User`s guide
Table Of Contents
- Ascend Customer Service
- How to use this guide
- What you should know
- Documentation conventions
- How to use the on-board software
- Manual set
- Configuring WAN Connections
- Configuring IP Routing
- Introduction to IP routing on the Pipeline
- Managing the routing table
- Parameters that affect the routing table
- Static and dynamic routes
- Configuring static routes
- Specifying default routes on a per-user basis
- Enabling the Pipeline to use dynamic routing
- Route preferences
- Viewing the routing table
- Fields in the routing table
- Removing down routes to a host
- Identifying Temporary routes in the routing table
- Configuring IP routing connections
- Ascend Tunnel Management Protocol (ATMP)
- IP Address Management
- Connecting to a local IP network
- BOOTP Relay
- DHCP services
- Dial-in user DNS server assignments
- Local DNS host address table
- Network Address Translation (NAT) for a LAN
- Configuring IPX Routing
- How the Pipeline performs IPX routing
- Adding the Pipeline to the local IPX network
- Working with the RIP and SAP tables
- Configuring IPX routing connections
- Configuring the Pipeline as a Bridge
- Defining Filters and Firewalls
- Setting Up Pipeline Security
- Pipeline System Administration
- Pipeline 75 Voice Features
- IDSL Implementations
- APP Server utility
- About the APP Server utility
- APP Server installation and setup
- Configuring the Pipeline to use the APP server
- Using App Server with Axent SecureNet
- Creating banner text for the password prompt
- Installing and using the UNIX APP Server
- Installing and using the APP Server utility for DO...
- Installing and using the APP Server utility for Wi...
- Installing APP Server on a Macintosh
- Troubleshooting
- Upgrading system software
- What you need to upgrade system software
- Displaying the software load name
- The upgrade procedure
- Untitled

Pipeline User’s Guide Preliminary January 30, 1998 7-1
7
Setting Up Pipeline Security
This chapter includes the following topics:
Recommended security measures
When the Pipeline is shipped from the factory, its security features are all set to
defaults that enable you to configure and set up the Pipeline without any
restrictions. Before you make the Pipeline generally accessible, you should
change these default security settings to protect the configured unit from
unauthorized access.
You should set these important security features before putting the Pipeline
online:
• Change the Full Access security level password.
A user who knows the password to the Full Access level will be able to
perform any operation on the Pipeline, including changing the configuration.
The Full Access password is set to “Ascend” by default, and you should
assign your own password. (For instructions, see “Changing the Full Access
security level password” on page 7-3.)
Recommended security measures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Pipeline Security profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Connection security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Using filters to secure the network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Using security cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17