This appendix discusses the following topics:
Introduction
Authorization procedures define what a user may do once he or she has access to your local area network. Authorization occurs after authentication has been completed.
Restricting access to the terminal server
The MAX TNT terminal server handles incoming calls initiated by means of a modem or terminal-adapter (TA). These calls are usually initiated by a dial-in user, so authorization is an important part of the setup. For details of authenticating terminal-server logins, see Appendix A, Access Security Settings.
TERMINAL-SERVERIf the software is not enabled, you can enable it as follows:
enabled = yes
admin> read terminal-server
TERMINAL-SERVER read
admin> set enabled = yes
admin> writeMost sites do not allow dial-in users to access the MAX TNT terminal-server administrative commands, such as Traceroute or Ping. In most cases, the terminal server is a stepping stone toward access to one or more network hosts. There are several ways to configure the Terminal-Server profile to enable this type of access:
TERMINAL-SERVER written
Restricting network commands
By default, the Terminal-Server profile disables the use of the Ping and Traceroute commands as a security measure, because these commands authorize users to gain information about the network. Following are the related parameters, shown with settings that disable Ping and Traceroute:
TERMINAL-SERVERYou can set the parameters to Yes if you want to enable use of the Ping and Traceroute commands from the terminal-server prompt.
terminal-mode-configuration
ping = no
traceroute = no
TERMINAL-SERVERThe following commands enable the use of the Telnet command from the terminal-server prompt:
terminal-mode-configuration
tcp = no
rlogin = no
telnet-options
telnet = no
admin> read terminal-server
TERMINAL-SERVER read
admin> list terminal telnet
telnet = no
telnet-mode = ascii
auto-telnet = no
local-echo = no
admin> set telnet = yes
admin> write
TERMINAL-SERVER written
TERMINAL-SERVERUsers can modify some of the default values on a per-session basis when they invoke the Telnet command. Following is an example that configures some of the session parameters:
terminal-mode-configuration
terminal-type = vt100
clear-call = no
buffer-chars = yes
telnet-options
telnet = yes
telnet-mode = ascii
auto-telnet = no
local-echo = no
admin> read terminal-server
TERMINAL-SERVER read
admin> set clear-call = yes
admin> set telnet auto-telnet = yes
admin> set telnet local-echo = yes
admin> writeTerminal-Type specifies a terminal type for the Telnet session, such as the vt100. Clear-Call specifies whether or not user termination of a Telnet session terminates the connection as well. Buffer-Chars determines whether the terminal server buffers input characters for 100 milliseconds before forwarding them to the host, or sends the characters as received.
TERMINAL-SERVER written
In the Telnet-Options subprofile, Telnet-Mode specifies whether Binary, ASCII, or Transparent mode is the default for Telnet sessions. Auto-Telnet instructs the terminal server to interpret unknown command strings as the name of a host for a Telnet session. Local-Echo sets a global default for echoing characters locally. Users can change the echo setting within an individual Telnet session.
If the user's dial-in software does not support PPP, the user can still initiate a PPP session from within the terminal-server software. To do so, a user could log into the terminal server in terminal mode and use the PPP command, or include the PPP command in an Expect-Send script; for example:
expect "Login:" send $username expect "Password:" send $password expect "ascend% " send "PPP"Following are the parameters related to authorizing PPP sessions initiated from the terminal-server software. The settings shown are the defaults.
TERMINAL-SERVERFor example, the following commands enable PPP sessions, and specify that the MAX TNT should start PPP negotiation immediately when the PPP command is executed:
ppp-mode-configuration
ppp = no
delay = 5
direct = no
info = session-ppp
admin> read terminal-server
TERMINAL-SERVER read
admin> set ppp ppp = yes
admin> set ppp direct = yes
admin> writeYou can use the Delay parameter to instruct the terminal server to transition to packet-mode processing after the specified number of seconds. By setting the Info parameter, you can specify that no message be displayed, or specify one of the following messages:
TERMINAL-SERVER written
expect "Login:" send $username expect "Password:" send $password expect "ascend% " send "SLIP"Following are the parameters related to authorizing SLIP sessions initiated from the terminal-server software. The settings shown are the defaults.
