Chapter 6ConfigurationSecurityThis section discusses configuration optionsthat restrict configuration.OverviewThe gateway uses the industry standard IP protocols. Since IPis a well-known standard, its security vulnerabilities are alsowell known and may be exploited. Several gateway options areavailable to enhance the inherent security of your network.However, since network security is a moving target andabsolute security is never achievable, every network installationshould be designed and implemented with care to minimizesecurity risks in a way that is appropriate for the applicationand perceived risks.The gateway may be configured with several levels of securityconfiguration and authentication. These restrict the ability ofan unwanted user from changing the configuration of thegateway. They do not restrict the ability of a remote device todeliver packets to the gateway’s data port.At the level 0, any workstation may be used to configure thegateway via either telnet or web browser configuration. Level 140