Using NNTP
89
Verifying Your Setup
Run your news server as you did before. Watch the logs for errors.
Using NNTP
The firewall and the plug proxy for NNTP traffic are transparent to the user. Users should
continue to point their news readers (rn, trn) and other news-aware tools (Netscape)
towards the internal news server. It’s that easy.
Configuring the Firewall for Other Protocols
Configuring the Gauntlet firewall involves planning, indicating which daemons the
system will run, configuring the proxies to enforce your policy, and configuring your
service.
Note:
If you have simple plug gateway needs, you can add custom plug gateways using
the gauntlet-admin proxies page. If you use that method, you may still need to modify
/etc/services, but do not need to modify /etc/init.d/network.local or
/usr/gauntlet/config/template.netperm-table.
This section uses the Quote of the Day (qotd) service as an example. Of course, you must
carefully determine if the benefits of something like a Quote of the Day service outweigh
the risks of allowing that type of service within your security perimeter.
Planning
1.
Determine which protocols and which applications you wish to proxy through your
firewall.
Warning:
Again, the consequences of allowing proprietary protocols through
your firewall are not known. Because the protocols are proprietary, the firewall
and the proxy have no idea what sorts of data or requests the applications are
sending. Nor can it be determined how safe the actual application is. Do not use
the plug proxy for proprietary protocols without first performing a risk
assessment.
2. Verify that the protocol is stream based.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......