18.07.2013 Views

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

Sidewinder G2 6.1.2 Administration Guide - Glossary of Technical ...

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Notes on<br />

selected proxy<br />

configurations<br />

Chapter 9: Configuring Proxies<br />

Notes on selected proxy configurations<br />

While non-transparent proxy configurations are not typically used, they may be<br />

useful under special circumstances. For example, if your internal network is<br />

experiencing problems resolving routes or names, non-transparent proxy<br />

configurations may be used as a temporary measure to allow HTTP, HTTPS,<br />

or Telnet sessions.<br />

You may also need to use non-transparent proxy configurations for outgoing<br />

connections if you configure the <strong>Sidewinder</strong> <strong>G2</strong> to trigger an IPS attack or<br />

system event response when external addresses are detected on the internal<br />

side <strong>of</strong> the <strong>Sidewinder</strong> <strong>G2</strong>. (For information on responses, see Chapter 20.)<br />

For incoming connections, you may need to use non-transparent proxy<br />

configurations if the internal network is not visible to the external side and<br />

redirection to a single internal machine is undesirable.<br />

Note: Certain transparent and non-transparent proxy configurations can require<br />

users to authenticate before they are allowed to connect (see Chapter 10).<br />

This section provides additional configuration information on some <strong>of</strong> the more<br />

common proxy configurations that you can use at your site.<br />

• Telnet (page 255)<br />

• FTP (page 257)<br />

• HTTP/HTTPS (page 259)<br />

• ICA (page 259)<br />

• Sun RPC (page 260)<br />

• NNTP (page 260)<br />

• T.120 and H.323 (page 262)<br />

• DNS (page 266)<br />

Notes on using the Telnet proxy<br />

The <strong>Sidewinder</strong> <strong>G2</strong> provides a Telnet proxy that allows your trusted users to<br />

remotely log into Internet systems using a Telnet client. When the proxy<br />

s<strong>of</strong>tware is enabled, users can Telnet to any available Internet site, and the<br />

connections will be routed through the <strong>Sidewinder</strong> <strong>G2</strong> without users being<br />

aware <strong>of</strong> it. You can control which systems on your trusted networks can use<br />

Telnet and prohibit users from accessing specified external addresses.<br />

Systems that users log into must be running a Telnet server in order to<br />

establish the connection. To make the Telnet connection, users must run a<br />

Telnet client and specify the name <strong>of</strong> the remote system they want to access.<br />

Users accessing a Telnet server must also have accounts on that system.<br />

Once the session is established, the user is logged in on the remote system as<br />

if he or she were a local user.<br />

255

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!