This SunScreen 3.1 Lite Installation Guide provides all information necessary to install the SunScreen firewall from the Solaris 8 Easy Access CD-ROM onto your network.
This guide is intended for SunScreen system administrators responsible for the operation, support, and maintenance of network security. It is assumed that you are familiar with UNIX system administration and TCP/IP networking concepts, and with your network topology.
The SunScreen 3.1 Lite Installation Guide is organized into the following chapters:
Chapter 1, "Installation Overview," introduces SunScreen concepts including product architecture, hardware, operating system, and browser requirements.
Chapter 2, "Installation Considerations," covers choosing the level of security for SunScreen, and preparing for installation with either local or remote administration.
Chapter 3, "Installing Lite With Local Administration," contains instructions for installing SunScreen in routing mode with local administration.
Chapter 4, "Installing Lite With Remote Administration," contains instructions for remotely installing SunScreen using self-generated or issued certificates.
Chapter 5, "Removing SunScreen," explains how to remove the SunScreen 3.1 Lite software.
Appendix A, "Command Line Installation," shows examples of using the command line to install SunScreen 3.1 Lite in routing mode with remote administration or in stealth mode.
Appendix B, "Upgrading Cryptography Modules," explains how to add additional cryptography modules to your SKIP configuration.
Fatbrain.com, an Internet professional bookstore, stocks select product documentation from Sun Microsystems, Inc.
For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
If you require technical support, contact your Sun sales representative or Sun Authorized Reseller. See http://sun.com/service/contacting/index.html for information on contacting Sun and http://internet.central.sun.com/service/support/index.html for information on Sun's support Services.
The following table describes the typographic changes used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 | The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 | What you type, contrasted with on-screen computer output |
machine_name% su Password: |
AaBbCc123 | Command-line placeholder: replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P-2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name# |
Bourne shell and Korn shell prompt | $ |
Bourne shell and Korn shell superuser prompt | # |
The following books may be useful or interesting when installing the SunScreen:
Applied Cryptography Bruce Schneier, John Wiley & Sons, 1996, 2nd edition, ISBN 0-471-12845-7
Building Internet Firewalls D. Brent Chapman and Elizabeth D. Zwicky O'Reilly &Associates, 1995, ISBN 1-56592-124-0
Computer Security Policies and SunScreen Firewalls Kathryn M. Walker and Linda Croswhite Cavanaugh Sun Microsystems Press, 1998, ISSBN 0-13-096015-0
Firewalls and Internet Security Bill Cheswick and Steve Bellovin Addison-Wesley, 1994, ISBN 0-201-63357-4
Handbook of Computer-Communications Standards Volume 3: The TCP/IP Protocol Suite William Stallings, Macmillan, 1990
Internetworking with TCP/IP, Volume 1 Douglas E. Comer, Prentice Hall, 1995, ISBN 0-13-216987-8
Network and Internetwork Security Principles and Practice William Stallings, Prentice Hall, 1995, ISBN 0-02-415483-0
Practical UNIX and Internet Security Simson Garfinkel and Gene Spafford, O'Reilly & Associates, 1996, 2nd edition, ISBN 1-56592-148-8
TCP/IP Illustrated, Volume 1 The Protocols W. Richard Stevens, Addison-Wesley, 1994, ISBN 0-201-63346-9
TCP/IP Network Administration Craig Hunt, O'Reilly & Associates, 1992
Network Security Charlie Kaufman, Radia Perlman, and Mike Speciner Prentice Hall, 1995
SKIP IP-Level Cryptography [http://skip.incog.com/] Sun Software and Networking Security [http://www.sun.com/security]