3Com 812 Network Router User Manual


 
6-26 CHAPTER 6: MANUAL SETUP
enable command password <password> or
disable command password
where <password> is an alphanumeric string of 1 to 8 characters. The default
password is “password.”
Be sure to save your configuration after entering a new password.
After logging in to the CLI, you can exit the CLI with the command:
exit cli
To set the idle timeout period, use the command:
set command idle_timeout <timeout>
where <timeout> specifies the idle timeout period in minutes.
By default, there is no idle timeout period.
This capability is useful for system administrators or users who wish to restrict
access to the OfficeConnect Remote 812.
Care should be taken to remember the configured password. If the password is
forgotten, the unit must be sent back to 3Com support to have the feature
disabled.
Introduction The OfficeConnect Remote 812 provides an extensive set of data filtering
capabilities. For instance, filters can accept packets only from specific addresses to
provide added security, or filters can be added to reduce network traffic and
improve overall performance.
Packet filters control inter-network data transmission by accepting or rejecting the
passage of specific packets through network interfaces based on packet header
information. When data packets are received by a network interface such as an
Ethernet (LAN) or WAN port, a packet filter analyzes the packet information using
a set of rules you define. A filter then lets the packet pass through or discards it.
This chapter contains information on the filtering capabilities for your
OfficeConnect Remote 812. It is divided into the following sections:
Filtering Overview
OfficeConnect Remote 812 Filtering Capabilities
Creating Filters
Assigning Filters
Applying Filters
Managing Filters
Filtering Overview Filters can provide added security by accepting packets only from specific
addresses or they can be added to reduce network traffic and improve overall
performance. Filters can also be used to approximate spoofing when routers with
different or incompatible spoofing methods are linked over the WAN. Spoofing is
the use of a forged IP source address to circumvent a firewall.