Security 13-1
C
C
C
Ch
h
h
haa
a
ap
p
p
pttttee
e
errrr 11113
3
3
3
S
S
S
See
e
eccccu
u
u
urrrriiiittttyyy
y
The Netopia R7100 provides a number of security features to help protect its configuration screens and your
local network from unauthorized access. Although these features are optional, it is strongly recommended that
you use them.
This section covers the following topics:
■
“Suggested security measures” on page 13-1
■
“User accounts” on page 13-1
■
“Dial-in console access” on page 13-3
■
“Enable Smar tStar t/Smar tView/Web ser ver” on page 13-4
■
“Telnet access” on page 13-4
■
“About filters and filter sets” on page 13-4
■
“Working with IP filters and filter sets” on page 13-12
■
“IPX filters” on page 13-21
.
■
“Firewall tutorial” on page 13-29
Suggested security measures
In addition to setting up user accounts, Telnet access, and filters (all of which are covered later in this chapter),
there are other actions you can take to make the Netopia R7100 and your network more secure:
■
Change the SNMP community strings (or passwords). The default community strings are universal and
could easily be known to a potential intruder.
■
Set the answer profile so it must match incoming calls to a connection profile.
■
Leave the Enable Dial-in Console Access option set to No.
■
When using AURP, accept connections only from configured par tners.
■
Configure the Netopia R7100 through the serial console por t to ensure that your communications cannot
be intercepted.
User accounts
When you first set up and configure the Netopia R7100, no passwords are required to access the configuration
screens. Anyone could tamper with the router’s configuration by simply connecting it to a console.
However, by adding user accounts, you can protect the most sensitive screens from unauthorized access. User
accounts are composed of name/password combinations that can be given to authorized users.
Summary of Contents for R7100
Page 1: ...Netopia R7100 SDSL Router User s Reference Guide ...
Page 12: ...User s Reference Guide ...
Page 18: ...2 4 User s Reference Guide ...
Page 30: ...4 8 User s Reference Guide ...
Page 44: ...5 14 User s Reference Guide ...
Page 68: ...User s Reference Guide ...
Page 80: ...8 12 User s Reference Guide ...
Page 110: ...9 30 User s Reference Guide ...
Page 116: ...10 6 User s Reference Guide ...
Page 148: ...12 20 User s Reference Guide WAN Event History page ...
Page 150: ...12 22 User s Reference Guide ...
Page 200: ...User s Reference Guide ...
Page 206: ...A 6 User s Reference Guide ...
Page 220: ...B 14 User s Reference Guide ...
Page 234: ...E 4 User s Reference Guide ...
Page 240: ...F 6 User s Reference Guide ...
Page 250: ...8 User s Reference Guide ...
Page 256: ...Index 6 ...
Page 258: ...2 User s Reference Guide ...