the restricted segments on the LAN, as shown in
Figure 51. In this diagram the Firewall labelled F2 is protecting an internal
network.
DUA1611-0AAA02.book Page 114 Thursday, August 2, 2001 4:01 PM
Содержание 3C16111 - SuperStack 3 Firewall Web Site Filter
Страница 18: ...18 DUA1611 0AAA02 book Page 18 Thursday August 2 2001 4 01 PM ...
Страница 50: ...50 DUA1611 0AAA02 book Page 50 Thursday August 2 2001 4 01 PM ...
Страница 96: ...96 CHAPTER 6 USING THE FIREWALL DIAGNOSTIC TOOLS DUA1611 0AAA02 book Page 96 Thursday August 2 2001 4 01 PM ...
Страница 122: ...122 CHAPTER 8 ADVANCED SETTINGS DUA1611 0AAA02 book Page 122 Thursday August 2 2001 4 01 PM ...
Страница 150: ...150 CHAPTER 10 CONFIGURING HIGH AVAILABILITY DUA1611 0AAA02 book Page 150 Thursday August 2 2001 4 01 PM ...
Страница 152: ...152 DUA1611 0AAA02 book Page 152 Thursday August 2 2001 4 01 PM ...
Страница 166: ...166 CHAPTER 11 ADMINISTRATION AND ADVANCED OPERATIONS DUA1611 0AAA02 book Page 166 Thursday August 2 2001 4 01 PM ...
Страница 174: ...174 DUA1611 0AAA02 book Page 174 Thursday August 2 2001 4 01 PM ...
Страница 178: ...178 CHAPTER 13 TYPES OF ATTACK AND FIREWALL DEFENCES DUA1611 0AAA02 book Page 178 Thursday August 2 2001 4 01 PM ...
Страница 190: ...190 CHAPTER 14 NETWORKING CONCEPTS DUA1611 0AAA02 book Page 190 Thursday August 2 2001 4 01 PM ...
Страница 192: ...192 DUA1611 0AAA02 book Page 192 Thursday August 2 2001 4 01 PM ...
Страница 206: ...206 APPENDIX D TECHNICAL SUPPORT DUA1611 0AAA02 book Page 206 Thursday August 2 2001 4 01 PM ...
Страница 212: ...212 INDEX DUA1611 0AAA02 book Page 212 Thursday August 2 2001 4 01 PM ...
Страница 214: ...DUA1611 0AAA02 book Page 214 Thursday August 2 2001 4 01 PM ...