Managing network security – Lucent Technologies PortMaster User Manual

Page 305

Advertising
background image

Networking Concepts

A-9

Managing Network Security

The PortMaster enables you to specify an internal host table, which can be used in
addition to DNS and NIS. The host table allows each unique IP address to be aliased to a
unique name. The host table is consulted when a port set for host access prompts for the
name of the host. The table is used to identify the IP address of the requested host. If the
user-specified hostname is not found in the host table, then NIS or DNS is consulted.

Note – The internal host table should be used only when no other host mapping
facility is available. Using the host table only when necessary reduces confusion and the
amount of network maintenance required.

Managing Network Security

PortMaster products allow you to maintain network security using a variety of methods.
Security is a general term that refers to restricting access to network devices and data.
To enable security features, you must identify sensitive information, find the network
access points to the sensitive information, and secure and maintain the access points.

PortMaster security methods include

Callback for remote access users

Assignment of local passwords before connections are established

Access control filters for host connections

Inbound and outbound packet filtering

IP packet filtering by protocol, source and destination address, and port

IPX packet filtering by source and destination network, node, and socket

SAP filtering

PAP and CHAP authentication protocols for PPP connections

Password security for administrative access

Remote Authentication Dial-In User Service (RADIUS) support

ChoiceNet filtering

Advertising