Lancom Systems LCOS 3.50 Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Software Lancom Systems LCOS 3.50 herunter. Lancom Systems LCOS 3.50 User's Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 346
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - LANCOM LCOS 3.50

Reference ManualLANCOM LCOS 3.50

Seite 2

LANCOM Reference Manual LCOS 3.50  Chapter 1: Preface10Preface1PrefaceUser’s manual and reference manualThe documentation of your device consists of

Seite 3 - Contents

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections100Routing and WAN connections The callback party selects 'Call back t

Seite 4

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50101Routing and WAN connectionsThe setting 'Name' offers the greate

Seite 5

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections102Routing and WAN connectionsTwo methods of channel bundling Static channe

Seite 6

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.50103Routing and WAN connections Depending on the type of application, the B1

Seite 7

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall104Firewall8FirewallFor most companies and many private users a work without the Internet is no

Seite 8

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50105Firewall Destroy data on the workstations of the LAN. Paralyse workstations of the LAN or

Seite 9

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall106Firewallprotocol, the search for open ports is also called “port scanning”. On the occa-sion

Seite 10 - 1Preface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50107Firewallthat a defenceless workstation installed in the Internet will - perhaps evenaccident

Seite 11

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall108Firewallwhich are used for creation of the rules and which are checked during theoperation o

Seite 12

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50109FirewallPacket filtersOne speaks about a packet filter-based Firewall, if the router only ch

Seite 13 - 2 System design

 Chapter 1: Preface LANCOM Reference Manual LCOS 3.5011Prefaceucts. The extensive feature set is available throughout all LANCOM products(provided re

Seite 14 - System design

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall110Firewallit is expecting the connection. The server will establish as a result from its port2

Seite 15 - Configuration and manage

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50111Firewallpackets that do not belong to one of the tracked session of the connectionstate tabl

Seite 16 - 3.2 Configuration software

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall112Firewalltable, because the connection to the LAN has been initiated from the client.Afterwar

Seite 17

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50113Firewallonly the one with the correct delivery note will pass. Likewise, a second cou-rier d

Seite 18

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall114FirewallApplication Gateways: It never exists a direct connection e.g. between a clientof th

Seite 19

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50115Firewall8.3.1 How the LANCOM Firewall inspects data packetsThe Firewall filters only those d

Seite 20

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall116FirewallThe Firewall only checks routed data packets!The Firewall only checks data packets r

Seite 21 - LANCAPI

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50117FirewallThe LANCOM Firewall uses several lists for checking data packets, which areautomatic

Seite 22

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall118Firewalllist will be carried out. If the action intends to accept the packet, then anentry i

Seite 23

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50119Firewalla dynamic one, new entries can be added continuously with the appropri-ate Firewall

Seite 24

LANCOM Reference Manual LCOS 3.50  Chapter 1: [email protected] online services ( www.lancom.de) are available to you around theclock

Seite 25

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall120FirewallHowever, if the server wants to send larger sets of data (e.g. TFTP) and wouldnot li

Seite 26 - 3.5.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50121FirewallICMP connectionsFor ICMP two cases must be differentiated: The ICMP request/reply co

Seite 27 - 3.5.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall122FirewallPlease notice that the N:N mapping functions (’N:N mapping’→page 80) are only active

Seite 28 - 3.5.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50123Firewall Route: Fragmented packets are passed on without any further checkingby the Firewal

Seite 29 - 3.5.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall124Firewallroute" are also suppressed, so that the LANCOM cannot be found, neither by"

Seite 30

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50125Firewallthe needed port will be opened for a short time (20 seconds) solely for theauthentic

Seite 31

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall126Firewall Create VPN rule: Is this Firewall rule also used to create a VPN rule?(→page 127)P

Seite 32 - 3.8 Command line interface

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50127Firewall either a rule applies to the packet, for which observe further rules is notactivat

Seite 33 - 3.8.1 Command line reference

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall128Firewallaction sets. If the same trigger is used for several action sets, thesequence of act

