Lancom Systems LCOS 3.50 Manuel d'utilisateur

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Logiciel Lancom Systems LCOS 3.50. Lancom Systems LCOS 3.50 User's Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 346
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - LANCOM LCOS 3.50

Reference ManualLANCOM LCOS 3.50

Page 2

LANCOM Reference Manual LCOS 3.50  Chapter 1: Preface10Preface1PrefaceUser’s manual and reference manualThe documentation of your device consists of

Page 3 - Contents

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections100Routing and WAN connections The callback party selects 'Call back t

Page 4

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50101Routing and WAN connectionsThe setting 'Name' offers the greate

Page 5

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections102Routing and WAN connectionsTwo methods of channel bundling Static channe

Page 6

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50103Routing and WAN connections Depending on the type of application, the B1

Page 7

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall104Firewall8FirewallFor most companies and many private users a work without the Internet is no

Page 8

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50105Firewall Destroy data on the workstations of the LAN. Paralyse workstations of the LAN or

Page 9

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall106Firewallprotocol, the search for open ports is also called “port scanning”. On the occa-sion

Page 10 - 1Preface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50107Firewallthat a defenceless workstation installed in the Internet will - perhaps evenaccident

Page 11

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall108Firewallwhich are used for creation of the rules and which are checked during theoperation o

Page 12

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50109FirewallPacket filtersOne speaks about a packet filter-based Firewall, if the router only ch

Page 13 - 2 System design

 Chapter 1: Preface LANCOM Reference Manual LCOS 3.5011Prefaceucts. The extensive feature set is available throughout all LANCOM products(provided re

Page 14 - System design

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall110Firewallit is expecting the connection. The server will establish as a result from its port2

Page 15 - Configuration and manage

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50111Firewallpackets that do not belong to one of the tracked session of the connectionstate tabl

Page 16 - 3.2 Configuration software

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall112Firewalltable, because the connection to the LAN has been initiated from the client.Afterwar

Page 17

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50113Firewallonly the one with the correct delivery note will pass. Likewise, a second cou-rier d

Page 18

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall114FirewallApplication Gateways: It never exists a direct connection e.g. between a clientof th

Page 19

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50115Firewall8.3.1 How the LANCOM Firewall inspects data packetsThe Firewall filters only those d

Page 20

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall116FirewallThe Firewall only checks routed data packets!The Firewall only checks data packets r

Page 21 - LANCAPI

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50117FirewallThe LANCOM Firewall uses several lists for checking data packets, which areautomatic

Page 22

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall118Firewalllist will be carried out. If the action intends to accept the packet, then anentry i

Page 23

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50119Firewalla dynamic one, new entries can be added continuously with the appropri-ate Firewall

Page 24

LANCOM Reference Manual LCOS 3.50  Chapter 1: [email protected] online services ( www.lancom.de) are available to you around theclock

Page 25

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall120FirewallHowever, if the server wants to send larger sets of data (e.g. TFTP) and wouldnot li

Page 26 - 3.5.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50121FirewallICMP connectionsFor ICMP two cases must be differentiated: The ICMP request/reply co

Page 27 - 3.5.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall122FirewallPlease notice that the N:N mapping functions (’N:N mapping’→page 80) are only active

Page 28 - 3.5.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50123Firewall Route: Fragmented packets are passed on without any further checkingby the Firewal

Page 29 - 3.5.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall124Firewallroute" are also suppressed, so that the LANCOM cannot be found, neither by"

Page 30

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50125Firewallthe needed port will be opened for a short time (20 seconds) solely for theauthentic

Page 31

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall126Firewall Create VPN rule: Is this Firewall rule also used to create a VPN rule?(→page 127)P

Page 32 - 3.8 Command line interface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50127Firewall either a rule applies to the packet, for which observe further rules is notactivat

Page 33 - 3.8.1 Command line reference

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall128Firewallaction sets. If the same trigger is used for several action sets, thesequence of act

Page 34 - 3.9 Scheduled Events

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50129Firewall The entire local network (LAN) Certain remote stations (described by the name of

Page 35

 Chapter 2: System design LANCOM Reference Manual LCOS 3.5013System design2 System designThe LANCOM operating system LCOS is a collection of differen

Page 36

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall130FirewallLimit / TriggerThe limit or trigger describes a quantified threshold value that must

Page 37 - 4 Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50131Firewall SNMP/LANmonitor: Sends a SNMP trap, that will be analyzed e. g. byLANmonitor.Each

Page 38 - 4.1.1 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall132FirewallFirewall. The specific parameters for the different alerting types such as thereleva

Page 39 - Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50133FirewallFROM: [email protected] TO: [email protected] SUBJECT: packet

Page 40

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall134FirewallSNMP: Generic trap = enterpriseSpecific (6) SNMP: Specific trap = 26 (0x1A) SNMP: Ti

