Netopia 4542 Benutzerhandbuch
Security 11-1
C
C
C
Ch
h
h
haa
a
ap
p
p
pttttee
e
errrr 11111111
S
S
S
See
e
eccccu
u
u
urrrriiiittttyyy
y
The Netopia 4541/4542 provides a number of security features to help protect its configuration screens and
your local network from unauthorized access. Although these features are optional, it is strongly recommended
that you use them.
your local network from unauthorized access. Although these features are optional, it is strongly recommended
that you use them.
This section covers the following topics:
■
■
■
■
■
■
Suggested security measures
In addition to setting up user accounts, Telnet access, and filters (all of which are covered later in this chapter),
there are other actions you can take to make the Netopia 4541/4542 and your network more secure:
there are other actions you can take to make the Netopia 4541/4542 and your network more secure:
■
Change the SNMP community strings (or passwords). The default community strings are universal and
could easily be known to a potential intruder.
could easily be known to a potential intruder.
■
Set the answer profile so it must match incoming calls to a connection profile.
■
Leave the Enable Dial-in Console Access option set to No.
■
When using AURP, accept connections only from configured par tners.
■
Configure the Netopia 4541/4542 through the serial console por t to ensure that your communications
cannot be intercepted.
cannot be intercepted.
User accounts
When you first set up and configure the Netopia 4541/4542, no passwords are required to access the
configuration screens. Anyone could tamper with the router’s configuration by simply connecting it to a console.
configuration screens. Anyone could tamper with the router’s configuration by simply connecting it to a console.
However, by adding user accounts, you can protect the most sensitive screens from unauthorized access. User
accounts are composed of name/password combinations that can be given to authorized users.
accounts are composed of name/password combinations that can be given to authorized users.
Caution!
You are strongly encouraged to add protection to the configuration screens. Unprotected screens could allow an
unauthorized user to compromise the operation of your entire network.
unauthorized user to compromise the operation of your entire network.