User Manual
Contents
vi
10: Modem Sharing................................................................................................... 10-1
10.1 Services...................................................................................................................................10-1
10.1.1 Creating a Service...................................................................................................10-1
10.1.2 Associating Ports with a Service ............................................................................10-1
10.1.3 Displaying Current Services ...................................................................................10-2
10.2 Sharing Modems .....................................................................................................................10-2
10.2.1 Configuring an IP Modem Pool Service.................................................................10-3
10.2.2 Using the COM Port Redirector .............................................................................10-3
10.2.3 Connecting to a TCP Listener Service....................................................................10-3
10.2.4 Connecting to a Serial Port .....................................................................................10-4
10.2.5 Connecting to a Service or Port ..............................................................................10-4
10.3 Examples.................................................................................................................................10-4
10.3.1 Configuring the Redirector .....................................................................................10-5
10.3.2 Configuring the PC Communications Software .....................................................10-6
11: Security ............................................................................................................... 11-1
11.1 Incoming Authentication ........................................................................................................11-1
11.1.1 Character Mode Logins ..........................................................................................11-1
11.1.2 PPP Logins..............................................................................................................11-3
11.1.3 SLIP Logins ............................................................................................................11-4
11.2 Outgoing Authentication.........................................................................................................11-4
11.2.1 Outgoing Character Mode Connections .................................................................11-5
11.2.2 Outgoing PPP Connections.....................................................................................11-5
11.2.3 Outgoing SLIP Connections ...................................................................................11-5
11.3 Dialback ..................................................................................................................................11-6
11.3.1 The Dialback Process..............................................................................................11-6
11.3.2 Dialback from Character Mode ..............................................................................11-6
11.3.3 Dialback from SLIP/PPP Mode..............................................................................11-7
11.3.4 Dialback Using CBCP ............................................................................................11-7
11.3.5 Potential Dialback Drawbacks................................................................................11-8
11.4 Database Configuration ..........................................................................................................11-8
11.4.1 Local (NVR) Database............................................................................................11-9
11.4.2 Kerberos................................................................................................................11-11
11.4.3 RADIUS................................................................................................................11-13
11.4.4 SecurID .................................................................................................................11-16
11.4.5 UNIX Password File.............................................................................................11-18
11.5 User Restrictions...................................................................................................................11-18
11.5.1 Privileged Commands...........................................................................................11-19
11.5.2 IP Address Restriction ..........................................................................................11-19
11.5.3 Controlling Use of Set PPP/SLIP Commands ......................................................11-19
11.5.4 Securing a Port......................................................................................................11-20
11.5.5 Locking a Port.......................................................................................................11-20
11.5.6 Forcing Execution of Commands .........................................................................11-20
11.5.7 Restricting Multiple Authenticated Logins...........................................................11-21
11.6 Network Restrictions ............................................................................................................11-21
11.6.1 Incoming Telnet/Rlogin Connections...................................................................11-21
11.6.2 Outgoing Rlogin Connections ..............................................................................11-22
11.6.3 Limiting Port Access ............................................................................................11-22
11.6.4 Packet Filters and Firewalls..................................................................................11-22
11.7 Event Logging.......................................................................................................................11-24
11.7.1 Setting the Destination..........................................................................................11-25
11.7.2 Logging Levels .....................................................................................................11-25