Page 41

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50135FirewallThis contradiction shows the dilemma of the responsible administrators whohave devel

Page 42 - 4.1.2 Configuration

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall136FirewallSome LANCOM models support this structure by a separate LAN interface onlyused for t

Page 43

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50137FirewallA direct data exchange between LAN and DMZ via LAN bridge is not possibleif a dedica

Page 44

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall138FirewallIf you operate a web server in your LAN, that has been permittedaccess to this servi

Page 45

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50139Firewall Example configuration “Basic Internet” If you want to permit a VPN dial-in to a L

Page 46 - 5 Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 2: System design14System design LANCOM Wireless access points resp. LANCOM routers with wirelessmodules o

Page 47 - Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall140Firewall For a network coupling you permit additionally the communicationbetween the involv

Page 48 - 5.2.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50141Firewall8.3.8 Configuration of Firewall rulesFirewall wizardThe fastest method to configure

Page 49 - 5.2.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall142FirewallLANconfigThe filters can be installed very comfortably with LANconfig. Starting from

Page 50 - 5.2.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50143Firewall The option 'Observe further rules ...' can be used to create complexfunc

Page 51 - 5.2.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall144Firewall Stations: Here the stations – as sender or addressee of the packets – arespecifi

Page 52 - 6 Security

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50145FirewallWEBconfig, TelnetUnder WEBconfig or Telnet the Firewall rules are configured in the

Page 53 - Security

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall146Firewallaction table for Firewall actions(→page 147). It can also contain directdescriptions

Page 54 - 6.1.2 Login barring

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50147FirewallStations and services can be described according to the following rules in theobject

Page 55

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall148Firewall Conditions If no further actions are specified in a “connect” or “Internet” fi

Page 56

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50149FirewallIf an action is given without any associated limit, then implicitly apacket limit is

Page 57

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5015Configuration and manage-ment3 Configuration and managementThis section w

Page 58 - 6.2.1 Identification control

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall150Firewall Further measuresIf the "close port" action is executed, an entry in a bl

Page 59

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50151Firewallsend at the same time an email to the administrator, then the description ofthe obje

Page 60 - 6.2.2 Callback

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall152Firewalllast five events, that were triggered either by a Firewall rule, the DoS, or theIDS

Page 61 - 6.3 The security checklist

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50153FirewallIf you call up the logging table via LANmonitor, it looks like the followingdepictio

Page 62

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall154FirewallAll Firewall actions are likewise displayed within the IP router trace(’How to start

Page 63

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50155FirewallOn Telnet level, the content of the filter list can be displayed with the com-mand s

Page 64 - 7 Routing and WAN connections

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall156FirewallThe connection listThe connection table files source address, destination address,

Page 65

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50157FirewallThe table contains the following elements: Element Element meaningSrc addr. Source

Page 66 - 7.2 IP routing

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall158FirewallMeaning of the flags of the connection listPort block listAddress, protocol and port

Page 67

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50159FirewallSorting is done according to address, protocol and port. The table contains thefollo

Page 68 - 7.2.2 Local routing

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management16Configuration and manage-ment3.2 Configuration softwareSituations in whic

Page 69

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall160Firewall8.4 Protection against break-in attempts: Intrusion DetectionA Firewall has the task

Page 70

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50161Firewall8.4.2 Configuration of the IDSLANconfigParameters of the Intrusion Detection System

Page 71

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall162Firewall8.5 Protection against “Denial of Service” attacksAttacks from the Internet can be b

Page 72 - Configuration tool Menu/table

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50163Firewallduring the attack and, moreover, the owner of the falsified address cannotreceive no

Page 73 - 7.2.4 SYN/ACK speedup

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall164Firewalla new Denial of Service attack can result thereby if the memory of the victimis exha

Page 74 - 7.3.1 Simple masquerading

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50165Firewall8.5.2 Configuration of DoS blockingLANconfigParameters against DoS attacks are set i

Page 75 - Source IP Port

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall166Firewall The connection will be cut off. The sender address will be blocked for an adjusta

Page 76

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50167FirewallWEBconfig, TelnetWith WEBconfig or Telnet the suppression of responses can be confi

Page 77

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service168Quality of Service9 Quality of ServiceThis chapter dedicates itself to quality: Un

Page 78 - 7.3.2 Inverse masquerading

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50169Quality of Servicedesired data transfer, certain data packets must be treated pref

Page 79

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5017Configuration and manage-mentOnce LANconfig has finished its search, it d

Page 80 - 7.4 N:N mapping

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service170Quality of Service Limited maximum bandwidthWhat is DiffServ?DiffServ stands for

Page 81 - 7.4.1 Application examples

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50171Quality of Service9.2.1 Guaranteed minimum bandwidthsHereby you give priority to e

Page 82

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service172Quality of Service9.2.2 Limited maximum bandwidthsHereby you limit e.g. the entire

