188
Gauntlet ® Firewall for UNIX Netperm Table Reference Guide Version 4.2

Netperm Table Reference Guide

Embed Size (px)

Citation preview

Page 1: Netperm Table Reference Guide

Gauntlet® Firewall for UNIX

Netperm Table Reference Guide

Version 4.2

Page 2: Netperm Table Reference Guide

Gauntlet Firewall for UNIX Netperm Table Reference Guide, Version 4.2 NAI-192-0050-1

COPYRIGHT

Copyright © 1996–1998 by Network Associates, Inc. and its Affiliated Companies. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of Network Associates, Inc.

TRADEMARKS

Gauntlet is a registered trademark, the Network Associates and Gauntlet logos are trademarks, and “Building a World of Trust” is a service mark of Network Associates, Inc. and its Affiliated Companies. All other trademarks are trademarks or registered trademarks of their respective holders.

CONTACT INFORMATION

Network Associates, Inc. (408) 988-3832 main

2805 Bowers Ave. (408) 970-9727 FAX

Santa Clara, CA 95051 http://www.nai.com

[email protected]

Documentation issues: [email protected]

Page 3: Netperm Table Reference Guide

Table of Contents

Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

Before You Begin . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

This User Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .1

Chapter 1. Understanding the Netperm Table . . . . . . . . . . . . . . . . . . . . . . 3Policy Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Application-Specific Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .3

Chapter 2. Modifying the Netperm Table . . . . . . . . . . . . . . . . . . . . . . . . . . 7Netperm Table Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .7

Chapter 3. Policies and Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11Creating New Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11

Adding Proxy Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12

Denying Proxy Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Denying Services by Network or Host . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13

Controlling Servives by User, Group, or Time . . . . . . . . . . . . . . . . . . . . . . . . .15

Chapter 4. Attribute Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19

Chapter 5. Keyword Reference . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167

Netperm Table Reference Guide i

Page 4: Netperm Table Reference Guide

Table of Contents

ii Netperm Table Reference Guide

Page 5: Netperm Table Reference Guide

Preface

r by

Netperm Table Reference Guide 1

This guide describes and tells you how to use the Gauntlet Firewall network permissions (netperm) table.

NOTE: Network Associates, Inc. recommends using the Gauntlet Firewall Manager to configure your firewall. However, if you have an unusual configuration or need to configure an option that you cannot set through the Gauntlet Firewall Manager, you can use the netperm table.

AudienceThis guide is intended for firewall administrators. It assumes familiarity with and understanding of UNIX system administration, networking, network administration, and basic firewall concepts. System administrators should be familiar with TCP/IP, domain name service, sendmail, and router configuration.

Consult the appendices of the Gauntlet Firewall Administrator’s Guide, your local library or bookstore, or your UNIX administrator for additional information about UNIX system administration.

Before You BeginBefore you begin, you need:

• An installed and configured Gauntlet Firewall, as described in the Gauntlet Firewall User’s Guide and the Gauntlet Firewall Administrator’s Guide

• UNIX system administration skills

This User GuideThis guide has the following chapters:

• Chapter 1, Understanding the Netperm Table—Describes the netperm table, including policy and application-specific rules.

• Chapter 2, Modifying the Netperm Table—Shows you how to modify the netperm table and explains netperm table syntax.

• Chapter 3, Policies and Services—Shows you how to create new policies, add odeny proxy services, deny services by network or host, and control services user, group, or time.

Page 6: Netperm Table Reference Guide

Preface

e

• Chapter 4, Attribute Reference—Lists all of the netperm table attributes and provides the information you need to use them.

• Chapter 5, Keyword Reference—Lists each keyword in the netperm table and thattributes it can use.

2 Netperm Table Reference Guide

Page 7: Netperm Table Reference Guide

11Understanding the Netperm Table

ble.

ead

ll

by the

re

empt

a set g a

This chapter describes the Gauntlet Firewall’s network permissions (netperm) ta

The netperm table (/usr/local/etc/netperm-table) contains configuration information for the Gauntlet Firewall. The kernel, proxies, and other applications rconfiguration information from this table.

The recommended method of configuring the Gauntlet Firewall is through the Gauntlet Firewall Manager. Edit the netperm table only if you:

• Have an unusual configuration, such as four network interface cards

• Need to configure an option that you cannot set through the Gauntlet FirewaManager

Changes you make to the netperm table may conflict with the settings generated Gauntlet Firewall Manager. When editing the netperm table, do NOT edit in the section labeled Computer Generated Area (between the #BEGIN WARNING and #END WARNING markings). Any changes you make between these markings aoverwritten when you use the Gauntlet Firewall Manager.

Remember to make a backup copy of your working netperm table before you attany changes or modifications.

Policy RulesPolicies are collections of general configuration information. These allow you to closely map your security policy to policies for the Gauntlet firewall. Gauntlet configuration policies often include information such as:

• Types of proxies that the firewall can start

• Permitted (or denied) destinations for requests

• Authentication requirements

The source address of the request is the basis for a policy. You define policies forof hosts. You can easily use the same set of rules for a group of hosts by creatingeneric policy describing what these hosts can and cannot do.

Application-Specific RulesThe netperm table also includes configuration information for proxies and other firewall applications. These include:

Netperm Table Reference Guide 3

Page 8: Netperm Table Reference Guide

Understanding the Netperm Table

ar

under T ore it are

ecific pd the

and cies.

ottom send n the

tility,

• Userid and groupid under which a proxy should run

• Directories that the proxies should use as their root directories

• Text files proxies should display when denying or accepting requests

• Length of idle time before the proxies should terminate the connection

• More specific lists of permitted and denied destination networks for a particulproxy

ProxiesFor example, the smap proxy reads the netperm table and determines the useridwhich it should run and the directory into which it should place mail. The TELNEproxy reads the netperm table to determine how long a session must be idle befshould disconnect the session. The specific configuration options for each proxydescribed in Chapter 4, Netperm Table Attribute Reference.

You can also include rules to permit or deny a particular service for requests to spaddresses or networks. For example, you can configure the HTTP proxy to denyrequests to a particular host or network. All of the other proxies, such as the smaserver, continue to use the generic policy and send information to that site, whileHTTP proxy denies requests to that site.

Because the proxies and applications read the netperm table from top to bottomstop on the first match, you must put proxy-specific rules before the generic poliWhen the relevant proxy parses the configuration information, it uses the proxy-specific rule rather than the more general policy rule.

For example, the FTP proxy includes a specific rule that denies requests to the destination ftp.bigu.edu. You have created a policy for untrusted hosts, near the bof the netperm table, that includes a rule that allows all proxies and applications toto any destination. Because the more restrictive rule is above the generic policy inetperm table, the FTP proxy uses the restrictive rule and denies requests to ftp.bigu.edu.

ApplicationsOther Gauntlet applications, such as the authentication server and IP screening ualso read configuration information from the netperm table. For example, configuration information in the netperm table tells the authentication server howmany incorrect login attempts to allow before disabling an account.

4 Netperm Table Reference Guide

Page 9: Netperm Table Reference Guide

Understanding the Netperm Table

Using This InformationAs part of the startup process, a proxy or application reads the netperm table and looks for applicable configuration rules. It parses the table from top to bottom, looking for rules that match its name. It also matches wildcard rules that apply to all applications. For example, the TELNET proxy (tn-gw) looks for rules that match tn-gw and *.

The proxy first uses these rules to determine if it can accept the request from the source address. It then determines whether the requested service is an explicitly permitted service. If it is not, the proxy denies the request. If it can accept the request, it uses the other rules to determine whether it needs to authenticate the request and whether it can send the request to the specified destination. The application also finds and uses rules for that specific application.

For example, using the default untrusted policy, the TELNET proxy allows TELNET requests from any outside network to any destination. The proxy also uses the untrusted policy to determine that it needs to authenticate the user and gets information about which server it should use to authenticate the user.

Netperm Table Reference Guide 5

Page 10: Netperm Table Reference Guide

Understanding the Netperm Table

6 Netperm Table Reference Guide

Page 11: Netperm Table Reference Guide

22Modifying the Netperm Table

the

at:

This chapter provides important information about modifying the netperm table.

You can modify the netperm table using your favorite text editor.

NOTE: Be sure to make a backup copy. Do NOT edit in the section labeled Computer Generated Area (between the #BEGIN WARNING and #END WARNING markings).

With a few exceptions, you do not need to restart the proxies for the changes to take effect. Each time the proxies start new processes, they check the last modification time of the netperm table. If the time has changed, the proxies reread the netperm table. You must restart several proxies when you make changes to certain attributes. These are noted in the attribute reference in the appendix.

Netperm Table Syntax

PrecedenceApplications and proxies read the tables from the top of the table to the bottom. They use the first rule that applies for a particular attribute. If there are multiple rules in the table that could apply for an attribute, the application uses the first one it finds.

For example, a netperm table attribute contains the following rule:

smapd: userid uucp

and later in the file contains the rule:

smapd: userid mail

When smapd parses the netperm table, it uses the first rule it finds—and runs asuser uucp.

FormatEach line in the netperm-table contains a separate configuration rule in the form

keyword: attribute valuelist

where:

Netperm Table Reference Guide 7

Page 12: Netperm Table Reference Guide

Modifying the Netperm Table

he

used

ut is

nore ne. If rmal

tion

es word up

• keyword indicates the application to which the rule on that line applies. The wildcard (*) indicates the rule is valid for all applications and proxies. Comma-separated lists of multiple keywords indicate that the rules apply to tproxies or applications listed. The keyword usually matches the name of the service in the startup script. It can also match the value for the -as name flagwhen starting the proxy in the startup script.

• attribute is a configuration parameter for that application or proxy.

• valuelist is the value for the specific configuration parameter. Some attributesallow multiple values.

A rule must fit on a single line. The length of a line varies by operating system, bgenerally around 1,024 bytes. There is no provision for continuing lines.

Whitespace and tabs are both valid separators.

CommentsA hash mark (#) at the beginning of the line indicates a comment. Applications igany text between the hash mark at the beginning of the line and the end of the lithe hash mark appears later in the line, applications treat the hash mark as a nocharacter. Applications treat the following line as a comment:

#set timeout to five minutes

Applications treat the following line as invalid syntax:

tn-gw: timeout 3000 #set timeout to five minutes

Some default comments in the netperm table include information for the substitudriver. They begin with #%subs-start and end with #%subs-end. Do not delete these lines.

KeywordsThe following table lists some defaults and common keywords for policies, proxiand other applications. You can create your own keywords. Be sure that the keymatches the value for the -as name flag you used when starting the proxy in a startscript.

Keyword Application

ahttp-gw Authenticating HTTP proxy (using the HTTP proxy)

aol-gw America Online proxy (using the plug proxy with -as)

alerts IPFS

authenIP IP screening configuration applications

8 Netperm Table Reference Guide

Page 13: Netperm Table Reference Guide

Modifying the Netperm Table

authsrv authentication server

ck-gw Circuit proxy

cserve-gw CompuServe proxy (using the plug proxy with -as)

ftp-gw FTP proxy

gopher-gw Gopher proxy (using the http-gw proxy with -as)

gui Gauntlet Firewall Manager

http-gw HTTP proxy

info-gw Web and Gopher server (Info proxy)

lnotes-gw LotusNotes proxy (using the plug proxy with -as)

login-sh Login shell

lp-gw line printer proxy

mmp Multimedia Proxy

netacl-fingerd network access control proxy running finger service

netacl-ftpd network access control proxy running FTP service

netacl-rlogind network access control proxy running Rlogin service

netacl-telnetd network access control proxy running TELNET service

NetShow NetShow Proxy (using the mmp proxy)

netconfig IP screening configuration applications

nntp-gw NNTP news proxy (using the plug-gw proxy with -as)

pcxdpp PC Extender DPP daemon

plug-gw plug proxy

policy-name policy

pop3-gw POP3 mail proxy

radm remote administration scripts

RealAudio RealAudio/RealVideo Proxy (using the mmp proxy)

rlogin-gw Rlogin proxy

rsh-gw remote shell proxy

smap SMTP mail client

smapd SMTP mail server

snmpd SNMP network management agent

snmp-gw SNMP network management proxy

sql-gw Oracle Proxy

Netperm Table Reference Guide 9

Page 14: Netperm Table Reference Guide

Modifying the Netperm Table

AttributesAttributes vary by proxy and application, although many use the same attributes. Consult the reference information at the end of this book for more information on applicable attributes and values.

ssl-gw SSL proxy (using the plug-gw proxy with -as)

strmwrks-gw Streamworks proxy

syb-gw Sybase proxy

tn-gw TELNET proxy

VDOLive VDOLive Proxy (using the mmp proxy)

whois whois proxy (using the plug-gw proxy with -as)

x-gw X11 proxy

10 Netperm Table Reference Guide

Page 15: Netperm Table Reference Guide

33Policies and Services

licy. es

orks.

This chapter shows you how to create new policies, add or deny proxy services, deny services by network or host, and control services by user, group, or time.

Creating New PoliciesYou can create additional policies to fit your security policies for different groups of inside hosts and networks. Remember that all policies are based on the source address of the request.

Creating a new policy involves modifying the netperm table.

To create a new policy:

1. Add a line indicating:

• Source networks that use the policy

• Name of the policy

2. Add rules indicating which proxies this policy allows.

3. Add rules indicating permitted destinations, authentication, and logging.

4. Place the policy lines above or below the section generated by the Gauntlet Firewall Manager, as appropriate.

For example, the generic policy for Yoyodyne uses the default Gauntlet trusted poThe security policy for Yoyodyne calls for restricting a particular group of machin(and set of addresses) to TELNET and Rlogin to a particular set of outside netw

To implement this policy, you could create a more restrictive policy:

1#define inside hosts who will use the policy

2*: permit-hosts 204.255.154.0:255.255.255.128 -policy restrictive

3#define the policy

4policy-restrictive: permit-proxy netacl-telnetd tn-gw

5policy-restrictive: permit-proxy netacl-rlogind rlogin-gw

6policy-restrictive: permit-destination 192.33.112.*

Netperm Table Reference Guide 11

Page 16: Netperm Table Reference Guide

Policies and Services

7policy-restrictive: authenticate *

8policy-restrictive: authserver 127.0.0.1

Line 2 indicates that all proxies and applications (*) should use the restrictive policy for requests from the designated subnet. If you specify the policy for only the TELNET (tn-gw) and Rlogin (rlogin-gw) proxies instead of for all (*), all other proxies (such as the HTTP and FTP proxies) skip this policy and use another policy.

Lines 4 and 5 indicate that this policy permits the TELNET and Rlogin proxies. All other proxies with requests from hosts within 204.255.154.0:255.255.255.128 deny the request after parsing this line.

Line 6 indicates that these proxies can send requests to the set of destinations: 192.33.112.*. The TELNET and Rlogin proxies deny requests to any other destinations after parsing this line.

Lines 7 and 8 indicate that users on these networks must authenticate with the authentication server on the firewall.

You should put this policy above the trusted policy so that the proxies use these rules rather than the more generous trusted policy. You may also want to create a matching restrictive untrusted policy to restrict access from outside networks to this internal subnet.

NOTE: This type of policy may not prevent users on this inside network from reading news and sending email. The recommended setup for the Gauntlet Firewall calls for central mail and news servers on the inside networks. The news readers and mail agents on the restricted subnet communicate directly with the news and mail servers. These servers, which are not on the restricted subnet, communicate with the firewall.

If you are running mail and news servers on the firewall, this more restrictive policy denies email and news activities from the restricted subnet.

Adding Proxy ServicesYou can add or remove proxy services at any point as your security policies change. This section describes the changes you must make to the netperm table to use the proxy. Consult Chapter 4 for more information on other configuration requirements.

To add a proxy service:

1. Add the name of the proxy to the permit-proxy line of the appropriate policy.

12 Netperm Table Reference Guide

Page 17: Netperm Table Reference Guide

Policies and Services

2. Add a section for proxy specific rules above the policy sections. These can include items such as userid, groupid, time-out, and denial messages. Consult the reference information for the proxy for information on proxy options.

