F-Secure Internet Gatekeeper for Linux/Administrator’s Guide
98
10.
Other Settings
This chapter describes additional settings, which you can configure for the product. For most users,
the settings described in “
Typical Configurations
” (15) provide enough security. However, some users
may require additional security. In this case, the examples in this chapter may be useful.
10.1
Access Authentication
To prevent unauthorized access to Internet Gatekeeper, you can define that hosts which access
Internet Gatekeeper from the Internet are authenticated.
You can configure Access Authentication in the following way.
10.1.1
Host Authentication
Internet
Mail server
Web server
Network A
Network B
Access prohibited
Access granted
Anti-Virus
Gateway
If the host which accesses the gateway is fixed, you can use IP addresses and host names to set
access control. In this case, you can set proxy settings in the web console. You can also use the IP
filtering (iptables) setting of Linux to set access control.
The following example limits access to hosts which have the following IP address and subnet:
192.168.1.0/255.255.255.0
.