Lancom Systems LCOS 3.50 Uživatelský manuál

Procházejte online nebo si stáhněte Uživatelský manuál pro Software Lancom Systems LCOS 3.50. Lancom Systems LCOS 3.50 User's Manual Uživatelská příručka

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 346
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků

Shrnutí obsahu

Strany 1 - LANCOM LCOS 3.50

Reference ManualLANCOM LCOS 3.50

Strany 2

LANCOM Reference Manual LCOS 3.50  Chapter 1: Preface10Preface1PrefaceUser’s manual and reference manualThe documentation of your device consists of

Strany 3 - Contents

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections100Routing and WAN connections The callback party selects 'Call back t

Strany 4

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50101Routing and WAN connectionsThe setting 'Name' offers the greate

Strany 5

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections102Routing and WAN connectionsTwo methods of channel bundling Static channe

Strany 6

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50103Routing and WAN connections Depending on the type of application, the B1

Strany 7

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall104Firewall8FirewallFor most companies and many private users a work without the Internet is no

Strany 8

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50105Firewall Destroy data on the workstations of the LAN. Paralyse workstations of the LAN or

Strany 9

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall106Firewallprotocol, the search for open ports is also called “port scanning”. On the occa-sion

Strany 10 - 1Preface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50107Firewallthat a defenceless workstation installed in the Internet will - perhaps evenaccident

Strany 11

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall108Firewallwhich are used for creation of the rules and which are checked during theoperation o

Strany 12

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50109FirewallPacket filtersOne speaks about a packet filter-based Firewall, if the router only ch

Strany 13 - 2 System design

 Chapter 1: Preface LANCOM Reference Manual LCOS 3.5011Prefaceucts. The extensive feature set is available throughout all LANCOM products(provided re

Strany 14 - System design

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall110Firewallit is expecting the connection. The server will establish as a result from its port2

Strany 15 - Configuration and manage

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50111Firewallpackets that do not belong to one of the tracked session of the connectionstate tabl

Strany 16 - 3.2 Configuration software

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall112Firewalltable, because the connection to the LAN has been initiated from the client.Afterwar

Strany 17

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50113Firewallonly the one with the correct delivery note will pass. Likewise, a second cou-rier d

Strany 18

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall114FirewallApplication Gateways: It never exists a direct connection e.g. between a clientof th

Strany 19

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50115Firewall8.3.1 How the LANCOM Firewall inspects data packetsThe Firewall filters only those d

Strany 20

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall116FirewallThe Firewall only checks routed data packets!The Firewall only checks data packets r

Strany 21 - LANCAPI

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50117FirewallThe LANCOM Firewall uses several lists for checking data packets, which areautomatic

Strany 22

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall118Firewalllist will be carried out. If the action intends to accept the packet, then anentry i

Strany 23

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50119Firewalla dynamic one, new entries can be added continuously with the appropri-ate Firewall

Strany 24

LANCOM Reference Manual LCOS 3.50  Chapter 1: [email protected] online services ( www.lancom.de) are available to you around theclock

Strany 25

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall120FirewallHowever, if the server wants to send larger sets of data (e.g. TFTP) and wouldnot li

Strany 26 - 3.5.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50121FirewallICMP connectionsFor ICMP two cases must be differentiated: The ICMP request/reply co

Strany 27 - 3.5.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall122FirewallPlease notice that the N:N mapping functions (’N:N mapping’→page 80) are only active

Strany 28 - 3.5.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50123Firewall Route: Fragmented packets are passed on without any further checkingby the Firewal

Strany 29 - 3.5.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall124Firewallroute" are also suppressed, so that the LANCOM cannot be found, neither by"

Strany 30

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50125Firewallthe needed port will be opened for a short time (20 seconds) solely for theauthentic

Strany 31

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall126Firewall Create VPN rule: Is this Firewall rule also used to create a VPN rule?(→page 127)P

Strany 32 - 3.8 Command line interface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50127Firewall either a rule applies to the packet, for which observe further rules is notactivat

Strany 33 - 3.8.1 Command line reference

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall128Firewallaction sets. If the same trigger is used for several action sets, thesequence of act

Strany 34 - 3.9 Scheduled Events

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50129Firewall The entire local network (LAN) Certain remote stations (described by the name of

Strany 35

 Chapter 2: System design LANCOM Reference Manual LCOS 3.5013System design2 System designThe LANCOM operating system LCOS is a collection of differen

Strany 36

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall130FirewallLimit / TriggerThe limit or trigger describes a quantified threshold value that must

Strany 37 - 4 Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50131Firewall SNMP/LANmonitor: Sends a SNMP trap, that will be analyzed e. g. byLANmonitor.Each

Strany 38 - 4.1.1 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall132FirewallFirewall. The specific parameters for the different alerting types such as thereleva

Strany 39 - Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50133FirewallFROM: [email protected] TO: [email protected] SUBJECT: packet

