User`s guide

Table Of Contents
Setting Up Pipeline Security
Using security cards
Pipeline User’s Guide Preliminary January 30, 1998 7-17
Filters can also be used to prevent remote users from accessing information on
your local network, even if they know how to “spoof” a local source address that
would enable them to get past a filter. For example, you can define a filter that
drops inbound packets whose source address is on the local network or the
loopback address.
Each filter consists of an ordered list of conditions (“rules”) based on either IP-
specific or protocol-independent information. For an IP filter, you can filter
packets based on any combination of the following elements:
Source address
Destination address
Protocol number
Source port
Destination port
A flag indicating if a TCP session is established
For a protocol-independent filter, you can specify data values and masks that the
Pipeline uses when determining whether to drop or forward packets.
(For information about how to organize and create Filter profiles, refer to
Chapter 6, “Defining Filters and Firewalls.”)
Using security cards
A secure network site can be set up to change its password after a number of
minutes or hours. An external authentication server such as a Security Dynamics
(ACE) or Enigma Logic (Safeword) server changes the password and relies on a
combination of a Personal ID (PIN) and a code generated by security card that
must be in the possession of the user. A liquid crystal display on the security card
shows the code that enables access to the secure network only at that time.
For secure sites the Pipeline is a client of a central-site device, such as MAX
4000, which acts as a network access server (NAS). The NAS is a client of a
RADIUS server, which in turn is a client of the ACE or Safeword server.
Figure 7-1 shows one example security card environment. The user dialing in
through a Pipeline unit is a client of the Pipeline, which in turn is a client of the