Understanding Gauntlet Firewall Concepts
5
Trusted Networks
Trusted networks are the networks inside your security perimeter. Trusted networks are
usually the ones that you are trying to protect. Often, you or someone in your
organization administers the machines on these networks. Your organization controls the
security measures for these networks. Usually, they are within the physical security
perimeter. They can also be connected by links you control in a Virtual Private Network,
as explained in Appendix C.
When you set up the firewall, you explicitly configure the networks your firewall can
trust. After initial configuration, the trusted networks usually include the firewall itself
and all networks behind the firewall.
Untrusted Networks
Untrusted networks are the networks outside your security perimeter. They are
untrusted because they are outside of your control or knowledge. You have no control
over the administration or security policies for these sites. They are the ones from which
you are trying to protect your network. However, you still need to and want to
communicate with these networks, even though they are untrusted.
When you setup the firewall, you explicitly configure the networks from which your
firewall can accept requests, but which it does not trust. By default, after initial
configuration, the untrusted networks are all networks outside the perimeter.
The firewall applies different policies (sets of rules) for requests from untrusted networks
than it does for requests from trusted networks. For some types of requests (including
TELNET, FTP, rlogin, rsh, and POP3), the firewall may use additional authentication
before processing the request. For others, the firewall may deny the request altogether.
Unknown Networks
Unknown networks are those networks that are neither trusted or untrusted. They are
unknown quantities to the firewall because you have not explicitly told the firewall that
this network is a trusted or an untrusted network. By default, there are no unknown
networks because the default list of untrusted networks covers everything that is not a
trusted network.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......