90
Chapter 13: Managing NNTP and General TCP Services
3. Determine what port these services use. Verify that the service uses the same port
for sending and receiving.
4. Determine which external hosts can use these services.
5. Determine which internal hosts can use these services.
Configuring Network Services
Configuring network services involves modifying IRIX configuration files so the system
knows which programs to start.
To configure network services, follow these steps:
1.
Add information to /etc/services so that the system knows what service it is offering
on that port:
qotd 17/tcp quote # Quote of the Day
The protocol you indicate is the protocol that the plug proxy uses (TCP).
2. Add information about the plug proxy to /etc/init.d/network.local so that the system
knows what daemon to start to handle Quote of the Day requests:
echo " qotd"
/usr/etc/plug-gw -as qotd-gw -daemon qotd qotd &
See the comments in /etc/init.d/network on how to ensure that /etc/init.d/network.local
will be executed at boot time.
Use the same name for the service that you specified in /etc/services.
Configuring the Proxy Rules
Configure the plug proxy to enforce your security policies. This involves modifying
/usr/gauntlet/config/template.netperm-table. You may use the gauntlet-admin Proxies form.
In the section called “Plug Gateways,” enter the source host, the firewall port, the
destination host, and the destination port for each plug gateway.
Alternatively, you may modify system files directly. Appendix B provides more
information on plug-gw options, netperm-table options, and order of precedence.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......