i-Planet Administration Guide

Netlet


Note -

If you change any of the parameters on this page, before you leave the page, you must click Enter to save your changes. After you have made all the changes in your editing session, you must stop and restart the web server for the changes to take effect. See the procedure "To Stop and Restart the Web Server on the i-Planet Server" in Chapter 3, Other Administrative Tasks.


This is the client program that works together with the reverse proxy server on the i-Planet gateway to allow secure access from the Internet to TCP/IP application on your intranet. You can specify which predefined application rules will be enabled as well create rules for your own TCP/IP applications that you want to access through the Netlet.

Clicking the Netlet link displays the Netlet Administration page, shown in Figure 2-11.

Figure 2-11 Netlet Administration Page

Graphic


Note -

The predefined Netlet rules work in conjunction with NetFile. For them to be active, you must enable them on this page and on the NetFile Configuration page.


The Netlet Administration page shows the predefined applications and provides a the place and the means for writing user-defined Netlet rules (up to a limit of 30).

The predefined function and rules are:

The destination system is given at runtime through the NetFile application. You must also enable the Netlet functions on the NetFile Configuration page. The defined applications are:

The i-Planet product also supports the software CarbonCopy, LapLink, RapidRemote, ReachOut, RemotelyPossible (all Microsoft Windows 95, 98, and NT remote-control products). If you want to use them, you must buy these products separately.

Table 2-5 shows the ports that are reserved for the predefined Netlet rules. Do not use these reserved ports in writing your own Netlet rules.

Table 2-5 Reserved Listen Ports for Predefined Netlet rules 

Predefined Netlet rule 

Reserved Ports 

Telnet 

30000 

GO-Joe 

10491 

Citrix 

1494 

pcANYWHERE 

4631, 5632 

CarbonCopy 

1138 

LapLink 

51547 

RapidRemote 

45414 

ReachOut 

43188 

RemotelyPossible 

799 

loopback [loopback is an internal Netlet rule that is used for internal functions.]

8000 

loopback is required because of the Java security model. Applets are only allowed to make connections back to the server from which they were loaded. In order to make the included client applets work with the Netlet, they must appear to be downloaded from server localhost. This is accomplished by telling the Netlet to fetch the desired applet. Traffic requests on the loopback port are requests to the Netlet to go back to the i-Planet server and download the object whose path is given in the URL.

The syntax for defining these applications is: name^client-listen-port^destination-host^destination port, in which:

For example, the following procedure shows how to write a Netlet rule that will allow telnet traffic to a specific system.

To Write a Netlet for Special Telnet Handling
  1. Write a Netlet rule for special handling of Telnet in one of the fields for writing user-defined Netlet rules, as follows:


    telnetspecial^23^machine-on-the intranet^23
    

  2. Click the Enter button at the bottom of the page to save this Netlet rule.

    This Netlet allows Telnet traffic from any remote machine and directs it to machine-on-the-intranet. Any normal Telnet traffic on port 23 (the destination Telnet port) to the machine on which the netlet is running will be redirected to machine-on-the-intranet. You can specify different names or port numbers, depending on your requirements. You must not have any other handler for port 23 for this to work (that is, no Telnet service/daemon specified).

  3. As root on the i-Planet server, stop and restart the web server so that the Netlet rule you just defined will take effect.

    See the procedure "To Stop and Restart the Web Server on the i-Planet Server" in Chapter 3, Other Administrative Tasks.


    Note -

    If you monitor incoming or outgoing traffic through your firewall, you will see that all Netlet traffic on the outside actually passes on your SSL port (likely 443). The TCP protocols used by the Netlet rules are tunnelled through your SSL port.