Networking Concepts
A-9
Managing Network Security
The PortMaster enables you to specify an internal host table, which can be used in
addition to DNS and NIS. The host table allows each unique IP address to be aliased to a
unique name. The host table is consulted when a port set for host access prompts for the
name of the host. The table is used to identify the IP address of the requested host. If the
user-specified hostname is not found in the host table, then NIS or DNS is consulted.
Note –
The internal host table should be used only when no other host mapping
facility is available. Using the host table only when necessary reduces confusion and the
amount of network maintenance required.
Managing Network Security
PortMaster products allow you to maintain network security using a variety of methods.
Security
is a general term that refers to restricting access to network devices and data.
To enable security features, you must identify sensitive information, find the network
access points to the sensitive information, and secure and maintain the access points.
PortMaster security methods include
•
Callback for remote access users
•
Assignment of local passwords before connections are established
•
Access control filters for host connections
•
Inbound and outbound packet filtering
•
IP packet filtering by protocol, source and destination address, and port
•
IPX packet filtering by source and destination network, node, and socket
•
SAP filtering
•
PAP and CHAP authentication protocols for PPP connections
•
Password security for administrative access
•
Remote Authentication Dial-In User Service (RADIUS) support
•
ChoiceNet filtering
✍
Содержание PortMaster
Страница 16: ...Contents xvi Configuration Guide for PortMaster Products...
Страница 26: ...Subscribing to PortMaster Mailing Lists xxvi PortMaster Configuration Guide...
Страница 32: ...Basic Configuration Steps 1 6 PortMaster Configuration Guide...
Страница 114: ...Configuring WAN Port Settings 6 12 PortMaster Configuration Guide...
Страница 128: ...Configuring Login Users 7 14 PortMaster Configuration Guide...
Страница 158: ...Restricting User Access 9 16 PortMaster Configuration Guide...
Страница 168: ...Configuring Ports for Modem Use 10 10 PortMaster Configuration Guide...
Страница 222: ...Frame Relay Subinterfaces 13 16 PortMaster Configuration Guide...
Страница 236: ...Troubleshooting a Synchronous V 25bis Connection 14 14 PortMaster Configuration Guide...
Страница 252: ...Using ISDN for On Demand Connections 15 16 PortMaster Configuration Guide...
Страница 264: ...Using ISDN for Internet Connections 16 12 PortMaster Configuration Guide...
Страница 276: ...Configuration Steps for Dial In Access 17 12 PortMaster Configuration Guide...
Страница 286: ...Configuration Steps for Shared Device Access 18 10 PortMaster Configuration Guide...
Страница 296: ...Troubleshooting a Leased Line Connection 19 10 PortMaster Configuration Guide...
Страница 310: ...B 4 PortMaster Configuration Guide...
Страница 352: ...Command Index Command Index 6 PortMaster Configuration Guide...