TERMINAL-SERVERFor example, the following commands authorize SLIP sessions and specify that the terminal server will respond to BootP in SLIP sessions:
slip-mode-configuration
slip = no
slip-bootp = no
info = basic-slip
admin> read term
TERMINAL-SERVER read
admin> set slip slip = yes
admin> set slip slip-bootp = yes
admin> writeThe SLIP-BOOTP parameter enables the terminal server to respond to BootP within SLIP sessions. If it is set to Yes, an interactive user who initiates a SLIP session can get an IP address from the designated IP address pool via BootP. If the parameter is set to No, the terminal server does not run BootP. Instead, the system prompts the user to accept an IP address at the start of the SLIP session. By setting the Info parameter, you can specify that a default startup message will be displayed, or an advanced message that includes a subnet mask and IP gateway address.
TERMINAL-SERVER written
TERMINAL-SERVERIf the call uses PPP encapsulation, the normal course of events for the MAX TNT is to authenticate the call by means of PAP or CHAP and then use the router software to establish an async PPP session. To avoid redirection of the call and enable the user to log into the Telnet host instead, you must set the Telnet-Host-Auth parameter to Yes.
immediate-mode-options
service = telnet
telnet-host-auth = no
host = 10.2.3.4
port = 514
The following example shows how to enable immediate Telnet connections for async connections, including async PPP:
admin> read terminal-server
TERMINAL-SERVER read
admin> set immediate service = telnet
admin> set immediate telnet-host-auth = yes
admin> set immediate host = 10.2.3.4
admin> writeIf the Service parameter is set to None, immediate mode is disabled. The other choices for establishing an immediate host connection for dial-in users are Telnet, Raw-TCP, or Rlogin.
TERMINAL-SERVER written
The Host parameter specifies the hostname or address to which users will be connected in terminal server immediate mode. You can also specify a TCP port number to use for the connections.
The Telnet-Host-Auth parameter is related only to asynchronous PPP calls in immediate mode. If it is set to No, the calls fail. If it is set to Yes, the MAX TNT terminal server processes the calls and directs them to the Telnet host rather than to the unit's router software.
For details of setting up a password that is required for accessing the terminal server when menu mode is in use or when users toggle from menu-mode to terminal-mode, see How security mode affects terminal-server authentication of Appendix A, Access Security Settings.
TERMINAL-SERVERIf you set Start-With-Menus to Yes, the terminal server brings up the menu upon initial login. If the Toggle-Screen parameter is set to Yes, users can press 0 (the zero key) in the menu to toggle to the terminal-server command line. To configure menu mode to obtain the menu from RADIUS, set the Remote-Configuration parameter to Yes. The Text and Host parameters expect a text description and an IP address, respectively, of up to four hosts. The MAX TNT uses only the specified IP addresses to access the hosts.
menu-mode-options
start-with-menus = no
toggle-screen = no
remote-configuration = no
text-1 = ""
host-1 = ""
text-2 = ""
host-2 = ""
text-3 = ""
host-3 = ""
text-4 = ""
host-4 = ""
The following commands configure the menu shown in Figure B-1, and specify that the menu should be displayed upon initial login:
admin> read terminal
TERMINAL-SERVER read
admin> set menu start-with-menus = yes
admin> set menu text-1 = administration
admin> set menu text-2 = engineering
admin> set menu text-3 = marketing
admin> set menu text-4 = techpubs
admin> set menu host-1 = 10.2.3.4
admin> set menu host-2 = 10.2.3.57
admin> set menu host-3 = 10.2.3.121
admin> set menu host-4 = 10.2.3.224
admin> writeWith this configuration, the MAX TNT authenticates the user's login name and password, and then displays a text-based menu such as the one shown in Figure B-1:
TERMINAL-SERVER written
Restricting access to DNS information
Domain Name Service (DNS) is a TCP/IP service for centralized management of address resolution. Service providers can maintain multiple DNS servers, each one dedicated to a particular client or location. In that case, it might be important, for security reasons, to ensure that connections are always directed to the correct DNS service. With per-connection DNS access, a service provider can direct specific users to the DNS servers appropriate to their services or locations. (For information about configuring local DNS servers and options, see Chapter 4, IP Routing.)
What is client DNS?
Client DNS enables the MAX TNT to direct incoming connections to DNS servers belonging to particular locations or customers, and to prevent those users from accessing the local DNS servers. The addresses configured for client DNS servers are presented to WAN connections during IPCP negotiation.
