User`s guide

Table Of Contents
Pipeline User’s Guide Preliminary January 30, 1998 7-1
7
Setting Up Pipeline Security
This chapter includes the following topics:
Recommended security measures
When the Pipeline is shipped from the factory, its security features are all set to
defaults that enable you to configure and set up the Pipeline without any
restrictions. Before you make the Pipeline generally accessible, you should
change these default security settings to protect the configured unit from
unauthorized access.
You should set these important security features before putting the Pipeline
online:
Change the Full Access security level password.
A user who knows the password to the Full Access level will be able to
perform any operation on the Pipeline, including changing the configuration.
The Full Access password is set to “Ascend” by default, and you should
assign your own password. (For instructions, see “Changing the Full Access
security level password” on page 7-3.)
Recommended security measures. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-1
Pipeline Security profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-7
Connection security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-11
Using filters to secure the network. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-16
Using security cards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7-17