AWAN 3883/4/5 Access Server Configuration and Management Manual
AWAN 3883/4/5 Access Server Configuration and Management Manual—424242-001
7-1
7
Configuring User and Port Access
This section describes how to restrict access to the AWAN access server by configuring
user lists and enabling protocols for ports on your AWAN access server. You should
perform the tasks described in this section before configuring your network connections.
Summary of Configuration Tasks
Configuring user and port access involves a number of tasks. Table 7-1 lists each task in
the order in which it must be performed.
Finally, you should save and store your configuration changes as described in Saving a
Configuration File on page 5-27 and Storing a Configuration File on page 5-29.
Planning User Access
Planning user access involves the following tasks:
•
Planning user names and passwords
•
Determining which protocols can be used by each user
•
Determining which dialback mode should be enabled for each dial-in user
•
Deciding how users will be assigned IP addresses
Use the User Configuration Worksheet to plan user access. Blank worksheets are
provided in Appendix A, Blank Configuration Worksheets
. Instructions for using the
User Configuration Worksheet are provided in note boxes titled Worksheet Instructions
throughout this subsection.
Table 7-1. User Access and Port Access Configuration Tasks
Task Description Purpose
1. Planning User Access To plan user names and passwords, the
protocols that can be used by each user, and
IP address assignments for users.
2. Planning Port Access To plan which protocols to enable for each
port.
3. Configuring User Access To configure user names and passwords and
enable the protocols that can be used by each
user.
4. Configuring Port Access To enable protocols for each port.