
13-12 User’s Reference Guide
option in the answer profile, PAP or CHAP in connection profiles, callback, and general awareness of how your network may be vulnerable.
An approach to using filters
The ultimate goal of network security is to prevent unauthorized access to the network without compromising authorized access. Using filter sets is part of reaching that goal.
Each filter set you design will be based on one of the following approaches:
■That which is not expressly prohibited is permitted.
■That which is not expressly permitted is prohibited.
It is strongly recommended that you take the latter, and safer, approach to all of your filter set designs.
Working with IP filters and filter sets
This section covers IP filters and filter sets. For working with IPX filters and filter sets, see “IPX filters” on page
Main
Menu
System
Configuration
Filter Sets
To work with filters and filter sets, begin by accessing the filter set screens.
Note: Make sure you understand how filters work before attempting to use them. Read the section “About filters and filter sets,” beginning on page
Filter Sets
Add Filter Set...
Display/Change Filter Set...
Delete Filter Set...
Return/Enter to modify an existing Filter Set.
Set Up IP Filter Sets (Firewalls) from this and the following Menus.