For example, after careful analysis Yoyodyne wants to add support for Quote of the Day (qotd) service for users on its inside networks. This involves using the proxy. First, you need to add a line to the trusted policy:

99policy-trusted: permit-proxy qotd-gw

You also need to create a section above the policies in which you define the communications rules for the Quote of the Day connection:

95# QotD (through plug proxy) rules

96# -----------------------------------------

97qotd-gw: port qotd * -plug-to qotd.bigu.edu -port qotd

Denying Proxy ServicesYou can add or remove proxy services at any point as your security policies change. You can use the Proxy Configuration options in the Gauntlet administration tools or you can modify the netperm table.

To remove a proxy service:

1. Remove or comment out the permit-proxy line in the appropriate policy.

For example, Yoyodyne no longer wishes to allow users to Rlogin from outside networks. They modify the untrusted policy:

44#policy-untrusted: permit-proxy rlogin-gw

Denying Services by Network or HostYou can deny services to and from specific networks and hosts. You can do this for all the proxies through a policy or for individual proxies.

When you deny service, you can specify by IP address or by host. If you specify by IP address, proxies deny access based on that IP address. Be sure that you explicitly deny all IP addresses a machine or site may have.

Because, in most cases, a proxy only sees an IP address for a given connection request, there are additional considerations when specifying host names in permit or deny rules. The firewall must perform additional processing steps to convert the address that is in the packet and the host name that is in the configuration rule to the same format so that it can compare the values.

Netperm Table Reference Guide 13

Page 18: Netperm Table Reference Guide

Policies and Services

If you deny by host name, the proxy must use DNS to map the source or destination address (in the packet) into a host name. If the proxy cannot perform this mapping, it considers the address unknown.

Denying Access FromYou can deny access from a particular host or network on a proxy or general basis.

By Proxy

To deny access by proxy:

1. Add a deny-hosts line to the specific proxy.

For example, Yoyodyne does not want anyone on a host at Big University to have TELNET access to Yoyodyne:

50tn-gw: deny-hosts *.bigu.edu

Later, Yoyodyne determines they only need to deny access from the dial-in machines at Big University:

50tn-gw: deny-hosts dial*.bigu.edu

GeneralYou can also deny access from a particular host or network for all proxies and applications.

To deny access for all applications:

1. Add a deny-hosts line above the untrusted policies. Use a wildcard as the keyword to indicate that the rule applies to all policies.

You must include this rule above the policy rules. The policies are based on permitted hosts. Including the deny-hosts rule in a policy has no effect because the application is using the permit-hosts rule that defines the policy.

NOTE: The smap proxies do not use the policy rules, so you still receive mail from the denied host or network.

For example, Yoyodyne does not want anyone or any service at Big University to communicate with Yoyodyne:

103*: deny-hosts *.bigu.edu

14 Netperm Table Reference Guide

Page 19: Netperm Table Reference Guide

Policies and Services

...

140*: permit-hosts * -policy outside

Denying Access ToYou can deny access to a particular host or network on a proxy or general basis.

By Proxy

To deny access by proxy:

1. Add a deny-destination line to the specific proxy.

For example, Yoyodyne does not want anyone on the inside networks to FTP files from any hosts at Big University:

55ftp-gw: deny-destination *.bigu.edu

GeneralYou can also deny access to a particular host or network for all proxies and applications.

To deny access for all applications:

1. Add a deny-destination line to the appropriate policy.

For example, Yoyodyne does not want anyone on the inside network to communicate with Big University:

108policy-trusted: deny-destination *.bigu.edu

NOTE: The smap proxies do not use the policy rules, so you can still send mail to the denied host or network.

Controlling Servives by User, Group, or TimeYou can control access to the following proxies on a per user, per group, or time of day basis:

• ck-gw Circuit proxy

• ftp-gw FTP proxy

Netperm Table Reference Guide 15

Page 20: Netperm Table Reference Guide

Policies and Services

n

rs to

the

use

per (in

n ccess

rs to

• rlogin-gw Rlogin proxy

• rsh-gw Rsh proxy

• tn-gw TELNET proxy

User or GroupYou can permit or deny access to certain proxies by user or group:

To control access by user or group:

1. Add the operations attribute to your authsrv configuration, specifying who caperform the operation and what services they can access.

2. Add the authenticate attribute to the appropriate policy or proxy, requiring useauthenticate before using the service.

3. Add the extended-permissions attribute to the appropriate policy or proxy, indicating that the authentication server should check information specified byoperations keyword.

For example, Yoyodyne wants to permit only members of the group developer tothe Rlogin proxy when accessing outside hosts:

55authsrv: permit-operation group developer rlogin-gw *

100rlogin-gw: authenticate *

101rlogin-gw: extended-permissions *

These commands prevent any other users who are not members of group develothe Gauntlet authentication database) from using the Rlogin proxy.

OperationYou can permit or deny access to certain proxies by time of day:

To control access by time of day:

1. Add the operations attribute to your authsrv configuration, specifying who caperform what operations, what services they can access, and when they can athem.

2. Add the authenticate attribute to the appropriate policy or proxy, requiring useauthenticate before using the service.

16 Netperm Table Reference Guide

Page 21: Netperm Table Reference Guide

Policies and Services

3. Add the extended-permissions attribute to the appropriate policy or proxy, indicating that the authentication server should check information specified by the operations keyword.

For example, Yoyodyne wants to deny TELNET between 5:00 pm and 11:00 pm:

55authsrv: deny-operation user * tn-gw * * time 17:00 23:00

56authsrv: permit-operation user * tn-gw * *

100tn-gw: authenticate *

101tn-gw: extended-permissions *

Line 55 denies TELNET access between 5:00 pm and 11:00 pm.

Line 56 permits TELNET access. You must include this rule because you must explicitly permit operations when you specify extended permissions.

The deny rule must appear before the permit rule because the proxies use the first matching rule. If you specify the permit rule before the deny rule, the authentication server would never read the deny rule because the permit rule matches all TELNET operations.

Netperm Table Reference Guide 17

Page 22: Netperm Table Reference Guide

Policies and Services

18 Netperm Table Reference Guide

Page 23: Netperm Table Reference Guide

44Attribute Reference

This chapter lists and describes all of the attributes that you can use in the netperm table.

The chart at the top of each attribute indicates the proxies, applications, or policies that can use that attribute. For example, a check (✓) next to tn-gw means you can use this attribute for the TELNET proxy.

A check next to policy-policy indicates that you can use this attribute in a policy definition. All proxies that use this policy will then use this attribute.

You can always use any attribute after the wildcard (*) keyword. All proxies read this rule.

NOTE: The ahttp-gw keyword in the tables on the following pages indicates the HTTP proxy when authentication is turned on. Rules marked with the ahttp-gw keyword are only active when the authentication option of the HTTP is enabled.

accept-count

Specifies the number of processes that the proxy forks to listen on a bind-port waiting for connections.

✓ ahttp-gw ✓ gopher-gw ✓ mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP ✓ info-gw NetShow smap VDOLive

✓ authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw snmp-gw policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw ✓ sql-gw

✓ ftp-gw mmp radm ✓ ssl-gw

Netperm Table Reference Guide 19

Page 24: Netperm Table Reference Guide

Attribute Reference

Syntaxaccept-count process

ExampleThis example indicates that the HTTP proxy forks 50 processes to listen for connections:

http-gw: accept-count 50

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

admin-user

Specifies the name of the administrative user for the firewall, which the Gauntlet Firewall Manager uses to authenticate before making changes to the firewall’s configuration.

process Specifies the number of processes the proxy should fork.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw ✓ gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

20 Netperm Table Reference Guide

Page 25: Netperm Table Reference Guide

Attribute Reference

Syntaxadmin-user user

ExampleThis example indicates that the Gauntlet Firewall Manager prompts for authentication information from fwadmin before making changes to the firewall’s configuration:

gui: admin-user fwadmin

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

agent

Specifies the name of a network management agent that the SNMP proxy can contact.

user Specifies the name of the administrative user for the firewall. This account must exist in the authentication database.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw ✓ snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 21

Page 26: Netperm Table Reference Guide

Attribute Reference

Syntax{permit | deny}-agent host [ get | !get ] [ set | !set ] [ trap | !trap ]

ExampleThis example indicates that the SNMP proxy allows the agent on the machine 204.255.154.3 to send traps to the network manager:

snmp-gw: permit-agent 204.255.154.3 trap

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

permit Indicates agents to which the proxy can send information.

deny Indicates agents to which the proxy can not send information.

host Specifies the name of a network management agent that the SNMP proxy can contact. Specify by IP address or host name.

get Indicates the proxy allows the network manager to access information on this agent.

!get Indicates that the proxy does not allow the network manager to access information on this agent.

set Indicates the proxy allows the network manager to set information on this agent.

!set Indicates that the proxy does not allow the network manager to set information on this agent.

trap Indicates that the proxy allows this agent to send traps to the network manager.

!trap Indicates the proxy does not allow this agent to send traps to the network manager.

22 Netperm Table Reference Guide

Page 27: Netperm Table Reference Guide

Attribute Reference

anon-user

Specifies the string that the HTTP proxy provides to anonymous FTP servers when prompted for a user name as a password. If you do not use this attribute, the proxy sends the string httpgw@.

Syntaxanon-user password

ExampleThis example indicates that the HTTP proxy use the name [email protected] when prompted for a user name as a password by an anonymous FTP server:

http-gw: anon-user [email protected]

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

password Specifies the string that the HTTP proxy provides to anonymous FTP servers when prompted for a user name as a password. Any printable ASCII characters, except space, are valid.

Netperm Table Reference Guide 23

Page 28: Netperm Table Reference Guide

Attribute Reference

answer_error_countdown

Specifies the maximum number of consecutive connection answer errors that the proxy handles before shutting down. If you do not use this attribute, the SQL*Net proxy allows a maximum of 16 consecutive connection answer errors before shutting down the proxy.

If you set this attribute to 0, this option is turned off and the proxy does not keep track of answer errors. This means that if there is a problem with the Oracle transport layer, the proxy keeps trying to connect. As soon as the proxy successfully answers an incoming connection request, the proxy resets the consecutive answer error counter to 0. Connection answer errors occur for one of the following reasons:

• There is end-to-end incompatibility between client and server

• The client’s connect data is longer specified with the maximum_connect_data attribute

• The proxy timed out waiting for a connect packet from the client to arrive

• The connectpacket from the client has a checksum error

Syntaxanswer_error_countdown errors

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

errors Specifies the number of consecutive connection answer errors that the proxy will handle before shutting down.

24 Netperm Table Reference Guide

Page 29: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the SQL*Net proxy allows a maximum of eight consecutive connection answer errors before shutting down itself:

sql-gw: answer_error_countdown 8

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

answer_timeout

Specifies the number of seconds that the SQL*Net proxy tells the TNS portion of the proxy to wait with no response before timing out the protocol hand-shake associated with an SQL*Net connection request. If you do not use this attribute, the SQL*Net proxy sets TNS to timeout after 1 second.

If you set this attribute to 0, the TNS timeout is turned off, indicating that the SQL*Net proxy tells TNS to wait an infinite amount of time.

Syntaxanswer_timeout seconds

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds that the SQL*Net proxy tells TNS to wait with no response before timing out.

Netperm Table Reference Guide 25

Page 30: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the SQL*Net proxy tells TNS to wait 2 seconds with no response before timing out connection requests:

sql-gw: asnwer_timeout 2

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

authenticate (all but pcxdpp)

Specifies whether or not users must authenticate when accessing these proxies. Proxies that do not support authentication ignore this setting. This option is equivalent to the -auth and -authall options in previous versions.

Syntaxauthenticate *

ExampleThis example requires all requests from hosts on the outside network to authenticate:

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

* Provided for future extensibility.

26 Netperm Table Reference Guide

Page 31: Netperm Table Reference Guide

Attribute Reference

policy-untrusted: authenticate *

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

authenticate (pcxdpp only)

Specifies whether the DPP daemon considers links between the firewall and the PC to be trusted or untrusted. If you use the authenticate attribute, the DPP daemon considers the link to be private. If you do not use authenticate attribute, the DPP daemon considers the link to be trusted.

This attribute is optional. If you do not specify the authenticate attribute, the DPP daemon uses the authenticate settings for the trusted or untrusted policy, as appropriate.

Syntaxauthenticate *

ExampleThis example indicates that the DPP daemon considers the link to be private between the firewall and PC Extender:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw ✓ pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

* Provided for future extensibility.

Netperm Table Reference Guide 27

Page 32: Netperm Table Reference Guide

Attribute Reference

pcxdpp: authenticate *

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

authentication_level

Specifies whether the SQL*Net proxy relays SQL*Net connections that are using the Oracle Advanced Network Option (ANO) for host authentication and end-to-end encryption. If you do not use this attribute, the SQL*Net proxy relays SQL*Net connections without requiring ANO.

Syntaxauthentication_level {0 | 1}

ExampleThis example indicates that the SQL*Net proxy requires that all connections use the Advanced Network Option if installed on the requesting client host:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

0 Indicates that the SQL*Net proxy does not require SQL*Net traffic to use ANO.

1 Indicates that the SQL*Net proxy rejects any connections from a client that has ANO installed is not using ANO.

28 Netperm Table Reference Guide

Page 33: Netperm Table Reference Guide

Attribute Reference

sql-gw: authentication_level 1

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

authserver

Specifies the host running the authentication server that the proxies use for authenticating users.

Syntaxauthserver host [bind-port]

ExampleThis example requires proxies to use the authentication server on the firewall itself using bind-port 7777:

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw ✓ login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

host Specifies the host running the authentication server. Specify by IP address or host name.

bind-port Specifies the bind-port on the host that the proxies use for communicating with the authentication server.

Netperm Table Reference Guide 29

Page 34: Netperm Table Reference Guide

Attribute Reference

policy-untrusted: authserver 127.0.0.1 7777

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

authtypeObsolete. Use the authserver attribute.

backend

Specifies the name of the executable to which the authenticating HTTP proxy passes requests after handling the authentication. The executable handles FTP, Gopher, and other protocols.

Syntaxbackend executable

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

executable Specifies the name of the executable to which the authenticating HTTP proxy passes requests after handling the authentication.

30 Netperm Table Reference Guide

Page 35: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the authenticating HTTP proxy passes processing to /usr/local/etc/http-gw:

ahttp: backend /usr/local/etc/http-gw

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

badadmin

Specifies the user name to which the smapd server forwards mail that it cannot deliver.

Syntaxbadadmin user

ExampleThis example sends mail to the firewalladmin alias:

smapd: badadmin firewalladmin

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

user Specifies the name of a user or alias.

Netperm Table Reference Guide 31

Page 36: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

baddir

Specifies the directory in which the smapd server places any spooled mail that it cannot deliver normally.

Syntaxbaddir directory

ExampleThis example places the undelivered mail in the /var/spool/smap/badmail directory:

smapd: baddir /var/spool/smap/badmail

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

directory Specifies the name of a directory on the same device as the spool directory. Do not include a trailing slash (/) character. Ensure that this directory has the same owner and permission as the normal directory that smap uses.

32 Netperm Table Reference Guide

Page 37: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

badsleep

Specifies the amount of time the authentication server disallows logins from a user who has attempted (and failed) to login five times in a row.

Syntaxbadsleep seconds

ExampleThis example indicates that the authentication server sleeps for twenty minutes (1200 seconds) after five unsuccessful login attempts:

authsrv: badsleep 1200

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds the authentication server sleeps before allowing login attempts from a user who has attempted (and failed) to login five times in a row. If this option is set to 0, the authentication server allows an unlimited number of unsuccessful login attempts. If this option is not set, the authentication server disables the account after the user attempts (and fails) to login five times in a row.

Netperm Table Reference Guide 33

Page 38: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

bind-address

Specifies the IP address to which a proxy is bound. Binding a proxy to a particular address allows you to offer that service only for requests to that address. This attribute is useful when you have assigned multiple IP addresses to one of your network interface cards, and only want to allow a particular type of traffic for one of those addresses.

Using the bind-address attribute, you can bind different proxies to different addresses, but all of these proxies can use the same port. This configuration is useful when you need to offer multiple services on the same port, but with different addresses.

Remember that when using bind-address, you must also run a new version of the proxy, create a startup script for the proxy, and create a policy that uses the new proxy.

