Contents 5
Chapter 9 Configuring IP Routing
Configuring Static Routes....................................................................53
Related Information .......................................................................................... 53
Procedure......................................................................................................... 53
Example: Route Using the Ethernet Interface .................................................. 53
Example: Route Using a PPP Link................................................................... 53
Configuring Dynamic Routes Using RIP..............................................54
Related Information .......................................................................................... 54
Starting Point.................................................................................................... 54
Procedure......................................................................................................... 54
Example: Dynamic Routes ............................................................................... 54
Configuring Proxy ARP........................................................................55
Related Information .......................................................................................... 55
Starting Point.................................................................................................... 55
Procedure......................................................................................................... 55
Example............................................................................................................ 55
Chapter 10 Configuring Security Features
Controlling Access to the Configuration ..............................................57
Controlling Access to Inbound Ports...................................................57
Default Access Restrictions.............................................................................. 57
Options for Removing Access Restriction ........................................................ 57
Procedure for Changing a Port’s Access Requirements .................................. 57
Example:........................................................................................................... 58
Procedure for Changing a User’s Access Requirements ................................. 58
Example:........................................................................................................... 58
Controlling Access to Outbound Ports.................................................58
Default Access.................................................................................................. 58
Restricting Access to Outbound Ports.............................................................. 58
CHAP Authentication for PPP Users................................................................ 58
Controlling Access to the Command Line ...........................................58
Autoconnection................................................................................................. 58
Method 2: Menus.............................................................................................. 59
Issuing User Passwords......................................................................59
Related Information .......................................................................................... 59
Starting Point.................................................................................................... 59
Procedure......................................................................................................... 59
Configuring SSH Version 2 for Secure Communication......................59
Password Protection......................................................................................... 60
Using a Public Key ........................................................................................... 60
Making Reverse SSH Connections to Ports..................................................... 60
Controlling Access to Services............................................................60
Services that Can Be Turned Off...................................................................... 60
Service Levels .................................................................................................. 61
Procedure......................................................................................................... 61