IP-GLOBAL
client-primary-dns-server = 0.0.0.0
client-secondary-dns-server = 0.0.0.0
allow-as-client-dns-info = true
CONNECTION stationA connection can use one of the following DNS servers:
ip-options
client-dns-primary-addr = 0.0.0.0
client-dns-secondary-addr = 0.0.0.0
client-dns-addr-assign = yes
admin> read ip-global
IP-GLOBAL read
admin> set client-dns-pri = 8.22.17.56
admin> set client-dns-sec = 8.22.17.107
admin> writeThe secondary server is accessed only if the primary one is inaccessible. If both client DNS servers in the IP-Global profile are not accessible and the caller's configured profile does not specify a connection-specific client DNS server, the MAX TNT can allow the client to access the local DNS servers, depending on the setting of the Allow-as-Client-DNS-Info parameter. Following is an example in which the administrator allows clients to access local DNS servers when client DNS servers are not found:
IP-GLOBAL written
admin> read ip-global
IP-GLOBAL read
admin> set allow-as-client-dns-info = true
admin> write
IP-GLOBAL written
admin> read connection cherry
CONNECTION/cherry read
admin> set ip-options client-dns-primary-addr = 10.2.3.4
admin> set ip-options client-dns-secondary-addr = 10.2.3.56
admin> set ip-options client-dns-addr-assign = yes
admin> writeThe secondary server is accessed only if the primary one is inaccessible.
CONNECTION/cherry written
Restricting SNMP access
The MAX TNT supports SNMP on a TCP/IP network. An SNMP management station that uses the Ascend Enterprise MIB can query the MAX TNT, set parameters, sound alarms when certain conditions appear in the MAX TNT, and perform other management tasks. Overview of SNMP security
The SNMP profile contains SNMP-readable information related to the unit itself and to its SNMP security. There are two levels of security:
SNMP
enabled = no
read-community = public
read-write-community = write
enforce-address-security = no
read-access-hosts = [ 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 ]
write-access-hosts = [ 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 ]
contact = ""
location = ""
queue-depth = 0
admin> read SNMP
SNMP read
admin> set enabled = yes
admin> write
SNMP written
Setting community strings
SNMP community strings set the administrative authorization policy for executing SNMP Set and Get commands from a management station. When the management station interacts with the MAX TNT, it must provide the proper community string to gain read access, and provide a separate community string to gain write access to the system's configuration.
read-community = publicThe following commands assign a new, confidential Read-Write-Community string. This string will be required from an SNMP management station for the station to gain read-write access to the MAX TNT:
read-write-community = write
admin> read snmp
SNMP read
admin> set read-write-community = secret
admin> writeYou can specify up to 32 characters in an SNMP community string.
SNMP written
The following commands enforce address security and specifies a trusted address for both read and write access:
admin> read snmp
SNMP read
admin> list
enabled = no
read-community = public
read-write-community = write
enforce-address-security = no
read-access-hosts = [ 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 ]
write-access-hosts = [ 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 0.0.0.0 ]
contact = ""
location = ""
admin> set enforce-address-security = yes
admin> set read-access 1 = 10.2.3.4
admin> set write-access 2 = 10.2.56.123
admin> write
SNMP written
Preventing misuse of directed broadcasts
Denial-of-service attacks known as "smurf" attacks typically use ICMP Echo Request packets with a spoofed source address and the direction of packets to IP broadcast addresses. These attacks are intended to cause degraded network performance, possibly to the point that the network becomes unusable. Disabling directed broadcasts
To prevent the MAX TNT router from being used as an intermediary in this type of denial-of-service attack that is launched from another network, you should disable the MAX TNT from forwarding directed broadcasts it receives from another network. The following example shows how to disable directed broadcasts that are not locally generated on all IP interfaces of a MAX TNT with a four-port Ethernet card in shelf 1, slot 12:
admin> read ip-int {{1 c 1} 0}
IP-INTERFACE/{ { shelf-1 controller 1 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 controller 1 } 0 } written
admin> read ip-int {{1 12 1} 0}
IP-INTERFACE/{ { shelf-1 slot-12 1 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 slot-12 1 } 0 } written
admin> read ip-int {{1 12 2} 0}
IP-INTERFACE/{ { shelf-1 slot-12 2 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 slot-12 2 } 0 } written
admin> read ip-int {{1 12 3} 0}
IP-INTERFACE/{ { shelf-1 slot-12 3 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 slot-12 3 } 0 } written
admin> read ip-int {{1 12 4} 0}
IP-INTERFACE/{ { shelf-1 slot-12 4 } 0 } read
admin> set directed-broadcast-allowed = no
admin> write
IP-INTERFACE/{ { shelf-1 slot-12 4 } 0 } written
The following example shows how to configure the MAX TNT to ignore ICMP Echo Requests sent to the IP broadcast address:
admin> read ip-global
IP-GLOBAL read
admin> set icmp-reply-directed-bcast = no
admin> write
IP-GLOBAL written
Copyright © 1998, Ascend Communications, Inc. All rights reserved.