vi User’s Reference Guide
SNMP traps ..................................................... 14-14
Chapter 15 — Security ...........................................................15-1
Suggested security measures....................................... 15-1
User accounts ............................................................. 15-2
Dial-in Console Access................................................. 15-3
Enable SmartStart/SmartView/Web Server................... 15-4
Telnet access .............................................................. 15-4
About filters and filter sets ........................................... 15-4
What’s a filter and what’s a filter set?.................. 15-4
How filter sets work............................................ 15-5
How individual filters work................................... 15-7
Design guidelines............................................. 15-11
Working with IP filters and filter sets............................ 15-12
Adding a filter set............................................. 15-13
Viewing filter sets............................................. 15-17
Modifying filter sets.......................................... 15-18
Deleting a filter set........................................... 15-18
A sample IP filter set ........................................ 15-18
IPX filters .................................................................. 15-22
IPX packet filters .............................................. 15-23
IPX packet filter sets ........................................ 15-24
IPX SAP filters.................................................. 15-26
IPX SAP filter sets ............................................ 15-28
Firewall tutorial.......................................................... 15-30
General Firewall Terms ..................................... 15-30
Basic IP Packet Components............................. 15-30
Basic Protocol Types ........................................ 15-30
Firewall design rules......................................... 15-31
Filter Basics..................................................... 15-33
Example Filters ................................................ 15-34
Token Security Authentication ..................................... 15-37
Securing network environments......................... 15-37