6 • Security
Model 3086 G.SHDSL Integrated Access Device User Guide
108
Introduction
Introduction
Security provides the ability to setup and enforce security policies. The policies define the types of traffic per-
mitted to pass through a gateway, either inbound, outbound, or both, and from which origins the traffic may
be allowed to enter.
Within the security configuration is a stateful firewall. A stateful firewall utilizes a security mechanism to main-
tain information concerning the packets it receives. This information is used for deciding dynamically whether
or not a packet may pass through.
Port filters are rules that determine how a packet should be handled. The rules define the protocol type, the
range of source and destination port numbers and an indication whether the packet is allowed or not.
Security triggers are used with applications that require and create separate sessions. The most common exam-
ple is FTP. An FTP client establishes a connection to a server using port 21, but data transfers are done on a
separate connection or port. The port number, and who makes the connection, can vary depending on the
FTP client. To allow FTP to work without triggers, you would need to set up port filters allowing the correct
port numbers through. This is a significant security risk.
This risk can be avoided by using security triggers. Triggers tell the security mechanism to expect these second-
ary sessions and how to handle them. Rather than allowing a range of port numbers, triggers handle the situa-
tion dynamically, opening the secondary sessions only when appropriate. The triggers work without needing to
understand the application protocol or reading the payload of the packet, although this does happen when
using NAT.
Triggering allows you to set up a trigger for different application protocols that use multiple sessions. The tim-
eout between sessions and whether or not session chaining are allowed are configurable. Session chaining is not
needed for FTP but is for NetMeeting.
See Chapter 7, “NAT (Network Address Translation)” on page 117.
Configuring the IAD
The configuration of security assumes that the 3086/IAD already has a valid IP address for the Ethernet port so
that the user may access the modem via the web page. If the IP address is still the factory default, go to the sec-
tion in Chapter 3 entitled IP Address Quick Start Modification.
In this example the WAN transport between the two 3086/IADs will be IPoA.
1. Click on
WAN Connections
under Configuration on the 3086’s Menu.
2. Click on
Create a New Service
.
3. Select
IPoA Routed
and click on the
Configure
button.
4. For this example, enter
IPoA Security Firewall
in the Description field.
5. VPI remains at 0. Change VCI to be 100.
6. Click on
WAN IP address
and enter 192.168.101.1 in the adjacent box. The default IP mask is
255.255.255.0.
7. Click on
Apply
.
Содержание 3086
Страница 8: ...Contents Model 3086 G SHDSL Integrated Access Device User Guide 8 ...
Страница 14: ...About this guide Model 3086 G SHDSL Integrated Access Device User Guide 14 ...
Страница 101: ...101 Chapter 5 Specialized Configurations Chapter contents IP Configurations 102 Router 102 DHCP Server and Relay 102 ...
Страница 106: ...5 Specialized Configurations Model 3086 G SHDSL Integrated Access Device User Guide 106 IP Configurations ...
Страница 116: ...6 Security Model 3086 G SHDSL Integrated Access Device User Guide 116 Intrusion Detection System IDS ...
Страница 121: ...121 Chapter 8 Monitoring Status Chapter contents Status LEDs 122 ...
Страница 136: ...A Specifications Model 3086 G SHDSL Integrated Access Device User Guide 136 Power and Power Supply Specifications ...
Страница 137: ...137 Appendix B Cable Recommendations Chapter contents DSL Cable 138 Ethernet Cable 138 Adapter 138 ...