Syntaxbind-address address

ExampleThis example indicates that the AOL proxy is bound to the IP address 204.255.154.1:

✓ ahttp-gw ✓ gopher-gw mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw NetShow smap VDOLive

✓ authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw ✓ login-sh ✓ plug-gw snmp-gw policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw mmp radm ✓ ssl-gw

address Specifiies the IP address to which you want to bind a proxy.

34 Netperm Table Reference Guide

Page 39: Netperm Table Reference Guide

Attribute Reference

aol-gw: bind-address 204.255.154.1

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

bind-inside

Specifies the inside interface and address of the trusted network inside the firewall. Used to create the packet screening rule that denies packets on the outside interfaces with trusted network addresses to prevent IP spoofing.

Syntaxbind-inside -if insideinterface -addr insidenetwork

ExampleThis example indicates that the inside interface of the firewall is le1 and the network inside the firewall uses 10.0.1.* addresses:

ahttp-gw gopher-gw ✓ mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw ✓ syb-gw

alerts http-gw ✓ netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

insideinterface Specifies the interface name of the inside interface of the firewall. Valid values vary by operating system and type of physical connection.

insidenetwork Specifies the IP address and subnet mask of a trusted network inside the firewall. The * wildcard is valid.

Netperm Table Reference Guide 35

Page 40: Netperm Table Reference Guide

Attribute Reference

netconfig: bind-inside -if le1 -addr 10.0.1.0:255.255.255.0

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

block

Specifies that the FTP proxy prevents file transfers of designated types.

Syntaxblock { input | output }

ExampleThis example indicates that the FTP proxy prevents file transfers from client to server:

ftp-gw: block output

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

input Indicates that the FTP proxy prevents file transfers from server to client.

output Indicates that the FTP proxy prevents file transfers from client to server.

36 Netperm Table Reference Guide

Page 41: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

buffer-size

Specifies the size of the internal buffer that the proxy uses for transferring data. If you do not use this attribute, the proxy uses a buffer of 16,384 bytes.

If you use this attribute and specify and invalid value (for example, a negative number), the proxy uses a buffer of 8,192 bytes.

Syntaxbuffer-size buffer

ExampleThis example indicates that the SSL proxy uses an internal buffer size of 32,768 bytes:

plug-gw: buffer-size 32768

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw snmp-gw policy-policy

✓ finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ✓ ssl-gw

buffer Specifies the size of the internal buffer thet the proxy uses for transferring data.

Netperm Table Reference Guide 37

Page 42: Netperm Table Reference Guide

Attribute Reference

check-server-ip

Specifies whether or not the proxy checks the IP address of the server sending the packets against the IP address in the clients request. By default, the proxy compares the IP address in the client request to the IP address in the incoming packets. If the IP addresses do not match, the proxy drops the packet.

Some multimedia sites use multiple servers to service requests. By default, the proxy drops packets. If your users need to access these types of sites, use this attribute to turn off IP checking on incoming packets.

Syntaxcheck-server-ip { 0 | 1 }

ExampleThis example indicates that the multimedia proxy does not check the IP address of incoming packets against the IP address in the client request:

mmp-gw: check-server-ip 1

ahttp-gw gopher-gw mssql-gw ✓ RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw ✓ NetShow smap ✓ VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw ✓ mmp radm ssl-gw

0 Indicates that the proxies check the IP address of the incoming packets against the IP address in the client request. If the IP addresses do not match, the proxy drops the packet.

1 Indicates that the proxies do not check the IP address of the incoming packets against the IP address in the client request.

38 Netperm Table Reference Guide

Page 43: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

child-limit

Specifies the maximum number of child processes that each daemon allows to run at a given time.

Syntaxchild-limit processes

ExampleThis example indicates that the TELNET proxy allows only 10 child processes to run at a single time:

tn-gw: child-limit 10

ahttp-gw ✓ gopher-gw ✓ mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui ✓ netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw NetShow smap VDOLive

✓ authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw ✓ snmp-gw ✓ policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw mmp radm ✓ ssl-gw

processes Specifies the maximum number of child processes that each daemon allows to run at a given time. If this option is set to 0 or not set, each daemon allows an unlimited number of child processes to run at a given time.

Netperm Table Reference Guide 39

Page 44: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

circuitexec

Specifies the location of the program that the circuit proxy runs once it allows a connection from the client program.

Syntaxcircuitexec programs

ExampleThis example indicates that the circuit proxy is in /usr/local/etc:

ck-gw: circuitexec /usr/local/etc/circuit

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

programs Specifies the location and name of the program that the circuit proxy runs once it allows a connection from the client program.

40 Netperm Table Reference Guide

Page 45: Netperm Table Reference Guide

Attribute Reference

circuitsperuser

Specifies the maximum number of client/server connections that can be active in one user session.

Syntaxcircuitsperuser circuits

ExampleThis example indicates that a user can have 12 active sessions:

ck-gw: circuitsperuser 12

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

circuits Specifies the maximum number of client/server connections that can be active in one user session.

Netperm Table Reference Guide 41

Page 46: Netperm Table Reference Guide

Attribute Reference

circuit-timeout

Specifies the amount of time the client/server connection is idle (with no network activity) before disconnecting. Overridden by the -timeout option for a particular server (as set with the server attribute).

Syntaxcircuit-timeout minutes

ExampleThis example indicates that the client/server activity can be idle for 15 minutes before disconnecting:

ck-gw: circuit-timeout 15

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

minutes Specifies the number of minutes that there is no client/server activity before disconnecting.

42 Netperm Table Reference Guide

Page 47: Netperm Table Reference Guide

Attribute Reference

client

Specifies the lp commands that the firewall denies or logs from clients to remote server queues.

Syntaxclient clients -printer serverqueue [ {-deny | -log} [{ lpcommands } | all] ]

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger ✓ lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

client Indicates the clients for whom this rule applies.

clients Specifies single hosts, entire networks, or subnets. Specify by IP address or host name. The wildcard * is valid.

printer Indicates the printer queue to which this rule applies.

serverqueue Specifies the name of the printer queue on the remote server to which this rule applies.

deny Indicates commands that clients cannot execute. The default allows users to issue all lp commands.

log Indicates extended logging applies. Extended logging includes the number of bytes transferred from client to server and time duration. Extended logging does not include data transfer from server to client, as this consists mostly of acknowledgments to client’s command.

Netperm Table Reference Guide 43

Page 48: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the proxy logs the restart and remove commands when any clients on the inside network (10.0.1.*) print to the remote printer queue lp_sales (on the remote server):

lp-gw: client 10.0.1.* -printer lp_sales -log { restart remove }

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

lpcommands Specifies the lp commands that the clients can issue when sending jobs through the proxy. The space between the "{" and "}" and the list entries is required. Valid keywords, which correspond to the first level lp protocol commands, are:

• restart• print• status_sh• status_ln• remove

all Indicates that the deny or log command applies to all lp commands.

44 Netperm Table Reference Guide

Page 49: Netperm Table Reference Guide

Attribute Reference

connect-timeout

Specifies the amount of time the user has to start the client application before the proxy stops listening at the service port. This attribute also controls the amount of time the user has to respond to the query asking them to allow the connection.

Syntaxconnect-timeout minutes

ExampleThis example indicates that the user has 3 minutes to start the client application before the proxy stops listening:

ck-gw: connect-timeout 3

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

minutes Specifies the number of minutes the proxy waits at the service port for a client application connection before disconnecting

Netperm Table Reference Guide 45

Page 50: Netperm Table Reference Guide

Attribute Reference

content-failunsafe

Specifies whether or not the content-scanning enabled proxies allow data transfers when content scanning is enabled but not working (for example, the server is unreachable). The proxies normally exit when a transfer is attempted while content scanning is broken so that unscanned data cannot enter your protected network.

If content-failunsafe is not used (it is off by default), the content-enabled proxies will not allow data transfers when content scanning is enabled but not working. This attribute has no effect when content scanning is not enabled.

Syntaxcontent-failunsafe {on | off}

ExampleThis example indicates that the FTP proxy (when content scanning is enabled) allows data transfers even when content scanning is not working:

ftp-gw: content-failunsafe on

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

46 Netperm Table Reference Guide

Page 51: Netperm Table Reference Guide

Attribute Reference

content-ftpcheck

Specifies the types of transfers for which the FTP proxy should scan the contents of the files. Use this attribute as part of a policy, rather than for the proxy itself.

Syntaxcontent-ftpcheck types

ExampleThis example indicates that when the FTP proxy is used as part of the untrusted policy, it scans all files being transferred:

policy-untrusted: content-ftpchk retr stor

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

type Specifies the types of transfers for which the FTP proxy scans the contents. Valid keywords are:

• retr—indicates that the FTP proxy should scan the content of files that are being transferred from server to client.

• stor—indicates that the FTP proxy should scan the content of files that are being transferred from client to server.

Netperm Table Reference Guide 47

Page 52: Netperm Table Reference Guide

Attribute Reference

contentscan-msg

Specifies the name of the file that the proxy displays as a welcome banner upon successful connection to the proxy when content scanning is enabled. If this attribute is not used, the proxy generates a default welcome message.

Syntaxcontentscan-msg file

ExampleThis example indicates that the FTP proxy displays the contents of the file /usr/local/etc/ftp-contentscan-msg.txt upon successful connection when content scanning is enabled:

ftp-gw: contentscan-msg /usr/local/etc/ftp-contentscan-msg.txt

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

file Specifies the name of the file that the proxy displays as a welcome banner upon successful connection to the proxy when content scanning is enabled.

48 Netperm Table Reference Guide

Page 53: Netperm Table Reference Guide

Attribute Reference

cvp-handling

Specifies the type of handling to use when the proxy receives a file or message that failed the content scan.

Syntaxcvp-handling { reject | repair }

ExampleThis example indicates that the HTTP proxy discards all files that fail the content scan:

http-gw: cvp-handling reject

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

reject Indicates that the proxy discards the failed file or message.

repair Indicates that the proxy attempts to repair the message. If the repair is successful, the proxy delivers the file or message.

Netperm Table Reference Guide 49

Page 54: Netperm Table Reference Guide

Attribute Reference

cvp-server

Specifies the server that the proxy uses for content scanning services.

Syntaxcvp-server host bind-port

ExampleThis example indicates that the FTP proxy uses a content scanner on the machine 10.0.1.57 using bind-port 18181:

ftp-gw: cvp-server 10.0.1.57 18181

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

host Specifies the host running the content scanning server. Specify by IP address or host name. Wildcards are not valid.

bind-port Specifies the bind-port on the host on which the content scanning server is running.

50 Netperm Table Reference Guide

Page 55: Netperm Table Reference Guide

Attribute Reference

cyber_masks

Lets you specify what what Cyber Patrol categories are blocked for work time hours and leisure time hours. Categories not blocked are allowed.

This attribute has no effect unless Cyber Patrol is active. Refer to the Gauntlet Firewall User’s Guide for descriptions of each category listed below.

Use this attribute as part of a policy, rather than for the proxy itself.

See also the feature, url, and work_time attributes.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 51

Page 56: Netperm Table Reference Guide

Attribute Reference

Syntaxpolicy-http-gw_Trusted: cyber_masks work_mask leisure_mask

work_mask The bitmasks for Cyber Patrol categories that are denied during work time hours. The categories are:

• Violence—0x0001• Partial Nudity—0x0002• Full Nudity—0x0004• Sexual Text—0x0008• Gross Depictions—0x0010• Intolerance—0x0020• Satanic/Cult—0x0040• Drug Culture—0x0080• Militant/Extremist—0x0100• Sex Education—0x0200• Gambling/Illegal—0x0400• Alcohol/Tobacco—0x0800• Sports/Leisure—0x1000• Not Yet Used #1—0x2000 *• Not Yet Used #2—0x4000 *

work_mask(cont.)

• Search Engines—0x8000* Reserved for future categories. Setting these bits has no effect.

To determine the bitmask for a group of categories, use the Calculator application that comes with Windows 95 or NT—click the Start button, select Programs, then Accessories, and finally Calculator. When Calculator displays, pull down the View menu and select Scientific. When the Scientific calculator displays, click the Hex radio button to select it.

To determine the bitmask for Violence, Partial Nudity, Full Nudity and Sexual Text, for example, enter 0001 (for Violence), click OR, then enter 0002 (for Partial Nudity), click OR again, then 0004 (for Full Nudity), click OR, then enter 0008 (for Sexual Text), and click OR a final time. The result, F, is the bitmask for these three categories. You can perform the same procedure for any combination of categories.

leisure_mask The bitmasks for Cyber Patrol categories that are denied during leisure time hours. The categories are the same as for work_mask.

52 Netperm Table Reference Guide

Page 57: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that all Cyber Patrol categories except Search Engines are denied during work time hours, while all categories except Search Engines and Sports/Leisure are denied during leisure time hours:

policy-http-gw_Trusted: cyber_masks 1FFF FFF

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

data-port

Specifies that FTP proxy requires FTP data connections to use bind-port 20, the default bind-port specified in the RFC for FTP. By default, the FTP proxy uses a random, non-privileged bind-port for the data connection. Some FTP software packages and routers require that the data connection use bind-port 20.

Syntaxdata-port bind-port

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

bind-port Specifies the bind-port name or number on which the FTP proxy listens for data connections.

Netperm Table Reference Guide 53

Page 58: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that FTP proxy requires data connections on bind-port 20:

ftp-gw: data-port 20

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

database (authsrv only)

Specifies the pathname of the database that the authentication server uses. This option is mandatory, unless you compile the authentication server with a specific database path.

Syntaxdatabase path

ExampleThis example indicates that the authentication server uses the authentication database in /usr/local/etc/fw-authdb:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

path Specifies the path of the database that the authentication server uses.

54 Netperm Table Reference Guide

Page 59: Netperm Table Reference Guide

Attribute Reference

authsrv: database /usr/local/etc/fw-authdb

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

database (pcxdpp only)

Specifies the path name of the database that the authentication server uses to check administrative keys for PC Extender to firewall links.

This attribute is required.

Syntaxdatabase path

ExampleThis example indicates that the authentication server uses the database /usr/local/etc/mgmt/dpp-authdb:

pcxdpp: database /usr/local/etc/mgmt/dpp-authdb

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw ✓ pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

path Specifies the path name of the database that the authentication server uses to check administrative keys.

Netperm Table Reference Guide 55

Page 60: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

denial-msg

Specifies the file that the proxy displays when it denies access to a user because they do not have permission to use the proxy.

Syntaxdenial-msg file

ExampleThis example displays the file /usr/local/etc/ftp-deny.txt when the FTP proxy denies access to a user:

ftp-gw: denial-msg /usr/local/etc/ftp-deny.txt

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

file Specifies the name of the file the proxy displays when it denies access to a user because they do not have permission to use the proxy. If no file is specified, the proxy generates a default message.

56 Netperm Table Reference Guide

Page 61: Netperm Table Reference Guide

Attribute Reference

denydest-msg

Specifies the file the proxy displays when it denies access to a user because they are trying to access a destination they are not permitted to access.

Syntaxdenydest-msg file

ExampleThis example displays the file /usr/local/etc/tn-denydest.txt when the TELNET proxy denies access to a user:

tn-gw: denydest-msg /usr/local/etc/tn-denydest.txt

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

file Specifies the name of the file the proxy displays when it denies access to a user because they are trying to access a destination that they are not permitted to access. If no file is specified, the proxy generates a default message.

Netperm Table Reference Guide 57

Page 62: Netperm Table Reference Guide

Attribute Reference

deny-spam (smap only)

Specifies known spammers to reject.

Syntaxdeny-spam {ip_addr | domain name}

ExampleThis example indicates that mail from spammers_r_us.com is to be rejected:

smap: deny-spam spammers_r_us.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

ip_addr Indicates the IP address of a known spammer to reject.

domain name Indicates the domain name of a known spammer to reject.

58 Netperm Table Reference Guide

Page 63: Netperm Table Reference Guide

Attribute Reference

destination

Specifies destination hosts and networks permissions.