Page 83

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50173Quality of ServiceAs long as the interval for the minimum bandwidth is not exceede

Page 84

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service174Quality of Servicedata packets it is still able to receive, and thus brakes the da

Page 85 - 7.4.2 Configuration

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50175Quality of Servicestandard DSL connection, the DSL interface is thus adjusted in t

Page 86

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service176Quality of Service Standard reception queueAll packets that do not need special t

Page 87

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50177Quality of ServiceA resulting delay has no disadvantageous effect to the TCP-secur

Page 88

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service178Quality of Serviceoffice via VPN connection, over which the Internet traffic is no

Page 89 - 7.5.1 Name list

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50179Quality of ServiceAccordingly, a VoIP connection should be configured such that th

Page 90 - 7.5.2 Layer list

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management18Configuration and manage-mentManagement of multiple devicesLANconfig supp

Page 91 - Parameter Meaning

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service180Quality of ServiceIn detail, delay is determined especially by the codec used, the

Page 92 - 7.6.1 The protocol

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50181Quality of Servicethe IPSec header must be added (RTP and IPSec headers can be lar

Page 93

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service182Quality of ServiceThe transfer time of the packets to the interface (serialization

Page 94

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50183Quality of Servicetion always the physical data transfer via the respective interf

Page 95

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service184Quality of Service DiffServ: The ToS/DiffServ field is interpreted as DiffServ fi

Page 96

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50185Quality of ServiceWEBconfig, TelnetFor configuration with WEBconfig or Telnet, the

Page 97 - In this column of

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service186Quality of Service The guaranteed bandwidth is defined on index card 'QoS&ap

Page 98 - 7.8 Callback functions

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50187Quality of ServiceA maximum bandwidth is simply defined by a limit rule, which dis

Page 99

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service188Quality of Service(e.g. Voice over IP), this extra overhead is quite noticeable. E

Page 100 - With this

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50189Quality of Service9.7.4 Sending and receiving directionLANconfigThe interpretation

Page 101

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5019Configuration and manage-mentSecure with HTTPSWEBconfig offers an encrypt

Page 102

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service190Quality of Service Not packets of certain protocols are reduced, rather than all

Page 103

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50191Quality of ServiceThe following example shows a setting for Voice over IP telephon

Page 104 - 8Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)192Virtual LANs (VLANs)10 Virtual LANs (VLANs)10.1 What is a Virtual LAN?The incre

Page 105 - 8.1.3 The methods

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50193Virtual LANs (VLANs) Data traffic of certain logical units should be transmitt

Page 106 - 8.1.4 The victims

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)194Virtual LANs (VLANs)The tagging is realized by an additional field within the M

Page 107 - 8.2 What is a Firewall?

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50195Virtual LANs (VLANs)rules for generating and processing of the VLAN tags are as

Page 108 - Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)196Virtual LANs (VLANs)Management and user traffic on a LANSeveral hot spots are i

Page 109

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50197Virtual LANs (VLANs)But this task is very burdensome to realize by hardware cha

Page 110

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)198Virtual LANs (VLANs)10.3 Configuration of VLANsVLAN technology functions are pr

Page 111

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50199Virtual LANs (VLANs)Example for a network table:10.3.2 The port tableThe port t

Page 112

© 2004 LANCOM Systems GmbH, Wuerselen (Germany)While the information in this manual has been compiled with great care, it may not be deemed an assuran

Page 113

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management20Configuration and manage-mentThe syntax of the TFTP call is dependent on

Page 114 - 8.3 The LANCOM Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)200Virtual LANs (VLANs)10.3.3 Configuration with LANconfigParameters for virtual n

Page 115

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50201Virtual LANs (VLANs)The definition of the used virtual networks can be accessed

Page 116

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)202Virtual LANs (VLANs)The VLAN configuration shows up under WEBconfig as follows:

Page 117

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50203Wireless LAN – WLAN11 Wireless LAN – WLAN11.1 What is a Wireless LAN?The followi

Page 118

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN204Wireless LAN – WLANIEEE 802.11a: 54 MbpsIEEE 802.11a describes the operation of

Page 119 - 8.3.2 Special protocols

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50205Wireless LAN – WLANtransmission. If exactly this range is used by another transm

Page 120

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN206Wireless LAN – WLANYour LANCOM base station supports - according to the model ty

Page 121

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50207Wireless LAN – WLAN Larger Wireless LANs, connection to LANs with one or more b

Page 122

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN208Wireless LAN – WLAN Connecting the Wireless LAN to an existing LAN Extending t

Page 123

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50209Wireless LAN – WLANIn the example above, the roaming function of the mobile stat

Page 124

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5021Configuration and manage-mentYou can also reserve a special calling numbe

Page 125

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN210Wireless LAN – WLANalso possible to specifically control the access of workstati

