F-Secure Internet Gatekeeper for Linux/Administrator’s Guide
99
Proxy Access Control
You can configure access control by using the
Access control
options. To apply restrictions which
are based on host names, you must first enable “DNS Reverse Lookup”.
For more information, see “
Access Control
”, 65.
Proxy settings
Proxy settings
HTTP proxy
Access control
From these hosts
:
Enabled
(
Example
: 192.168.1.0/255.255.255.0)
DNS reverse lookup:
Enable to restrict by host names
SMTP proxy
Access control
From these hosts
:
Enabled
(Example:
192.168.1.0/255.255.255.0)
DNS reverse lookup:
Enable to restrict by host names
POP proxy
Access control
From these hosts
:
Enabled
(Example:
192.168.1.0/255.255.255.0)
DNS reverse lookup:
Enable to restrict by host names
FTP proxy
Access control
From these hosts
:
Enabled
(Example:
192.168.1.0/255.255.255.0)
DNS reverse lookup:
Enable to restrict by host names
IP filtering (iptables)
You can configure access control which is based on IP addresses by using iptables. The following
shows you a configuration example:
•
iptables
commands
#
iptables -A INPUT -s 192.168.1.0/255.255.255.0 -j ACCEPT
#
iptables -A INPUT -j DROP