Seite 34 - 3.9 Scheduled Events

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50129Firewall The entire local network (LAN) Certain remote stations (described by the name of

Seite 35

 Chapter 2: System design LANCOM Reference Manual LCOS 3.5013System design2 System designThe LANCOM operating system LCOS is a collection of differen

Seite 36

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall130FirewallLimit / TriggerThe limit or trigger describes a quantified threshold value that must

Seite 37 - 4 Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50131Firewall SNMP/LANmonitor: Sends a SNMP trap, that will be analyzed e. g. byLANmonitor.Each

Seite 38 - 4.1.1 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall132FirewallFirewall. The specific parameters for the different alerting types such as thereleva

Seite 39 - Management

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50133FirewallFROM: [email protected] TO: [email protected] SUBJECT: packet

Seite 40

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall134FirewallSNMP: Generic trap = enterpriseSpecific (6) SNMP: Specific trap = 26 (0x1A) SNMP: Ti

Seite 41

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50135FirewallThis contradiction shows the dilemma of the responsible administrators whohave devel

Seite 42 - 4.1.2 Configuration

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall136FirewallSome LANCOM models support this structure by a separate LAN interface onlyused for t

Seite 43

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50137FirewallA direct data exchange between LAN and DMZ via LAN bridge is not possibleif a dedica

Seite 44

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall138FirewallIf you operate a web server in your LAN, that has been permittedaccess to this servi

Seite 45

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50139Firewall Example configuration “Basic Internet” If you want to permit a VPN dial-in to a L

Seite 46 - 5 Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 2: System design14System design LANCOM Wireless access points resp. LANCOM routers with wirelessmodules o

Seite 47 - Diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall140Firewall For a network coupling you permit additionally the communicationbetween the involv

Seite 48 - 5.2.1 How to start a trace

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50141Firewall8.3.8 Configuration of Firewall rulesFirewall wizardThe fastest method to configure

Seite 49 - 5.2.2 Overview of the keys

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall142FirewallLANconfigThe filters can be installed very comfortably with LANconfig. Starting from

Seite 50 - 5.2.4 Combination commands

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50143Firewall The option 'Observe further rules ...' can be used to create complexfunc

Seite 51 - 5.2.5 Examples

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall144Firewall Stations: Here the stations – as sender or addressee of the packets – arespecifi

Seite 52 - 6 Security

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50145FirewallWEBconfig, TelnetUnder WEBconfig or Telnet the Firewall rules are configured in the

Seite 53 - Security

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall146Firewallaction table for Firewall actions(→page 147). It can also contain directdescriptions

Seite 54 - 6.1.2 Login barring

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50147FirewallStations and services can be described according to the following rules in theobject

Seite 55

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall148Firewall Conditions If no further actions are specified in a “connect” or “Internet” fi

Seite 56

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50149FirewallIf an action is given without any associated limit, then implicitly apacket limit is

Seite 57

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5015Configuration and manage-ment3 Configuration and managementThis section w

Seite 58 - 6.2.1 Identification control

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall150Firewall Further measuresIf the "close port" action is executed, an entry in a bl

Seite 59

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50151Firewallsend at the same time an email to the administrator, then the description ofthe obje

Seite 60 - 6.2.2 Callback

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall152Firewalllast five events, that were triggered either by a Firewall rule, the DoS, or theIDS

Seite 61 - 6.3 The security checklist

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50153FirewallIf you call up the logging table via LANmonitor, it looks like the followingdepictio

Seite 62

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall154FirewallAll Firewall actions are likewise displayed within the IP router trace(’How to start

Seite 63

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50155FirewallOn Telnet level, the content of the filter list can be displayed with the com-mand s

Seite 64 - 7 Routing and WAN connections

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall156FirewallThe connection listThe connection table files source address, destination address,

Seite 65

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50157FirewallThe table contains the following elements: Element Element meaningSrc addr. Source

