Limiting Connections To Specific Computer Names Or Ip Addresses - Symantec PCANYWHERE - ADMINISTRATOR GUIDE V12.1 Administrator's Manual

Hide thumbs Also See for PCANYWHERE - ADMINISTRATOR GUIDE V12.1:
Table of Contents

Advertisement

90
Managing security in Symantec pcAnywhere
Controlling access to pcAnywhere hosts

Limiting connections to specific computer names or IP addresses

Implement an authentication method.
Symantec pcAnywhere supports a number of centralized authentication types,
including Active Directory, Novell Directory Services, Novell Bindery, NT, and
RSA SecurID, giving you the flexibility of using the authentication measures
already in place on your network.
See
"Leveraging centralized authentication in pcAnywhere"
Note: RSA is currently not supported for Windows Vista because the RSA client
for Vista is unavailable.
Limit logon attempts per call.
Limiting the number of consecutive times that a remote user can attempt to
log on to the host computer helps protect against hacker and denial of service
attacks. Symantec pcAnywhere ends the connection if a remote user is not
able to log on successfully before reaching the limit.
For more information, see the Symantec pcAnywhere User's Guide.
Limit the time to complete logon.
Limiting the amount of time that a remote user has to successfully log on to
the host computer helps protect against hacker and denial of service attacks.
For more information, see the Symantec pcAnywhere User's Guide.
Prompt to confirm connections.
If you enable this option, pcAnywhere notifies the host user that someone is
attempting to connect. The host user has the option to allow or deny the
connection.
For more information, see the Symantec pcAnywhere User's Guide.
Block outside connections to a pcAnywhere host by configuring the host to accept
only the connections that fall within a specific subnet or range of TCP/IP addresses
that you specify. Remote users outside the firewall must connect through a secure
tunnel or VPN that is included in the range of addresses that you specify.
An experienced hacker might be able to circumvent this measure by spoofing or
stealing a valid IP address. For maximum security, use this feature in combination
with serialization.
on page 91.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Pcanywhere

Table of Contents