86
Chapter 13: Managing NNTP and General TCP Services
Understanding the Proxy
The Gauntlet plug proxy is a TCP gateway that provides configurable access control and
logging mechanisms. The plug proxy, which runs on the firewall, passes NNTP or other
application requests through the firewall, using rules you supply. It essentially tunnels
information from a port on the firewall to a specific port on another machine.
You can configure instances of the plug proxy to service
•
NNTP news feeds
•
webster
•
whois
This is not an exhaustive list. The plug proxy is protocol neutral, so you can tunnel a
variety of other applications. Weigh the risks carefully for each application.
For each version of the plug proxy, you can configure the proxy to allow connections
based on
•
source IP address
•
source hostname
•
source port
•
destination IP address
•
destination hostname
•
destination port
Using these options for the plug proxy, you could configure your firewall to allow your
service provider's host on the outside to connect to the firewall and pass news via NNTP
to your news machine on the inside network. You could also route all internal requests
for whois lookups to a specific whois server on the outside network.
The proxies log all successful and unsuccessful connection attempts, and the amount of
data transferred.
Used together, these access controls and log files allow you to have much more control
over the connections to and from your system than without a firewall. However, you
may be allowing proprietary protocols into your network, which can be dangerous.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......