Page 126

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50211Wireless LAN – WLANBy the use of narrow beam antennas (e.g. AirLancer Extender),

Page 127

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN212Wireless LAN – WLANbase station. Due to the client mode, it is also possible to

Page 128

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50213Wireless LAN – WLANIn some applications, however, it may be desirable to divide

Page 129

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN214Wireless LAN – WLANOn the way from the original WEP of the 802.11 standard to 80

Page 130

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50215Wireless LAN – WLANcase, so-called assymetric encryption methods such as RSA can

Page 131

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN216Wireless LAN – WLANdata packet—a double application of the XOR operation with th

Page 132 - Configuration tool Run

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50217Wireless LAN – WLANcombination of two clear text packets. If one already knows t

Page 133

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN218Wireless LAN – WLANusually weaker than 40 or 104 bits (the current IEEE standard

Page 134

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50219Wireless LAN – WLANfor certain values of the RC4 key, conclusions may be drawn a

Page 135

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management22Configuration and manage-ment햳 Open a Telnet session to the LANCOM. Use t

Page 136

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN220Wireless LAN – WLANwhich could automatically crack an arbitrary WLAN connection

Page 137

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50221Wireless LAN – WLANthe possibility of installing a valid WEP key for the next se

Page 138

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN222Wireless LAN – WLANThe access point is thus a sort of middle man between client

Page 139

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50223Wireless LAN – WLANFurther advantages of this procedure include its simple imple

Page 140

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN224Wireless LAN – WLAN A simplified procedure for deriving the Master Secret menti

Page 141 - Firewall wizard

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50225Wireless LAN – WLANa new component (green), however, besides the CRC, the unencr

Page 142

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN226Wireless LAN – WLANdecryption part of TKIP checks this sequentiality and discard

Page 143

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50227Wireless LAN – WLANThe key handshake breaks down into two phases: first the pair

Page 144

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN228Wireless LAN – WLANThe client still can't be 'approved', however,

Page 145

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50229Wireless LAN – WLANpoint to show whether encryption should be used or not. This

Page 146

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5023Configuration and manage-ment햲 Switch to the 'Security' tab in

Page 147

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN230Wireless LAN – WLAN11.2.6 AES and 802.11i In mid-2004, the long awaited 802.11i

Page 148 - Limit Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50231Wireless LAN – WLANSimilar to TKIP, CCM uses a 48-bit Initial Vector in each pac

Page 149

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN232Wireless LAN – WLANsteps like WPA, the IEEE committee has now presented the new

Page 150 - Measure Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50233Wireless LAN – WLANexample, is not a particularly secure SSID. (’Network setting

Page 151 - 8.3.9 Firewall diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN234Wireless LAN – WLANapply to all of the logical wireless networks supported by th

Page 152 - Configuration tool

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50235Wireless LAN – WLANstations. If the stations do not answer these packets, then t

Page 153 - Element Element meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN236Wireless LAN – WLANCheck that the setting 'filter out data from the listed

Page 154

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50237Wireless LAN – WLANConfiguration with LANconfigFor configuration with LANconfig

Page 155 - Entry Description

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN238Wireless LAN – WLAN Redirect address when the 'Redirect' action is se

Page 156

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50239Wireless LAN – WLANincorporated in the 802.11 standard for the encryption of dat

Page 157

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management24Configuration and manage-menttime under Windows operating systems—of all

Page 158 - Flag Flag meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN240Wireless LAN – WLANKey 1/passphraseIn line with the encryption method activated,

Page 159 - 8.3.10 Firewall limitations

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50241Wireless LAN – WLANRules of the entry of the keys can be found in the descriptio

Page 160 - Detection

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN242Wireless LAN – WLANkeys: a special key for each logical WLAN interface and three

Page 161

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50243Wireless LAN – WLANRules for entering WEP keysWEP keys can be entered as ASCII c

Page 162

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN244Wireless LAN – WLANConfiguration with LANconfigFor the configuration with LANcon

Page 163

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50245Wireless LAN – WLANthe list of physical WLAN interfaces by clicking on the butto

Page 164

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN246Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Page 165

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50247Wireless LAN – WLANthis mode, the WLAN card in the access point principally work

Page 166

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN248Wireless LAN – WLANpossible range and, in particular, the highest possible data

Page 167

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50249Wireless LAN – WLAN Point-to-point 'Off': The access point only commu

Page 168 - 9 Quality of Service

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5025Configuration and manage-mentmonitor. If the configuration of the device

Page 169 - Quality of Service

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN250Wireless LAN – WLANCreate IBBSIf the station can establish an IBBS (Independent

Page 170

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50251Wireless LAN – WLANLAN' tab. Open the list of logical WLAN interfaces by cl

Page 171

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN252Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Page 172 - 9.3 The queue concept