Strany 40

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall134FirewallSNMP: Generic trap = enterpriseSpecific (6) SNMP: Specific trap = 26 (0x1A) SNMP: Ti

Strany 41

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50135FirewallThis contradiction shows the dilemma of the responsible administrators whohave devel

Strany 42 - 4.1.2 Configuration

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall136FirewallSome LANCOM models support this structure by a separate LAN interface onlyused for t

Strany 43

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50137FirewallA direct data exchange between LAN and DMZ via LAN bridge is not possibleif a dedica

Strany 44

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall138FirewallIf you operate a web server in your LAN, that has been permittedaccess to this servi

Strany 45

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50139Firewall Example configuration “Basic Internet” If you want to permit a VPN dial-in to a L

Strany 46 - 5 Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 2: System design14System design LANCOM Wireless access points resp. LANCOM routers with wirelessmodules o

Strany 47 - Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall140Firewall For a network coupling you permit additionally the communicationbetween the involv

Strany 48 - 5.2.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50141Firewall8.3.8 Configuration of Firewall rulesFirewall wizardThe fastest method to configure

Strany 49 - 5.2.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall142FirewallLANconfigThe filters can be installed very comfortably with LANconfig. Starting from

Strany 50 - 5.2.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50143Firewall The option 'Observe further rules ...' can be used to create complexfunc

Strany 51 - 5.2.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall144Firewall Stations: Here the stations – as sender or addressee of the packets – arespecifi

Strany 52 - 6 Security

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50145FirewallWEBconfig, TelnetUnder WEBconfig or Telnet the Firewall rules are configured in the

Strany 53 - Security

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall146Firewallaction table for Firewall actions(→page 147). It can also contain directdescriptions

Strany 54 - 6.1.2 Login barring

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50147FirewallStations and services can be described according to the following rules in theobject

Strany 55

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall148Firewall Conditions If no further actions are specified in a “connect” or “Internet” fi

Strany 56

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50149FirewallIf an action is given without any associated limit, then implicitly apacket limit is

Strany 57

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5015Configuration and manage-ment3 Configuration and managementThis section w

Strany 58 - 6.2.1 Identification control

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall150Firewall Further measuresIf the "close port" action is executed, an entry in a bl

Strany 59

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50151Firewallsend at the same time an email to the administrator, then the description ofthe obje

Strany 60 - 6.2.2 Callback

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall152Firewalllast five events, that were triggered either by a Firewall rule, the DoS, or theIDS

Strany 61 - 6.3 The security checklist

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50153FirewallIf you call up the logging table via LANmonitor, it looks like the followingdepictio

Strany 62

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall154FirewallAll Firewall actions are likewise displayed within the IP router trace(’How to start

Strany 63

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50155FirewallOn Telnet level, the content of the filter list can be displayed with the com-mand s

Strany 64 - 7 Routing and WAN connections

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall156FirewallThe connection listThe connection table files source address, destination address,

Strany 65

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50157FirewallThe table contains the following elements: Element Element meaningSrc addr. Source

Strany 66 - 7.2 IP routing

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall158FirewallMeaning of the flags of the connection listPort block listAddress, protocol and port

Strany 67

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50159FirewallSorting is done according to address, protocol and port. The table contains thefollo

Strany 68 - 7.2.2 Local routing

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management16Configuration and manage-ment3.2 Configuration softwareSituations in whic

Strany 69

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall160Firewall8.4 Protection against break-in attempts: Intrusion DetectionA Firewall has the task

Strany 70

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50161Firewall8.4.2 Configuration of the IDSLANconfigParameters of the Intrusion Detection System

Strany 71

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall162Firewall8.5 Protection against “Denial of Service” attacksAttacks from the Internet can be b

Strany 72 - Configuration tool Menu/table

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50163Firewallduring the attack and, moreover, the owner of the falsified address cannotreceive no

Strany 73 - 7.2.4 SYN/ACK speedup

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall164Firewalla new Denial of Service attack can result thereby if the memory of the victimis exha

Strany 74 - 7.3.1 Simple masquerading

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50165Firewall8.5.2 Configuration of DoS blockingLANconfigParameters against DoS attacks are set i

Strany 75 - Source IP Port

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall166Firewall The connection will be cut off. The sender address will be blocked for an adjusta

Strany 76

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50167FirewallWEBconfig, TelnetWith WEBconfig or Telnet the suppression of responses can be confi

Strany 77

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service168Quality of Service9 Quality of ServiceThis chapter dedicates itself to quality: Un

Strany 78 - 7.3.2 Inverse masquerading

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50169Quality of Servicedesired data transfer, certain data packets must be treated pref

Strany 79

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5017Configuration and manage-mentOnce LANconfig has finished its search, it d

Strany 80 - 7.4 N:N mapping

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service170Quality of Service Limited maximum bandwidthWhat is DiffServ?DiffServ stands for

Strany 81 - 7.4.1 Application examples

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50171Quality of Service9.2.1 Guaranteed minimum bandwidthsHereby you give priority to e

