Netopia PN Series Network Router User Manual


 
Contents v
G
AppleTalk Setup for Small Office models.......................... 6-7
AppleTalk Setup for Corporate models ............................. 6-9
EtherTalk Setup.................................................... 6-9
LocalTalk Setup.................................................. 6-11
AURP setup ....................................................... 6-12
Chapter 7 — Security................................................................ 7-1
Suggested security measures......................................... 7-2
User accounts ............................................................... 7-2
Telnet access ................................................................ 7-5
About filters and filter set ............................................... 7-6
What’s a filter and what’s a filter set?.................... 7-6
How filter sets work.............................................. 7-6
How individual filters work..................................... 7-9
Design guidelines............................................... 7-15
Working with IP filters and filter sets.............................. 7-16
Adding a filter set............................................... 7-17
Viewing filter sets............................................... 7-23
Modifying filter sets............................................ 7-24
Deleting a filter set............................................. 7-24
A sample IP filter set .......................................... 7-25
Chapter 8 — Token Security Authentication ................................ 8-1
Securing network environments ...................................... 8-1
Using the SecurID token card ......................................... 8-2
Personal identification number (PIN) ...................... 8-2
Key Security Authentication Features of the Netopia
Router................................................................. 8-2
Security authentication components................................ 8-3
Configuring the Netopia Router
for security authentication .............................................. 8-4
Initiating a connection call using
security authentication ................................................... 8-5