Seite 66 - 7.2 IP routing

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall158FirewallMeaning of the flags of the connection listPort block listAddress, protocol and port

Seite 67

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50159FirewallSorting is done according to address, protocol and port. The table contains thefollo

Seite 68 - 7.2.2 Local routing

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management16Configuration and manage-ment3.2 Configuration softwareSituations in whic

Seite 69

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall160Firewall8.4 Protection against break-in attempts: Intrusion DetectionA Firewall has the task

Seite 70

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50161Firewall8.4.2 Configuration of the IDSLANconfigParameters of the Intrusion Detection System

Seite 71

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall162Firewall8.5 Protection against “Denial of Service” attacksAttacks from the Internet can be b

Seite 72 - Configuration tool Menu/table

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50163Firewallduring the attack and, moreover, the owner of the falsified address cannotreceive no

Seite 73 - 7.2.4 SYN/ACK speedup

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall164Firewalla new Denial of Service attack can result thereby if the memory of the victimis exha

Seite 74 - 7.3.1 Simple masquerading

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50165Firewall8.5.2 Configuration of DoS blockingLANconfigParameters against DoS attacks are set i

Seite 75 - Source IP Port

LANCOM Reference Manual LCOS 3.50  Chapter 8: Firewall166Firewall The connection will be cut off. The sender address will be blocked for an adjusta

Seite 76

 Chapter 8: Firewall LANCOM Reference Manual LCOS 3.50167FirewallWEBconfig, TelnetWith WEBconfig or Telnet the suppression of responses can be confi

Seite 77

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service168Quality of Service9 Quality of ServiceThis chapter dedicates itself to quality: Un

Seite 78 - 7.3.2 Inverse masquerading

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50169Quality of Servicedesired data transfer, certain data packets must be treated pref

Seite 79

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5017Configuration and manage-mentOnce LANconfig has finished its search, it d

Seite 80 - 7.4 N:N mapping

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service170Quality of Service Limited maximum bandwidthWhat is DiffServ?DiffServ stands for

Seite 81 - 7.4.1 Application examples

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50171Quality of Service9.2.1 Guaranteed minimum bandwidthsHereby you give priority to e

Seite 82

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service172Quality of Service9.2.2 Limited maximum bandwidthsHereby you limit e.g. the entire

Seite 83

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50173Quality of ServiceAs long as the interval for the minimum bandwidth is not exceede

Seite 84

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service174Quality of Servicedata packets it is still able to receive, and thus brakes the da

Seite 85 - 7.4.2 Configuration

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50175Quality of Servicestandard DSL connection, the DSL interface is thus adjusted in t

Seite 86

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service176Quality of Service Standard reception queueAll packets that do not need special t

Seite 87

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50177Quality of ServiceA resulting delay has no disadvantageous effect to the TCP-secur

Seite 88

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service178Quality of Serviceoffice via VPN connection, over which the Internet traffic is no

Seite 89 - 7.5.1 Name list

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50179Quality of ServiceAccordingly, a VoIP connection should be configured such that th

Seite 90 - 7.5.2 Layer list

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management18Configuration and manage-mentManagement of multiple devicesLANconfig supp

Seite 91 - Parameter Meaning

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service180Quality of ServiceIn detail, delay is determined especially by the codec used, the

Seite 92 - 7.6.1 The protocol

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50181Quality of Servicethe IPSec header must be added (RTP and IPSec headers can be lar

Seite 93

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service182Quality of ServiceThe transfer time of the packets to the interface (serialization

Seite 94

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50183Quality of Servicetion always the physical data transfer via the respective interf

Seite 95

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service184Quality of Service DiffServ: The ToS/DiffServ field is interpreted as DiffServ fi

Seite 96

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50185Quality of ServiceWEBconfig, TelnetFor configuration with WEBconfig or Telnet, the

Seite 97 - In this column of

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service186Quality of Service The guaranteed bandwidth is defined on index card 'QoS&ap