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50253Wireless LAN – WLANRTS thresholdThe RTS threshold prevents the occurrence of the

Page 173

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN254Wireless LAN – WLAN11.4.5 Additional WLAN functionsApart from the different encr

Page 174

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50255Wireless LAN – WLANIEEE 802.1x/EAPThe international industry standard IEEE 802.1

Page 175

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN256Wireless LAN – WLANIPSec over WLANOnly with the LANCOM VPN Option. Not available

Page 176

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50257Wireless LAN – WLANtransmitter and receiver. The areas where the waves amplify o

Page 177

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN258Wireless LAN – WLANTo ensure that the Fresnel zone 1 remains unobstructed, the h

Page 178

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50259Wireless LAN – WLANconnections, and even the air, and amplifying elements such a

Page 179

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management26Configuration and manage-mentspecify whether LANmonitor should create a l

Page 180 - 1 64 128 256 512 1024 1500

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN260Wireless LAN – WLANThe data transmission rate is set according to the reception

Page 181

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50261Wireless LAN – WLAN햸 The receiving end also has amplifying and attenuating eleme

Page 182

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN262Wireless LAN – WLAN(P2mP, connection from an access point to the registered clie

Page 183 - 9.7 QoS configuration

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50263Wireless LAN – WLAN Assumed cable loss: 9 dBAirLancer Extender O-70 (802.11b/g)

Page 184

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN264Wireless LAN – WLAN11.5.4 Transmission power reductionEvery country has regulati

Page 185

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50265Office communications with LANCAPI12 Office communications with L

Page 186

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI266Office communications with LANCAPI Which of the computers in the

Page 187

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50267Office communications with LANCAPI햴 Activate the LANCAPI server f

Page 188 - Transfer External

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI268Office communications with LANCAPI햹 Switch to the 'Availabil

Page 189

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50269Office communications with LANCAPIIf necessary, the system is res

Page 190

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5027Configuration and manage-ment3.5.2 Overview of the keys3.5.3 Overview of

Page 191

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI270Office communications with LANCAPI It is also possible to set th

Page 192 - 10 Virtual LANs (VLANs)

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50271Office communications with LANCAPIInstallationThe CAPI Faxmodem c

Page 193 - 10.2.1 Frame tagging

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN272Server services for the LAN13 Server services for the LANAn LANCOM offer

Page 194 - Virtual LANs (VLANs)

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50273Server services for the LAN period of validity for the parameters assig

Page 195 - 10.2.3 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN274Server services for the LAN13.1.3 How are the addresses assigned?IP addr

Page 196

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50275Server services for the LANOtherwise, the network mask from the TCP/IP m

Page 197

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN276Server services for the LANit requested. The DHCP module provides two se

Page 198 - 10.3 Configuration of VLANs

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50277Server services for the LANChecking of IP addresses in the LANThe DHCP t

Page 199 - 10.3.2 The port table

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN278Server services for the LANpart specifies the domain. Specifying the dom

Page 200

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50279Server services for the LAN Finally, the DNS server checks whether the

Page 201

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management28Configuration and manage-ment3.5.4 Combination commandsAny appended param

Page 202

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN280Server services for the LAN Initially the router checks whether a DNS s

Page 203 - 11 Wireless LAN – WLAN

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50281Server services for the LAN햳 Enter the domain in which the DNS server is

Page 204 - Wireless LAN – WLAN

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN282Server services for the LAN that are accessible via the router.With the

Page 205

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50283Server services for the LANThe DNS server may either be specified by the

Page 206

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN284Server services for the LANTo only block the access of a certain compute

Page 207

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50285Server services for the LANThe current WAN IP address of a LANCOM can be

Page 208

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN286Server services for the LANmum of 830 charge units may be used in six da

Page 209

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50287Server services for the LAN13.3.3 Settings in the charge moduleIn the ch

Page 210

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN288Server services for the LAN13.4.1 Setting up the SYSLOG module13.4.2 Exa

Page 211

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50289Server services for the LANshows the alignment between the internal sour

Page 212

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5029Configuration and manage-ment3.5.5 Examples3.6 Working with configuration

Page 213

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN290Server services for the LAN햶 After you have set all the parameters, conf

Page 214 - 11.2.1 Some basic concepts

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50291Virtual Private Networks—VPN14 Virtual Private Networks—VPN14.1 What do

Page 215 - 11.2.2 WEP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN292Virtual Private Networks—VPN The central LAN has a connection to the I

Page 216

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50293Virtual Private Networks—VPN The subsidiary also has its own connectio

Page 217

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN294Virtual Private Networks—VPNRouting at the IP level with VPNIP connecti

Page 218

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50295Virtual Private Networks—VPNthe Internet. With the proper technology, t

Page 219 - 11.2.3 WEPplus

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN296Virtual Private Networks—VPNfollowing example illustrates a typical app