Syntax{permit | deny}-destination destination-list

ExampleThis example permits applications to send requests to hosts on the 192.3.4 network:

policy-restrictive: permit-destination 192.3.4.*

✓ ahttp-gw ✓ gopher-gw ✓ mssql-gw ✓ RealAudio ✓ strmwrks-gw

✓ aol-gw ✓ gui ✓ netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw ✓ NetShow smap ✓ VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

✓ ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw ✓ snmp-gw ✓ policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw ✓ mmp radm ✓ ssl-gw

permit Indicates hosts to which the proxies and applications can send requests.

deny Indicates hosts to which the proxies and applications cannot send requests.

destination-list Specifies single hosts, entire networks, or subnets. Specify by IP address or host name. The wildcard * is valid. Use the word unknown to match hosts that do not have DNS entries or whose forward and reverse lookups do not match.

Specify multiple destinations using braces {} and separating the items with spaces.

If no destination-list is specified, no destinations are valid.

Netperm Table Reference Guide 59

Page 64: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

directory

Specifies the directory that the proxy makes its root directory before providing service. For the info-gw, specifies the directory they use as the root of their database. This option is equivalent to the -chroot option in previous versions.

Syntaxdirectory directory

ExampleThis example indicates that the smap and smapd proxies use the directory /var/spool/smap as their root directories:

smap, smapd: directory /var/spool/smap

ahttp-gw ✓ gopher-gw ✓ mssql-gw ✓ RealAudio ✓ strmwrks-gw

✓ aol-gw ✓ gui ✓ netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw ✓ NetShow ✓ smap ✓ VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw ✓ smapd ✓ whois

✓ ck-gw ✓ lnotes-gw pcxdpp snmpd ✓ x-gw

✓ cserve-gw login-sh ✓ plug-gw ✓ snmp-gw policy-policy

finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw ✓ mmp radm ✓ ssl-gw

directory Specifies the directory that the proxy makes its root directory before providing service.

60 Netperm Table Reference Guide

Page 65: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

directory (sql-gw only)

Specifies the directory in which the proxy places the Oracle TNS trace file. If you do not use this attribute, the proxy places the Oracle TNS trace file in the directory from which the proxy was started.

Syntaxdirectory directory

ExampleThis example indicates that the SQL*Net proxy places the TNS trace file in the /var/adm/oracle directory:

sql-gw: directory /var/adm/oracle

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

directory Specifies the directory in which the proxy places the Oracle TNS trace file.

Netperm Table Reference Guide 61

Page 66: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

display

Specifies the destination display on which applications display.

Syntaxdisplay host:displaynumber.screennumber

ExampleThis example indicates that the X gateway displays all X applications on the display attached to dimension:

x-gw: display dimension:10.0

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd ✓ x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

host Specifies the name of the machine to which the display is physically connected.

displaynumber Number of the display on the machine.

screennumber Number of the screen for the display.

62 Netperm Table Reference Guide

Page 67: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

dssagent

Specifies the name that is registered as the agent on the Defender Security Server.

Syntaxdssagent agent

ExampleThis example indicates that gauntlet is registered as the agent on the Defender Security Server:

authsrv: dssagent gauntlet

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

agent Specifies the name that is registered as the agent on the Defender Security Server.

Netperm Table Reference Guide 63

Page 68: Netperm Table Reference Guide

Attribute Reference

dsshost

Specifies the name of the host running the Defender Security Server software.

Syntaxdsshost hostname

ExampleThis example indicates that the Defender Security Server is running on dimension:

authsrv: dsshost dimension

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

hostname Specifies the name of the host running the Defender Security Server software. Specify by IP address or host name.

64 Netperm Table Reference Guide

Page 69: Netperm Table Reference Guide

Attribute Reference

dsskey

Specifies the SNK key string that the authentication server uses when authenticating with the Defender Security Server.

Syntaxdsskey snk_key

ExampleThis example shows the SNK key string the authentication server uses:

authsrv: dsskey 53 94 dd 90 a3 b7 29 e1

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

snk_key Specifies the SNK key string (in hex) that the authentication server uses when authenticating with the Defender Security Server. This value must match the string displayed when you registered your firewall as an agent.

Netperm Table Reference Guide 65

Page 70: Netperm Table Reference Guide

Attribute Reference

dssport

Specifies thebind- port that the authentication server uses when communicating with the Defender Security Server.

Syntaxdssport bind-port

ExampleThis example indicates that the authentication server communicates with the Defender Security Server on bind-port 2626:

authsrv: dssport 2626

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

bind-port Specifies the bind-port that the authentication server uses when communicating with the Defender Security Server. The default bind-port is 2626.

66 Netperm Table Reference Guide

Page 71: Netperm Table Reference Guide

Attribute Reference

enable

Specifies the types of alerts that the Gauntlet kernel generates and logs. If there is no enable entry, all alerts are enabled.

Syntaxenable {options | none}

ExampleThis example indicates that the Gauntlet kernel generates security alerts for packets sent to TCP and UDP ports without active listeners:

alerts: enable TCP UDP

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

✓ alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

options Specifies the types of alerts the Gauntlet kernel generates and logs. Valid options are:

• TCP packets sent to TCP ports without active listeners• UDP packets sent to UDP ports without active listeners• Source source-routed packets• Sedir ICMP redirects• Screen packets dropped by the local or forward packet screen

none Specifies that the Gauntlet kernel does not generate security alerts for any of the above activities.

Netperm Table Reference Guide 67

Page 72: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

event_timer

Specifies the amount of time that the SQL*Net proxy sleeps between checking various timers. If you do not use this attribute, the SQL*Net proxy sleeps for 1 second.

Set this value higher if your SQL*Net proxy is configured to handle many simultaneous connections.

Syntaxevent_timer seconds

ExampleThis example indicates that the SQL*Net proxy wakes up every 5 seconds to examine timers for each connection:

sql-gw: event_timer 5

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds that the proxy sleeps between checks on idle time and connected time.

68 Netperm Table Reference Guide

Page 73: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

exec

Specifies a program that the proxy invokes to handle the service. This option is equivalent to the -exec option in previous versions.

Syntaxexec program [options]

ExampleThis example indicates that the netacl daemon invokes the cat program to display the file /usr/local/etc/finger.txt for finger requests:

netacl-fingerd: exec /bin/cat /usr/local/etc/finger.txt

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui ✓ netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

program Specifies the name of the program to invoke.

options Specifies the command line options for the program.

Netperm Table Reference Guide 69

Page 74: Netperm Table Reference Guide

Attribute Reference

extended-permissions

Specifies whether the proxies check for extended permissions for users as they authenticate. Checking for extended permissions tells the authentication server to obey the options keywords when it reads the netperm-table. This option is equivalent to the -extend and -extnd options in previous versions.

When you turn on extended permissions, the proxies that use extended permissions deny all operations. You must then explicitly permit the proxies to allow the desired activities by creating rules using the operations attribute. Use care when specifying extended permissions for policies.

Syntaxextended-permissions *

ExampleThis example indicates that FTP proxy checks for extended permissions when authenticating users:

ftp-gw: extended-permissions *

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

70 Netperm Table Reference Guide

Page 75: Netperm Table Reference Guide

Attribute Reference

feature

Lets you control general features rather than specific portions of the HTTP protocol.

Syntax Specifies particular features explicitly permitted or denied. Denying a feature causes the HTTP proxy to remove the related tags from within the HTML code.

http-gw: {permit | deny}-feature features

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw

login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

features Lists particular HTTP features. Valid features are:

• activeX (deny removes <EMBED> and <OBJECT> tags)• frames• html2• cyberpatrol (permit activates support for Cyber Patrol software)• java (deny removes <APPLET> tags)• script (deny removes <SCRIPT> tags>)• kanji (permit allows Kanji charachters as described in RFC

1468)• legacy-kanji (permit allows Kanji characters as implemented in

Gauntlet 3.2)• multipart-form (blocks a file upload bug in Netscape

Navigator)

Netperm Table Reference Guide 71

Page 76: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the HTTP proxy removes Java or Javascript tags from within any HTML accessed through the proxy:

http-gw: deny-feature java javascript

This example indicates that Cyber Patrol is enabled at the policy level:

policy-http-gw_Trusted: permit-feature cyberpatrol

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

You cannot set portions of this attribute through the Gauntlet Firewall Manager.

Syntax 2Specifies features in which the HTTP proxy restricts the HTML to comply with that feature type.

http-gw: feature features

ExampleThis example indicates that the HTTP proxy removes, from any HTML that it accesses, all HTML that does not meet the HTML2 standards:

http-gw: feature html2

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

You cannot set portions of this attribute through the Gauntlet Firewall Manager.

features lists particular HTTP features. Valid features are:

• frames• html2• java• script

72 Netperm Table Reference Guide

Page 77: Netperm Table Reference Guide

Attribute Reference

force_source_address

Specifies that the plug proxy uses the IP address of the originating host as the source address of the packet when sending the request on to the destination host.

If this option is not specified, the firewall uses its IP address as the source address of the packet, causing all packets to look like they originated on the firewall.

You must be using officially registered, routable addresses on your trusted networks in order to use this option.

Syntaxforce_source_address { on | off }

ExampleThis example indicates that the plug proxy for America Online uses the IP address of the originating host as the source address of the packet when sending the packet on to the destination host:

aol-gw: force_source_address on

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

You cannot set this attribute through the Gauntlet Firewall Manager for some proxies.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig ✓ rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ✓ ssl-gw

Netperm Table Reference Guide 73

Page 78: Netperm Table Reference Guide

Attribute Reference

forward

Specifies the name of a host to which the HTTP proxy forwards requests for which it can find no destination information.

The HTTP proxy uses this information as a last resort, when it cannot find any other information in the request. This is used when transparency is not enabled.

Syntaxforward pattern -protocol protocol -tohost host:port

ahttp-gw ✓ gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

pattern Specifies the pattern in the URL for which the HTTP uses this rule. Quotes are not required.

-protocol protocol

Specifies the protocol that the HTTP proxy uses when talking to the remote host. Valid values are:

• FTP• Gopher• HTTP

-tohost host:port

Specifies the host and port to which the HTTP proxy forwards requests and the port on which it connects. Use IP addresses or host names. Specify port by port number.

74 Netperm Table Reference Guide

Page 79: Netperm Table Reference Guide

Attribute Reference

itself.

ening

ExampleThis example indicates that the HTTP proxy forwards all requests with a URL starting with the string “/pub” to the host ftp.bigu.edu using the FTP protocol:

http-gw: forward /pub* -protocol ftp -tohost ftp.bigu.edu

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

forward (authenIP only)

Specifies screening rules that apply to packets that the firewall would normally forward (like a router) because their destinations are hosts other than the firewall

The packet screening facility reads rules specified with the authenIP keyword before rules (including default Gauntlet firewall rules) specified with the netconfig keyword. The recommended way to add forward rules is through the packet screeditor in the administration tools.

Syntax{permit | deny | absorb}-forward [-proto protocol] [-if interface] -srcaddr address -dstaddr address [-srcport port] [-dstport port]

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

✓ authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

permit-forward Indicates that packets are forwarded from one interface of the firewall to the other, as a router does.

Netperm Table Reference Guide 75

Page 80: Netperm Table Reference Guide

Attribute Reference

deny-forward Indicates that packets are not forwarded from one interface of the firewall to the other nor are they absorbed for processing as if they were addressed for the firewall. Indicates that the firewall drops these packets.

absorb-forward Indicates that the firewall accepts these packets as if their destination were the firewall itself and passes them on to the appropriate utility or proxy.

-proto protocol Specifies a particular protocol for which this rule is valid. Valid values are defined in RFC 1700. Specify by protocol name or number. The wildcard * is valid.

You can specify a subset of the ICMP protocol. Use the following syntax:

icmp: [!] subtype [& | | [!] subtype ] [& | | [!] subtype ]

where:

subtype specifies one of subtypes of the ICMP protocol. Specify by subtype name. Valid subtypes are:

ECHO

ECHOREPLY

IREQ

IREQREPLY

MASKREPLY

MASKREQ

PARAMPROB

REDIRECT

ROUTERADVERT

ROUTERSOLICIT

SOURCEQUENCH

TIMXCEED

TSTAMP

TSTAMPREPLY

UNREACH

! specifies that a particular subtype is not permitted.

& specifies multiple subtypes that are allowed.

| specifies that any of the listed subtypes are allowed.

-if interface Specifies the name of the interface on which the packet arrives. Valid values vary by operating system and type of physical connection The wildcard * is valid.

76 Netperm Table Reference Guide

Page 81: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the firewall forwards SNMP packets (which can originate on any port) between an SNMP management station (10.0.1.120) on the trusted network and another workstation (10.0.1.33) on the untrusted network of the Gauntlet Intranet Firewall:

authenIP: permit-forward -if ef1 -proto UDP -srcaddr 10.0.1.120:255.255.255.255 -dstaddr 10.0.1.33:255.255.255.255 -srcport * -dstport 161

authenIP: permit-forward -if ef0 -proto UDP -srcaddr 10.0.1.33:255.255.255.255 -dstaddr 10.0.1.120:255.255.255.255 -srcport * -dstport 161

This example indicates that the firewall forwards all ICMP packets except ROUTERADVERT and ROUTERSOLICIT from a host on the trusted network (10.0.1.120) and a host on the untrusted network (204.255.154.27):

authenIP: permit-forward -if ef1 -proto icmp: !ROUTERADVERT | !ROUTERSOLICIT -srcaddr 10.0.1.120:255.255.255.255 -dstaddr 10.0.1.33:255.255.255.255 -srcport * -dstport *

The commands must be on one line. They are wrapped here for readability.

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

-srcaddr address Specifies the source IP address and netmask of the packet. The wildcard address 0.0.0.0:0.0.0.0 is valid.

-dstaddr address Specifies the destination IP address and netmask of the packet. The wildcard address 0.0.0.0:0.0.0.0 is valid.

-srcport port Specifies the source port of the packet. Specify by port number. The wildcard * is valid.

-dstport port Specifies the destination port of the packet. Specify by port number. The wildcard * is valid.

Netperm Table Reference Guide 77

Page 82: Netperm Table Reference Guide

Attribute Reference

function

Specifies particular functions of the protocol that are explicitly permitted or denied.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

78 Netperm Table Reference Guide

Page 83: Netperm Table Reference Guide

Attribute Reference

Syntaxftp-gw: {permit | deny}-function functions

IXQFWLRQV Specifies functions that are permitted or denied.

Valid values for the FTP proxy are:

• ABOR—Abort previous command• ACCT—Specify account• ALLO—Allocate storage• APPE—Append to a file• CDUP—Change to parent of current working directory• CWD—Change working directory• DELE—Delete a file• HELP—Give help information• LIST—Give list files in a directory• MKD—Make directory• MODE—Specify data transfer mode• NLST—Give name list of files in directory• NOOP—Do nothing• PASS—Specify password• PASV—Prepare for server to-server transfer• PORT—Specify data connection port• PWD—Print the current working directory• QUIT—Terminate session

Netperm Table Reference Guide 79

Page 84: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the FTP proxy does not allow people to retrieve (RETR) files:

ftp-gw: deny-function RETR

IXQFWLRQV�FRQW��

• REIN—Full user terminate• REST—Restart incomplete transfer• RETR—Retrieve a fileRMD Remove a directory• RNFR—Specify rename-from file name• RNTO—Specify rename-to file name• SITE—Non-standard commands• SIZE—Return size of a file• SMNT—Structure mount• STAT—Return status of server• STOR—Store a file• STOU—Store a file with a unique name• STRU—Specify data transfer structure• SYST—Show operating system server type• TYPE—Specify data transfer type• USER—Specify user name• XCUP—Change to parent of current working directory• XCWD—Change working directory• XMKD—Make a directory• XPWD—Print the current working directory• XRMD—Remove a directory

Valid values for the HTTP proxy are:

• BINARY—Read Files• DIR—List Directories• EXEC—Exec Commands• FTP—FTP Requests• GOPHER—Gopher Requests• HTTP—HTTP Requests• HTTPREQ—HTTP Requests• PLUS—Gopher+ Commands• READ—Requests• TEXT—Read Files• TYPE—Content-type of header• WAIS—Search Commands• WRITE—Write Data

80 Netperm Table Reference Guide

Page 85: Netperm Table Reference Guide

Attribute Reference

This example indicates that the HTTP proxy does not allow people to perform FTP requests through the HTTP proxy:

http-gw: deny-function FTP

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

groupid

Specifies the group ID the proxy uses when running.

