Paradyne 3810 Network Card User Manual


 
12-13810-A2-GB30-20 November 1996
Security
Overview 12-1. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Originate Access Security 12-2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Answer Access Security 12-2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
VF-Side Passwords 12-2. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
DTE-Side Passwords 12-3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Combination of VF-Side and DTE-Side Passwords 12-3. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security Branch 12-4. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Access Ctrl 12-5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Administrative Password 12-5. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
EditPasswdTable 12-6. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Answer Sec 12-8. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Orig Sec 12-9. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Set Admin PsWd 12-10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Reset Security 12-10. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Security Password Entry Techniques 12-11. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Answer Access Password (VF-Side and DTE-Side Entry Techniques) 12-11. . . . . . . . . . . . . . . . . . . . . . .
Originate Access Password 12-12. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Database Table Examples 12-12. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Overview
NOTE
This chapter supports the
operation of dial access security
for the COMSPHERE 3800
Series modems. This chapter is
self-supporting and can be
removed to prevent unwanted
knowledge of dial access
security operation.
Although the security functions
described in this chapter are
designed to prevent unwanted
user access to your network, the
company recognizes that no
security system is infallible.
Dial
Access Security is an optional feature that allows
you to control who has access to your COMSPHERE
3800 Series modem and ultimately your host DTE.
To take advantage of this security feature, you must
create a database of passwords which are stored in the
modem’s nonvolatile memory. COMSPHERE 3800 Series
modems can store a maximum of 20 passwords. (A
Model 381
1 with the optional Password Expansion
Feature can store up to 3000 passwords.) Each password
is assigned a series of parameters that determine the type
of security protocol applied to it. This protocol is
established in the Security branch of the Top-Level menu.
Control of security functions is established in the Security
Configuration Options group which is located in the
Configuration branch of the Top-Level menu. These areas
are described in the
Security Branch
section of this
chapter and the
Security Configuration Options
section in
Chapter 9.
The COMSPHERE 3800 Series modem uses an
outbound and inbound method of security known
respectively as Originate Access and Answer Access
security. Both methods of security require some type of
password entry whether it be included as part of an
AT command dial string or entered directly from a remote
user’s DTE.
12