6 • Security
Model 3201 G.SHDSL Integrated Access Device User Guide
86
Introduction
Introduction
Security provides the ability to setup and enforce security policies. The policies define the types of traffic per-
mitted to pass through a gateway, either inbound, outbound, or both, and from which origins the traffic may
be allowed to enter.
Within the security configuration is a stateful firewall. A stateful firewall utilizes a security mechanism to main-
tain information concerning the packets it receives. This information is used for deciding dynamically whether
or not a packet may pass through.
Port filters are rules that determine how a packet should be handled. The rules define the protocol type, the
range of source and destination port numbers and an indication whether the packet is allowed or not.
Security triggers are used with applications that require and create separate sessions. The most common exam-
ple is FTP. An FTP client establishes a connection to a server using port 21, but data transfers are done on a
separate connection or port. The port number, and who makes the connection, can vary depending on the
FTP client. To allow FTP to work without triggers, you would need to set up port filters allowing the correct
port numbers through. This is a significant security risk.
This risk can be avoided by using security triggers. Triggers tell the security mechanism to expect these second-
ary sessions and how to handle them. Rather than allowing a range of port numbers, triggers handle the situa-
tion dynamically, opening the secondary sessions only when appropriate. The triggers work without needing to
understand the application protocol or reading the payload of the packet, although this does happen when
using NAT.
Triggering allows you to set up a trigger for different application protocols that use multiple sessions. The tim-
eout between sessions and whether or not session chaining are allowed are configurable. Session chaining is not
needed for FTP but is for NetMeeting.
See Chapter 7, “NAT (Network Address Translation)” on page 95.
Configuring the router
The configuration of security assumes that the 3201/Router modem already has a valid IP address for the
Ethernet port so that the user may access the modem via the web page. If the IP address is still the factory
default, go to the section in Chapter 3 entitled IP Address Quick Start Modification.
In this example the WAN transport between the two 3201/Router modems will be IPoA.
1. Click on
WAN Connections
under Configuration on the 3201’s Menu.
2. Click on
Create a New Service
.
3. Select
IPoA Routed
and click on the
Configure
button.
4. For this example, enter
IPoA Security Firewall
in the Description field.
5. VPI remains at 0. Change VCI to be 100.
6. Click on
WAN IP address
and enter 192.168.101.1 in the adjacent box. The default IP mask is
255.255.255.0.
7. Click on
Apply
.
Содержание DIAMONDLINK 3201
Страница 12: ...About this guide Model 3201 G SHDSL Integrated Access Device User Guide 10...
Страница 19: ...17 Chapter 2 Product Overview Chapter contents Product Overview 18 Applications Overview 18...
Страница 22: ...2 Product Overview Model 3201 G SHDSL Integrated Access Device User Guide 20 Product Overview...
Страница 86: ...5 Specialized Configurations Model 3201 G SHDSL Integrated Access Device User Guide 84 IP Configurations...
Страница 96: ...6 Security Model 3201 G SHDSL Integrated Access Device User Guide 94 Intrusion Detection System IDS...
Страница 101: ...99 Chapter 8 Monitoring Status Chapter contents Status LEDs 100...
Страница 103: ...101 Chapter 9 Diagnostics Chapter contents Ping 96 Software Upgrades 96 Configuration 96 Procedure 96...
Страница 106: ...9 Diagnostics Model 3201 G SHDSL Integrated Access Device User Guide 104 Software Upgrades...
Страница 117: ...115 Appendix B Cable Recommendations Chapter contents DSL Cable 106 Ethernet Cable 106 Adapter 106...