
Setting Up Pipeline Security
Connection security
Pipeline User’s Guide Preliminary January 30, 1998 7-11
5
Close and save the profile.
Connection security
Connection security has two levels: caller authentication regulating authorized
access, and network security preventing unauthorized wide-area network access.
All authentication relies on the Pipeline finding a matching profile to verify
information presented by the caller.
• Authentication mechanisms
– Password authentication, such as PAP, CHAP, or MS-CHAP, requires a
name and password from the caller. Additionally, CHAP encrypts the
password data.
– Calling-line ID (CLID) authentication verifies that the call is coming
from the expected phone number.
– Called number (Called #) is similar to authentication by CLID, but it
authenticates on the number called into rather than the number
originating the call. In the Connection profile, the Called # parameter is
almost identical to the Dial # parameter, but uses a number without a
trunk group or dialing prefix prepended.
– Callback authentication instructs the Pipeline to hang up and call back
before performing password authentication. Callback provides the
highest level of control, assuring that incoming calls are coming from a
known user or network.
Note:
Any form of authentication requires a configured profile. See
“Requiring profiles for incoming connections” on page 7-7 for details
on configuring the Pipeline to always require a matching profile,
regardless of whether authentication is enforced.
• Network security
– Filters are one of the most effective methods of protecting your site from
unwanted WAN access. Filters are described briefly in this chapter; see
Chapter 6, “Defining Filters and Firewalls,” for full details.
Commentaires sur ces manuels