Proxy Access Control
You can configure access control by using the
are based on host names, you must first enable "DNS Reverse Lookup".
For more information, see
Proxy settings
Proxy settings
HTTP proxy
Access control
From these hosts : Enabled
DNS reverse lookup: Enable to restrict by host names
SMTP proxy
Access control
From these hosts : Enabled
DNS reverse lookup: Enable to restrict by host names
POP proxy
Access control
From these hosts : Enabled
DNS reverse lookup: Enable to restrict by host names
FTP proxy
Access control
From these hosts : Enabled
DNS reverse lookup: Enable to restrict by host names
IP filtering (iptables)
You can configure access control which is based on IP addresses by using iptables. The following
shows you a configuration example:
• iptables commands
# iptables -A INPUT -s 192.168.1.0/255.255.255.0 -j ACCEPT
# iptables -A INPUT -j DROP
F-Secure Internet Gatekeeper for Linux/Administrator's Guide
Access control
"Access
Control", 65.
(Example: 192.168.1.0/255.255.255.0)
(Example: 192.168.1.0/255.255.255.0)
(Example: 192.168.1.0/255.255.255.0)
(Example: 192.168.1.0/255.255.255.0)
options. To apply restrictions which
99
Need help?
Do you have a question about the INTERNET GATEKEEPER FOR LINUX 4.01 and is the answer not in the manual?