Page 220 - 11.2.4 EAP and 802.1x

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50297Virtual Private Networks—VPN When VPN clients are dialing in with the

Page 221

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN298Virtual Private Networks—VPN DES, key length 56 bit IKE key exchange

Page 222

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50299Virtual Private Networks—VPNIn practice, LAN-LAN couplings are frequent

Page 223 - 11.2.5 TKIP and WPA

 Contents LANCOM Reference Manual LCOS 3.503ContentsContents1 Preface 102 System design 133 Configuration and management 153.1 Configuration tool

Page 224

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management30Configuration and manage-mentConvenient series configurationHowever, even

Page 225

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN300Virtual Private Networks—VPNsoftware then sets up a tunnel to the VPN g

Page 226

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50301Virtual Private Networks—VPNof the Internet and a private one by which

Page 227

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN302Virtual Private Networks—VPN static – dynamic dynamic – dynamicDynami

Page 228

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50303Virtual Private Networks—VPNStatic – dynamicIf, on the other hand, comp

Page 229

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN304Virtual Private Networks—VPNtranslation via dynamic DNS services, a sol

Page 230 - 11.2.6 AES and 802.11i

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50305Virtual Private Networks—VPNThe LLC element is not available in 1TR6, t

Page 231 - 11.2.7 Summary

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN306Virtual Private Networks—VPNaddress for the DNS name translation. This

Page 232

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50307Virtual Private Networks—VPNindividual computers (RAS) or the connectio

Page 233

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN308Virtual Private Networks—VPN14.5.2 Set up VPN connections with the Setu

Page 234 - 11.4.1 WLAN security

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50309Virtual Private Networks—VPN14.5.3 Inspect VPN rulesVPN rules represent

Page 235 - Configuration tool Menu/Table

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5031Configuration and manage-ment The device no longer responds after loadin

Page 236

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN310Virtual Private Networks—VPN Definition of the tunnel endpoints Defin

Page 237

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50311Virtual Private Networks—VPN14.5.5 Prepare VPN network relationshipsThe

Page 238

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN312Virtual Private Networks—VPN When only a portion of the local intranet

Page 239

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50313Virtual Private Networks—VPNThe firewall rules for generating VPN rules

Page 240

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN314Virtual Private Networks—VPN14.5.6 Configuration with LANconfigThe sect

Page 241

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50315Virtual Private Networks—VPNgateway”, enter the public address of the r

Page 242

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN316Virtual Private Networks—VPNaccessible in the remote and in the local L

Page 243 - 11.4.2 General WLAN settings

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50317Virtual Private Networks—VPNAs a rule, it is recommended that you keep

Page 244

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN318Virtual Private Networks—VPNThe only difference is that the source and

Page 245

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50319Virtual Private Networks—VPN햴 Under Configuration  VPN  Connection li

Page 246

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management32Configuration and manage-mentLANconfig then tells you the version number

Page 247

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN320Virtual Private Networks—VPNaccessible in the remote and in the local L

Page 248

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50321Virtual Private Networks—VPN“VPN-GW1-REMOTE”). Enter each subnet in the

Page 249

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN322Virtual Private Networks—VPNonly difference is that the source and the

Page 250

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50323Virtual Private Networks—VPN14.6.1 Static/staticA VPN tunnel via the In

Page 251

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN324Virtual Private Networks—VPNHeadquarters has a fixed, static address. W

Page 252

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50325Virtual Private Networks—VPNAlternatively, this application can be solv

Page 253

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN326Virtual Private Networks—VPNThe entries for the ISDN connection are nee

Page 254

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50327Virtual Private Networks—VPN14.7.1 IPSec—The basis for LANCOM VPNThe or

Page 255

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN328Virtual Private Networks—VPN14.7.2 Alternatives to IPSecIPSec is an ope

Page 256

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50329Virtual Private Networks—VPNAll of these layer-2 protocols only support

Page 257 - √ (λ * d)

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5033Configuration and manage-ment StatusContains all read-only statistics of

Page 258 - 11.5.2 Antenna power

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN330Virtual Private Networks—VPN Security Parameter Index (SPI)ID to disti

Page 259

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50331Virtual Private Networks—VPNIn transport mode, the IP header of the ori

Page 260

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN332Virtual Private Networks—VPNThe result is a nominal key length of 168 b

Page 261

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50333Virtual Private Networks—VPNThe AH process in the senderIn the sender,

Page 262 - Mbps P2P P2mP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN334Virtual Private Networks—VPNpacket. The comparison with the sent ICV of

Page 263 -  Assumed cable loss: 6 dB

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50335Virtual Private Networks—VPNGeneration of the authentication dataIn the

Page 264

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN336Virtual Private Networks—VPN햵 In two further messages, the devices exch

