30Operating modes and functions

a password to gain access to a network, a computer or another device. In order to do so, a computer can, for example, go through all the possible combinations of letter and numbers until the right password is found.

As a measure of protection against such attacks, the maximum allowed number of unsuccessful attempts to Login can be set. If this limit is reached, the access will be barred for a certain length of time.

These parameters apply LANconfig and SNMP). automatically barred too.

globally to

all configuration options

(telnet,

TFTP/ELSA

If barring

is activated on one port

all other

ports are

The following entries are provided in the configuration tool ELSA LANconfig for configuring login barring in the 'Management' configuration area on the 'Security' tab or under /Setup/Config-Modulein the menu:

K'Lock configuration after' (Login-errors)

K'Lock configuration for' (Lock-minutes)

Access control via TCP/IP

Access to the internal functions of the devices through TCP/IP can be restricted using a special filter list. Internal functions in this case means Telnet or TFTP sessions to configure the ELSA LANconfig.

This table is empty by default and so access to the router can therefore be obtained by TCP/IP using Telnet or TFTP from computers with any IP address. The filter is activated when the first IP address with its associated network mask is entered and from that point on only those IP addresses contained in this initial entry will be permitted to use the internal functions. The circle of authorized users can be expanded by inputting further entries. The filter entries can describe both individual computers and whole networks.

The access list can be found in the configuration tool ELSA LANconfig in the 'TCP/IP' configuration section on the 'General' tab, or in the /Setup/TCP-IP Module/ Access List menu.

Security for your LAN

You certainly would not like any outsider to access or edit the data on your computers. A ELSA MicroLink Cable offers you various ways of restricting access from outside:

KData encryption

KData packet filtering

KIP masquerading (also known as NAT or PAT)

ELSA MicroLink Cable

Page 38
Image 38
ELSA Cable manual Security for your LAN, Access control via TCP/IP, Globally to