11
D
IAL
SECURITY
This chapter contains information about:
■
Setting up Dial Security
■
Maintaining security accounts
■
What the guest user needs to do
■
Configuring dial security remotely
■
DTMF security
Overview
Dial Security is designed to protect networks and data centres from
unauthorised access.
You should be familiar with these terms before you continue:
You can configure up to 10 accounts: one administrative account for you
and nine accounts for guest users. The account profiles are stored in the
host Courier V.Everything modem’s nonvolatile random access memory
(NVRAM).
There are two forms of Dial Security; each will be explained later in this
chapter:
■
Autopass
■
Password Promptin
Local
The device that is directly connected to the computer
you are using.
Remote
The device at the other end of a telephone connection.
Host
The Courier V.Everything mode
that will be accessed
and controlled by other devices.
Guest
The device that will access and control the host Courier
V.Everything modem.
Summary of Contents for Courier
Page 12: ......
Page 28: ...1 14 CHAPTER 1 CONNECTING TO YOUR ISP ...
Page 36: ...3 4 CHAPTER 3 UPGRADING YOUR MODEM ...
Page 58: ...6 6 CHAPTER 6 WORKING WITH MEMORY ...
Page 64: ...8 4 CHAPTER 8 CONTROLLING EIA 232 SIGNALING ...
Page 72: ...9 8 CHAPTER 9 ACCESSING AND CONFIGURING THE COURIER V EVERYTHING MODEM REMOTELY ...
Page 80: ...10 8 CHAPTER 10 CONTROLLING DATA RATES ...
Page 96: ...12 6 CHAPTER 12 FLOW CONTROL ...
Page 108: ...13 12 CHAPTER 13 HANDSHAKING ERROR CONTROL DATA COMPRESSION AND THROUGHPUT ...
Page 112: ...14 4 CHAPTER 14 DISPLAYING QUERYING AND HELP SCREENS ...
Page 122: ...15 10 CHAPTER 15 TESTING THE CONNECTION ...
Page 142: ...17 8 CHAPTER 17 TROUBLESHOOTING ...
Page 156: ...A 14 APPENDIX A S REGISTERS ...
Page 172: ...B 16 APPENDIX B ALPHABETIC COMMAND SUMMARY ...
Page 178: ...C 6 APPENDIX C FLOW CONTROL TEMPLATE ...
Page 186: ...E 4 APPENDIX E V 25 BIS REFERENCE ...