Page 265 - Office communications with

 Chapter 15: Appendix LANCOM Reference Manual LCOS 3.5033715 Appendix: Overview of functions for LANCOM models and LCOS versions 1) Port Sep

Page 266

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index338Index16 IndexNumerics11 mapping 41, 843 DES 297, 3313-DES 3374-Port Switch 337802.11i 213

Page 267

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42339IndexCommand line reference 33Common ISDN Application Programming Interface (CAPI) 265Comput

Page 268

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management34Configuration and manage-ment All commands and directory/item names may

Page 269

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index340IndexDynamic – static 302, 323Examples 323How it works 301ICMP 324Introduction 300PPP lis

Page 270 - 12.4 The LANCOM CAPI Faxmodem

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42341IndexIKE 298, 335Inband 15inbandConfiguration via Inband 15with Telnet 19Initial Vector 2

Page 271

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index342IndexMAC frame 194Mail server 282Main mode 297Maximum bandwidth 170, 172Microsoft Network

Page 272 - 13.1.1 The DHCP server

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42343IndexPrecedence 170Pre-Shared Key 214Preshared key 298Priority control 268Private Mode 33

Page 273 - Server services for the LAN

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index344IndexTCP-Stealth-Modus 124Teardrop 164Telnet 21Temporal Key Integrity Protocol 224Term 97

Page 274

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42345IndexStatic – dynamic 324static - static 323VPN client 299VPN connectionsDiagnosis 322Manu

Page 275

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index346IndexVPN pass-through 207WEP group keys 241WLAN interfacelogical 250physical 244WLAN secur

Page 276

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5035Configuration and manage-ment regular firmware or configuration updates

Page 277 - 13.2 DNS

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management36Configuration and manage-mentTime-controlled rules will not necessarily b

Page 278

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5037Management4 Management4.1 N:N mappingNetwork Address Translation (NAT) can be used for seve

Page 279 - 13.2.2 DNS forwarding

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management38Managementthe defined translation range. An “inbound” address mapping, whe-reby the source

Page 280 - Configuration tool Run/Table

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5039ManagementWith the help of N:N mapping, all addresses of the LAN can be translated toa new

Page 281

LANCOM Reference Manual LCOS 3.50  Contents4Contents4.1.1 Application examples 384.1.2 Configuration 424.1.3 455 Diagnosis 465.1 LANmonitor—kno

Page 282

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management40ManagementIn this example, a service provider monitors the networks of different clientsout

Page 283 - 13.2.4 URL blocking

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5041ManagementThe networks of client A and B use different address ranges in therespective head

Page 284 - 13.2.5 Dynamic DNS

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management42Managementwith actual same address range looks like two different networks for the gate-way

Page 285 - 13.3 Call charge management

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5043ManagementThe address range for translation must be at minimum as large as thesource addres

Page 286

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management44Managementped” original addresses. The entries of the remote network use the“mapped” addres

Page 287 - 13.4 The SYSLOG module

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5045ManagementWEBconfig, TelnetUnder WEBconfig and Telnet you find the NAT table for configurat

Page 288

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis46Diagnosis5 Diagnosis5.1 LANmonitor—know what's happeningThe LANmonitor includes a monit

Page 289 - Source Meaning Facility

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5047Diagnosis5.1.2 Monitor Internet connectionTo demonstrate the functions of LANmonitor we will

Page 290 - /var/log/lancom.log

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis48DiagnosisUnder the general information you can watch the transmission rates atwhich data is

Page 291 - 14.1 What does VPN offer?

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5049Diagnosis5.2.2 Overview of the keys5.2.3 Overview of the parametersThe available traces depe

Page 292 - Virtual Private Networks—

 Contents LANCOM Reference Manual LCOS 3.505Contents7.4 N:N mapping 807.4.1 Application examples 817.4.2 Configuration 857.5 Configuration of rem

Page 293

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis50Diagnosis5.2.4 Combination commandsAny appended parameters are processed from left to right.

Page 294

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5051Diagnosis5.2.5 ExamplesThis code... ... in combination with the trace causes the following:t

Page 295 - 14.2 LANCOM VPN: an overview

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security52Security6 SecurityYou certainly would not like any outsider to have easy access to or to be a

Page 296

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5053SecurityNote: If a password has not been set, the Power LED flashes, until thedevices have be

Page 297 - 14.2.3 LANCOM VPN functions

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security54Securityard Security Settings. In a terminal or Telnet session you set or change thepassword

Page 298 - 14.3.1 LAN-LAN coupling

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5055Security Lock configuration for (Lock-minutes)6.1.3 Restriction of the access rights on the

Page 299

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security56Security햲 Change to the register card 'Security in the 'Management' configurat

Page 300

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5057Securityrately. The configuration access can generally be permitted or forbidden, apure rea

Page 301

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security58SecurityBy default, this table does not contain entries. Thus the device can beaccessed over

Page 302

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5059SecurityYou have a choice of the following: all: Calls are accepted from any remote station.

