Chapter 14 - Security; Suggested Security Measures - Netopia R2020 User Reference Manual

Dual analog router
Table of Contents

Advertisement

C C C C h h h h a a a a p p p p t t t t e e e e r r r r 1 1 1 1 4 4 4 4
S S S S e e e e c c c c u u u u r r r r i i i i t t t t y y y y
The Netopia R2020 provides a number of security features to help protect its configuration screens and your
local network from unauthorized access. Although these features are optional, it is strongly recommended that
you use them.
This section covers the following topics:
"Suggested security measures" on page
"User accounts," beginning on page
protect the Netopia R2020's configuration screens.
"Dial-in Console Access" on page 14-3
"Telnet access" on page
Telnet protocol.
"About filters and filter sets," beginning on page
beginning on page
how to use them in sets. For information on IPX filters and filter sets, see
page
14-21.
"Firewall tutorial" on page 14-28
"Token Security Authentication" on page 14-36

Suggested security measures

In addition to setting up user accounts, Telnet access, and filters (all of which are covered later in this chapter),
there are other actions you can take to make the Netopia R2020 and your network more secure:
Change the SNMP community strings (or passwords). The default community strings are universal and
could easily be known to a potential intruder.
Set the answer profile so it must match incoming calls to a connection profile.
Use CallerID.
Leave the "Enable Dial-in Console Access" option set to No.
Where possible, insist on using PAP, CHAP, or secure authentication token card to authenticate
connections to and from connection profiles.
When using AURP, accept connections only from configured partners.
Configure the Netopia R2020 through the serial console port to ensure that your communications cannot
be intercepted.
14-2, shows you how to set up name/password combinations to
14-4, shows you how to control access to the Netopia R2020 by those using the
14-12, have information on what filters are, how they work, how to customize them, and
14-1, lists actions for blocking potential security holes.
14-4, and
"Working with IP filters and filter sets,"
Security 14-1
"IPX filters," beginning on

Advertisement

Table of Contents
loading

Table of Contents