vi User’s Reference GuideSNMP traps ..................................................... 14-14Chapter 15 — Security ...........................................................15-1Suggested security measures ....................................... 15-1User accounts ............................................................. 15-2Dial-in Console Access ................................................. 15-3Enable SmartStart/SmartView/Web Server................... 15-4Telnet access .............................................................. 15-4About filters and filter sets ........................................... 15-4What’s a filter and what’s a filter set?.................. 15-4How filter sets work............................................ 15-5How individual filters work................................... 15-7Design guidelines............................................. 15-11Working with IP filters and filter sets............................ 15-12Adding a filter set ............................................. 15-13Viewing filter sets............................................. 15-17Modifying filter sets .......................................... 15-18Deleting a filter set........................................... 15-18A sample IP filter set ........................................ 15-18IPX filters .................................................................. 15-22IPX packet filters .............................................. 15-23IPX packet filter sets ........................................ 15-24IPX SAP filters .................................................. 15-26IPX SAP filter sets ............................................ 15-28Firewall tutorial .......................................................... 15-30General Firewall Terms ..................................... 15-30Basic IP Packet Components............................. 15-30Basic Protocol Types ........................................ 15-30Firewall design rules......................................... 15-31Filter Basics..................................................... 15-33Example Filters ................................................ 15-34Token Security Authentication ..................................... 15-37Securing network environments......................... 15-37