Using This Information
217
TELNET proxy reads the netperm-table file to determine how long a session must be idle
before it should disconnect the session.
You can also include rules to permit or deny a particular service for requests to specific
addresses or networks. For example, you can configure the HTTP proxy to deny requests
to a particular host or network. All of the other proxies, such as the smapd server, continue
to use the generic policy and send information to that site, while the HTTP proxy denies
requests to that site.
Because the proxies and applications read the netperm-table file from top to bottom, you
must put proxy-specific rules before the generic policies. When the relevant proxy parses
the configuration information, it uses the proxy-specific rule rather than the more general
policy rule.
For example, the FTP proxy includes a generic rule that denies requests to the destination
ftp.bigu.edu. The general outside policy, near the bottom of the netperm-table file includes
a rule that allows all proxies and applications to send to any destination. Because the
more restrictive rule is above the generic policy in the netperm-table file, the FTP proxy
uses the restrictive rule and denies requests to ftp.bigu.edu.
Applications
Other Gauntlet applications such as the authentication server also read configuration
information from the netperm-table file.
Using This Information
As part of the startup process a proxy or application reads the netperm-table file looking
for applicable configuration rules. It parses the table from top to bottom, looking for rules
that match its name. It also matches wildcard rules that apply to all applications. For
example, the TELNET proxy (tn-gw) looks for rules that match tn-gw and *.
The proxy first uses these rules to determine if it can accept the request from the source
address. It then determines whether the requested service is an explicitly permitted
service. If it is not, the proxy denies the request. If it can accept the request, it uses the
other rules to determine whether it needs to authenticate the request, and whether it can
send the request to the specified destination. The application also finds and uses rules for
that specific application.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......