Internet Express for Tru64 UNIX Version 6.8 Administration Guide (14233)

9.1.3 Modifying Access to a Wrapped Network Service...............................................................172
9.1.4 Testing TCP Security Modifications......................................................................................173
9.2 FireScreen Administration.............................................................................................................174
9.2.1 Installing FireScreen..............................................................................................................175
9.2.2 Configuring FireScreen..........................................................................................................179
9.2.2.1 Setting Command-Line Options...................................................................................180
9.2.2.2 Setting the Screening Mode...........................................................................................182
9.2.2.3 Adding a Screening Rule...............................................................................................182
9.2.2.4 Checking Syntax of Screening Rules.............................................................................184
9.2.2.5 Deleting a Screening Rule.............................................................................................184
9.2.3 Starting and Stopping FireScreen..........................................................................................185
9.2.3.1 Starting FireScreen.........................................................................................................185
9.2.3.2 Stopping FireScreen.......................................................................................................186
9.2.4 Viewing FireScreen Status.....................................................................................................187
9.2.4.1 Viewing FireScreen Screening Rules.............................................................................187
9.2.4.2 Viewing the FireScreen Log...........................................................................................187
9.2.4.3 Viewing FireScreen Statistics.........................................................................................188
9.3 Snort Intrusion Detection System .................................................................................................188
9.3.1 Configuring Snort Decoder...................................................................................................189
9.3.2 Configuring Snort Preprocessor............................................................................................189
9.3.3 Running Snort........................................................................................................................190
9.3.4 Viewing Alert Messages........................................................................................................190
9.4 FreeRADIUS Server Administration.............................................................................................190
9.4.1 Considerations While Installing FreeRADIUS......................................................................191
9.4.2 Starting and Stopping the FreeRADIUS Server....................................................................191
9.4.3 Understanding FreeRADIUS Configuration Files................................................................191
9.4.4 Viewing FreeRADIUS Log File..............................................................................................193
10 Proxy Services Administration................................................................................195
10.1 Dante SOCKS Server Administration..........................................................................................195
10.1.1 Controlling the Dante SOCKS Server..................................................................................195
10.1.2 Configuring the Dante SOCKS Server.................................................................................196
10.1.3 Accessing Dante SOCKS Information.................................................................................196
10.2 Squid Proxy/Caching Server Administration..............................................................................196
10.2.1 Configuring the Squid Proxy/Caching Server.....................................................................197
10.2.2 Reinitializing the Disk Cache..............................................................................................197
10.2.3 Managing the Squid Proxy/Caching Server........................................................................197
10.2.4 Rotating Log Files................................................................................................................198
10.2.5 Displaying Access Statistics.................................................................................................198
10.2.6 Controlling the Squid Proxy/Caching Server......................................................................199
11 LDAP Directory Server Administration....................................................................201
11.1 Understanding the LDAP Directory Schema..............................................................................201
11.2 Using the LDAP Browser............................................................................................................202
11.2.1 Installing and Running the LDAP Browser.........................................................................203
11.2.2 Managing Frequently Used Connections............................................................................203
11.2.2.1 Connecting to an LDAP Server...................................................................................203
11.2.2.2 Creating or Editing Frequently Used Connections.....................................................203
11.2.2.3 Connecting to an LDAP Server using SSL...................................................................204
11.2.2.4 Disconnecting from an LDAP Server..........................................................................205
11.2.2.5 Reconnecting to an LDAP Server................................................................................205
11.2.3 Using the Main Browsing Window ....................................................................................205
11.2.3.1 Opening a New Main Window...................................................................................206
8 Table of Contents