Security 13-1
CC
CC
hh
hh
aa
aa
pp
pp
tt
tt
ee
ee
rr
rr
11
11
33
33
SS
SS
ee
ee
cc
cc
uu
uu
rr
rr
ii
ii
tt
tt
yy
yy
The Netopia R5000 Series Router provides a number of security features to help protect its configuration
screens and your local network from unauthorized access. Although these features are optional, it is strongly
recommended that you use them.
This section covers the following topics:
■ “Suggested security measures” on page 13-1
■ “User accounts” on page 13-1
■ “Dial-in console access” on page 13-3
■ “Enable SmartStart/SmartView/Web server” on page 13-4
■ “Telnet access” on page 13-4
■ “About filters and filter sets” on page 13-4
■ “Working with IP filters and filter sets” on page 13-12
■ “IPX filters” on page 13-23.
■ “Firewall tutorial” on page 13-31
SS
SS
uu
uu
gg
gg
gg
gg
ee
ee
ss
ss
tt
tt
ee
ee
dd
dd
ss
ss
ee
ee
cc
cc
uu
uu
rr
rr
ii
ii
tt
tt
yy
yy
mm
mm
ee
ee
aa
aa
ss
ss
uu
uu
rr
rr
ee
ee
ss
ss
In addition to setting up user accounts, Telnet access, and filters (all of which are covered later in this chapter),
there are other actions you can take to make the Netopia R5000 Series Router and your network more secure:
■ Change the SNMP community strings (or passwords). The default community strings are universal and
could easily be known to a potential intruder.
■ Set the answer profile so it must match incoming calls to a connection profile.
■ Leave the Enable Dial-in Console Access option set to No.
■ When using AURP, accept connections only from configured partners.
■ Configure the Netopia R5000 Series Router through the serial console port to ensure that your
communications cannot be intercepted.
UU
UU
ss
ss
ee
ee
rr
rr
aa
aa
cc
cc
cc
cc
oo
oo
uu
uu
nn
nn
tt
tt
ss
ss
When you first set up and configure the Netopia R5000 Series Router, no passwords are required to access the
configuration screens. Anyone could tamper with the router’s configuration by simply connecting it to a console.
However, by adding user accounts, you can protect the most sensitive screens from unauthorized access. User
accounts are composed of name/password combinations that can be given to authorized users.