
Configuring Security and Authentication
Chapter 8 73
f
Introduction
The Digi CM unit provides four methods for controlling access to the network
and the devices on the network:
• Restricting or permitting IP filtering
This method allows or prevents users with specific IP addresses from
accessing devices or serial ports on the network. IP filtering can be
permitted or restricted for all ports globally or per port.
• Restricting or permitting specific users
You easily can add users to or remove them from a list of restricted or
permitted users list.
• Enabling sniff session access
This method allows multiple users to access a single port.
• Using a central point (System administration > Security profile) where you
establish security parameters per network, port, or password.
The Digi CM unit supports several authentication methods, including:
• Local
•RADIUS
• TACACS+
•LDAP
• Kerberos (The Kerberos module is not part of the normal firmware
because of memory constraints. You can download the module from
http://support.digi.com and place onto /usr2/ if required. To copy files to
/usr2/, use a scp tool such as WinSCP.)
• Custom PAM. You can configure authentication so that a secondary
method is attempted if the primary method fails.
Configuring Network IP Filtering
The Digi CM unit offers built-in firewall functionality to limit TCP/IP traffic to and
from certain networks, TCP ports, and interfaces. The functionality
implemented is based on the Linux tool IP tables.
Chapter 8
Configuring Security and Authentication
Comentarios a estos manuales