Networking Concepts
A-7
Using Naming Services and the Host Table
Using Naming Services and the Host Table
Naming services are used to associate IP addresses with hostnames. Many networks use
the Domain Name System (DNS) or the Network Information Service (NIS) for mapping
hostnames to IP addresses. Both services are used to identify and locate objects and
resources on the network. To use DNS or NIS, you must specify the IP address of the
name server during the configuration process.
The PortMaster enables you to specify an internal host table, which can be used in
addition to DNS and NIS. The host table allows each unique IP address to be aliased to a
unique name. The host table is consulted when a port set for host access prompts for the
name of the host. The table is used to identify the IP address of the requested host. If the
user-specified hostname is not found in the host table, then NIS or DNS is consulted.
Note – The internal host table should be used only when no other host mapping
facility is available. Using the host table only when necessary reduces confusion and the
amount of network maintenance required.
Managing Network Security
PortMaster products allow you to maintain network security using a variety of methods.
Security is a general term that refers to restricting access to network devices and data.
To enable security features, you must identify sensitive information, find the network
access points to the sensitive information, and secure and maintain the access points.
PortMaster security methods include
•
Callback for remote access users
•
Assignment of local passwords before connections are established
•
Access control filters for host connections
•
Inbound and outbound packet filtering
•
IP packet filtering by protocol, source and destination address, and port
•
IPX packet filtering by source and destination network, node, and socket
•
SAP filtering
•
PAP and CHAP authentication protocols for PPP connections
•
Password security for administrative access
•
Remote Authentication Dial-In User Service (RADIUS) or PortAuthority™ RADIUS
support
•
ChoiceNet filtering
Each of these security methods is described in more detail in this guide. All or some of
these security methods can be configured as you configure the system-wide parameters
and each interface. RADIUS, PortAuthority RADIUS, and ChoiceNet are described
briefly in the next sections.
PortAuthority RADIUS must be purchased separately.
✍
Summary of Contents for PortMaster 4
Page 12: ...Contents xii PortMaster Configuration Guide...
Page 24: ...Basic Configuration Steps 1 6 PortMaster 4 Configuration Guide...
Page 48: ...PortMaster Security Management 2 24 PortMaster 4 Configuration Guide...
Page 102: ...Testing Your Location Configuration 7 12 PortMaster 4 Configuration Guide...
Page 122: ...Configuring Ports for Modem Use 9 8 PortMaster 4 Configuration Guide...
Page 152: ...Performing Diagnostics 11 4 PortMaster 4 Configuration Guide...
Page 162: ...Frame Relay Subinterfaces 12 10 PortMaster 4 Configuration Guide...
Page 168: ...Troubleshooting a Leased Line Connection 13 6 PortMaster 4 Configuration Guide...
Page 182: ...Command Index Command Index 4 PortMaster 4 Configuration Guide...