Chapter 2. Netperm Table Setup

This chapter provides important information about netperm table setup. You can modify the netperm table using your favorite text editor.


Note: Be sure to make a backup copy of the original netperm table. Do not edit in the section labeled Computer Generated Area (between the #BEGIN WARNING and #END WARNING marks).

With a few exceptions, you do not need to restart the proxies for the changes to take effect. Each time the proxies start new processes, they check the last modification time of the netperm table. If the time has changed, the proxies reread the netperm table. However, there are several proxies that must be restarted when you make changes to certain attributes. Chapter 4, “Attribute Reference,” lists each attribute and notes whether restart is necessary.

This chapter contains information on the netperm table syntax in the following sections:

Precedence in Netperm Tables

Applications and proxies read the rules from the top of the table to the bottom. They use the first rule that applies for a particular attribute. If there are multiple rules in the table that could apply for an attribute, the application uses the first one it finds.

For example, a netperm table attribute contains the following rule:

smapd: userid uucp

and later in the file contains the rule:

smapd: userid mail

When smapd parses the netperm table, it uses the first rule it finds, and runs as the user uucp.

Netperm Table Format

Each line in the netperm table contains a separate configuration rule in the format:

keyword: attribute valuelist

where:

  • keyword indicates the application to which the rule applies. The wildcard (*) indicates the rule is valid for all applications and proxies. A comma-separated list of multiple keywords indicates the rules applies to all of the applications in the list. The keyword usually matches the name of the service or the value of the -as flag in the startup script.

  • attribute is a configuration parameter for the application or proxy.

  • valuelist is the value for the specific configuration parameter. Some attributes allow multiple values.

A rule must fit on a single line. The length of a line varies by operating system, but is usually around 1,024 bytes. There is no provision for continuing lines.

The keyword(s), attribute, and value list can be separated by spaces or tabs.

Comments in Netperm Tables

A hash mark (#) at the beginning of a line indicates a comment. Applications ignore any text between the hash mark at the beginning of the line and the end of the line. If the hash mark appears later in the line, applications treat the hash mark as a normal character. Applications treat the following line as a comment:

#set timeout to five minutes

Applications treat the following line as invalid syntax:

tn-gw: timeout 3000 #set timeout to five minutes


Note: Some default comments in the netperm table include information for the substitution driver. They begin with #%subs-start and end with #%subs-end. Do not delete these lines.


Netperm Table Keywords

The following table lists some common keywords for proxies and other applications. You can create your own keywords. Be sure that the keyword matches the value for the -as name flag you used when starting the proxy in a startup script

Table 2-1. Common Keywords and Associated Applications

Keyword

Application

ahttp-gw

Authenticating HTTP proxy (using the HTTP proxy)

aol-gw

America Online proxy (using the plug proxy with -as)

authenIP

IP screening configuration applications

authsrv

Authentication server

ck-gw

Circuit proxy

cserve-gw

CompuServe proxy (using the plug proxy with -as)

finger

Proxy for finger.

ftp-gw

FTP proxy

gopher-gw

Gopher proxy (using the HTTP proxy with -as)

gui

Gauntlet Firewall Manager

http-gw

HTTP proxy

info-gw

Web and Gopher server (Info proxy)

lnotes-gw

Lotus Notes proxy (using the plug proxy with -as)

login-sh

Login shell

lp-gw

Line printer proxy

mbase-gw

MediaBase proxy

mmp

Multimedia proxy

mssql-gw

Microsoft SQL proxy

netacl-fingerd

Network access control proxy running finger service

netacl-ftpd

Network access control proxy running FTP service

netacl-rlogind

Network access control proxy running rlogin service

netacl-telnetd

Network access control proxy running telnet service

netconfig

IP screening configuration applications

NetShow

NetShow proxy (using the mmp proxy)

nntp-gw

NNTP news proxy (using the plug proxy with -as)

pcxdpp

PC Extender DPP daemon

plug-gw

Plug proxy

policy-name

Policy

pop3-gw

POP3 mail proxy

radm

Remote administration scripts

RealAudio

RealAudio/RealVideo proxy (using the mmp proxy)

rlogin-gw

Rlogin proxy

rsh-gw

Remote shell proxy

smap

SMTP mail client

smapd

SMTP mail server

snmpd

SNMP network management agent

snmp-gw

SNMP network management proxy

ssl-gw

SSL proxy (using the plug proxy with -as)

strmwrks-gw

Streamworks proxy

syb-gw

Sybase proxy

tn-gw

TELNET proxy

VDOLive

VDOLive proxy (using the mmp proxy)

whois

whois proxy (using the plug proxy with -as)

x-gw

X11 proxy


Attributes in Netperm Tables

Attributes vary by proxy and application, though some attributes are common to multiple applications. Consult the reference information in Chapter 4, “Attribute Reference,” for more information on applicable attributes and values.