Configuring the Firewall for FTP Services
41
Configuring the Firewall for FTP Services
Configuring the Gauntlet firewall involves planning, indicating which daemons the
system will run, configuring the FTP proxy to enforce your policy, and creating user
accounts for users who will need to authenticate.
Planning
1.
Determine whether you wish to allow outside hosts to FTP through the firewall to
inside hosts or to the firewall itself. This decision will determine whether or you
need to use the network access control daemon.
2. Determine your policies for
•
requiring authentication
•
allowing specific FTP commands (for example, RETR and STOR)
•
permitting or denying specific sources and destination
Configuring Network Services
You do not need to modify the IRIX configuration files on the firewall to support FTP
traffic.
Configuring the Proxy Rules
If you are using the Gauntlet Firewall default configuration, you do not need to modify
the proxy rules for FTP services. Use the gauntlet-admin Proxies form if you want to
enable FTP or anonymous FTP. If you have chosen a different denial message, you must
modify /usr/gauntlet/config/template.netperm-table to reflect your configuration. See
Appendix B for more information on ftp-gw options, netperm-table options, and order of
precedence.
Creating Authentication User Entries
Use the authentication management system to add users to the Gauntlet user
authentication database for any users who need to authenticate when using FTP services.
See “Creating Users” on page 181 for more information.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......