xx
About This Guide
Gauntlet firewall, as well as required and potential configuration steps for the
terminal applications.
•
Chapter 5, “Managing FTP Services,” explains what the FTP proxy does and how it
works. It presents instructions for configuring the Gauntlet firewall, as well as
required and potential configuration steps for the FTP application. It also includes
notes on running an anonymous FTP server.
•
Chapter 6, “Managing Rsh Services,” explains what the Rsh proxy does and how it
works. It presents instructions for configuring the Gauntlet firewall, as well as
required and potential configuration steps for Rsh.
•
Chapter 7, “Managing Gopher and WWW Services,” explains the types of
information services the Gauntlet firewall supports. It explains what the HTTP
proxy does for HTTP, SHTTP, SSL, and Gopher proxies and how it works. It
presents instructions for configuring the Gauntlet firewall, as well as required and
potential configuration steps for these applications.
•
Chapter 8, “Managing RealAudio Services,” describes the RealAudio proxy, which
securely handles requests to listen to audio data.
•
Chapter 9, “Managing MediaBase Services,” describes the MediaBase proxy, which
securely handles requests to play video and multimedia data.
•
Chapter 10, “Managing X Window Services,” explains what the X11 proxy does and
how it works. It presents instructions for configuring the Gauntlet firewall, as well
as required and potential configuration steps for the X11 applications.
•
Chapter 11, “Managing LP Services,” explains what the lp proxy does and how it
works. It presents instructions for configuring the Gauntlet firewall, as well as
required and potential configuration steps for lp.
•
Chapter 12, “Managing Sybase Services,” explains what the Sybase proxy does and
how it works. It presents instructions for configuring the Gauntlet firewall, as well
as required and potential configuration steps for Sybase.
Part III, “Administering General Gauntlet Firewall Services,” presents information on
the other administrative tasks for the Gauntlet firewall.
•
Chapter 13, “Managing NNTP and General TCP Services,” explains the types of
News and network services the Gauntlet firewall supports. It explains what the
plug proxy does and how it works. It presents instructions for configuring the
Gauntlet firewall, as well as required and potential configuration steps for the News
and network applications.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......