Previous Page: X.25 Support  Next Page: Security Options

Remote Access Security

Before you install the remote access software, you should create a security plan for remote users dialing in to your network. This involves selecting the type of access security you want to implement and whether the restrictions will be placed globally or for selected users only.


Types of Access Security

Remote access provides the following levels of access security:


Default Security

Default security is in effect when you first install and set up a basic configuration. The default security for each service is explained in Table 2.


Table 2. Default Security Requirements

PPP Remote Node Service AppleTalk Remote Access Service NASI Connection Service

NetWare username and NetWare password

NetWare username
and Remote Client password

NASI, Win2NCS, or Mac2NCS workstation: NetWare password

Remote workstation: NetWare username and Remote Client password

The default security parameters specify the following:


User-, Port-, and Service-Level Security

As an administrator, you can customize the level of security by restricting the following:


Global Security for All Users

You can define the following security options globally for all users:

NOTE:  Frame=26:/2.0 internal insetSetting a value for a security option for a user overrides, in order, the nearest container, remote access server, and global settings for that option.


User-Specific Security

You can define remote access security for each user. If you have more than one remote access server on the network, you can customize user security from a single server console. Note, however, that you must specify dial-out restrictions on each remote access server.

You can configure the following options for each user:


Service-Specific Security

You can configure service-specific security options for each of the following services:


PPP Remote Node Service

You can disable PPPRNS security or enable one or more of the three supported protocols used to establish a connection:

If the default NWCAP authentication is enabled, users must specify a NetWare username and password. If you enable PAP or CHAP, users must specify Remote Client passwords.

PPPRNS negotiates the security modes in the following order (when enabled): CHAP, PAP, and NWCAP. For example, the server is configured to support both NWCAP and CHAP. If the client supports CHAP, CHAP is used. If the client supports NWCAP, NWCAP is used. If the client supports both CHAP and NWCAP, CHAP is used because it is negotiated first.

When PAP or CHAP is used, a Remote Client password must be defined to allow users access. To allow users access without Remote Client passwords, either turn off PPPRNS security or use the Set PPPRNS AdmitNoConfig=ON command at the server console to validate users without Remote Client passwords.

NOTE:  To use the native Windows 95 or Windows NT dialer to connect to a Novell Internet Access Server 4.1 server, you must enable CHAP or PAP on Novell Internet Access Server 4.1 and either assign a Remote Client password to each user or allow users without Remote Client passwords to be validated.

If you want your Windows 95 dialer to use NetWare passwords instead of Remote Client passwords, you must install the latest Novell Client for Windows 95 from the client CD-ROM. Refer to the Novell Internet Access Server 4.1 remote access online help for more information. From the server console, type SET PPPTSM NWCAPFIRST=ON. This does not affect Windows 95 or Windows NT clients using the Microsoft client or older NetWare clients.

If security is disabled at the server side, the remote client must specify None for the security type.


NASI Connection Service

For NASI Connection Service (NCS), you apply security to the network workstation dialing out and to the remote workstation dialing in. Enabling security for the network workstation means that NASI workstations must specify a password. Enabling remote security means that remote workstations must specify a username and a Remote Client password.


AppleTalk Remote Access Service

For AppleTalk Remote Access Service (ARAS), you can restrict access to AppleTalk zones globally for all users or on a per-user basis.


Third-Party Security

Remote access supports third-party security products that implement token-based challenge/response types of security. These products have both hardware and software components. Remote access supports the software by providing a configuration option in the configuration utility. The hardware components are installed between the remote access port and the modem.

When third-party security is enabled, PPPRNS and NCS users must be validated through third-party security. After third-party security passes, call selection takes place. Any configured security for a service is applied to the call before the session is established.

PPPRNS users must configure their dialers to enter terminal mode to process the third-party security validation and transfer the call to PPP mode. If the dialer is configured incorrectly, that is, the call goes into PPP mode right away, the call will be rejected. Refer to the Novell Internet Access Server 4.1 remote access online help for information about how to use scripts for the dialers.

When the services available on a port are PPPRNS, NCS, or both, the incoming call executes third-party security as soon as the call is received. If additional services (such as ARAS) are also available on a port, the usual call selection will take place first. This enables services that do not support third-party security to accept calls even when third-party security is enabled. After the initial call selection, third-party security is executed.

If third-party security passes, a second call selection process takes place to determine which service the call is destined for.

If PPPRNS clients are configured incorrectly and the call is selected during the initial call selection process, the call is terminated.

If you have services other than PPPRNS or NCS selected, you can minimize the call establishment time for PPPRNS and NCS calls by restricting ARAS (and other services that do not support third-party security) to using specific ports.



  Previous Page: X.25 Support  Next Page: Security Options