Syntaxgroupid group

ExampleThis example indicates that the Info Server runs using the group ID of uucp:

info-gw: groupid uucp

✓ ahttp-gw ✓ gopher-gw mssql-gw RealAudio ✓ strmwrks-gw

aol-gw gui ✓ netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw ✓ snmp-gw ✓ policy-policy

finger ✓ lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

group Specifies the name of the group as either a name or numeric id from the /etc/group file.

Netperm Table Reference Guide 81

Page 86: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

handoff

Syntax for ftp-gwSpecifies the name of a host to which the FTP proxy hands the proxy request. This allows you to redirect FTP requests to another machine which is running an FTP server, such as an anonymous FTP server running on your service net.

ftp-gw: handoff host[:bind-port]

ExampleThis example indicates the FTP proxy on the firewall hands all requests on bind-port 21to the ftp server (ftp.yoyodyne.com) running on the service network:

ftp-gw: handoff ftp.yoyodyne.com

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

host[:bind-port] Specifies the host and bind-port to which the FTP proxy forwards requests and the bind-port on which it connects. Use IP addresses or host names. Specify bind-port by service name or bind-port number. If no bind-port number is specified, the proxy uses bind-port 21 by default.

82 Netperm Table Reference Guide

Page 87: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

Syntax for http-gwSpecifies the name of a host to which the HTTP proxy hands the proxy request. This allows you to use several proxies, such as the HTTP proxy on the firewall and a caching proxy.

The HTTP proxy communicates with the next proxy as if it were a client, rather than as another proxy. You cannot use this setting in place of specifying the HTTP proxy in your browser. The handoff attribute does not work for FTP or Gopher URLs.

http-gw: handoff host[:bind-port]

ExampleThis example indicates the HTTP proxy on the firewall inside the network (fw-engineering.engineering.yoyodyne.com) hands all requests to the firewall between the corporate network and the Internet (fire-in.yoyodyne.com):

http-gw: handoff fire-in.yoyodyne.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

host[:bind-port] Specifies the host and bind-port to which the HTTP proxy forwards requests and the -bindport on which it connects. Use IP addresses or host names. Specify bind-port by service name or bind-port number. If no bind-port number is specified, the proxy uses bind-port 80 by default.

Netperm Table Reference Guide 83

Page 88: Netperm Table Reference Guide

Attribute Reference

header

Specifies HTTP headers that the proxy permits or denies. Denying a header causes the HTTP proxy to remove that information from the request when it sends it to the destination host.

Syntaxhttp-gw: {permit | deny}-header header

ExampleThis example indicates that the HTTP proxy removes the user agent header and headers that begin with x- before sending the request on to the destination host:

http-gw: deny-header user-agent

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

header Specifies the headers you wish to explicitly permit or deny (remove). You can only specify one header per line. Consult the HTTP 1.0/1.1 specifications a for a list of headers. Certain headers are always processed by the HTTP proxy and are dealt with specifically:

• Connection• Content-Length• Content-Type• Location• Proxy-Connection

84 Netperm Table Reference Guide

Page 89: Netperm Table Reference Guide

Attribute Reference

http-gw: deny-header x-*

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

help-msg

Specifies the file that the proxy displays when the user accesses the help command.

Syntaxhelp-msg file

ExampleThis example displays the file /usr/local/etc/rlogin-help.txt when a user requests access from the Rlogin proxy:

rlogin-gw: help-msg /usr/local/etc/rlogin-help.txt

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

file Specifies the name of the file the proxy displays when the user accesses the help command. If no file is specified, the proxy displays a list of internal commands.

Netperm Table Reference Guide 85

Page 90: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

host (sql-gw only)

Specifies the interfaces and bind-ports on which the SQL*Net proxy listens for SQL*Net requests. This attribute is required.

Syntaxhost interface bind-port

ExampleThis example indicates that the firewall listens for SQL*Net requests on its trusted network interface (10.0.1.100) on port 1560:

sql-gw: host 10.0.1.100 1560

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

interface Specifies the IP address of the interface of the firewall on which the firewall listens for SQL*Net proxy requests. The wildcard character * is not valid.

bind-port Specifies the bind-port on the firewall on which the firewall listens for SQL*Net proxy requests. Specify by bind-port number or by a service name defined in /etc/services.

86 Netperm Table Reference Guide

Page 91: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

hosts (authsrv only)

Specifies the hosts that can connect to the authentication server.

Syntaxauthsrv: {permit | deny}-hosts hosts

ExampleThis example indicates that the authentication server only accepts connections from the firewall itself (localhost):

authsrv: permit-hosts 127.0.0.1

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

hosts Specifies the hosts from which the authentication server accepts connections. Specify individual machines, entire networks, or subnets. Use IP addresses or host names. The wildcard * is valid.

Netperm Table Reference Guide 87

Page 92: Netperm Table Reference Guide

Attribute Reference

hosts

Specifies the hosts for which the proxy uses a particular policy or the hosts that can use the proxy.

Syntaxpermit-hosts hosts -policy policy

Specifies the hosts that cannot use the proxy.

deny-hosts hosts

ahttp-gw ✓ gopher-gw ✓ mssql-gw ✓ RealAudio ✓ strmwrks-gw

✓ aol-gw ✓ gui ✓ netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw ✓ NetShow smap ✓ VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

✓ ck-gw ✓ lnotes-gw pcxdpp ✓ snmpd ✓ x-gw

✓ cserve-gw login-sh ✓ plug-gw ✓ snmp-gw policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw ✓ mmp ✓ radm ✓ ssl-gw

permit Indicates hosts for which the proxy uses a particular policy, or the hosts that can use the proxy.

deny Indicates hosts that cannot use the proxy .

hosts Specifies the hosts for which the proxy uses the particular policy. When used without the -policy option, indicates the hosts that can use the proxy. Specifies single hosts, entire networks, or subnets. Specify by IP address or host name. The wildcard * is valid.

policy Indicates the name of the policy these hosts use.

policy Specifies the name of the policy.

88 Netperm Table Reference Guide

Page 93: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that all requests from the network 10.0.4.* use the policy restrictive:

*: permit-hosts 10.0.4.* -policy restrictive

This example indicates that that the host 10.0.1.12 can use the RSH proxy:

rsh-gw: permit-hosts 10.0.1.12

This example indicates that that all the hosts on the 10.0.1.0:255.255.255.0 subnet cannot use the FTP proxy:

ftp-gw: deny-hosts 10.0.1.0:255.255.255.0

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

if-inside

Specifies the name of the inside interface and the IP address of the inside interface of the firewall. Used to create local screening rules that accept packets for the inside interface. Used to create forward screening rules that absorb packets if transparency is on.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw ✓ netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 89

Page 94: Netperm Table Reference Guide

Attribute Reference

Syntaxif-inside -if insideinterface -addr insideIPaddress

ExampleThis example indicates that the inside interface of the firewall is le1 and the inside address of the firewall is 10.0.1.100:

netconfig: if-inside -if le1 -addr 10.0.1.100:255.255.255.255

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

insideinterface Specifies the interface name of the inside interface of the firewall. Valid values vary by operating system and type of physical connection.

InsideIPaddress Specifies the IP address and subnet mask of the inside interface of the firewall.

90 Netperm Table Reference Guide

Page 95: Netperm Table Reference Guide

Attribute Reference

if-outside

Specifies the name of an outside or service net interface and the IP address of the outside or service net interface of the firewall. Used to create local screening rules that accept packets for the outside interface.

Syntaxif-outside -if outsideinterface -addr outsideIPaddress

ExampleThis example indicates that the outside interface of the firewall is we1 and the outside address of the firewall is 204.255.154.100:

netconfig: if-outside -if we1 -addr 204.255.154.100:255.255.255.255

This example indicates that the service net interface of the firewall is we2 and the IP address of the service net interface of the firewall is 204.255.154.30:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw ✓ netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

outsideinterface Specifies the interface name of the outside or service net interface of the firewall. Valid values vary by operating system and type of physical connection.

outsideIPaddress Specifies the IP address and subnet mask of the outside or service net interface of the firewall.

Netperm Table Reference Guide 91

Page 96: Netperm Table Reference Guide

Attribute Reference

netconfig: if-outside -if we2 -addr 204.255.154.30:255.255.255.255

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

keepalive-timeout

Specifies the amount of time that the Gauntlet Firewall Manager waits for activity from the client before shutting itself down. If you do not use this attribute, the Gauntlet Firewall Manager waits 7200 seconds (2 hours) for activity before shutting itself down.

Syntaxkeepalive-timeout seconds

ExampleThis example indicates that the Gauntlet Firewall Manager waits 30 minutes (1800 seconds) before shutting itself down:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw ✓ gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds that the Gauntlet Firewall Manager waits for activity from the client before shutting itself down

92 Netperm Table Reference Guide

Page 97: Netperm Table Reference Guide

Attribute Reference

gui: keepalive-timeout 1800

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

local

Specifies screening rules that apply to packets with a destination of the firewall itself.

Note that the packet screening facility reads rules specified with the authenIP keyword before rules (including default Gauntlet Firewall rules) specified with the netconfig keyword. The recommended way to add local rules is through the packet screening editor in the administration tools.

Syntax{permit | deny}-local [-proto protocol] [-if interface] -srcaddr address -dstaddr address [-srcport port] [-dstport port]

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

✓ authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

permit-local Indicates that the firewall accepts the packets for local delivery and processing.

deny-local Indicates that the firewall does not accept these packets for local delivery. Indicates that the firewall drops these packets.

Netperm Table Reference Guide 93

Page 98: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the firewall denies all SMTP connections on its outside interface (ef0) on port 25 (the SMTP port) from one network (192.168.1.*):

authenIP: deny-local -if ef0 -proto TCP -srcaddr 192.168.1.0:255.255.255.0 -dstaddr 0.0.0.0:0.0.0.0 -srcport * -dstport 25

The command must be on one line. It is wrapped here for readability.

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

-proto protocol Specifies a particular protocol for which this rule is valid. Valid values are specified in RFC 1770. Specify by protocol name or number. The wildcard * is valid.

-if interface Specifies the name of the interface on which the packet arrives. Valid values vary by operating system and type of physical connection. The wildcard * is valid.

-srcaddr address Specifies the source IP address and netmask of the packet. The wildcard address 0.0.0.0:0.0.0.0 is valid.

-dstaddr address Specifies the destination IP address and netmask of the packet. The wildcard address 0.0.0.0:0.0.0.0 is valid.

-srcport port Specifies the source port of the packet. Specify by port number. The wildcard * is valid.

-dstport port Specifies the destination port of the packet. Specify by port number. The wildcard * is valid.

94 Netperm Table Reference Guide

Page 99: Netperm Table Reference Guide

Attribute Reference

local-domain (smap only)

Explicitly defines the local domain the firewall is serving. One or more domain names may be listed on the same line or separate lines.

Syntaxlocal-domain {ip_addr | domain name}

ExampleThis example indicates the domain name of the local domain the firewall is serving:

smap: local-domain xyz.abc.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

ip_addr Indicates the IP address of the local domain the firewall is serving.

domain name Indicates the domain name of the local domain the firewall is serving.

Netperm Table Reference Guide 95

Page 100: Netperm Table Reference Guide

Attribute Reference

log

Specifies that proxies log only the operations listed, rather than all operations (the default). Note that the FTP proxy does not log all FTP operations by default. This option is equivalent to the -log command in previous versions.

Syntaxlog operations

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger ✓ lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

operations Specifies operations the proxies log. Refer to the function attribute (page 4–78) for a list of supported FTP functions.

Valid values for the HTTP proxy are:• BINARY—Read Files• DIR—List Directories• EXEC—Exec Commands• FTP—FTP Requests• GOPHER—Gopher Requests• HTTP—HTTP Requests• HTTPREQ—HTTP Requests• PLUS—Gopher+ Commands• READ—Requests• TEXT—Read Files• TYPE—Content-type of header• WAIS—Search Commands• WRITE—Write Data

96 Netperm Table Reference Guide

Page 101: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that requests the trusted policy log only retrieve (RETR) and storage (STOR) activities:

policy-trusted: log RETR STOR

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

You cannot set this attribute through the Gauntlet Firewall Manager for all proxies.

logging

Specifies that logging is on or off for all services or an individual service.

operations(cont.)

Valid values for the lp proxy are:• all• print• remove• restart• status-ln (long)• status-sh (short)

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP ✓ info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 97

Page 102: Netperm Table Reference Guide

Attribute Reference

Syntaxlogging {normal | none}

ExampleThis example indicates that the FTP proxy is not logging events:

ftp-gw: logging none

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

log_level

Specifies the level of logging that the SQL*Net proxy performs. All logs are written to the standard Gauntlet log file (/var/adm/messages). If you do not use this attribute, the proxy uses log level 1.

normal Indicates that normal logging is performed.

none Indicates that no logging is performed.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

98 Netperm Table Reference Guide

Page 103: Netperm Table Reference Guide

Attribute Reference

Syntaxlog_level {0 | 1 | 2 | 3}

ExampleThis example indicates that the SQL*Net proxy logs normal and blocked events:

sql-gw: log_level 2

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

0 Indicates that the SQL*Net proxy does not log any information.

1 Indicates that the SQL*Net proxy logs normal events, such as the opening and closing of relays and connections.

2 Indicates that the SQL*Net proxy logs normal events, as well as occurrences where relays and connections are blocked.

3 Indicates that the SQL*Net proxy logs normal events, blocked events, as well as all relay and connection I/O activity

Netperm Table Reference Guide 99

Page 104: Netperm Table Reference Guide

Attribute Reference

log-relay (smap only)

Logs the rejection of relay attempts.

Syntaxlog-relay {reject | none}

ExampleThis example indicates the logging of the rejection of relay attempts:

smap: log-relay reject

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

reject Logs the rejection of relay attempts.

none Does not log the rejection of relay attempts.

100 Netperm Table Reference Guide

Page 105: Netperm Table Reference Guide

Attribute Reference

log-spam (smap only)

Logs the rejection of spam attempts.

Syntaxlog-spam {reject | none}

ExampleThis example indicates the logging of the rejection of spam attempts:

smap: log-spam reject

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

reject Logs the rejection of spam attempts.

none Does not log the rejection of spam attempts.

Netperm Table Reference Guide 101

Page 106: Netperm Table Reference Guide

Attribute Reference

manager

Specifies the manager that the SNMP proxy can contact.

Syntaxmanager manager [port agent-port] [trap trap-port]

ExampleThis example indicates that the network manager on 10.0.1.123 can use the SNMP proxy:

snmp-gw: manager 10.0.1.123

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw ✓ snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

manager Specifies the name of the network manager that can use the proxy. Specifcy by IP address or host name.

port agent-port Specifies the port on which the agent is listening for queries from the SNMP manager. If you do not include the agent-port option, the proxy uses port 161.

trap trap-port Specifies the port on which the proxy listens for trap messages from the agents. If you do not include the agent-port option, the proxy uses port 162.

102 Netperm Table Reference Guide

Page 107: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

maxbad

Specifies the number of incorrect consective login attempts a user can have before the authentication server disables the account.

If you do not use this attribute, the authentication server disables a user account after five unsuccessful login attempts.

Syntaxmaxbad logins

ExampleThis example indicates that the authentication server allows three incorrect login attempts before disabling an account:

authsrv: maxbad 3

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

logins Specifies the maximum number of incorrect login attempts a user can have before the authentication server disables the account

Netperm Table Reference Guide 103

Page 108: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

maxbytes

Specifies the maximum size (in bytes) of mail messages that the smap client accepts. After receiving the maximum number of bytes, the smap client truncates the message and sends the truncated message to the recipient. The smap client accepts the remaining data from the sender and discards it. If this attribute is not used, the smap client does not set a limit on the size of mail messages.

Syntaxmaxbytes bytes

ExampleThis example indicates that the smap client accepts messages up to 2 MB in size:

smap: maxbytes 2048

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

bytes Specifies the maximum size (in bytes) of mail messages that the smap client accepts.