Seite 98 - 7.8 Callback functions

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50187Quality of ServiceA maximum bandwidth is simply defined by a limit rule, which dis

Seite 99

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service188Quality of Service(e.g. Voice over IP), this extra overhead is quite noticeable. E

Seite 100 - With this

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50189Quality of Service9.7.4 Sending and receiving directionLANconfigThe interpretation

Seite 101

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5019Configuration and manage-mentSecure with HTTPSWEBconfig offers an encrypt

Seite 102

LANCOM Reference Manual LCOS 3.50  Chapter 9: Quality of Service190Quality of Service Not packets of certain protocols are reduced, rather than all

Seite 103

 Chapter 9: Quality of Service LANCOM Reference Manual LCOS 3.50191Quality of ServiceThe following example shows a setting for Voice over IP telephon

Seite 104 - 8Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)192Virtual LANs (VLANs)10 Virtual LANs (VLANs)10.1 What is a Virtual LAN?The incre

Seite 105 - 8.1.3 The methods

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50193Virtual LANs (VLANs) Data traffic of certain logical units should be transmitt

Seite 106 - 8.1.4 The victims

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)194Virtual LANs (VLANs)The tagging is realized by an additional field within the M

Seite 107 - 8.2 What is a Firewall?

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50195Virtual LANs (VLANs)rules for generating and processing of the VLAN tags are as

Seite 108 - Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)196Virtual LANs (VLANs)Management and user traffic on a LANSeveral hot spots are i

Seite 109

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50197Virtual LANs (VLANs)But this task is very burdensome to realize by hardware cha

Seite 110

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)198Virtual LANs (VLANs)10.3 Configuration of VLANsVLAN technology functions are pr

Seite 111

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50199Virtual LANs (VLANs)Example for a network table:10.3.2 The port tableThe port t

Seite 112

© 2004 LANCOM Systems GmbH, Wuerselen (Germany)While the information in this manual has been compiled with great care, it may not be deemed an assuran

Seite 113

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management20Configuration and manage-mentThe syntax of the TFTP call is dependent on

Seite 114 - 8.3 The LANCOM Firewall

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)200Virtual LANs (VLANs)10.3.3 Configuration with LANconfigParameters for virtual n

Seite 115

 Chapter 10: Virtual LANs (VLANs) LANCOM Reference Manual LCOS 3.50201Virtual LANs (VLANs)The definition of the used virtual networks can be accessed

Seite 116

LANCOM Reference Manual LCOS 3.50  Chapter 10: Virtual LANs (VLANs)202Virtual LANs (VLANs)The VLAN configuration shows up under WEBconfig as follows:

Seite 117

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50203Wireless LAN – WLAN11 Wireless LAN – WLAN11.1 What is a Wireless LAN?The followi

Seite 118

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN204Wireless LAN – WLANIEEE 802.11a: 54 MbpsIEEE 802.11a describes the operation of

Seite 119 - 8.3.2 Special protocols

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50205Wireless LAN – WLANtransmission. If exactly this range is used by another transm

Seite 120

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN206Wireless LAN – WLANYour LANCOM base station supports - according to the model ty

Seite 121

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50207Wireless LAN – WLAN Larger Wireless LANs, connection to LANs with one or more b

Seite 122

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN208Wireless LAN – WLAN Connecting the Wireless LAN to an existing LAN Extending t

Seite 123

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50209Wireless LAN – WLANIn the example above, the roaming function of the mobile stat

Seite 124

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5021Configuration and manage-mentYou can also reserve a special calling numbe

Seite 125

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN210Wireless LAN – WLANalso possible to specifically control the access of workstati

Seite 126

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50211Wireless LAN – WLANBy the use of narrow beam antennas (e.g. AirLancer Extender),

Seite 127

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN212Wireless LAN – WLANbase station. Due to the client mode, it is also possible to

Seite 128

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50213Wireless LAN – WLANIn some applications, however, it may be desirable to divide

