User`s guide

Table Of Contents
Setting Up Pipeline Security
Connection security
Pipeline User’s Guide Preliminary January 30, 1998 7-11
5
Close and save the profile.
Connection security
Connection security has two levels: caller authentication regulating authorized
access, and network security preventing unauthorized wide-area network access.
All authentication relies on the Pipeline finding a matching profile to verify
information presented by the caller.
Authentication mechanisms
Password authentication, such as PAP, CHAP, or MS-CHAP, requires a
name and password from the caller. Additionally, CHAP encrypts the
password data.
Calling-line ID (CLID) authentication verifies that the call is coming
from the expected phone number.
Called number (Called #) is similar to authentication by CLID, but it
authenticates on the number called into rather than the number
originating the call. In the Connection profile, the Called # parameter is
almost identical to the Dial # parameter, but uses a number without a
trunk group or dialing prefix prepended.
Callback authentication instructs the Pipeline to hang up and call back
before performing password authentication. Callback provides the
highest level of control, assuring that incoming calls are coming from a
known user or network.
Note:
Any form of authentication requires a configured profile. See
“Requiring profiles for incoming connections” on page 7-7 for details
on configuring the Pipeline to always require a matching profile,
regardless of whether authentication is enforced.
Network security
Filters are one of the most effective methods of protecting your site from
unwanted WAN access. Filters are described briefly in this chapter; see
Chapter 6, “Defining Filters and Firewalls,” for full details.