Strany 82

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service172Quality of Service9.2.2 Limited maximum bandwidthsHereby you limit e.g. the entire

Strany 83

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50173Quality of ServiceAs long as the interval for the minimum bandwidth is not exceede

Strany 84

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service174Quality of Servicedata packets it is still able to receive, and thus brakes the da

Strany 85 - 7.4.2 Configuration

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50175Quality of Servicestandard DSL connection, the DSL interface is thus adjusted in t

Strany 86

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service176Quality of Service Standard reception queueAll packets that do not need special t

Strany 87

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50177Quality of ServiceA resulting delay has no disadvantageous effect to the TCP-secur

Strany 88

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service178Quality of Serviceoffice via VPN connection, over which the Internet traffic is no

Strany 89 - 7.5.1 Name list

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50179Quality of ServiceAccordingly, a VoIP connection should be configured such that th

Strany 90 - 7.5.2 Layer list

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management18Configuration and manage-mentManagement of multiple devicesLANconfig supp

Strany 91 - Parameter Meaning

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service180Quality of ServiceIn detail, delay is determined especially by the codec used, the

Strany 92 - 7.6.1 The protocol

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50181Quality of Servicethe IPSec header must be added (RTP and IPSec headers can be lar

Strany 93

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service182Quality of ServiceThe transfer time of the packets to the interface (serialization

Strany 94

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50183Quality of Servicetion always the physical data transfer via the respective interf

Strany 95

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service184Quality of Service DiffServ: The ToS/DiffServ field is interpreted as DiffServ fi

Strany 96

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50185Quality of ServiceWEBconfig, TelnetFor configuration with WEBconfig or Telnet, the

Strany 97 - In this column of

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service186Quality of Service The guaranteed bandwidth is defined on index card 'QoS&ap

Strany 98 - 7.8 Callback functions

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50187Quality of ServiceA maximum bandwidth is simply defined by a limit rule, which dis

Strany 99

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service188Quality of Service(e.g. Voice over IP), this extra overhead is quite noticeable. E

Strany 100 - With this

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50189Quality of Service9.7.4 Sending and receiving directionLANconfigThe interpretation

Strany 101

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5019Configuration and manage-mentSecure with HTTPSWEBconfig offers an encrypt

Strany 102

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service190Quality of Service Not packets of certain protocols are reduced, rather than all

Strany 103

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50191Quality of ServiceThe following example shows a setting for Voice over IP telephon

Strany 104 - 8Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)192Virtual LANs (VLANs)10 Virtual LANs (VLANs)10.1 What is a Virtual LAN?The incre

Strany 105 - 8.1.3 The methods

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50193Virtual LANs (VLANs) Data traffic of certain logical units should be transmitt

Strany 106 - 8.1.4 The victims

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)194Virtual LANs (VLANs)The tagging is realized by an additional field within the M

Strany 107 - 8.2 What is a Firewall?

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50195Virtual LANs (VLANs)rules for generating and processing of the VLAN tags are as

Strany 108 - Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)196Virtual LANs (VLANs)Management and user traffic on a LANSeveral hot spots are i

Strany 109

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50197Virtual LANs (VLANs)But this task is very burdensome to realize by hardware cha

Strany 110

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)198Virtual LANs (VLANs)10.3 Configuration of VLANsVLAN technology functions are pr

Strany 111

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50199Virtual LANs (VLANs)Example for a network table:10.3.2 The port tableThe port t

Strany 112

© 2004 LANCOM Systems GmbH, Wuerselen (Germany)While the information in this manual has been compiled with great care, it may not be deemed an assuran

Strany 113

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management20Configuration and manage-mentThe syntax of the TFTP call is dependent on

Strany 114 - 8.3 The LANCOM Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)200Virtual LANs (VLANs)10.3.3 Configuration with LANconfigParameters for virtual n

Strany 115

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50201Virtual LANs (VLANs)The definition of the used virtual networks can be accessed

Strany 116

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)202Virtual LANs (VLANs)The VLAN configuration shows up under WEBconfig as follows:

Strany 117

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50203Wireless LAN – WLAN11 Wireless LAN – WLAN11.1 What is a Wireless LAN?The followi

Strany 118

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN204Wireless LAN – WLANIEEE 802.11a: 54 MbpsIEEE 802.11a describes the operation of

Strany 119 - 8.3.2 Special protocols

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50205Wireless LAN – WLANtransmission. If exactly this range is used by another transm

Strany 120

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN206Wireless LAN – WLANYour LANCOM base station supports - according to the model ty

Strany 121

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50207Wireless LAN – WLAN Larger Wireless LANs, connection to LANs with one or more b

Strany 122

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN208Wireless LAN – WLAN Connecting the Wireless LAN to an existing LAN Extending t

Strany 123

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50209Wireless LAN – WLANIn the example above, the roaming function of the mobile stat

Strany 124

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5021Configuration and manage-mentYou can also reserve a special calling numbe

