Troubleshooting
Chapter 7
Configuration Security
This section discusses configuration options that restrict the configuration process.
Overview
The EtherPath uses the industry standard IP protocol. Since this is a well known standard, its security
vulnerabilities are also well known and may be exploited. Several EtherPath options are available to
enhance the inherent security of your EtherPath network. However, since network security is a moving
target and absolute security is never achievable, every network installation should be designed and
implemented with care to minimize security risks in a way that is appropriate for the application and
perceived risks.
The EtherPath may be configured with several levels of security configuration and authentication. These
restrict the ability of an unwanted user from changing the configuration of the EtherPathl. They do
not
restrict the ability of a remote device to deliver packets to the EtherPath's data port.
At the level 0, any workstation may be used to configure the EtherPath via either telnet or web browser
configuration. Level 1 restricts configuration to workstation users knowing the admin user name and
password. Either web-based or telnet configuration is allowed. Level 2 disables remote configuration using
web browser, telnet, or SNMP in any combination. Level 3 requires a user name and password for remote
configuration. Combinations of Level 2 and Level 3 are possible (ie. One may disable web browser
configuration and SNMP and require a username/password for telnet configuration. The most secure
method would be to disable all remote configuration.
The EtherPath may always be configured using the direct connected terminal method. This requires
physical access to the hardware, and pressing the configuration button while a terminal (or PC) is connected
to the serial port.
Level 0:
No specific security configuration is required. Also, any user name/password pairs that may have been
entered on the terminal configuration/telnet "Security Configuration" screen should be cleared.
Level 1:
Using any configuration method, configure Administrator Access user name and password. That user name
and password are required for configuration tasks.
Level 2:
Using telnet, direct connection, or web browser configuration, selectively enable or disable remote
configuration via Telnet, via web browser, and SNMP.
37