13-12 User’s Reference Guide
option in the answer profile, PAP or CHAP in connection profiles, callback, and general awareness of how
your network may be vulnerable.
AA
AA
nn
nn
aa
aa
pp
pp
pp
pp
rr
rr
oo
oo
aa
aa
cc
cc
hh
hh
tt
tt
oo
oo
uu
uu
ss
ss
ii
ii
nn
nn
gg
gg
ff
ff
ii
ii
ll
ll
tt
tt
ee
ee
rr
rr
ss
ss
The ultimate goal of network security is to prevent unauthorized access to the network without compromising
authorized access. Using filter sets is part of reaching that goal.
Each filter set you design will be based on one of the following approaches:
■ That which is not expressly prohibited is permitted.
■ That which is not expressly permitted is prohibited.
It is strongly recommended that you take the latter, and safer, approach to all of your filter set designs.
WW
WW
oo
oo
rr
rr
kk
kk
ii
ii
nn
nn
gg
gg
ww
ww
ii
ii
tt
tt
hh
hh
II
II
PP
PP
ff
ff
ii
ii
ll
ll
tt
tt
ee
ee
rr
rr
ss
ss
aa
aa
nn
nn
dd
dd
ff
ff
ii
ii
ll
ll
tt
tt
ee
ee
rr
rr
ss
ss
ee
ee
tt
tt
ss
ss
This section covers IP filters and filter sets. For working with IPX filters and filter sets, see “IPX filters” on
page 13-23.
To work with filters and filter sets, begin by accessing the filter set screens.
Note: Make sure you understand how filters work before attempting to use them. Read the section “About
filters and filter sets,” beginning on page 13-4.
Main
Menu
System
Configuration
Filter
Sets
Filter Sets
Add Filter Set...
Display/Change Filter Set...
Delete Filter Set...
Return/Enter to modify an existing Filter Set.
Set Up IP Filter Sets (Firewalls) from this and the following Menus.