Strany 125

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN210Wireless LAN – WLANalso possible to specifically control the access of workstati

Strany 126

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50211Wireless LAN – WLANBy the use of narrow beam antennas (e.g. AirLancer Extender),

Strany 127

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN212Wireless LAN – WLANbase station. Due to the client mode, it is also possible to

Strany 128

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50213Wireless LAN – WLANIn some applications, however, it may be desirable to divide

Strany 129

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN214Wireless LAN – WLANOn the way from the original WEP of the 802.11 standard to 80

Strany 130

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50215Wireless LAN – WLANcase, so-called assymetric encryption methods such as RSA can

Strany 131

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN216Wireless LAN – WLANdata packet—a double application of the XOR operation with th

Strany 132 - Configuration tool Run

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50217Wireless LAN – WLANcombination of two clear text packets. If one already knows t

Strany 133

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN218Wireless LAN – WLANusually weaker than 40 or 104 bits (the current IEEE standard

Strany 134

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50219Wireless LAN – WLANfor certain values of the RC4 key, conclusions may be drawn a

Strany 135

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management22Configuration and manage-ment햳 Open a Telnet session to the LANCOM. Use t

Strany 136

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN220Wireless LAN – WLANwhich could automatically crack an arbitrary WLAN connection

Strany 137

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50221Wireless LAN – WLANthe possibility of installing a valid WEP key for the next se

Strany 138

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN222Wireless LAN – WLANThe access point is thus a sort of middle man between client

Strany 139

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50223Wireless LAN – WLANFurther advantages of this procedure include its simple imple

Strany 140

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN224Wireless LAN – WLAN A simplified procedure for deriving the Master Secret menti

Strany 141 - Firewall wizard

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50225Wireless LAN – WLANa new component (green), however, besides the CRC, the unencr

Strany 142

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN226Wireless LAN – WLANdecryption part of TKIP checks this sequentiality and discard

Strany 143

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50227Wireless LAN – WLANThe key handshake breaks down into two phases: first the pair

Strany 144

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN228Wireless LAN – WLANThe client still can't be 'approved', however,

Strany 145

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50229Wireless LAN – WLANpoint to show whether encryption should be used or not. This

Strany 146

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5023Configuration and manage-ment햲 Switch to the 'Security' tab in

Strany 147

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN230Wireless LAN – WLAN11.2.6 AES and 802.11i In mid-2004, the long awaited 802.11i

Strany 148 - Limit Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50231Wireless LAN – WLANSimilar to TKIP, CCM uses a 48-bit Initial Vector in each pac

Strany 149

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN232Wireless LAN – WLANsteps like WPA, the IEEE committee has now presented the new

Strany 150 - Measure Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50233Wireless LAN – WLANexample, is not a particularly secure SSID. (’Network setting

Strany 151 - 8.3.9 Firewall diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN234Wireless LAN – WLANapply to all of the logical wireless networks supported by th

Strany 152 - Configuration tool

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50235Wireless LAN – WLANstations. If the stations do not answer these packets, then t

Strany 153 - Element Element meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN236Wireless LAN – WLANCheck that the setting 'filter out data from the listed

Strany 154

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50237Wireless LAN – WLANConfiguration with LANconfigFor configuration with LANconfig

Strany 155 - Entry Description

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN238Wireless LAN – WLAN Redirect address when the 'Redirect' action is se

Strany 156

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50239Wireless LAN – WLANincorporated in the 802.11 standard for the encryption of dat

Strany 157

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management24Configuration and manage-menttime under Windows operating systems—of all

Strany 158 - Flag Flag meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN240Wireless LAN – WLANKey 1/passphraseIn line with the encryption method activated,

Strany 159 - 8.3.10 Firewall limitations

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50241Wireless LAN – WLANRules of the entry of the keys can be found in the descriptio

Strany 160 - Detection

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN242Wireless LAN – WLANkeys: a special key for each logical WLAN interface and three

Strany 161

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50243Wireless LAN – WLANRules for entering WEP keysWEP keys can be entered as ASCII c

Strany 162

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN244Wireless LAN – WLANConfiguration with LANconfigFor the configuration with LANcon

Strany 163

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50245Wireless LAN – WLANthe list of physical WLAN interfaces by clicking on the butto

Strany 164

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN246Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Strany 165

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50247Wireless LAN – WLANthis mode, the WLAN card in the access point principally work

Strany 166

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN248Wireless LAN – WLANpossible range and, in particular, the highest possible data

Strany 167

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50249Wireless LAN – WLAN Point-to-point 'Off': The access point only commu

Strany 168 - 9 Quality of Service

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5025Configuration and manage-mentmonitor. If the configuration of the device

Strany 169 - Quality of Service

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN250Wireless LAN – WLANCreate IBBSIf the station can establish an IBBS (Independent

Strany 170

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50251Wireless LAN – WLANLAN' tab. Open the list of logical WLAN interfaces by cl

