User Manual

Security Network Restrictions
11-22
In Figure 11-43, the first command prevents all incoming Telnet and Rlogin connections. The second
command permits the connections, but requires that the login password be entered before the connection is
permitted.
When Incoming None is specified, incoming SSH connections are also denied. The other parameters do not
affect incoming SSH connections.
11.6.2 Outgoing Rlogin Connections
The Set/Define Server Rlogin setting controls whether or not outgoing Rlogin connections are permitted.
By default, outgoing Rlogin is disabled; to change this setting, use the following command:
Figure 11-44: Permitting Outgoing Rlogin Connections
11.6.3 Limiting Port Access
A ports access may be set to one of the following: dynamic, local, remote, or none. Dynamic permits both
local and remote logins, local permits only local logins, and remote permits only remote logins. None
prevents all incoming and outgoing connections; the port is unusable.
To configure a ports access setting, use the Set/Define Ports Access command.
Figure 11-45: Configuring Connection Type
Note: For more information about configuring a port’s access, refer to Setting Port
Access on page 8-1.
11.6.4 Packet Filters and Firewalls
Filters enable the SCS to restrict packet traffic. Each filter specifies a particular rule, for example, only IP
packets will be permitted passage. Packets that pass the filter will be forwarded; packets that dont will be
discarded.
Filters are organized into ordered filter lists, which are referenced by name. For example, a filter named
firewall may permit forwarding of packets that match a particular IP rule, but deny passage to packets that
match a generic rule.
Note: For a complete explanation of filter rules, see Set/Define Filter on page 12-168.
Local>> DEFINE SERVER RLOGIN ENABLED
Local>> DEFINE PORT 2 ACCESS REMOTE
Local>> DEFINE PORT 2 ACCESS DYNAMIC