User`s guide

Table Of Contents
Contents
x Preliminary January 30, 1998 Pipeline User’s Guide
Defining IP filter conditions ............................................................... 6-10
Example filters ........................................................................................... 6-12
An example generic filter to handle AppleTalk broadcasts ............... 6-12
An example IP filter to prevent address spoofing .............................. 6-16
An example IP filter for more complex security issues ..................... 6-19
Working with predefined call filters .......................................................... 6-21
NetWare Call filter ............................................................................. 6-21
Extending the predefined filter for RIP packets ........................... 6-23
Defining a SNEP data filter for Ethernet ..................................... 6-24
IP Call filter ........................................................................................ 6-26
AppleTalk Call filter .......................................................................... 6-26
Display unwanted dial-out packets ............................................................ 6-28
When packets are not captured ........................................................... 6-28
Turning on the diagnostic option ....................................................... 6-29
Displaying packets ............................................................................. 6-29
Secure Access Firewalls ............................................................................ 6-34
Determining if Secure Access is present ............................................ 6-34
Firewall profiles ................................................................................. 6-34
Assigning firewalls to a Connection profile ....................................... 6-35
Assigning firewalls to the Mod Config profile .................................. 6-35
Filter persistence ........................................................................................ 6-36
Background on firewall and filter persistence .................................... 6-36
Filter persistence and Connection profiles ......................................... 6-37
Setting Up Pipeline Security .................................... 7-1
Recommended security measures ................................................................ 7-1
Changing the Full Access security level password .............................. 7-3
Activating the Full Access security level ............................................. 7-4
Making the Default security level restrictive ....................................... 7-4
Assigning a Telnet password ................................................................ 7-5
Changing the SNMP read and write community string ....................... 7-5
Requiring profiles for incoming connections ....................................... 7-7
Turning off ICMP redirects .................................................................. 7-7
Pipeline Security profiles ............................................................................ 7-7
Default security level ........................................................................... 7-8
Security profile passwords ................................................................... 7-8
Security privileges ................................................................................ 7-8
Using the Full Access profile ......................................................... 7-9
Defining a second Security profile ............................................... 7-10