Strany 171

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN252Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Strany 172 - 9.3 The queue concept

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50253Wireless LAN – WLANRTS thresholdThe RTS threshold prevents the occurrence of the

Strany 173

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN254Wireless LAN – WLAN11.4.5 Additional WLAN functionsApart from the different encr

Strany 174

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50255Wireless LAN – WLANIEEE 802.1x/EAPThe international industry standard IEEE 802.1

Strany 175

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN256Wireless LAN – WLANIPSec over WLANOnly with the LANCOM VPN Option. Not available

Strany 176

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50257Wireless LAN – WLANtransmitter and receiver. The areas where the waves amplify o

Strany 177

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN258Wireless LAN – WLANTo ensure that the Fresnel zone 1 remains unobstructed, the h

Strany 178

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50259Wireless LAN – WLANconnections, and even the air, and amplifying elements such a

Strany 179

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management26Configuration and manage-mentspecify whether LANmonitor should create a l

Strany 180 - 1 64 128 256 512 1024 1500

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN260Wireless LAN – WLANThe data transmission rate is set according to the reception

Strany 181

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50261Wireless LAN – WLAN햸 The receiving end also has amplifying and attenuating eleme

Strany 182

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN262Wireless LAN – WLAN(P2mP, connection from an access point to the registered clie

Strany 183 - 9.7 QoS configuration

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50263Wireless LAN – WLAN Assumed cable loss: 9 dBAirLancer Extender O-70 (802.11b/g)

Strany 184

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN264Wireless LAN – WLAN11.5.4 Transmission power reductionEvery country has regulati

Strany 185

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50265Office communications with LANCAPI12 Office communications with L

Strany 186

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI266Office communications with LANCAPI Which of the computers in the

Strany 187

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50267Office communications with LANCAPI햴 Activate the LANCAPI server f

Strany 188 - Transfer External

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI268Office communications with LANCAPI햹 Switch to the 'Availabil

Strany 189

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50269Office communications with LANCAPIIf necessary, the system is res

Strany 190

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5027Configuration and manage-ment3.5.2 Overview of the keys3.5.3 Overview of

Strany 191

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI270Office communications with LANCAPI It is also possible to set th

Strany 192 - 10 Virtual LANs (VLANs)

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50271Office communications with LANCAPIInstallationThe CAPI Faxmodem c

Strany 193 - 10.2.1 Frame tagging

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN272Server services for the LAN13 Server services for the LANAn LANCOM offer

Strany 194 - Virtual LANs (VLANs)

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50273Server services for the LAN period of validity for the parameters assig

Strany 195 - 10.2.3 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN274Server services for the LAN13.1.3 How are the addresses assigned?IP addr

Strany 196

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50275Server services for the LANOtherwise, the network mask from the TCP/IP m

Strany 197

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN276Server services for the LANit requested. The DHCP module provides two se

Strany 198 - 10.3 Configuration of VLANs

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50277Server services for the LANChecking of IP addresses in the LANThe DHCP t

Strany 199 - 10.3.2 The port table

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN278Server services for the LANpart specifies the domain. Specifying the dom

Strany 200

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50279Server services for the LAN Finally, the DNS server checks whether the

Strany 201

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management28Configuration and manage-ment3.5.4 Combination commandsAny appended param

Strany 202

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN280Server services for the LAN Initially the router checks whether a DNS s

Strany 203 - 11 Wireless LAN – WLAN

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50281Server services for the LAN햳 Enter the domain in which the DNS server is

Strany 204 - Wireless LAN – WLAN

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN282Server services for the LAN that are accessible via the router.With the

Strany 205

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50283Server services for the LANThe DNS server may either be specified by the

Strany 206

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN284Server services for the LANTo only block the access of a certain compute

Strany 207

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50285Server services for the LANThe current WAN IP address of a LANCOM can be

Strany 208

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN286Server services for the LANmum of 830 charge units may be used in six da

Strany 209

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50287Server services for the LAN13.3.3 Settings in the charge moduleIn the ch

Strany 210

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN288Server services for the LAN13.4.1 Setting up the SYSLOG module13.4.2 Exa

Strany 211

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50289Server services for the LANshows the alignment between the internal sour

Strany 212

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5029Configuration and manage-ment3.5.5 Examples3.6 Working with configuration

Strany 213

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN290Server services for the LAN햶 After you have set all the parameters, conf

Strany 214 - 11.2.1 Some basic concepts

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50291Virtual Private Networks—VPN14 Virtual Private Networks—VPN14.1 What do

Strany 215 - 11.2.2 WEP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN292Virtual Private Networks—VPN The central LAN has a connection to the I

Strany 216

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50293Virtual Private Networks—VPN The subsidiary also has its own connectio

Strany 217

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN294Virtual Private Networks—VPNRouting at the IP level with VPNIP connecti

Strany 218

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50295Virtual Private Networks—VPNthe Internet. With the proper technology, t

