Using Rsh Services
49
Configuring the Proxy Rules
Configure the Rsh proxy to enforce your security policies. This involves modifying
/usr/local/etc/netperm-table
. See Appendix B for more information on rsh-gw options,
netperm-table options and order of precedence. To configure the netperm-table:
1.
Add the Rsh proxy to your trusted policies, as appropriate.
policy-trusted:permit-proxy rsh-gw
2. Configure other Rsh proxy options, as appropriate for your setup. These could
include the default directory and timeout values.
#Rsh proxy rules
rsh-gw: timeout 300
Verifying Your Setup
Verify your configuration by accessing a machine outside the perimeter from a machine
inside the perimeter.
Using Rsh Services
Following some initial configuration, the firewall and the rsh-gw proxy are transparent to
the user. Users can continue to use rsh to outside hosts as they did before.
Configuring the Remote Machine
Before using Rsh, users must add their user name and the name of the firewall to their
.rhosts
file on the remote machine:
user
@
firewall
where:
1.
user is their user name within the domain from which the request comes. The user
does not actually need to have an account on the firewall itself. The Rsh request
simply appears to be coming from the firewall.
2. firewall is the name (including domain if necessary) of the firewall. This name
should be the name of the interface on firewall closest to the remote machine.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......