Specifications
allow activated
Pattern 80.80.60.*
3. IP Filter Configuration
No further restrictions need to be made in the “IP Filter Configuration”
tab. Only the standard access remains to be configured:
IP Filter activated Configure IP Filter rules automatically
activated Log access violation
Access allowed for: 80.80.60.0/24
In addition, a second similar role must be inserted. The only difference from
the previous rule is in the port number. Both Bind port and Connect
port are set to the value 993 for imaps.
Configuring the HTTP Proxy — External
If you are not operating your own web server, you do npt need to configure
anything here. Otherwise, make settings for the HTTP proxy in this module.
The module processes HTTP requests from the outside. The following en-
tries, shown in Figure 3.31 on the facing page, are required to configure the
HTTP proxy:
HTTP proxy port Port on which the proxy should accept HTTP requests
from the outside. The default is port 80.
Auto listen to Decide if the “listen to” parameters should be calculated
automatically or if you want to set specific IP addresses on which the
HTTP proxy accepts requests.
Listen to selected IP addresses: Specify the IP addresses of the interfaces
from which the proxy accepts HTTP requests.
Create Redirect Rule If an HTTP request arrives on the firewall, this is redi-
rected to the corresponding web page. Enter the local path in the first
field and, in the second field, the URL for the redirection.
When all settings have been made, confirm with ‘Next’.
In the following dialog (see Figure 3.32 on page 74), define who has access
to the HTTP proxy. Automatic generation of IP filter rules is activated by
default. If required, select the logging of “Access Violations”. Then choose
the IP addresses to have access to the proxy. With ‘Add’, these addresses are
applied. With ‘Finish’, complete the configuration.
72 Using the FAS