Strany 219 - 11.2.3 WEPplus

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN296Virtual Private Networks—VPNfollowing example illustrates a typical app

Strany 220 - 11.2.4 EAP and 802.1x

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50297Virtual Private Networks—VPN When VPN clients are dialing in with the

Strany 221

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN298Virtual Private Networks—VPN DES, key length 56 bit IKE key exchange

Strany 222

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50299Virtual Private Networks—VPNIn practice, LAN-LAN couplings are frequent

Strany 223 - 11.2.5 TKIP and WPA

 Contents LANCOM Reference Manual LCOS 3.503ContentsContents1 Preface 102 System design 133 Configuration and management 153.1 Configuration tool

Strany 224

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management30Configuration and manage-mentConvenient series configurationHowever, even

Strany 225

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN300Virtual Private Networks—VPNsoftware then sets up a tunnel to the VPN g

Strany 226

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50301Virtual Private Networks—VPNof the Internet and a private one by which

Strany 227

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN302Virtual Private Networks—VPN static – dynamic dynamic – dynamicDynami

Strany 228

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50303Virtual Private Networks—VPNStatic – dynamicIf, on the other hand, comp

Strany 229

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN304Virtual Private Networks—VPNtranslation via dynamic DNS services, a sol

Strany 230 - 11.2.6 AES and 802.11i

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50305Virtual Private Networks—VPNThe LLC element is not available in 1TR6, t

Strany 231 - 11.2.7 Summary

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN306Virtual Private Networks—VPNaddress for the DNS name translation. This

Strany 232

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50307Virtual Private Networks—VPNindividual computers (RAS) or the connectio

Strany 233

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN308Virtual Private Networks—VPN14.5.2 Set up VPN connections with the Setu

Strany 234 - 11.4.1 WLAN security

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50309Virtual Private Networks—VPN14.5.3 Inspect VPN rulesVPN rules represent

Strany 235 - Configuration tool Menu/Table

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5031Configuration and manage-ment The device no longer responds after loadin

Strany 236

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN310Virtual Private Networks—VPN Definition of the tunnel endpoints Defin

Strany 237

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50311Virtual Private Networks—VPN14.5.5 Prepare VPN network relationshipsThe

Strany 238

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN312Virtual Private Networks—VPN When only a portion of the local intranet

Strany 239

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50313Virtual Private Networks—VPNThe firewall rules for generating VPN rules

Strany 240

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN314Virtual Private Networks—VPN14.5.6 Configuration with LANconfigThe sect

Strany 241

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50315Virtual Private Networks—VPNgateway”, enter the public address of the r

Strany 242

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN316Virtual Private Networks—VPNaccessible in the remote and in the local L

Strany 243 - 11.4.2 General WLAN settings

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50317Virtual Private Networks—VPNAs a rule, it is recommended that you keep

Strany 244

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN318Virtual Private Networks—VPNThe only difference is that the source and

Strany 245

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50319Virtual Private Networks—VPN햴 Under Configuration  VPN  Connection li

Strany 246

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management32Configuration and manage-mentLANconfig then tells you the version number

Strany 247

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN320Virtual Private Networks—VPNaccessible in the remote and in the local L

Strany 248

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50321Virtual Private Networks—VPN“VPN-GW1-REMOTE”). Enter each subnet in the

Strany 249

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN322Virtual Private Networks—VPNonly difference is that the source and the

Strany 250

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50323Virtual Private Networks—VPN14.6.1 Static/staticA VPN tunnel via the In

Strany 251

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN324Virtual Private Networks—VPNHeadquarters has a fixed, static address. W

Strany 252

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50325Virtual Private Networks—VPNAlternatively, this application can be solv

Strany 253

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN326Virtual Private Networks—VPNThe entries for the ISDN connection are nee

Strany 254

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50327Virtual Private Networks—VPN14.7.1 IPSec—The basis for LANCOM VPNThe or

Strany 255

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN328Virtual Private Networks—VPN14.7.2 Alternatives to IPSecIPSec is an ope

Strany 256

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50329Virtual Private Networks—VPNAll of these layer-2 protocols only support

Strany 257 - √ (λ * d)

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5033Configuration and manage-ment StatusContains all read-only statistics of

Strany 258 - 11.5.2 Antenna power

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN330Virtual Private Networks—VPN Security Parameter Index (SPI)ID to disti

Strany 259

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50331Virtual Private Networks—VPNIn transport mode, the IP header of the ori

Strany 260

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN332Virtual Private Networks—VPNThe result is a nominal key length of 168 b

Strany 261

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50333Virtual Private Networks—VPNThe AH process in the senderIn the sender,

Strany 262 - Mbps P2P P2mP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN334Virtual Private Networks—VPNpacket. The comparison with the sent ICV of

Strany 263 -  Assumed cable loss: 6 dB

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50335Virtual Private Networks—VPNGeneration of the authentication dataIn the

Strany 264

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN336Virtual Private Networks—VPN햵 In two further messages, the devices exch