Seite 129

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN214Wireless LAN – WLANOn the way from the original WEP of the 802.11 standard to 80

Seite 130

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50215Wireless LAN – WLANcase, so-called assymetric encryption methods such as RSA can

Seite 131

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN216Wireless LAN – WLANdata packet—a double application of the XOR operation with th

Seite 132 - Configuration tool Run

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50217Wireless LAN – WLANcombination of two clear text packets. If one already knows t

Seite 133

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN218Wireless LAN – WLANusually weaker than 40 or 104 bits (the current IEEE standard

Seite 134

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50219Wireless LAN – WLANfor certain values of the RC4 key, conclusions may be drawn a

Seite 135

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management22Configuration and manage-ment햳 Open a Telnet session to the LANCOM. Use t

Seite 136

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN220Wireless LAN – WLANwhich could automatically crack an arbitrary WLAN connection

Seite 137

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50221Wireless LAN – WLANthe possibility of installing a valid WEP key for the next se

Seite 138

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN222Wireless LAN – WLANThe access point is thus a sort of middle man between client

Seite 139

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50223Wireless LAN – WLANFurther advantages of this procedure include its simple imple

Seite 140

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN224Wireless LAN – WLAN A simplified procedure for deriving the Master Secret menti

Seite 141 - Firewall wizard

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50225Wireless LAN – WLANa new component (green), however, besides the CRC, the unencr

Seite 142

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN226Wireless LAN – WLANdecryption part of TKIP checks this sequentiality and discard

Seite 143

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50227Wireless LAN – WLANThe key handshake breaks down into two phases: first the pair

Seite 144

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN228Wireless LAN – WLANThe client still can't be 'approved', however,

Seite 145

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50229Wireless LAN – WLANpoint to show whether encryption should be used or not. This

Seite 146

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5023Configuration and manage-ment햲 Switch to the 'Security' tab in

Seite 147

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN230Wireless LAN – WLAN11.2.6 AES and 802.11i In mid-2004, the long awaited 802.11i

Seite 148 - Limit Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50231Wireless LAN – WLANSimilar to TKIP, CCM uses a 48-bit Initial Vector in each pac

Seite 149

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN232Wireless LAN – WLANsteps like WPA, the IEEE committee has now presented the new

Seite 150 - Measure Description Object

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50233Wireless LAN – WLANexample, is not a particularly secure SSID. (’Network setting

Seite 151 - 8.3.9 Firewall diagnosis

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN234Wireless LAN – WLANapply to all of the logical wireless networks supported by th

Seite 152 - Configuration tool

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50235Wireless LAN – WLANstations. If the stations do not answer these packets, then t

Seite 153 - Element Element meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN236Wireless LAN – WLANCheck that the setting 'filter out data from the listed

Seite 154

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50237Wireless LAN – WLANConfiguration with LANconfigFor configuration with LANconfig

Seite 155 - Entry Description

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN238Wireless LAN – WLAN Redirect address when the 'Redirect' action is se

Seite 156

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50239Wireless LAN – WLANincorporated in the 802.11 standard for the encryption of dat

Seite 157

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management24Configuration and manage-menttime under Windows operating systems—of all

Seite 158 - Flag Flag meaning

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN240Wireless LAN – WLANKey 1/passphraseIn line with the encryption method activated,

Seite 159 - 8.3.10 Firewall limitations

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50241Wireless LAN – WLANRules of the entry of the keys can be found in the descriptio

Seite 160 - Detection

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN242Wireless LAN – WLANkeys: a special key for each logical WLAN interface and three

Seite 161

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50243Wireless LAN – WLANRules for entering WEP keysWEP keys can be entered as ASCII c

Seite 162

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN244Wireless LAN – WLANConfiguration with LANconfigFor the configuration with LANcon

Seite 163

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50245Wireless LAN – WLANthe list of physical WLAN interfaces by clicking on the butto

Seite 164

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN246Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Seite 165

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50247Wireless LAN – WLANthis mode, the WLAN card in the access point principally work

