39
Chapter 5
5.
Managing FTP Services
Sometimes the easiest way to transfer information from one machine to another is to
actually transfer the relevant files. The file transfer protocol (FTP) is one of several
protocols that make this possible. The Gauntlet firewall includes a proxy that securely
allows the transfer of files between trusted and untrusted networks.
This chapter explains the concepts behind the FTP proxy and how it works, how to
configure the proxy, and how to use FTP services. A section also discusses considerations
for running anonymous FTP servers.
Understanding the FTP Proxy
The Gauntlet FTP proxy is an application-level proxy that provides configurable access
control, authentication, and logging mechanisms.
The FTP proxy, which runs on the firewall, passes FTP requests through the firewall,
using rules you supply. You can configure the FTP proxy to allow file transfer activity
based on
•
source IP address
•
source hostname
•
destination IP address
•
destination hostname
•
FTP command (for example, STOR and RETR)
Using these options, you can configure your firewall to allow specific hosts on outside
networks to transfer files to and from inside hosts. Employees working at specific
customer sites can access files on their workstations. Similarly, you can configure your
firewall to permit users on the inside network to copy files (using the FTP daemon RETR
command) from hosts on the outside network, but not place files (using the FTP daemon
STOR command) on these outside hosts.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......