Strany 265 - Office communications with

 Chapter 15: Appendix LANCOM Reference Manual LCOS 3.5033715 Appendix: Overview of functions for LANCOM models and LCOS versions 1) Port Sep

Strany 266

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index338Index16 IndexNumerics11 mapping 41, 843 DES 297, 3313-DES 3374-Port Switch 337802.11i 213

Strany 267

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42339IndexCommand line reference 33Common ISDN Application Programming Interface (CAPI) 265Comput

Strany 268

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management34Configuration and manage-ment All commands and directory/item names may

Strany 269

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index340IndexDynamic – static 302, 323Examples 323How it works 301ICMP 324Introduction 300PPP lis

Strany 270 - 12.4 The LANCOM CAPI Faxmodem

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42341IndexIKE 298, 335Inband 15inbandConfiguration via Inband 15with Telnet 19Initial Vector 2

Strany 271

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index342IndexMAC frame 194Mail server 282Main mode 297Maximum bandwidth 170, 172Microsoft Network

Strany 272 - 13.1.1 The DHCP server

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42343IndexPrecedence 170Pre-Shared Key 214Preshared key 298Priority control 268Private Mode 33

Strany 273 - Server services for the LAN

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index344IndexTCP-Stealth-Modus 124Teardrop 164Telnet 21Temporal Key Integrity Protocol 224Term 97

Strany 274

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42345IndexStatic – dynamic 324static - static 323VPN client 299VPN connectionsDiagnosis 322Manu

Strany 275

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index346IndexVPN pass-through 207WEP group keys 241WLAN interfacelogical 250physical 244WLAN secur

Strany 276

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5035Configuration and manage-ment regular firmware or configuration updates

Strany 277 - 13.2 DNS

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management36Configuration and manage-mentTime-controlled rules will not necessarily b

Strany 278

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5037Management4 Management4.1 N:N mappingNetwork Address Translation (NAT) can be used for seve

Strany 279 - 13.2.2 DNS forwarding

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management38Managementthe defined translation range. An “inbound” address mapping, whe-reby the source

Strany 280 - Configuration tool Run/Table

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5039ManagementWith the help of N:N mapping, all addresses of the LAN can be translated toa new

Strany 281

LANCOM Reference Manual LCOS 3.50  Contents4Contents4.1.1 Application examples 384.1.2 Configuration 424.1.3 455 Diagnosis 465.1 LANmonitor—kno

Strany 282

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management40ManagementIn this example, a service provider monitors the networks of different clientsout

Strany 283 - 13.2.4 URL blocking

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5041ManagementThe networks of client A and B use different address ranges in therespective head

Strany 284 - 13.2.5 Dynamic DNS

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management42Managementwith actual same address range looks like two different networks for the gate-way

Strany 285 - 13.3 Call charge management

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5043ManagementThe address range for translation must be at minimum as large as thesource addres

Strany 286

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management44Managementped” original addresses. The entries of the remote network use the“mapped” addres

Strany 287 - 13.4 The SYSLOG module

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5045ManagementWEBconfig, TelnetUnder WEBconfig and Telnet you find the NAT table for configurat

Strany 288

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis46Diagnosis5 Diagnosis5.1 LANmonitor—know what's happeningThe LANmonitor includes a monit

Strany 289 - Source Meaning Facility

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5047Diagnosis5.1.2 Monitor Internet connectionTo demonstrate the functions of LANmonitor we will

Strany 290 - /var/log/lancom.log

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis48DiagnosisUnder the general information you can watch the transmission rates atwhich data is

Strany 291 - 14.1 What does VPN offer?

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5049Diagnosis5.2.2 Overview of the keys5.2.3 Overview of the parametersThe available traces depe

Strany 292 - Virtual Private Networks—

 Contents LANCOM Reference Manual LCOS 3.505Contents7.4 N:N mapping 807.4.1 Application examples 817.4.2 Configuration 857.5 Configuration of rem

Strany 293

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis50Diagnosis5.2.4 Combination commandsAny appended parameters are processed from left to right.

Strany 294

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5051Diagnosis5.2.5 ExamplesThis code... ... in combination with the trace causes the following:t

Strany 295 - 14.2 LANCOM VPN: an overview

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security52Security6 SecurityYou certainly would not like any outsider to have easy access to or to be a

Strany 296

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5053SecurityNote: If a password has not been set, the Power LED flashes, until thedevices have be

Strany 297 - 14.2.3 LANCOM VPN functions

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security54Securityard Security Settings. In a terminal or Telnet session you set or change thepassword

Strany 298 - 14.3.1 LAN-LAN coupling

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5055Security Lock configuration for (Lock-minutes)6.1.3 Restriction of the access rights on the

Strany 299

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security56Security햲 Change to the register card 'Security in the 'Management' configurat

Strany 300

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5057Securityrately. The configuration access can generally be permitted or forbidden, apure rea

Strany 301

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security58SecurityBy default, this table does not contain entries. Thus the device can beaccessed over

Strany 302

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5059SecurityYou have a choice of the following: all: Calls are accepted from any remote station.