104 Netperm Table Reference Guide

Page 109: Netperm Table Reference Guide

Attribute Reference

maxchildrenObsolete. Use the child-limit attribute.

maximum_connect_data

Specifies the maximum length of the data packet used for a connect. If you do not use this attribute, the SQL*Net proxy uses a maximum length of 1,024 bytes for a data packet.

Syntaxmaximum_connect_data bytes

ExampleThis example indicates that the SQL*Net proxy uses a maximum length of 2,048 bytes for a data packet:

sql-gw: maximum_connect_data 2048

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

bytes Specifies the maximum length (in bytes) of the data packet used for a connect.

Netperm Table Reference Guide 105

Page 110: Netperm Table Reference Guide

Attribute Reference

maximum_relays

Specifies the maximum number of relays (connections) between clients and servers. If you do not use the attribute, the SQL*Net proxy allows a maximum of 8 relays between clients and servers.

A client can initiate multiple connections to one or many servers across a firewall, such as an Oracle Web server outside the firewall accessing data from internal databases. If you are using CGI scripts to access internal databases, set this attribute to allow at least 20 connections.

Syntaxmaximum_relays relays

ExampleThis example indicates that the maximum number of connections between clients and servers is 12:

sql-gw: maximum_relays 12

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

relays Specifies the maximum number of relays.

106 Netperm Table Reference Guide

Page 111: Netperm Table Reference Guide

Attribute Reference

maxrecip

Specifies the maximum number of recipients that the smap client accepts in the SMTP dialog. If the SMTP dialog indicates that there are more recipients than allowed, then the smap client discards the message. The message is not delivered to anyone. If this attibute is not used, the smap client allows an unlimited number of recipients.

Syntaxmaxrecip recipients

ExampleThis example indicates that the smap client accepts mail with a maximum of 25 recipeints:

smap: maxrecip 25

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

recipients Specifies the maximum number of recipients that the smap client accepts in the SMTP dialog.

Netperm Table Reference Guide 107

Page 112: Netperm Table Reference Guide

Attribute Reference

maxsessions

Specifies the maximum number of concurrent sessions that a single process of the HTTP proxy can support. When this limit is exceeded, the proxy creates a new process to handle the additional load.

Syntaxmaxsessions sessions

ExampleThis example indicates that the authenticated HTTP proxy allows a maximum of 10 concurent sessions for a single process before creating a new process:

ahttp-gw: maxsessions 10

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

sessions Specifies the maximum number of concurrent sessions that a single process of the HTTP proxy can support.

108 Netperm Table Reference Guide

Page 113: Netperm Table Reference Guide

Attribute Reference

NetShow

Specifies the bind-port on which the NetShow proxy listens for requests.

SyntaxNetShow bind-port

ExampleThis example indicates that the NetShow proxy listens for requests on bind-port 1755:

mmp: NetShow 1755

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw ✓ mmp radm ssl-gw

bind-port Specifies the bind-port on which the NetShow proxy listens for requests. Specify by bind-port number or by bind-port name as specified in /etc/services.

Netperm Table Reference Guide 109

Page 114: Netperm Table Reference Guide

Attribute Reference

es not and

nobogus

Specifies that the authentication server indicates when a userID does not exist when users attempt to login and fail.

If this option is not specified and a user enters a non-existent user name, the authentication server always responds with a bogus SNK challenge.

Syntaxnobogus true

NOTE: You must remove or comment out this setting if you wish to disable it. The settings “nobogus false” and “nobogus off” are not valid.

ExampleThis example indicates that the authentication server indicates that the userID doexist (rather than displaying a bogus SNK challenge) when users attempt to loginfail:

authsrv: nobogus true

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

110 Netperm Table Reference Guide

Page 115: Netperm Table Reference Guide

Attribute Reference

operation

Specifies explicitly permitted or denied operations for particular users or groups at particular times of day. The authentication server only uses these rules when the policy or the proxy uses the extended-permissions attribute.

Syntaxauthsrv: {permit |deny}-operation [user users |group groups] service destination [options] [time start end]

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

user users Specifies the names of users for which the proxies use this rule. The wildcard * is valid.

group groups Specifies the names of groups for which the proxies use this rule. The wildcard * is valid.

Service Specifies the name of a service for which this rule applies. Valid values are:

• ck-gw—Circuit proxy• ftp-gw—FTP proxy• rlogin-gw—Rlogin proxy• rsh-gw—Rsh proxy• tn-gw—TELNET proxy• *—all of these proxies

Netperm Table Reference Guide 111

Page 116: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the sales group is permitted to TELNET to any destination only between the hours of 8:00 am and 5:00 pm:

authsrv: permit-operation group sales tn-gw * time 08:00 17:00

This example indicates that the user robert is permitted to FTP only to ftp.yoyodyne.com:

authsrv: permit-operation user robert ftp-gw ftp.yoyodyne.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

destination Specifies the hosts to which the proxies can or cannot send requests. Specify individual machines, entire networks, or subnets. Use IP addresses or host names. The wildcard * is valid.

Options Specifies particular operations for each protocol that can be controlled. Valid values are:

• ck-gw—none• ftp-gw—Consult the ftpd(1) man page• rlogin-gw—none• rsh-gw—none• tn-gw—none

time Indicates that this rule goes into effect and stops having an effect at a particular time.

Start Specifies the time at which the proxy begins using this rule. Specify time in hours and minutes (between 00:00 and 23:59).

End Specifies the time at which the proxy stops using this rule. Specify time in hours and minutes (between 00:00 and 23:59).

112 Netperm Table Reference Guide

Page 117: Netperm Table Reference Guide

Attribute Reference

oracle_log

Specifies whether or not the SQL*Net proxy generates Oracle-style log messages in addition to generating Gauntlet log messages. The proxy writes these Oracle log messages to the same message file (/var/adm/messages) as it does for Gauntlet log messages.If you do not use this attribute, the SQL*Net proxy does not generate Oracle-style log messages.

Oracle-style log messages can help database administrators trace database connections.

Syntaxoracle_log {yes | no}

ExampleThis example indicates that the Indicates the SQL*Net proxy generates Oracle-style log messages in addition to Gauntlet log messages:

sql-gw: oracle_log yes

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 113

Page 118: Netperm Table Reference Guide

Attribute Reference

ourname

Specifies the host and domain name that the graphical administrative tool or HTTP proxy uses when putting its own name into non-transparent forwarded URLs (links). Because the firewall may have different host names, this allows you to specify which host name to use.

Syntaxourname hostname

ExampleThis example indicates that the GUI displays all pages as being on 10.0.1.100 (the inside interface of the firewall):

gui: ourname 10.0.1.100

This example indicates that the HTTP proxy (if needed) prepends fire-in.yoyodyne.com (the inside interface of the firewall) to all URLs when rewriting them:

http-gw: ourname fire-in.yoyodyne.com

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw ✓ gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

hostname Specifies the name of the host that the GUI or HTTTP proxy uses when prepending URLs. Specify an individual interface. Use an IP addresses or host name.

114 Netperm Table Reference Guide

Page 119: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

password change

Specifies password change options for allowing users to change passwords in authentication management system from within the TELNET and Rlogin proxies.

Syntax{permit | deny}-password change

ExampleThis example allows users on the inside network to change their passwords from both the TELNET and Rlogin proxies:

policy-trusted: permit-password change

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

permit Indicates hosts from which users can change their passwords. This is equivalent to the -passok option in previous versions

deny Indicates hosts from which users cannot change their passwords. Including a deny-password change rule has the same effect as not including those hosts in a permit-password change rule.

Netperm Table Reference Guide 115

Page 120: Netperm Table Reference Guide

Attribute Reference

This example allows users to change their passwords using the TELNET proxy. If this is the only permit-password change rule in the netperm-table, users can only change their password from the TELNET proxy (not from the Rlogin proxy).

tn-gw: permit-password change

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

password-timeout

Specifies the amount of time between authentication requests. This attribute is useful if you are using a strong authentication system that uses one-time passwords and you do not want to force your users to reauthenticate frequently. If you not use this attribute, the proxy asks users to reauthenticate every 300 seconds (5 minutes).

Syntaxpassword-timeout seconds

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds between authentication requests by the proxy.

116 Netperm Table Reference Guide

Page 121: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the authenticating HTTP proxy prompts users to reauthenticate very 30 minutes (1800 seconds):

ahttp-gw: password-timeout 1800

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

peer-net

Specifies the IP address of networks that are part of the trusted network but are separated from the firewall by a bridge or a router. Use this attribute if you have multiple inside networks that you want to reach from hosts using PC Extender. If you do not use this attribute, hosts using PC Extender can only reach hosts on the network to which the firewall is directly connected.

Syntaxpeer-net network

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw ✓ pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

network Specifies the networks that are part of the trusted network but are separated from the firewall by a bridge or a router. Specify by IP address. The * wildcard is valid.

Netperm Table Reference Guide 117

Page 122: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the PC Extender DPP daemon considers hosts on the 10.0.7.* to be peer networks:

pcxdpp: peer-net 10.0.7.*

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

permit-relay (smap only)

Allows mail relaying from other “non-local” domains.

Syntaxpermit-relay {ip_addr | domain name}

ExampleThis example indicates a domain name from which mail relaying is permitted:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

ip_addr Indicates the IP address from which mail relaying is permitted.

domain name Indicates the domain name from which mail relaying is permitted.

118 Netperm Table Reference Guide

Page 123: Netperm Table Reference Guide

Attribute Reference

smap: permit-relay neta.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

pop-server

Specifies the name of the machine on which the POP3 server is running. This option is required for the POP3 proxy when you are using APOP authentication.

Syntaxpop-server host

ExampleThis example indicates that the POP3 proxy accesses the POP3 server running on the inside mail hub, mail:

pop3-gw: pop-server mail

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw ✓ pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

host Specifies the name of the host on which the POP3 server is running. Specify by IP address or host name.

Netperm Table Reference Guide 119

Page 124: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

port

Specifies the connection rule for this instance of the plug proxy, including hosts and ports.

Syntaxport port hosts [-plug-to hosts] [-privport *] [-port port]

ahttp-gw gopher-gw ✓ mssql-gw RealAudio strmwrks-gw

✓ aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp snmpd x-gw

✓ cserve-gw login-sh ✓ plug-gw snmp-gw policy-policy

✓ finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ✓ ssl-gw

port Indicates the port on which the plug proxy runs.

Ports Specifies the name or port number, as specified in /etc/services.

Hosts Specifies hosts from which connections can originate. Specifies single hosts, entire networks, or subnets. Specify by IP address or host name. The wildcard * is valid.

-plug-to Indicates hosts to which the plug proxy connects.

Hosts Specifies single hosts, entire networks, or subnets. Specify by IP address or host name.

120 Netperm Table Reference Guide

Page 125: Netperm Table Reference Guide

Attribute Reference

ExampleThis example creates a plug proxy rule for a Quote of the Day server (qotd-gw) which allows all hosts to connect to the Quote of the Day server at Big University on the qotd port:

qotd-gw: port qotd * -plug-to qotd.bigu.edu -port qotd

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

You cannot set this attribute through the Gauntlet Firewall Manager for all proxies.

-privport Indicates that the proxy uses a reserved port number when connecting.

* Provided for future extensibility.

-port Indicates the port on which the plug proxy connects on the remote host.

Port Specifies the name or port number, as specified in /etc/services.

Netperm Table Reference Guide 121

Page 126: Netperm Table Reference Guide

Attribute Reference

ports

Specifies the ports on the destination host to which the proxy can connect. If you do not use this attribute, the proxy can connect to any port. Without this attribute, users can use the TELNET proxy to access any other network service that uses ASCII. This attribute is useful if you wish to ensure that the TELNET proxy is used only for accessing TELNET.

Without this attribute, users can designate a destination when they connect to an SSL server. This SSL connection connects to the remote service, which may or may not be running SSL. This attribute is useful if you wish to ensure that the HTTP proxy is only used to connect to standard SSL ports.

Syntax{ permit|deny }-ports port-list

ExampleThis example indicates that the TELNET proxy only allows connections to port 4000:

tn-gw: permit-ports 4000

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

port-list Specifies a list of ports to which the proxy can connect. Specifiy by port number or service name (as specified in /etc/services). The wildcard * is valid. Use the ! character to deny a particular service.

122 Netperm Table Reference Guide

Page 127: Netperm Table Reference Guide

Attribute Reference

ueue.

This example indicates that the HTTP proxy only allows connections to a few common HTTP ports (8000 and 8080) and the SSL port (443) and denies connections to every other port (!*).

Http-gw: permit-ports 8000 8080 ssl !*

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

printer

Specifies a mapping from a client’s print queue name to a server's host and print q

Syntaxprinter clientqueue -host server -printer serverqueue

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger ✓ lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

printer Indicates the printer for which these rules apply.

Clientqueue Specifies the name of a client print queue.

Host Indicates the server on which the remote printer queue is.

Server Specifies the name of the host on which the remote printer queue runs.

Printer Indicates the printer queue name.

Netperm Table Reference Guide 123

Page 128: Netperm Table Reference Guide

Attribute Reference

ExampleThis example maps the printer queue lp_remote to the queue lp3, which is running on blaze.clientsite.com:

lp-gw: printer lp_remote -host blaze.clientsite.com -printer lp3

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

prompt

Specifies the prompt the proxies use in command mode.

serverqueue Specifies the name of the remote printer queue to which proxy sends the print jobs. If server queue is not specified, the client’s queue name will be used as server queue name.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd ✓ x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

124 Netperm Table Reference Guide

Page 129: Netperm Table Reference Guide

Attribute Reference

Syntaxprompt prompt

ExampleThis example indicates that the TELNET proxy displays the prompt “Yoyodyne TELNET proxy> ”:

tn-gw: prompt “Yoyodyne TELNET proxy> ”

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

proxy

Specifies proxy permissions.

prompt Specifies a string that the proxy displays in command mode. Quotes are not required, but are recommended for strings that include spaces.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 125

Page 130: Netperm Table Reference Guide

Attribute Reference

Syntax{permit | deny}-proxy proxy-list

ExamplesThis example allows the FTP and HTTP proxies to run:

policy-restrictive: permit-proxy ftp-gw http-gw

This example allows a plug proxy configured for webster traffic to run:

policy-restrictive: permit-proxy webster

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

permit Indicates proxies that this policy allows to run.

Deny Indicates hosts that this policy does not allow to run. Including a deny-proxy rule has the same effect as not including those proxies in a permit-proxy rule.

proxy-list Specifies the name of the proxy. This name must match the name specified in /etc/rc.local or on the command line to start the proxy. If the proxy was started using a -as flag, use that name here.

126 Netperm Table Reference Guide

Page 131: Netperm Table Reference Guide

Attribute Reference

quarantine-dir

Specifies the directory in which the smapd server places messages that fail the content scan. If you are using a content scanning engine to quarantine mail, you must specify this attribute.

Syntaxquarantine-dir directory

ExampleThis example indicates that the smapd server places files that fail the content scan into the /var/mail/quarantine directory:

smapd: quarantine-dir /var/mail/quarantine

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

directory Specifies the directory in which the smapd server places messages that fail the content scan. Do not include a trailing slash (/) character. Ensure that this directory has the same owner and permission as the mail spool directory (as set by the directory attribute) that the smapd server uses.

Netperm Table Reference Guide 127

Page 132: Netperm Table Reference Guide

Attribute Reference

RealAudio

Specifies the bind-port on which the RealAudio proxy listens for requests.

SyntaxRealAudio bind-port

ExampleThis example indicates that the RealAudio proxy listens for requests on bind-port 7070:

mmp: RealAudio 7070

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw ✓ mmp radm ssl-gw

bind-port Specifies the bind-port on which the RealAudio proxy listens for requests. Specify by bind-port number or by bind-port name as specified in /etc/services.

128 Netperm Table Reference Guide

Page 133: Netperm Table Reference Guide

Attribute Reference

relay_connected_timer

Specifies the amount of time that each relay or connection can be connected before the proxy disconnects. If you do not use this attribute, the SQL*Net proxy does not enforce a time limit on connections; connections have an unlimited length.

