15-12 User’s Reference Guide
Disadvantages of filters
Although using filter sets can greatly enhance network security, there are disadvantages:
■Filters are complex. Combining them in filter sets introduces subtle interactions, increasing the likelihood of implementation errors.
■Enabling a large number of filters can have a negative impact on performance. Processing of packets will take longer if they have to go through many checkpoints.
■Too much reliance on packet filters can cause too little reliance on other security methods. Filter sets are not a substitute for password protection, effective safeguarding of passwords, caller ID, the “must match” option in the answer profile, PAP or CHAP in connection profiles, callback, and general awareness of how your network may be vulnerable.
An approach to using filters
The ultimate goal of network security is to prevent unauthorized access to the network without compromising authorized access. Using filter sets is part of reaching that goal.
Each filter set you design will be based on one of the following approaches:
■That which is not expressly prohibited is permitted.
■That which is not expressly permitted is prohibited.
It is strongly recommended that you take the latter, and safer, approach to all of your filter set designs.
Working with IP filters and filter sets
This section covers IP filters and filter sets. For working with IPX filters and filter sets, see “IPX filters” on page
Main
Menu
System
Configuration
Filter Sets
IP Filter Sets
To work with filters and filter sets, begin by accessing the filter set screens.
Note: Make sure you understand how filters work before attempting to use them. Read the section “About filters and filter sets,” beginning on page