Token security authentication, Securing network environments, E your network with securid, see – Netopia Router PN Series User Manual
Page 173: Chapter 8, “token, Security authentication, Chapter 8 token security authentication

8-1
Chapter 8
Token Security Authentication
This chapter discusses how to configure and use security 
authentication on the Netopia Router.
Note: The security authentication feature only applies to Netopia 
Router models connecting over a dial-up ISDN line using the 
PPP-PAP-TOKEN or PPP-CACHE-TOKEN authentication protocol.
If you will not be using this feature, you can skip this chapter.
Securing network environments
Unauthorized tampering or theft of information on internal networks 
causes serious ramifications, given the reliance on information 
systems. Network abuse is a serious problem, complicated by the 
difficulty in detecting the source of the abuses. An unauthorized 
user can gain access to networks and copy information without 
leaving a trace.
Password protection is one solution, but static passwords are often 
insecure. They can be compromised, allowing unauthorized users 
to disguise themselves as authorized users and enter supposedly 
secure systems. However, a company called Security Dynamics™ 
has patented a security authentication technology to increase 
network security.