Page 303

LANCOM Reference Manual LCOS 3.50  Contents6Contents8.3.10 Firewall limitations 1598.4 Protection against break-in attempts: Intrusion Detection 16

Page 304

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security60SecurityChecking the numberWhen a call is placed over an ISDN line, the caller's number

Page 305

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5061SecurityAn especially effective callback method is the fast-callback procedure (patentpending

Page 306

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security62SecurityWhen a call is placed over an ISDN line, the caller's number is normallysent ove

Page 307

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5063Securitywill be permitted to use the internal functions. The circle of authorizedusers can be

Page 308

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections64Routing and WAN connections7 Routing and WAN connectionsThis chapter descr

Page 309 - 14.5.3 Inspect VPN rules

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5065Routing and WAN connectionsA simplified example will clarify this process.

Page 310

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections66Routing and WAN connections햵 Transmission of data packetsAs soon as the co

Page 311

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5067Routing and WAN connectionsConfiguration of the routing tableAn IP routing

Page 312

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections68Routing and WAN connectionsThat way routes which are forbidden on the Inte

Page 313

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5069Routing and WAN connectionsHow can you assist the workstation computer now

Page 314

 Contents LANCOM Reference Manual LCOS 3.507Contents10.3.4 Configuration with WEBconfig or Telnet 20111 Wireless LAN – WLAN 20311.1 What is a Wire

Page 315

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections70Routing and WAN connectionsAlthough the entries in the static routing tabl

Page 316

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5071Routing and WAN connectionscolumn shows which router has revealed this rou

Page 317

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections72Routing and WAN connectionspackets and look on them as normal broadcast or

Page 318

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5073Routing and WAN connections 'address': The network mask is deri

Page 319

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections74Routing and WAN connectionsassume a certain order that differs from the pr

Page 320

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5075Routing and WAN connectionsany number. It also enters this new port on the

Page 321

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections76Routing and WAN connectionsWhich protocols can be transmitted using IP mas

Page 322

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5077Routing and WAN connectionsOn the local side, the router supports two diff

Page 323 - 14.6.2 Dynamic/static

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections78Routing and WAN connections7.3.2 Inverse masqueradingThis masking operates

Page 324 - Branch_office

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5079Routing and WAN connectionsConfiguration of the inverse masqueradingStatef

Page 325

LANCOM Reference Manual LCOS 3.50  Contents8Contents13 Server services for the LAN 27213.1 Automatic IP address administration with DHCP 27213.1.1

Page 326 - 14.7 How does VPN work?

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections80Routing and WAN connectionsExample: You are assigned the IP network addres

Page 327

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5081Routing and WAN connectionsIn the first application the so-called N:1 NAT,

Page 328 - 14.7.2 Alternatives to IPSec

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections82Routing and WAN connectionsNetwork couplingAn often appearing scenario is

Page 329

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5083Routing and WAN connectionsRemote monitoring and remote control of network

Page 330

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections84Routing and WAN connectionsclient C operates a network with several public

Page 331

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5085Routing and WAN connectionshead office. On this occasion, also all subnet

Page 332

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections86Routing and WAN connectionsof the mapping address. Therefore, in an assign

Page 333

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5087Routing and WAN connectionsuse the “mapped” addresses of the remote side,

Page 334

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections88Routing and WAN connectionsConfiguration with different toolsLANconfigWith

Page 335 - 14.8.5 Key management – IKE

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5089Routing and WAN connectionsWhen starting a new entry under WEBconfig, the

Page 336

 Contents LANCOM Reference Manual LCOS 3.509Contents14.5.5 Prepare VPN network relationships 31114.5.6 Configuration with LANconfig 31414.5.7 Conf

Page 337

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections90Routing and WAN connections7.5.2 Layer listWith a layer, a collection of p

Page 338 - 16 Index

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5091Routing and WAN connections7.6 Establishing connection with PPPLANCOM rout

Page 339

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections92Routing and WAN connectionsof routers made by different manufacturers sinc

Page 340

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5093Routing and WAN connectionsThe phases of PPP negotiationEstablishment of a

Page 341

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections94Routing and WAN connectionsto begin output of the PPP protocol frames exch

Page 342

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5095Routing and WAN connectionstelecomputer), the LANCOM assigns it an IP addr

Page 343

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections96Routing and WAN connectionsWindows users are able to view the assigned add

Page 344

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5097Routing and WAN connections7.7 Extended connection for flat rates—Keep-ali

Page 345

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections98Routing and WAN connectionsholding time of 0 seconds then. However, connec

Page 346

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5099Routing and WAN connectionsNo callbackFor this setting, the callback entry

Commentaires sur ces manuels

Pas de commentaire