
893-741-B
A15-71
Using Model 5390 Security
Configuring the IP Basic Security Option (IPSO)
The Department of Defense Basic Security Option for IP identifies the U.S. classification level at
which an IP datagram is to be protected and the authorities whose protection rules apply to each
datagram, as defined in RFC 1108. The Model 5390 server partially implements this security option
by adding the IPSO classification level to packets generated by telnet or rlogin running on a Model
5390 dedicated, adaptive, or CLI port. (The CLI port can be an auto_detect or auto_adapt port
that the user has put into cli mode by pressing Return when first connected to the port.) The Model
5390 server does not add the option to locally generated system packets, such as ICMP messages
and RIP updates. Nor does the Model 5390 server check incoming packets for the presence of the
IP Security Option.
To set the IPSO for packets generated on a port:
1
Use the na utility, the superuser CLI admin command, or SNMP to set the Model 5390
parameter enable_security to Y (the default is N).
2
Use na, admin, or SNMP to set the serial line port parameter ipso_class to one of the
following values: topsecret, secret, confidential, unclassified, or none. If you specify none
(the default), the Model 5390 server does not add the option to packets.
The following sample su session causes a basic security option of secret to be included in all packets
generated by ports 1 and 2.
annex: su
Password:
annex# admin
Annex administration Remote Annex R10.1, 24 ports
admin: set port=1,2 ipso_class secret
admin: set port mode cli
admin:
NOTE:
The Model 5390 ftp daemon is compatible with all versions of
UNIX ftp. You can completely disable the Model 5390 ftp daemon by
setting ftpd in the disabled_modules parameter.
NOTE:
The ipso_class parameter is also an object in the Bay Networks
private-enterprise MIB and can be set via SNMP (for more details, see
Simple Network Management Protocol (SNMP) starting on page B2-1).
Summary of Contents for 5390
Page 28: ...893 741 B Figures xxviii ...
Page 44: ...893 741 B Preface xliv ...
Page 45: ......
Page 48: ......
Page 60: ...A1 12 893 741 B Introduction to the Model 5390 Server ...
Page 106: ...A3 18 893 741 B Configuring Ports ...
Page 142: ...A5 12 893 741 B Printers ...
Page 152: ...A6 10 893 741 B Modems ...
Page 168: ...A7 16 893 741 B Serial Line Internet Protocol SLIP ...
Page 224: ...A9 38 893 741 B Internetwork Packet Exchange IPX Protocol ...
Page 258: ...A11 12 893 741 B Dial up Networking ...
Page 289: ...893 741 B A12 31 Internet Protocol IP Routing that are possible ...
Page 506: ...A15 86 893 741 B Using Model 5390 Security ...
Page 507: ......
Page 544: ...B1 36 893 741 B Network Administration ...
Page 574: ...B2 30 893 741 B Simple Network Management Protocol SNMP ...
Page 575: ......
Page 606: ...C1 30 893 741 B na Commands ...
Page 676: ...C2 70 893 741 B Configuration Parameters ...
Page 772: ...C3 96 893 741 B Using the CLI Commands ...
Page 794: ...C5 12 893 741 B Network Protocols ...
Page 795: ......
Page 796: ... Appendix D1 Software Reference Part D Appendixes ...