How can I improve security?
141
User’s Guide: Version 1.2
Access Lists
If NAT can’t be used or simply isn’t enough you can always use Access
Lists (with Allow and Deny Lists) to control the types of traffic to restrict
on a per-interface basis. Separate Access Lists can be used for IP, IPX, and
Bridging traffic. See page 111 for information on using IP access lists.
RADIUS
Many sites use a separate RADIUS server for more advanced authentica-
tion procedures. The V!CAS can be configured as a RADIUS client that
polls the RADIUS server at connection time. See page 113.
Identification of ISDN dialup X.25 partners
A special Rewriting Rule for X.25 calls can be used to verify X.25 callers.
This must be configured from the SNMP shell using the x25RouteTable
and the x25RewriteTable as follows.
If the RewritingField is set (default is 0) in the x25RouteTable, then the
X.25 route is rewritten using the respective Rule defined in the
x25RewriteTable. The special rule is this:
If the respective SrcAddress field is set to “# “ then the caller’s X.25 ad-
dress will be replaced with the ISDN Calling Party’s Number.