About This Guide
How to use this guide
This supplement is intended for the person setting up security on the MAX. It explains how to set up different kinds of security options using the MAX configuration interface, and contains the following chapters:
- Chapter 1, Getting Started: Basic Security Measures, details recommended changes to default security settings to protect the MAX from unauthorized access.
- Chapter 2, Setting Up Security Profiles, describes security levels for the MAX and explains the privileges you can set in Security profiles.
- Chapter 3, Setting Up User Authentication, explains how to identify and permit access to users dialing in over both analog and digital lines.
- Chapter 4, Defining Static Filters, details how to set up data filters and call filters.
- Chapter 5, Setting Up Security-Card Authentication, describes how the MAX supports dynamic password challenges sent from an external authentication server at a secure site.
- Chapter 6, Setting Up User Authorization, describes how to limit user access to network devices, resources, and services.
This supplement also contains an index.
What this guide does not contain
This supplement does not describe how to set up security in RADIUS, how to use the Access Control product, or how to set up the MAX to work with firewalls and the Secure Access product. Further, it does not discuss general network security issues or provide guidelines about the extent to which you should protect your network and local hosts. For pointers to information about these products and topics, consult the following publications:
What you should know
You should read this supplement if you will be setting up security in the MAX. This supplement does not discuss general network security issues, or provide guidelines for protecting your network and local hosts. To use this book effectively, however, you should be familiar with network security. For background information about security, we recommend the following publication, which is available in bookstores:
Firewalls and Internet Security, William R. Cheswick and Steven M. Bellovin
RADIUS and other external servers offer additional methods for handling security. For more information about RADIUS, see the RADIUS Configuration Guide.
Ascend's Access Control is a software program that provides authentication, authorization, and accounting services for users who request network connections. For more information about Access Control, see the Access Control User's Guide, available from Ascend.
Documentation conventions
This section explains all the special characters and typographical conventions in this manual.
Convention
|
Meaning
|
---|
Monospace text
|
Represents text that appears on your computer's screen, or that could appear on your computer's screen.
|
Boldface mono-space text
|
Represents characters that you enter exactly as shown (unless the characters are also in italics-see Italics, below). If you could enter the characters, but are not specifically instructed to, they do not appear in boldface.
|
Italics
|
Represent variable information. Do not enter the words themselves in the command. Enter the information they represent. In ordinary text, italics are used for titles of publications, for some terms that would otherwise be in quotation marks, and to show emphasis.
|
[ ]
|
Square brackets indicate an optional argument you might add to a command. To include such an argument, type only the information inside the brackets. Do not type the brackets unless they appear in bold type.
|
|
|
Separates command choices that are mutually exclusive.
|
>
|
Points to the next level in the path to a parameter. The parameter that follows the angle bracket is one of the options that appears when you select the parameter that precedes the angle bracket.
|
Key1-Key2
|
Represents a combination keystroke. To enter a combination keystroke, press the first key and hold it down while you press one or more other keys. Release all the keys at the same time. (For example, Ctrl-H means hold down the Control key and press the H key.)
|
Press Enter
|
Means press the Enter, or Return, key or its equivalent on your computer.
|
Note:
|
Introduces important additional information.
|
Caution:
|
Warns that a failure to follow the recommended procedure could result in loss of data or damage to equipment.
|
Warning:
|
Warns that a failure to take appropriate safety precautions could result in physical injury.
|
Manual set
The MAX 6000 Series Documentation Set consists of the following manuals:
- Security Supplement (this guide)
- Getting Started
- ISP and Telecommuting Configuration Guide
- MIF Supplement
- RADIUS Configuration Guide
- Reference Guide
techpubs@eng.ascend.com
Copyright © 1998, Ascend Communications, Inc. All rights
reserved.