210
Appendix A: Gauntlet System Files
Note:
The online list of Gauntlet files is always the most current list. Use the online view
link to see the current Gaunlet file list.
Table A-1
The Gauntlet File List
Filename
Safe?
Description
/*/*.old.12345
Yes
To save copies of certain configuration
files, Gauntlet will use the convention
of appending “.old.” to the filename
and then the process ID of whatever
Gauntlet program is actually making
the change.
/*/*.new.12345
No
While creating new versions of
configuration files, Gauntlet uses the
same convention as when saving copies
of configuration files. Such files should
be removed by Gauntlet when it is done
performing whatever task it is up to.
cgi-data/*.g
Yes
Stores settings from the configuration
pages.
config/trusted-networks
Yes
Lists networks which are to be
considered trusted.
config/untrusted-networks
Yes
Lists networks which are to be
considered untrusted.
config/trusted-ports
Yes
Lists ports on which traffic will be
permitted to pass through the firewall
unimpeded.
config/trusted-interfaces
Yes
Lists interfaces on which traffic from
trusted networks will be accepted. All
other packets claiming to be from
trusted networks but which come in
over other interfaces will be rejected.
config/*.txt
Yes
Text files which are displayed by the
respective application proxies under
certain circumstances. For example,
rlogin-deny.txt would be displayed by
the rlogin application proxy if access is
denied.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......