Security
7-19
to go through many checkpoints.
■
Too much reliance on packet filters can cause too little reliance
on other security methods. Filter sets are
not a substitute for
password protection, effective safeguarding of passwords, caller
ID, the “must match” option in the answer profile, PAP or CHAP in
connection profiles, callback, and general awareness of how your
network may be vulnerable.
An approach to using filters
The ultimate goal of network security is to prevent unauthorized
access to the network without compromising authorized access. Using
filter sets is par t of reaching that goal.
Each filter set you design will be based on one of the following
approaches:
■
That which is not expressly prohibited is permitted.
■
That which is not expressly permitted is prohibited.
It is strongly recommended that you take the latter, and safer,
approach to all of your filter set designs.
Working with IP filters and filter sets
This section covers IP filters and filter sets. For working with IPX filters
and filter sets, see
“IPX filters,” beginning on page 5-11
.
To work with filters and filter sets, begin by accessing the filter set
screens.
Note:
Make sure you understand how filters work before attempting
to use them. Read the section
“About filters and filter sets,” beginning
on page 7-9
.
Main
Menu
Advanced
Config.
Filter
Sets
IP
Содержание 430 S/T
Страница 1: ...Netopia ISDN Router Reference Guide F on arall Farallon Communications Inc...
Страница 133: ...6 20 Netopia ISDN Router Reference Guide...
Страница 173: ...8 8 Netopia ISDN Router Reference Guide...
Страница 192: ...Monitoring Tools 9 19...
Страница 193: ...9 20 Netopia ISDN Router Reference Guide...
Страница 255: ...F 2 Netopia ISDN Router Reference Guide...
Страница 276: ......