Chapter Six: Security

Security features 75

 

 

Security features

The following table lists all security features offered by the DIVA LAN ISDN Modem, and their default settings.

Feature

Default

Description

System password

None

Restricts access to the DIVA LAN ISDN Modem

 

 

configuration interfaces.

Automatic log out

Active

Automatically terminates idle configuration sessions.

Network address translation (NAT)

Active

NAT hides the addresses of the computers on the internal Ethernet

 

 

LAN from the external network.

Remote management

Disabled

Permits remote systems to log on to the DIVA LAN ISDN

 

 

Modem configuration interfaces (Web or CLI).

Incoming data calls

Disabled

Permits the DIVA LAN ISDN Modem to answer incoming

 

 

data calls.

Call screening

Disabled

Allows you to accept incoming data calls from specific phone

 

 

numbers only.

Call authentication

Always

Lets you validate incoming data calls, or respond to authentication

 

authenticate

requests when making outgoing data calls.

Callback

Disabled

Forces the remote site to call back to establish the connection.

Manual dialing

Disabled

Enables you to manually control when the ISDN link is

 

 

established.

Custom security using IP filters

None

Enables you to filter specific IP datagrams for security reasons.

The following table lists the security features that can be applied to restrict access to the DIVA LAN ISDN Modem configuration interfaces.

Source system

Connected via

Security features that apply

Remote computer

ISDN

System password

 

 

Automatic log out

 

 

• Remote Management

 

 

Answer incoming data calls

 

 

Call screening

 

 

Call authentication

 

 

Custom security using IP filters

Local computer

Ethernet

System password

 

 

Automatic log out

 

 

Custom security using IP filter

Local computer

Serial

System password

Telephone

Phone port

• (Only available when the ISDN is not connected.)

Page 75
Image 75
Eicon Networks DIVA LAN ISDN manual Security features, Configuration interfaces