Strany 303

LANCOM Reference Manual LCOS 3.50  Contents6Contents8.3.10 Firewall limitations 1598.4 Protection against break-in attempts: Intrusion Detection 16

Strany 304

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security60SecurityChecking the numberWhen a call is placed over an ISDN line, the caller's number

Strany 305

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5061SecurityAn especially effective callback method is the fast-callback procedure (patentpending

Strany 306

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security62SecurityWhen a call is placed over an ISDN line, the caller's number is normallysent ove

Strany 307

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5063Securitywill be permitted to use the internal functions. The circle of authorizedusers can be

Strany 308

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections64Routing and WAN connections7 Routing and WAN connectionsThis chapter descr

Strany 309 - 14.5.3 Inspect VPN rules

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5065Routing and WAN connectionsA simplified example will clarify this process.

Strany 310

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections66Routing and WAN connections햵 Transmission of data packetsAs soon as the co

Strany 311

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5067Routing and WAN connectionsConfiguration of the routing tableAn IP routing

Strany 312

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections68Routing and WAN connectionsThat way routes which are forbidden on the Inte

Strany 313

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5069Routing and WAN connectionsHow can you assist the workstation computer now

Strany 314

 Contents LANCOM Reference Manual LCOS 3.507Contents10.3.4 Configuration with WEBconfig or Telnet 20111 Wireless LAN – WLAN 20311.1 What is a Wire

Strany 315

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections70Routing and WAN connectionsAlthough the entries in the static routing tabl

Strany 316

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5071Routing and WAN connectionscolumn shows which router has revealed this rou

Strany 317

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections72Routing and WAN connectionspackets and look on them as normal broadcast or

Strany 318

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5073Routing and WAN connections 'address': The network mask is deri

Strany 319

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections74Routing and WAN connectionsassume a certain order that differs from the pr

Strany 320

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5075Routing and WAN connectionsany number. It also enters this new port on the

Strany 321

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections76Routing and WAN connectionsWhich protocols can be transmitted using IP mas

Strany 322

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5077Routing and WAN connectionsOn the local side, the router supports two diff

Strany 323 - 14.6.2 Dynamic/static

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections78Routing and WAN connections7.3.2 Inverse masqueradingThis masking operates

Strany 324 - Branch_office

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5079Routing and WAN connectionsConfiguration of the inverse masqueradingStatef

Strany 325

LANCOM Reference Manual LCOS 3.50  Contents8Contents13 Server services for the LAN 27213.1 Automatic IP address administration with DHCP 27213.1.1

Strany 326 - 14.7 How does VPN work?

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections80Routing and WAN connectionsExample: You are assigned the IP network addres

Strany 327

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5081Routing and WAN connectionsIn the first application the so-called N:1 NAT,

Strany 328 - 14.7.2 Alternatives to IPSec

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections82Routing and WAN connectionsNetwork couplingAn often appearing scenario is

Strany 329

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5083Routing and WAN connectionsRemote monitoring and remote control of network

Strany 330

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections84Routing and WAN connectionsclient C operates a network with several public

Strany 331

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5085Routing and WAN connectionshead office. On this occasion, also all subnet

Strany 332

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections86Routing and WAN connectionsof the mapping address. Therefore, in an assign

Strany 333

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5087Routing and WAN connectionsuse the “mapped” addresses of the remote side,

Strany 334

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections88Routing and WAN connectionsConfiguration with different toolsLANconfigWith

Strany 335 - 14.8.5 Key management – IKE

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5089Routing and WAN connectionsWhen starting a new entry under WEBconfig, the

Strany 336

 Contents LANCOM Reference Manual LCOS 3.509Contents14.5.5 Prepare VPN network relationships 31114.5.6 Configuration with LANconfig 31414.5.7 Conf

Strany 337

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections90Routing and WAN connections7.5.2 Layer listWith a layer, a collection of p

Strany 338 - 16 Index

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5091Routing and WAN connections7.6 Establishing connection with PPPLANCOM rout

Strany 339

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections92Routing and WAN connectionsof routers made by different manufacturers sinc

Strany 340

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5093Routing and WAN connectionsThe phases of PPP negotiationEstablishment of a

Strany 341

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections94Routing and WAN connectionsto begin output of the PPP protocol frames exch

Strany 342

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5095Routing and WAN connectionstelecomputer), the LANCOM assigns it an IP addr

Strany 343

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections96Routing and WAN connectionsWindows users are able to view the assigned add

Strany 344

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5097Routing and WAN connections7.7 Extended connection for flat rates—Keep-ali

Strany 345

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections98Routing and WAN connectionsholding time of 0 seconds then. However, connec

Strany 346

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5099Routing and WAN connectionsNo callbackFor this setting, the callback entry

Komentáře k této Příručce

Žádné komentáře