54
Chapter 7: Managing Gopher and WWW Services
Gopher and FTP Services
If the request is for Gopher services (from a Web or Gopher client), the firewall calls a
second copy of the http-gw proxy, running as http-gw on port 70. It still uses the http-gw
rules in the
netperm-table
.
If the request is for FTP services (from a Web client), the firewall still calls the http-gw
proxy and uses the http-gw rules in the
netperm-table
if you have your FTP proxy set to the
HTTP proxy. If you have not set an FTP proxy in your Web browser, the FTP proxy
(ftp-gw) handles requests for FTP service.
SHTTP and SSL Services
If the request is for some sort of secure HTTP transaction using either the SHTTP protocol
(on port 8080) or SSL protocol (on port 443), the proxy performs the appropriate hand-off
with the secure server at the other end of the connection.
If you have not configured or can not configure the web browser to know about the HTTP
proxy as the security proxy, the firewall calls the SSL plug proxy for all requests on port
443.
Configuring the Firewall for WWW and Gopher Services
Configuring the Gauntlet firewall involves planning, indicating which daemons the
system will run, and configuring the proxies to enforce your policy.
Planning
1.
Determine which services you will allow.
2. Determine your policies for source and destination sites.
3. Determine whether you wish to require authentication.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......