How It Works
53
proxy. The proxy examines the request and determines that it is a basic request for HTTP
service. The proxy checks the source and destination ports in the netperm-table file. It then
sends the request to the web server specified in the URL. When it receives the requested
data, it passes the data back to the requesting web browser.
If the request is for Gopher or FTP services (from a Web or Gopher client), it is still the
http-gw proxy which receives the request, and it still uses the http-gw rules.
If the request is for some sort of secure HTTP transaction using either the SHTTP or SSL
protocols, the proxy performs the appropriate hand-off with the secure server at the
other end of the connection.
If you have not configured or can not configure the web browser to know about the HTTP
proxy, the firewall still calls the HTTP proxy for requests on port 80. However, it does
not handle requests for services on other ports (for example, 8080). You can, however,
run a second or even a third HTTP proxy on popular alternate ports.
Authenticated HTTP
If you want to authenticate users before allowing them to access information, the firewall
runs the authenticating HTTP proxy (ahttp-gw) as a daemon listening for requests on the
HTTP port (8080). When the firewall receives requests for service on this port, it
performs the normal configuration checks to ensure that the initiating host has
permission to use the desired service to the desired destination.
If the host has permission, ahttp-gw prompts the user to authenticate. It verifies the
information with Gauntlet authentication database. If the user provided proper
authentication, ahttp-gw passes processing over to the HTTP proxy.
The proxy remains active as long as a persistent connection between the source and
destination remains. Each time the connection breaks (due to inactivity, pressing the stop
button, or selecting a link before the initial page finishes loading, or any other reason),
the ahttp-gw proxy reauthenticates you. If you are using reusable passwords, your
browser remembers this information and reauthenticates on your behalf. If you are
using strong authentication, you must reauthenticate each time the connection breaks.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......