Other Settings; Access Authentication; Host Authentication - F-SECURE INTERNET GATEKEEPER FOR LINUX 4.01 Administrator's Manual

Table of Contents

Advertisement

This chapter describes additional settings, which you can configure for the product. For most users,
the settings described in
may require additional security. In this case, the examples in this chapter may be useful.

10.1 Access Authentication

To prevent unauthorized access to Internet Gatekeeper, you can define that hosts which access
Internet Gatekeeper from the Internet are authenticated.
You can configure Access Authentication in the following way.

10.1.1 Host Authentication

If the host which accesses the gateway is fixed, you can use IP addresses and host names to set
access control. In this case, you can set proxy settings in the web console. You can also use the IP
filtering (iptables) setting of Linux to set access control.
The following example limits access to hosts which have the following IP address and subnet:
192.168.1.0/255.255.255.0.
F-Secure Internet Gatekeeper for Linux/Administrator's Guide
"Typical
Configurations" (15) provide enough security. However, some users
Web server
Access granted
Internet
Network A

10. Other Settings

Mail server
Anti-Virus
Gateway
Access pro hibit ed
Network B
98

Advertisement

Table of Contents
loading

This manual is also suitable for:

Internet gatekeeper for linux version 4

Table of Contents