6 security, 1 protection for the configuration, 1 password protection – Lancom Systems LCOS 3.50 User Manual

Page 52: D in chapter ’security

Advertising
background image

LANCOM Reference Manual LCOS 3.50

̈

Chapter 6: Security

52

Security

6 Security

You certainly would not like any outsider to have easy access to or to be able
to modify the data on your computer. Therefore this chapter covers an impor-
tant topic: safety. The description of the security settings is divided into the
following sections:

̈

Protection for the configuration

Password protection

Login barring

Access verification

̈

Securing ISDN access

At the end of the chapter you will find the most important security settings as
a checklist. It ensures that your LANCOM is excellently protected.

Some further LCOS features to enhance the data security are
described in separate chapters:

’Firewall’

page 104

’The hiding place—IP masquerading (NAT, PAT)’

page 74

’Virtual LANs (VLANs)’

page 192

6.1

Protection for the configuration

A number of important parameters for the exchange of data are established
in the configuration of the device. These include the security of your network,
monitoring of costs and the authorizations for the individual network users.

Needless to say, the parameters that you have set should not be modified by
unauthorized persons. The LANCOM thus offers a variety of options to protect
the configuration.

6.1.1

Password protection

The simplest option for the protection of the configuration is the establish-
ment of a password.

As long as a password hasn't been set, anyone can change the con-
figuration of the device. For example, your Internet account informa-
tion could be stolen, or the device could be reconfigured in a way that
the protection-mechanisms for the local network could by bypassed.

Advertising