User`s guide

Table Of Contents
Setting Up Pipeline Security
Pipeline Security profiles
Pipeline User’s Guide Preliminary January 30, 1998 7-7
Requiring profiles for incoming connections
There are many authentication measures you can set for incoming connections.
At the most basic level, you can configure the Pipeline to reject all incoming calls
that don’t have a Connection profile.
To require configured profiles for all incoming connections:
1
Open the Ethernet > Answer profile.
2
Specify that a matching profile is required for incoming calls.
For example:
Profile Reqd=Yes
3
Close and save the profile.
(For more information about securing incoming connections, see “Connection
security” on page 7-11.)
Turning off ICMP redirects
Internet Control Message Protocol (ICMP) was designed to dynamically find the
most efficient IP route to a destination. ICMP Redirect packets are one of the
oldest route discovery methods on the Internet and one of the least secure. It is
possible to create counterfeit ICMP Redirects and change the way a device routes
packets. If the Pipeline is routing IP, you should turn off ICMP redirects.
To configure the Pipeline to ignore ICMP redirect packets, do the following:
1
Open the Ethernet > Mod Config profile.
2
Turn off ICMP redirects.
For example:
ICMP Redirects=Ignore
3
Close and save the profile.
Pipeline Security profiles
When the Pipeline is shipped from the factory, its security privileges are open to
enable you to configure and set it up without any restrictions. (For recommended