Token security authentication, Securing network environments, E your network with securid, see – Netopia Router PN Series User Manual

Page 173: Chapter 8, “token, Security authentication, Chapter 8 token security authentication

Advertising
background image

8-1

Chapter 8

Token Security Authentication

This chapter discusses how to configure and use security
authentication on the Netopia Router.

Note: The security authentication feature only applies to Netopia
Router models connecting over a dial-up ISDN line using the
PPP-PAP-TOKEN or PPP-CACHE-TOKEN authentication protocol.

If you will not be using this feature, you can skip this chapter.

Securing network environments

Unauthorized tampering or theft of information on internal networks
causes serious ramifications, given the reliance on information
systems. Network abuse is a serious problem, complicated by the
difficulty in detecting the source of the abuses. An unauthorized
user can gain access to networks and copy information without
leaving a trace.

Password protection is one solution, but static passwords are often
insecure. They can be compromised, allowing unauthorized users
to disguise themselves as authorized users and enter supposedly
secure systems. However, a company called Security Dynamics™
has patented a security authentication technology to increase
network security.

Advertising