66
Chapter 9: Managing MediaBase Services
Used together, these access controls and log files give you much more control over the
MediaBase connections to and from your system than you would have without the
firewall.
How It Works
The firewall runs the MediaBase proxy (mbase-gw) as a daemon listening for requests on
a series of ports: ports 6301, 6309, 6310, 6312, and 6313 handle control information; ports
6320 through 6323 and 6340 handle data information. When the firewall receives requests
for those ports, the MediaBase proxy checks its configuration information (in the
netperm-table file) and determines whether the initiating client has permission to use
MediaBase. If the client has permission, the proxy logs the transaction and passes the
request to the appropriate host.
The mbase-gw daemon is always active. This daemon requires that MediaBase players
also be configured to use a proxy.
The default policy allows clients inside the network to connect to MediaBase servers; it
does not allow outside clients such access, however. Because the firewall runs the
MediaBase proxy on all MediaBase ports, all requests from outside clients access the
MediaBase proxy rather than the server. This configuration prohibits running a
MediaBase server on the firewall itself—there is no way to start a MediaBase server to
accept such requests.
Configuring the Firewall to Use the MediaBase Proxy
Configuring the Gauntlet firewall involves planning, indicating which servers may be
accessed, and configuring the MediaBase proxy to enforce your policy.
Planning
Determine which internal users and hosts can use MediaBase, and determine whether
you want to run the MediaBase proxy.
Содержание Gauntlet
Страница 1: ...Gauntlet for IRIX Administrator s Guide Document Number 007 2826 004 ...
Страница 16: ......
Страница 26: ......
Страница 27: ...PART ONE Understanding the Gauntlet Internet Firewall I ...
Страница 28: ......
Страница 43: ...PART TWO Configuring and Using Proxies II ...
Страница 44: ......
Страница 50: ......
Страница 56: ......
Страница 64: ......
Страница 72: ......
Страница 94: ......
Страница 109: ...PART THREE Administering General Gauntlet Firewall Services III ...
Страница 110: ......
Страница 140: ......
Страница 146: ...120 Chapter 17 The Graphical Management Interface Figure 17 3 Gauntlet Introductory Management Form 1 of 3 ...
Страница 147: ...Introductory Management Form 121 Figure 17 4 Gauntlet Introductory Management Form 2 of 3 ...
Страница 148: ...122 Chapter 17 The Graphical Management Interface Figure 17 5 Gauntlet Introductory Management Form 3 of 3 ...
Страница 150: ...124 Chapter 17 The Graphical Management Interface Figure 17 6 Networks and Interfaces Configuration Form 1 of 2 ...
Страница 151: ...Networks and Interfaces Configuration Form 125 Figure 17 7 Networks and Interfaces Configuration Form 2 of 2 ...
Страница 155: ...Routing Configuration Form 129 Figure 17 8 Routing Configuration Form ...
Страница 162: ...136 Chapter 17 The Graphical Management Interface Figure 17 10 Proxy Servers Configuration Form 1 of 3 ...
Страница 163: ...Proxy Servers Configuration Form 137 Figure 17 11 Proxy Servers Configuration Form 2 of 3 ...
Страница 164: ...138 Chapter 17 The Graphical Management Interface Figure 17 12 Proxy Servers Configuration Form 3 of 3 ...
Страница 170: ...144 Chapter 17 The Graphical Management Interface Figure 17 13 DNS Configuration Form 1 of 2 ...
Страница 171: ...DNS Configuration Form 145 Figure 17 14 DNS Configuration Form 2 of 2 ...
Страница 177: ...Sendmail on Gauntlet Servers 151 Figure 17 15 Sendmail Configuration Form ...
Страница 187: ...Logfiles and Reports Configuration Form 161 Figure 17 20 Reports and Logfiles Form 1 of 2 ...
Страница 191: ...Authorizing Users Form 165 Figure 17 22 Authorizing Users Form ...
Страница 192: ...166 Chapter 17 The Graphical Management Interface Figure 17 23 Add User Form ...
Страница 214: ......
Страница 232: ......
Страница 233: ...Appendixes IV ...
Страница 234: ......
Страница 294: ......
Страница 305: ......