User`s guide
Table Of Contents
- Ascend Customer Service
- How to use this guide
- What you should know
- Documentation conventions
- How to use the on-board software
- Manual set
- Configuring WAN Connections
- Configuring IP Routing
- Introduction to IP routing on the Pipeline
- Managing the routing table
- Parameters that affect the routing table
- Static and dynamic routes
- Configuring static routes
- Specifying default routes on a per-user basis
- Enabling the Pipeline to use dynamic routing
- Route preferences
- Viewing the routing table
- Fields in the routing table
- Removing down routes to a host
- Identifying Temporary routes in the routing table
- Configuring IP routing connections
- Ascend Tunnel Management Protocol (ATMP)
- IP Address Management
- Connecting to a local IP network
- BOOTP Relay
- DHCP services
- Dial-in user DNS server assignments
- Local DNS host address table
- Network Address Translation (NAT) for a LAN
- Configuring IPX Routing
- How the Pipeline performs IPX routing
- Adding the Pipeline to the local IPX network
- Working with the RIP and SAP tables
- Configuring IPX routing connections
- Configuring the Pipeline as a Bridge
- Defining Filters and Firewalls
- Setting Up Pipeline Security
- Pipeline System Administration
- Pipeline 75 Voice Features
- IDSL Implementations
- APP Server utility
- About the APP Server utility
- APP Server installation and setup
- Configuring the Pipeline to use the APP server
- Using App Server with Axent SecureNet
- Creating banner text for the password prompt
- Installing and using the UNIX APP Server
- Installing and using the APP Server utility for DO...
- Installing and using the APP Server utility for Wi...
- Installing APP Server on a Macintosh
- Troubleshooting
- Upgrading system software
- What you need to upgrade system software
- Displaying the software load name
- The upgrade procedure
- Untitled

Contents
x Preliminary January 30, 1998 Pipeline User’s Guide
Defining IP filter conditions ............................................................... 6-10
Example filters ........................................................................................... 6-12
An example generic filter to handle AppleTalk broadcasts ............... 6-12
An example IP filter to prevent address spoofing .............................. 6-16
An example IP filter for more complex security issues ..................... 6-19
Working with predefined call filters .......................................................... 6-21
NetWare Call filter ............................................................................. 6-21
Extending the predefined filter for RIP packets ........................... 6-23
Defining a SNEP data filter for Ethernet ..................................... 6-24
IP Call filter ........................................................................................ 6-26
AppleTalk Call filter .......................................................................... 6-26
Display unwanted dial-out packets ............................................................ 6-28
When packets are not captured ........................................................... 6-28
Turning on the diagnostic option ....................................................... 6-29
Displaying packets ............................................................................. 6-29
Secure Access Firewalls ............................................................................ 6-34
Determining if Secure Access is present ............................................ 6-34
Firewall profiles ................................................................................. 6-34
Assigning firewalls to a Connection profile ....................................... 6-35
Assigning firewalls to the Mod Config profile .................................. 6-35
Filter persistence ........................................................................................ 6-36
Background on firewall and filter persistence .................................... 6-36
Filter persistence and Connection profiles ......................................... 6-37
Setting Up Pipeline Security .................................... 7-1
Recommended security measures ................................................................ 7-1
Changing the Full Access security level password .............................. 7-3
Activating the Full Access security level ............................................. 7-4
Making the Default security level restrictive ....................................... 7-4
Assigning a Telnet password ................................................................ 7-5
Changing the SNMP read and write community string ....................... 7-5
Requiring profiles for incoming connections ....................................... 7-7
Turning off ICMP redirects .................................................................. 7-7
Pipeline Security profiles ............................................................................ 7-7
Default security level ........................................................................... 7-8
Security profile passwords ................................................................... 7-8
Security privileges ................................................................................ 7-8
Using the Full Access profile ......................................................... 7-9
Defining a second Security profile ............................................... 7-10