Security, Suggested security measures, User accounts – Netopia R910 User Manual

Page 123: Chapter 13, “security, Chapter 13

Advertising
background image

Security 13-123

C

C

C

Ch

h

h

haa

a

ap

p

p

pttttee

e

errrr 11113

3

3

3

S

S

S

See

e

eccccu

u

u

urrrriiiittttyyy

y

The Netopia R910 provides a number of security features to help protect its configuration screens and your
local network from unauthorized access. Although these features are optional, it is strongly recommended that
you use them.

This section covers the following topics:

“Suggested security measures” on page 13-123

“User accounts” on page 13-123

“Telnet access” on page 13-125

“About filters and filter sets” on page 13-126

“Working with IP filters and filter sets” on page 13-133

“Firewall tutorial” on page 13-143

“RADIUS Client Suppor t” on page 13-151

Suggested security measures

In addition to setting up user accounts, Telnet access, and filters (all of which are covered later in this chapter),
there are other actions you can take to make the Netopia R910 and your network more secure:

Change the SNMP community strings (or passwords). The default community strings are universal and
could easily be known to a potential intruder.

Set the answer profile so it must match incoming calls to a connection profile.

Set the Enable Dial-in Console Access option to No.

When using AURP, accept connections only from configured par tners.

Configure the Netopia R910 through the serial console por t to ensure that your communications cannot be
intercepted.

User accounts

When you first set up and configure the Netopia R910, no passwords are required to access the configuration
screens. Anyone could tamper with the router’s configuration by simply connecting it to a console.

However, by adding user accounts, you can protect the most sensitive screens from unauthorized access. User
accounts are composed of name/password combinations that can be given to authorized users.

Caution!

You are strongly encouraged to add protection to the configuration screens. Unprotected screens could allow an
unauthorized user to compromise the operation of your entire network.

Advertising