Lantronix MPS100 EPS Reference Manual - Page 47

Controlling Incoming Sessions, IP Security Table

Page 47 highlights

Server Configuration Security 4.7.1 Controlling Incoming Sessions The Set/Define Server Incoming command allows or denies incoming LAT or Telnet connections. It can also require incoming users to enter the Server login password to log in from the network. The following commands allow LAT and Telnet users to log into the Server without having to enter a password. Figure 4-19: Allowing Unrestricted Incoming Connections Local> SET SERVER INCOMING BOTH Local> SET SERVER INCOMING NOPASSWORD For security-conscious systems, the following commands can be used to only allow authenticated logins. That is, login attempts are subject to password verification. Figure 4-20: Configuring Password for Incoming Connections Local> SET SERVER INCOMING PASSWORD Local> SET SERVER LOGIN PASSWORD "8ball" Connection Methods on page -HIDDEN explains in detail the mechanics of setting up incoming sessions. Note that users logging in from the network are much harder to trace and monitor than those on attached physical ports. Make sure your Server and network environment are reasonably secure if you allow network logins. Also, refer to Enabling Server-Wide Port Characteristics on page 4-1 for details on configuring ports for network logins. Note that you can configure the TCP/IP security table to enable or disable network connections from certain hosts-see IP Security Table on page 4-11 for more information. 4.7.2 IP Security Table The Server provides an IP Security Table as a mechanism for restricting incoming and outgoing TCP/IP sessions (including Telnet, Rlogin, SLIP, and RTEL). The security table allows the manager to enable or disable access to and from the Server based on port number as well as IP address. The IP security table does not apply to print connections via RTEL. Like other configurations, security table entries can be Set or Defined. To add an entry to the table, specify an IP address (or range), which direction(s) to restrict, and a list of affected ports. Figure 4-21: Setting Server Access Local> SET IPSECURITY 192.0.1.255 OUTGOING DISABLED PORT 4-7 In order, the command in Figure 4-21: 1 Affects addresses from 192.0.1.1 through 192.0.1.254 using the 255 "wildcard" network address segment. 2 Prevents ports 4, 5, 6, and 7 from beginning sessions to hosts with these addresses using the Outgoing Disabled keywords. 4-11

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223

Server Configuration
Security
4-
11
4.7.1
Controlling Incoming Sessions
The
Set/Define Server Incoming
command allows or denies incoming LAT or Telnet connections. It can
also require incoming users to enter the Server login password to log in from the network. The following
commands allow LAT and Telnet users to log into the Server without having to enter a password.
Figure 4-19:
Allowing Unrestricted Incoming Connections
For security-conscious systems, the following commands can be used to only allow authenticated logins.
That is, login attempts are subject to password verification.
Figure 4-20:
Configuring Password for Incoming Connections
Connection Methods
on page -HIDDEN explains in detail the mechanics of setting up incoming sessions.
Note that users logging in from the network are much harder to trace and monitor than those on attached
physical ports.
Make sure your Server and network environment are reasonably secure if you allow network logins. Also,
refer to
Enabling Server-Wide Port Characteristics
on page 4-1 for details on configuring ports for network
logins. Note that you can configure the TCP/IP security table to enable or disable network connections from
certain hosts—see
IP Security Table
on page 4-11 for more information.
4.7.2
IP Security Table
The Server provides an IP Security Table as a mechanism for restricting incoming and outgoing TCP/IP
sessions (including Telnet, Rlogin, SLIP, and RTEL). The security table allows the manager to enable or
disable access to and from the Server based on port number as well as IP address. The IP security table does
not apply to print connections via RTEL.
Like other configurations, security table entries can be Set or Defined. To add an entry to the table, specify
an IP address (or range), which direction(s) to restrict, and a list of affected ports.
Figure 4-21:
Setting Server Access
In order, the command in Figure 4-21:
1
Affects addresses from 192.0.1.1 through 192.0.1.254 using the 255 “wildcard” network address seg-
ment.
2
Prevents ports 4, 5, 6, and 7 from beginning sessions
to
hosts with these addresses using the
Outgoing
Disabled
keywords.
Local> SET SERVER INCOMING BOTH
Local> SET SERVER INCOMING NOPASSWORD
Local> SET SERVER INCOMING PASSWORD
Local> SET SERVER LOGIN PASSWORD “8ball”
Local> SET IPSECURITY 192.0.1.255 OUTGOING DISABLED PORT 4-7