Syntaxrelay_connected_timer minutes

ExampleThis example indicates that the SQL*Net proxy allows connections to last up to 60 minutes minutes before disconnecting:

sql-gw: relay_connected_timer 60

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

minutes Specifies the number of minutes that the connection is active before disconnecting.

Netperm Table Reference Guide 129

Page 134: Netperm Table Reference Guide

Attribute Reference

relay-reply (smap only)

Controls the type of response the smap proxy makes back to the connected SMTP server.

Syntaxrelay-reply {550 | 250}

ExampleThis example indicates to explicity reject and notify the connected server:

smap: relay-reply 550

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

550 Explicitly reject and notify the connected server. Each recipient from an invalid domain is rejected with: 550 Mailbox unavailable: This site may not be used as a relay agent. This is a permanent error code; it avoids automatic retries from the sending system.

250 Acknowledge acceptance of the message but drop it at the firewall. Recipient receives: 250 Requested mail action okay, completed.

130 Netperm Table Reference Guide

Page 135: Netperm Table Reference Guide

Attribute Reference

cal

e

relay_statistics

Specifies whether or not the proxy generates statisics for each connection:

• Time since connected

• Number of bytes in/out

• Number of packets in/out for each connection.

If you do not use this attribute, the SQL*Net proxy does not keep track of statistiinformation for each connection.

Syntaxrelay_statistics {yes | no}

ExampleThis example indicates that the SQL*Net proxy logs time since connected and thnumber of packets and bytes passed between client and server:

sql-gw: relay_statistics yes

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 131

Page 136: Netperm Table Reference Guide

Attribute Reference

require-source

Specifies whether or not users of the X11 proxy, when starting the X11 proxy, must specify the name of the host from which they are connecting.

If you do not use this attribute, users do not need to specify the name of the host when starting the X11 proxy.

Syntaxrequire-source { on | off }

ExampleThis example indicates that users of the X11 proxy must specify the name of the host when starting the X11 proxy.

x-gw: require-source on

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd ✓ x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

132 Netperm Table Reference Guide

Page 137: Netperm Table Reference Guide

Attribute Reference

de

securidhost

Specifies the name of the firewall that is registered as the client host name on the ACE/Server. Because the firewall may have different host names, this allows you to specify which host name to use.

Syntaxsecuridhost firewall

ExampleThis example indicates the SecurID server communicates with the firewall’s insiinterface as fire-in.yoyodyne.com:

authsrv: securidhost fire-in.yoyodyne.com

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

firewall Specifies the name of the firewall that is registered as the client host name on the ACE/Server. Specify an individual machine. Use an IP addresses or host name.

Netperm Table Reference Guide 133

Page 138: Netperm Table Reference Guide

Attribute Reference

send-broken-post-requests

Specifies whether or not the HTTP proxy sends a carriage return/line feed after the data to the HTTP server when sending a POST request. Some designers of Web pages have ignored the HTTP specifications when creating their forms. These forms always expect to receive a carriage return/line feed after the data.

If you do not use this attribute, the HTTP proxy follows the HTTP specifications and does not send a carriage return/ line feed after sending the data to an HTTP server.

Syntaxsend-broken-post-requests { on | off }

ExampleThis example indicates that the HTTP proxy does not follow the HTTP specifications and sends a carriage return / line feed after sending data:

http-gw: send-broken-post-requets on

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw

mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

134 Netperm Table Reference Guide

Page 139: Netperm Table Reference Guide

Attribute Reference

sendmail

Specifies an alternate path for sendmail or another mail delivery program you are using to deliver your mail inside your perimeter.

Syntaxsendmail program

ExampleThis example indicates that the smapd server uses the sendmail executable in /usr/sbin/sendmail:

smapd: sendmail /usr/sbin/sendmail

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

program Specifies an alternate path for the sendmail executable or other program you are using to deliver mail.

Netperm Table Reference Guide 135

Page 140: Netperm Table Reference Guide

Attribute Reference

server

Specifies a server for which the proxy handles client/server connections.

Syntaxserver service -port remote-port [-host remote-host] [-hostport port] [-timeout minutes] [-nookay]

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

server service Specifies a symbolic name for the service. Must be unique. Used by the proxy to create the menu of available services.

-port remote-port Specifies the port on the remote host to which the circuit proxy connects. Specify by service name or port number.

-host remote-host Specifies the name of the remote host to which the circuit proxy connects. Specify an individual machines. Use IP addresses or host names. This option is required if you are not using transparency.

-hostport port Specifies the port on which the proxy connects on the remote host.

-timeout minutes Specifies the number of minutes the client/ server connection is idle before disconnecting for this service

-nookay Specifies that the proxy does not prompt the user to confirm before listening on the service port for a connection.

136 Netperm Table Reference Guide

Page 141: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the circuit proxy provides service for an Oracle server on the host db.clientsite.com:

ck-gw: server oracle -host db.clientsite.com -port oracle

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

shellfile

Specifies the name of the file in which the login shell finds information about users and their actual shells.

Syntaxshellfile file

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw ✓ login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

file Specifies the name of the file that contains a list of users and their actual shells

Netperm Table Reference Guide 137

Page 142: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the login shell program looks in the /usr/local/etc/login-shellfile file for information about users and their shells

login-sh: shellfile /usr/local/etc/login-shellfile

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

show_tns_info

Specifies whether or not the SQL*Net proxy places Oracle TNS (Transparent Network Substrate) layer information into the log. If you do not use this attribute, the SQL*Net proxy does not log TNS information. If you use this attribute, the proxy creates a log file named sql-gw.log in the directory specified by the directory attribute.

The database administrator can use TNS layer information to help debug Oracle connections.

Syntaxshow_tns_info {yes | no}

ExampleThis example indicates that the SQL*Net proxy logs TNS information:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

138 Netperm Table Reference Guide

Page 143: Netperm Table Reference Guide

Attribute Reference

sql-gw: show_tns_info yes

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

sid

Specifies client, server, and database access rules. This is a required attribute.

Syntax{permit | deny}-sid client server SID

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

permit Indicates that the rule explicitly permits access from this client to this server and database.

Deny Indicates that the rule explicitly denies access from this client to this server and database.

Client Specifies single hosts, entire networks, or subnets. Specify by IP address, IP address and netmask, or host name. The wildcard * is valid in host names.

Server Specifies single hosts, entire networks, or subnets. Specify by IP address, IP address and netmask, or host name. The wildcard * is valid in host names.

Netperm Table Reference Guide 139

Page 144: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that the firewall permits access for all clients on the trusted network (10.0.1.*) to the database with a SID name of production on the database server 204.255.16.16:

sql-gw: permit-sid 10.0.1.* 204.255.16.16 production

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

snmp-manager

Specifies the IP address of the SNMP manager to which the SNMP agent on the firewall sends traps. If you do not use this attribute, the SNMP agent on the firewall does not send traps.

SID Specifies the database identifier on the server that you wish to permit/deny access. The wildcard * is valid in a SID name

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp ✓ snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

140 Netperm Table Reference Guide

Page 145: Netperm Table Reference Guide

Attribute Reference

Syntaxsnmp-manager host

ExampleThis example indicates that the SNMP agent on the firewall sends traps to the SNMP manager running on the host 10.0.1.58:

snmpd: snmp-manager 10.0.1.58

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

spam-reply (smap only)

Controls the type of response the smap proxy makes back to the connected SMTP server when nuisance mail is detected.

host Specifies the SNMP manager to which the SNMP agent on the firewall sends traps. Specify by IP address.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 141

Page 146: Netperm Table Reference Guide

Attribute Reference

Syntaxspam-reply {554 | 250}

ExampleThis example indicates to explicity reject and notify the connected server:

smap: relay-reply 550

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

554 Explicitly reject and notify the connected server. When a spammer is detected the reply to MAIL FROM is: 554 Transaction failed. This is a permanent error code; it avoids automatic retries from the sending system.

250 Acknowledge acceptance of the message but drop it at the firewall. Sender receives: 250 Requested mail action okay, complete.

142 Netperm Table Reference Guide

Page 147: Netperm Table Reference Guide

Attribute Reference

c.,

oup

system-contact

Specifies the information that the SNMP agent supplies as the contact when the network manager sends a request for the system.sysContact MIB-II variable. Use this attribute to provide information about the department to contact about the firewall. If you do not use this attribute, the firewall uses “Trusted Information Systems, In+1 888 FIREWALL.”

Syntaxsystem-contact contact

ExampleThis example indicates that the SNMP agent sends the information “Systems Gr301-555-7135)” when queried:

snmpd: system-contact “Systems Group 301-555-7135”

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp ✓ snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

contact Specifies the information the SNMP agent supplies as the contact to the SNMP manager. If you use spaces in the contact, use quotes around the information.

Netperm Table Reference Guide 143

Page 148: Netperm Table Reference Guide

Attribute Reference

hird

system-location

Specifies the information that the SNMP agent supplies about the location when the network manager sends a request for the system.sysLocation MIB-II variable. Use this attribute to provide information about the location of the firewall. If you do not use this attribute, the firewall sends “unknown.”

Syntaxsystem-location location

ExampleThis example indicates that the SNMP agent sends the information “Rockville: TFloor: Room 409)” when queried:

snmpd: system-location “Rockville: Third Floor: Room 468”

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp ✓ snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

location Specifies the information the SNMP agent supplies as the location to the SNMP manager. If you use spaces in the location, use quotes around the information.

144 Netperm Table Reference Guide

Page 149: Netperm Table Reference Guide

Attribute Reference

system-name

Specifies the information that the SNMP agent supplies about the name of the agent when the network manager sends a request for the system.sysName MIB-II variable. Use this attribute to provide information about the host name of the firewall. If you do not use this attribute, the firewall sends its fully qualified domain name.

Syntaxsystem-name name

ExampleThis example indicates that the SNMP agent sends the information fire-in.yoyodyne.com when sending queried:

snmpd: system-name “fire-in.yoyodyne.com”

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp ✓ snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

name Specifies the information the SNMP agent supplies as the location to the SNMP manager. Specify by host name or IP address. If you use spaces in the name, use quotes around this information.

Netperm Table Reference Guide 145

Page 150: Netperm Table Reference Guide

Attribute Reference

tempdir

Specifies the directory in which the Authenticating HTTP proxy places its temporary files.

Syntaxtempdir directory

ExampleThis example indicates the Authenticating HTTP directory places temporary files in the /usr/tmp directory:

ahttp-gw: tempdir /usr/tmp

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

✓ ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

directory Specifies the directory in which the Authenticating HTTP proxy places its temporary files.

146 Netperm Table Reference Guide

Page 151: Netperm Table Reference Guide

Attribute Reference

timeout

Specifies the amount of time the proxy is idle (with no network activity) before disconnecting. To disable the timeout feature for a proxy, do not set the timeout value to zero. Instead, set the timeout attribute to a large value, such as 10 years (315,360,000 seconds).

Syntaxtimeout seconds

ExampleThis example indicates that the trusted policy allows 1800 seconds (30 minutes) of idle time before the proxies disconnect:

policy-trusted: timeout 1800

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw ✓ gopher-gw ✓ mssql-gw ✓ RealAudio ✓ strmwrks-gw

✓ aol-gw ✓ gui ✓ netacl ✓ rlogin-gw ✓ syb-gw

alerts ✓ http-gw netconfig ✓ rsh-gw ✓ tn-gw

authenIP ✓ info-gw ✓ NetShow ✓ smap ✓ VDOLive

authsrv ✓ ldap-gw ✓ nntp-gw ✓ smapd ✓ whois

ck-gw ✓ lnotes-gw pcxdpp ✓ snmpd ✓ x-gw

✓ cserve-gw login-sh ✓ plug-gw ✓ snmp-gw ✓ policy-policy

✓ finger ✓ lp-gw ✓ pop3-gw sql-gw

✓ ftp-gw ✓ mmp radm ✓ ssl-gw

seconds Specifies the number of seconds the proxy is idle before disconnecting.

Netperm Table Reference Guide 147

Page 152: Netperm Table Reference Guide

Attribute Reference

tmp-directory

Specifies the directory in which the smapd server creates temporary files during content scanning. If you do not use this attibute, the smapd server places temporary files in the /tmp directory.

Syntaxtmp-directory directory

ExampleThis example indicates that the smapd server creates temporary files in the /var/tmp/smapd directory:

smapd: tmp-directory /var/tmp/smapd

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

directory Specifies the directory in which the smapd server creates temporary files during content scanning. Do not include a trailing slash (/) character. Ensure that this directory has the same owner and permission as the mail spool directory (as set by the directory attribute) that smapd server uses.

148 Netperm Table Reference Guide

Page 153: Netperm Table Reference Guide

Attribute Reference

tns_tracing

Specifies whether or not the SQL*Net proxy creates TNS trace files. If you do not use this attribute, the SQL*Net proxy does not create TNS trace files.

The TNS trace file is a very detailed log of all events and low level TNS connections between client and server. The SQL*Net proxy places the TNS trace file (named sql-gw.trc) in the directory specified by the directory attribute.

TNS trace files can be hundreds of megabytes. Ensure that you have plenty of disk space before enabling this attribute. This option is applied to the entire SQL*Net proxy process and should only be used as a brief debugging tool for tracing Oracle TNS layer activities. Make sure you do not accidentally leave an SQL*Net proxy process in the background with this attribute active or you may quickly run out of disk space.

Syntaxtns_tracing {yes | no}

ExampleThis example indicates that the SQL*Net proxy creates TNS tracing files:

sql-gw: tns_tracing yes

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

Netperm Table Reference Guide 149

Page 154: Netperm Table Reference Guide

Attribute Reference

transparency

Specifies that the firewall uses inbound to outbound transparency. Used to create the packet screening rule in the forward ruleset that absorbs packets from inside addresses to outside addresses for handling by the appropriate proxy or service.

Syntaxtransparency {-on | - off}

ExampleThis example indicates that inbound to outbound transparency is on:

netconfig: transparency -on

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw ✓ netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

-on Specifies that inbound to outbound transparency is on.

-off Specifies that inbound to outbound transparency is off.

150 Netperm Table Reference Guide

Page 155: Netperm Table Reference Guide

Attribute Reference

unknown

Specifies a list of additional names that the authentication server checks (in addition to the authentication database) when checking for extended permissions on a per user basis.

If the user name is not in the authentication database, or in the list of names, the authentication server logs the attempt and indicates that the user is not valid. If the user name is found in the list of names, the authentication server assigns the user name to the group “unknown.”

Syntaxpermit-unknown names

ExampleThis example indicates that the authentication server considers scooter, hikita, and penny to be valid user names when it checks for extended permissions:

authsrv: permit-unknown scooter hikita penny

Gauntlet Firewall ManagerYou cannot set this attribute through the Gauntlet Firewall Manager.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

✓ authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

names Specifies a list of names, separated by spaces. The wildcard * is valid.

Netperm Table Reference Guide 151

Page 156: Netperm Table Reference Guide

Attribute Reference

url

Lets you specify that certain URLs be denied to your users. If a user attempts to access a denied URL, they receive a message indicating that access to this URL is denied. You can use this feature to deny access to any URL whether or not you are using Cyber Patrol. If you are using Cyber Patrol, these denied sites are in addition to the sites denied by Cyber Patrol. You can also allow access to URLs that would otherwise be blocked by Cyber Patrol.

NOTE: Any URL you permit or deny access to takes precedence over Cyber Patrol settings.

Use this attribute as part of a policy, rather than for the proxy itself.

See also the cyber_masks, feature, and work_time attributes.

Syntaxpolicy-http-gw_Trusted: {permit | deny}-url url

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

url An entire URL or a substring of a URL:

• .jpg matches all URLs with .jpg somewhere in the URL• yoyodyne.com matches all URLs with yoyodyne.com in the

URL• ftp:// matches all URLs with ftp:// in the URL

152 Netperm Table Reference Guide

Page 157: Netperm Table Reference Guide

Attribute Reference

ExampleThis example indicates that you want your users to be able to access any URL in the yoyodyne.com domain, even if Cyber Patrol has it blocked:

policy-http-gw_Trusted: permit-url yoyodyne.com

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

url-filter

Specifies characters that you want to deny in a URL.

