Netopia R910 manual Working with IP filters and filter sets, Disadvantages of filters, Security

Models: R910

1 209
Download 209 pages 33.84 Kb
Page 133
Image 133
Disadvantages of filters

Security 13-133

Discarded if all the filters are configured to pass (forward)

Discarded if the set contains a combination of pass and discard filters

Disadvantages of filters

Although using filter sets can greatly enhance network security, there are disadvantages:

Filters are complex. Combining them in filter sets introduces subtle interactions, increasing the likelihood of implementation errors.

Enabling a large number of filters can have a negative impact on performance. Processing of packets will take longer if they have to go through many checkpoints.

Too much reliance on packet filters can cause too little reliance on other security methods. Filter sets are not a substitute for password protection, effective safeguarding of passwords, caller ID, the “must match” option in the answer profile, PAP or CHAP in connection profiles, callback, and general awareness of how your network may be vulnerable.

An approach to using filters

The ultimate goal of network security is to prevent unauthorized access to the network without compromising authorized access. Using filter sets is part of reaching that goal.

Each filter set you design will be based on one of the following approaches:

That which is not expressly prohibited is permitted.

That which is not expressly permitted is prohibited.

It is strongly recommended that you take the latter, and safer, approach to all of your filter set designs.

Working with IP filters and filter sets

Main

Menu

System

Configuration

Filter Sets

IP Filter Sets

To work with filters and filter sets, begin by accessing the filter set screens.

Note: Make sure you understand how filters work before attempting to use them. Read the section “About filters and filter sets,” beginning on page 13-126.

Page 133
Image 133
Netopia R910 manual Working with IP filters and filter sets, Disadvantages of filters, An approach to using filters, Security