About This Guide
xxi
•
Chapter 14, “Managing General TCP Services With Authentication,” explains what
the user authentication management system does, and how to use it with the
supported strong authentication systems.
•
Chapter 15, “Managing Information Services on the Firewall,” explains how the
system logs activity. It explains the different types of reports, how to configure
them, and how to interpret them.
•
Chapter 16, “Using the Network Access Control Daemon,” discusses firewall
backup and explains how to ensure that the firewall contains the files and data that
it should.
•
Chapter 17, “The Graphical Management Interface,” explains what the graphical
administrative interface does, how to access it from local and remote locations, and
how to use it to configure your Gauntlet firewall.
•
Chapter 18, “Managing User Authentication,” explains what the user
authentication management system does, and how to use it with the supported
strong authentication systems.
•
Chapter 19, “Using the Login Shell,”explains what the login shell does and how it
works. It presents instructions for configuring the Gauntlet firewall for more secure
access.
•
Chapter 20, “Logging and Reporting,” explains how the system logs activity. It
explains the different types of reports, how to configure them, and how to interpret
them.
•
Chapter 21, “Backups and System Integrity,” explains considerations for
incorporating the Gauntlet firewall in an administrator’s general backup schedule.
It also presents considerations for restoring the Gauntlet firewall.
“Appendixes” present reference material.
•
Appendix A, “Gauntlet System Files,” explains the format and precedence of the
trusted and untrusted network tables that the Gauntlet firewall uses.
•
Appendix B, “Netperm Table,” explains the format and precedence of the
netperm-table, which contains configuration information for the Gauntlet firewall,
and the concepts behind policies.
•
Appendix C, “Virtual Private Networks,” Virtual Private Networks, explains how
you can use your Gauntlet Internet Firewall to exchange encrypted traffic with
other Gauntlet Firewalls.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......