Syntaxurl-filter filterlist

ExampleThis example indicates that you do not want to see the carriage return/line feed characters in any URLs:

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

urlfilter Specifies an xurl-encoded string of characters that you want to deny in a URL. Consult the HTML RFC or other HTML specification documents for lists of xurl-encoded characters.

Netperm Table Reference Guide 153

Page 158: Netperm Table Reference Guide

Attribute Reference

uest as a

nous

http-gw: url-filter %0D%0A

Gauntlet Firewall ManagerServices, HTTP tab, Add or Modify, URL Filtering

use_async_call

Specifies whether or not the SQL*Net proxy uses the Oracle Asynchronous Call feature. If you do not use this attribute, the SQL*Net proxy uses the Asynchronous Call feature. Asynchronous call allows server to “answer” a client's connection reqon a separate connection. This option is required when the server is configured multi-threaded server.

Syntaxuse_async_call {yes | no}

ExampleThis example indicates that the SQL*Net proxy does not use the Oracle AsynchroCall feature:

sql-gw: use_async_call no

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw ✓ sql-gw

ftp-gw mmp radm ssl-gw

154 Netperm Table Reference Guide

Page 159: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

userid

Specifies the user ID the proxy uses when running. This option is equivalent to the -user command in previous versions.

Syntaxuserid user

ExampleThis example indicates that the smap and smapd processes run as the uucp:

smap, smapd: userid uucp

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

✓ ahttp-gw ✓ gopher-gw mssql-gw RealAudio ✓ strmwrks-gw

aol-gw gui ✓ netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow ✓ smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw ✓ snmp-gw ✓ policy-policy

✓ finger ✓ lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

user Specifies the user as either a name or numeric id from the /etc/passwd file.

Netperm Table Reference Guide 155

Page 160: Netperm Table Reference Guide

Attribute Reference

user-servers

Specifies the servers a particular user can access. Also specifies which services a particular users sees when they use the circuit proxy menu.

Syntaxuser-servers { user user | group group } [-deny] service

ExampleThis example indicates that group grads can use the accounting service:

ck-gw: user-servers group grads accounting

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

user user Specifies the name of a user who can access a particular service.

group group Specifies the name of a group who can access a particular service.

-deny Specifies that the user can use all services except those explicitly denied.

Service Specifies the names of particular services. It must match the name of a service specified through a server attribute.

156 Netperm Table Reference Guide

Page 161: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

user-timeout

Specifies the amount of time the proxy is idle with no active client connections before disconnecting.

Syntaxuser-timeout minutes

ExampleThis example indicates that the proxy waits 10 minutes without an active client connection before disconnecting:

ck-gw: user-timeout 10

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

minutes Specifies the number of minutes the proxy is active with no client connections before disconnecting.

Netperm Table Reference Guide 157

Page 162: Netperm Table Reference Guide

Attribute Reference

VDOLive

Specifies the bind-port on which the VDOLive proxy listens for requests.

SyntaxVDOLive bind-port

ExampleThis example indicates that the VDOLive proxy listens for requests on bind-port 7000:

mmp: VDOLive 7000

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw ✓ mmp radm ssl-gw

bind-port Specifies the bind-port on which the VDOLive proxy listens for requests. Specify by bind-port number or by bind-port name as specified in /etc/services.

158 Netperm Table Reference Guide

Page 163: Netperm Table Reference Guide

Attribute Reference

virtual-net

Specifies how the DPP daemon tells the firewall to add rules to the kernel to implement transparency. If you do not use the virtual-net attribute, the firewall adds rules for each trusted host. If you use the virtual-net attribute, the DPP daemon tells the firewall to create rules for each virtual network that you specify. Using the virtual-net attribute, the DPP daemon no longer tells the firewall to create rules for a host if the host is part of the specified virtual network.

This attribute is optional.

Syntaxvirtual-net virtualnetworks [-trusted]

ExampleThis example indicates that the DPP daemon tells the firewall to create one set of rules for the whole 10.0.10.* network, a trusted network:

pcxdpp: virtual-net 10.0.10.0:255.255.255.0 -trusted

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw ✓ pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

virtualnetworks Specifies virtual networks. Specify by IP address and netmask of the virtual network.

-trusted Specifies that the DPP daemon tells the firewall to create rules that indicate the virtual network is a trusted network.

Netperm Table Reference Guide 159

Page 164: Netperm Table Reference Guide

Attribute Reference

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

wakeup

Specifies the amount of time that the smapd server sleeps between scans of the spool directory for undelivered mail. If no value is specified, smapd uses a default value of 30 seconds.

Syntaxwakeup seconds

ExampleThis example indicates that the smapd server sleeps for 120 seconds between scans:

smapd: wakeup 120

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw ✓ smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

seconds Specifies the number of seconds that the smapd server sleeps between scans of the spool directory.

160 Netperm Table Reference Guide

Page 165: Netperm Table Reference Guide

Attribute Reference

welcome-msg

Specifies the file that the proxy displays as a welcome banner upon successful connection to the proxy.

Syntaxwelcome-msg file

ExampleThis example displays the file /usr/local/etc/tn-welcome.txt when a user successfully connects to the TELNET proxy:

tn-gw: welcome-msg /usr/local/etc/tn-welcome.txt

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

✓ ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

✓ ftp-gw mmp radm ssl-gw

file Specifies the name of the file the proxy as a welcome banner upon successful connection to the proxy. If no file is specified, the proxy generates a default message.

Netperm Table Reference Guide 161

Page 166: Netperm Table Reference Guide

Attribute Reference

work_time

Lets you establish work (and leisure) time hours for the Cyber Patrol filtering software from The Learning Company, Inc., which lets you block access to objectionable material.

This attribute has no effect unless Cyber Patrol is active. Refer to the Gauntlet Firewall User’s Guide for more information about Cyber Patrol.

NOTE: Leisure time hours are all hours outside of the defined work time hours.

See also the cyber_masks, feature, and url attributes.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl rlogin-gw syb-gw

alerts ✓ http-gw netconfig rsh-gw tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

162 Netperm Table Reference Guide

Page 167: Netperm Table Reference Guide

Attribute Reference

Syntaxwork_time day_mask start_time end_time

ExampleThis example indicates that work time hours are 8 a.m. to midnight Monday through Friday:

http-gw: work_time 3E 800 0000

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

day_mask The bitmask of the day of the week or a range of days, from 00 to 7F. The bitmasks for the days of the week are:

• Sunday—0x01• Monday—0x02• Tuesday—0x04• Wednesday—0x08• Thursday—0x10• Friday—0x20• Saturday—0x40

To determine the bitmask for a range of days, use the Calculator application that comes with Windows 95 or NT—click the Start button, select Programs, then Accessories, and finally Calculator. When Calculator displays, pull down the View menu and select Scientific. When the Scientific calculator displays, click the Hex radio button to select it. To determine the bitmask for Monday through Friday, for example, enter 02 (for Monday), click OR, then enter 04 (for Tuesday), click OR again, and continue through 20 (for Friday) and click OR a final time. The result, 3E, is the bitmask for Monday through Friday.

start_time The time of the day when work_time begins, using the twenty-four-hour system (sometimes called “military time”). For example, 0800 is 8 a.m. and 1700 is 5 p.m.

end_time The time of the day when work_time ends, using the twenty-four-hour system.

Netperm Table Reference Guide 163

Page 168: Netperm Table Reference Guide

Attribute Reference

xforwarder

Specifies the location of the executable to which the TELNET and Rlogin proxies pass requests for the X proxy. Generally specifies the location of the X proxy.

Syntaxxforwarder program

ExampleThis example indicates that the TELNET and Rlogin proxies use the standard X proxy for requests from the inside network:

policy-trusted: xforwarder /usr/local/etc/x-gw

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

program Specifies the location of the executable to which the TELNET and Rlogin proxies pass requests for the X proxy.

164 Netperm Table Reference Guide

Page 169: Netperm Table Reference Guide

Attribute Reference

xgateway

Specifies X11 proxy permissions.

Syntax{permit | deny}-xgateway *

ExampleThis example allows the hosts on the inside network to start the X11 proxy:

policy-trusted: permit-xgateway *

Gauntlet Firewall ManagerTo set this attribute through the Gauntlet Firewall Manager, consult the Gauntlet Firewall User’s Guide.

ahttp-gw gopher-gw mssql-gw RealAudio strmwrks-gw

aol-gw gui netacl ✓ rlogin-gw syb-gw

alerts http-gw netconfig rsh-gw ✓ tn-gw

authenIP info-gw NetShow smap VDOLive

authsrv ldap-gw nntp-gw smapd whois

ck-gw lnotes-gw pcxdpp snmpd x-gw

cserve-gw login-sh plug-gw snmp-gw ✓ policy-policy

finger lp-gw pop3-gw sql-gw

ftp-gw mmp radm ssl-gw

permit Indicates that the TELNET and Rlogin proxies can accept requests to start the X11 proxy.

deny Indicates that the TELNET and Rlogin proxies do not accept requests to start the X11 proxy.

* Provided for future extensibility.

Netperm Table Reference Guide 165

Page 170: Netperm Table Reference Guide

Attribute Reference

166 Netperm Table Reference Guide

Page 171: Netperm Table Reference Guide

55Keyword Reference

This chapter lists each keyword and the attributes it can use. For more information about a specific attribute, refer to its description in Chapter 4, Netperm Table Attribute Reference.

ahttp-gw• authserver

• backend

• bind-address

• accept-count

• authenticate

• authserver

• destination

• groupid

• maxsessions

• password-timeout

• tempdir

aol-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

Netperm Table Reference Guide 167

Page 172: Netperm Table Reference Guide

Keyword Reference

• timeout

alerts• enable

authenIP• forward

• local

authsrv• accept-count

• authserver

• badsleep

• bind-address

• child-limit

• database

• dssagent

• dsshost

• dsskey

• dssport

• hosts

• maxbad

• nobogus

• operation

• securidhost

• unknown

ck-gw• authenticate

• authserver

168 Netperm Table Reference Guide

Page 173: Netperm Table Reference Guide

Keyword Reference

• circuitexec

• circuitsperuser

• circuit-timeout

• connect-timeout

• denial-msg

• destination

• directory

• extended-permissions

• groupid

• help-msg

• hosts

• password change

• prompt

• server

• userid

• user-servers

• user-timeout

• welcome-msg

cserve-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

Netperm Table Reference Guide 169

Page 174: Netperm Table Reference Guide

Keyword Reference

• port

• timeout

finger• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

• timeout

ftp-gw• accept-count

• authenticate

• authserver

• bind-address

• block

• child-limit

• contentscan-msg

• content-ftpchk

• cvp-handling

• cvp-server

• data-port

• denial-msg

• denydest-msg

170 Netperm Table Reference Guide

Page 175: Netperm Table Reference Guide

Keyword Reference

• destination

• directory

• extended-permissions

• functions

• groupid

• handoff

• help-msg

• hosts

• log

• logging

• timeout

• userid

• welcome-msg

gopher-gw• accept-count

• bind-address

• child-limit

• destination

• directory

• forward

• groupid

• hosts

• timeout

• userid

gui• admin-user

• destination

Netperm Table Reference Guide 171

Page 176: Netperm Table Reference Guide

Keyword Reference

• directory

• hosts

• keepalive-timeout

• ourname

• timeout

http-gw• accept-count

• anon-user

• authenticate

• backend

• bind-address

• child-limit

• cvp-handling

• cvp-server

• denydest-msg

• destination

• directory

• feature

• forward

• function

• groupid

• handoff

• header

• hosts

• log

• logging

• ourname

172 Netperm Table Reference Guide

Page 177: Netperm Table Reference Guide

Keyword Reference

• ports

• send-broken-post-requests

• timeout

• url-filter

• userid

info-gw• accept-count

• bind-inside

• child-limit

• destination

• directory

• hosts

• logging

• timeout

ldap-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

• timeout

lnotes-gw• accept-count

Netperm Table Reference Guide 173

Page 178: Netperm Table Reference Guide

Keyword Reference

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

• timeout

login-sh• authserver

• bind-address

• shellfile

lp-gw• accept-count

• bind-inside

• child-limit

• client

• destination

• directory

• groupid

• hosts

• log

• printer

• timeout

• userid

174 Netperm Table Reference Guide

Page 179: Netperm Table Reference Guide

Keyword Reference

mmp• check-server-ip

• directory

• hosts

• NetShow

• RealAudio

• timeout

• VDOLive

mssql-gw• accept-count

• bind-inside

• child-limit

• destination

• directory

• hosts

• port

• timeout

netacl• child-limit

• destination

• directory

• groupid

• exec

• timeout

• userid

Netperm Table Reference Guide 175

Page 180: Netperm Table Reference Guide

Keyword Reference

netconfig• bind-inside

• if-inside

• if-outside

• transparency

NetShow• check-server-ip

• destination

• directory

• hosts

• timeout

nntp-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

• timeout

pcxdpp• authenticate

• database

• hosts

176 Netperm Table Reference Guide

Page 181: Netperm Table Reference Guide

Keyword Reference

• peer-net

• virtual-net

plug-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

• hosts

• port

• timeout

pop3-gw• accept-count

• authenticate

• authserver

• bind-address

• child-limit

• database

• destination

• directory

• groupid

• hosts

• pop-server

• timeout

• userid

Netperm Table Reference Guide 177

Page 182: Netperm Table Reference Guide

Keyword Reference

radm• hosts

RealAudio• check-server-ip

• destination

• directory

• hosts

• timeout

rlogin-gw• accept-count

• authenticate

• authserver

• bind-address

• child-limit

• denial-msg

• denydest-msg

• destination

• directory

• extended-permissions

• help-msg

• hosts

• password change

• prompt

• timeout

• welcome-msg

• xforwarder

• xgateway

178 Netperm Table Reference Guide

Page 183: Netperm Table Reference Guide

Keyword Reference

rsh-gw• bind-address

• child-limit

• destination

• directory

• extended-permissions

• force_source_address

• hosts

• timeout

• userid

smap• deny-spam

• directory

• groupid

• local-domain

• logging

• log-relay

• log-spam

• maxbytes

• maxrecip

• permit-relay

• relay-reply

• spam-reply

• timeout

• userid

smapd• badadmin

Netperm Table Reference Guide 179

Page 184: Netperm Table Reference Guide

Keyword Reference

• baddir

• cvp-handling

• cvp-server

• directory

• groupid

• maxbytes

• quarantine-dir

• sendmail

• timeout

• tmp-directory

• userid

• wakeup

snmpd• hosts

• snmp-manager

• system-contact

• system-name

• system-location

• timeout

snmp-gw• agent

• child-limit

• destination

• groupid

• directory

• manager

• timeout

180 Netperm Table Reference Guide

Page 185: Netperm Table Reference Guide

Keyword Reference

• userid

sql-gw• answer_error_countdown

• answer_timeout

• authentication_level

• directory

• event_timer

• groupid

• host

• log_level

• maximum_connect_data

• maximum_relays

• oracle_log

• relay_connected_timer

• relay_statistics

• show_tns_info

• sid

• tns_tracing

• use_async_call

ssl-gw• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

• force_source_address

Netperm Table Reference Guide 181

Page 186: Netperm Table Reference Guide

Keyword Reference

• hosts

• port

• timeout

strmwrks-gw• hosts

• destination

• directory

• groupid

• userid

• timeout

syb-gw• accept-count

• bind-inside

• child-limit

• destination

• directory

• hosts

• port

• timeout

tn-gw• accept-count

• authenticate

• authserver

• bind-address

• child-limit

• denial-msg

• denydest-msg

182 Netperm Table Reference Guide

Page 187: Netperm Table Reference Guide

Keyword Reference

• destination

• directory

• extended-permissions

• groupid

• help-msg

• hosts

• password change

• ports

• prompt

• timeout

• userid

• welcome-msg

• xforwarder

• xgateway

VDOLive• check-server-ip

• destination

• directory

• hosts

• timeout

whois• accept-count

• bind-address

• buffer-size

• child-limit

• destination

• directory

Netperm Table Reference Guide 183

Page 188: Netperm Table Reference Guide

Keyword Reference

• force_source_address

• hosts

• port

• timeout

x-gw• directory

• display

• hosts

• prompt

• require-source

• timeout

184 Netperm Table Reference Guide