Seite 166

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN248Wireless LAN – WLANpossible range and, in particular, the highest possible data

Seite 167

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50249Wireless LAN – WLAN Point-to-point 'Off': The access point only commu

Seite 168 - 9 Quality of Service

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5025Configuration and manage-mentmonitor. If the configuration of the device

Seite 169 - Quality of Service

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN250Wireless LAN – WLANCreate IBBSIf the station can establish an IBBS (Independent

Seite 170

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50251Wireless LAN – WLANLAN' tab. Open the list of logical WLAN interfaces by cl

Seite 171

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN252Wireless LAN – WLANConfiguration with WEBconfig or TelnetUnder WEBconfig or Teln

Seite 172 - 9.3 The queue concept

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50253Wireless LAN – WLANRTS thresholdThe RTS threshold prevents the occurrence of the

Seite 173

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN254Wireless LAN – WLAN11.4.5 Additional WLAN functionsApart from the different encr

Seite 174

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50255Wireless LAN – WLANIEEE 802.1x/EAPThe international industry standard IEEE 802.1

Seite 175

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN256Wireless LAN – WLANIPSec over WLANOnly with the LANCOM VPN Option. Not available

Seite 176

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50257Wireless LAN – WLANtransmitter and receiver. The areas where the waves amplify o

Seite 177

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN258Wireless LAN – WLANTo ensure that the Fresnel zone 1 remains unobstructed, the h

Seite 178

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50259Wireless LAN – WLANconnections, and even the air, and amplifying elements such a

Seite 179

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management26Configuration and manage-mentspecify whether LANmonitor should create a l

Seite 180 - 1 64 128 256 512 1024 1500

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN260Wireless LAN – WLANThe data transmission rate is set according to the reception

Seite 181

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50261Wireless LAN – WLAN햸 The receiving end also has amplifying and attenuating eleme

Seite 182

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN262Wireless LAN – WLAN(P2mP, connection from an access point to the registered clie

Seite 183 - 9.7 QoS configuration

 Chapter 11: Wireless LAN – WLAN LANCOM Reference Manual LCOS 3.50263Wireless LAN – WLAN Assumed cable loss: 9 dBAirLancer Extender O-70 (802.11b/g)

Seite 184

LANCOM Reference Manual LCOS 3.50  Chapter 11: Wireless LAN – WLAN264Wireless LAN – WLAN11.5.4 Transmission power reductionEvery country has regulati

Seite 185

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50265Office communications with LANCAPI12 Office communications with L

Seite 186

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI266Office communications with LANCAPI Which of the computers in the

Seite 187

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50267Office communications with LANCAPI햴 Activate the LANCAPI server f

Seite 188 - Transfer External

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI268Office communications with LANCAPI햹 Switch to the 'Availabil

Seite 189

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50269Office communications with LANCAPIIf necessary, the system is res

Seite 190

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5027Configuration and manage-ment3.5.2 Overview of the keys3.5.3 Overview of

Seite 191

LANCOM Reference Manual LCOS 3.50  Chapter 12: Office communications with LANCAPI270Office communications with LANCAPI It is also possible to set th

Seite 192 - 10 Virtual LANs (VLANs)

 Chapter 12: Office communications with LANCAPI LANCOM Reference Manual LCOS 3.50271Office communications with LANCAPIInstallationThe CAPI Faxmodem c

Seite 193 - 10.2.1 Frame tagging

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN272Server services for the LAN13 Server services for the LANAn LANCOM offer

Seite 194 - Virtual LANs (VLANs)

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50273Server services for the LAN period of validity for the parameters assig

Seite 195 - 10.2.3 Application examples

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN274Server services for the LAN13.1.3 How are the addresses assigned?IP addr

Seite 196

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50275Server services for the LANOtherwise, the network mask from the TCP/IP m

Seite 197

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN276Server services for the LANit requested. The DHCP module provides two se

Seite 198 - 10.3 Configuration of VLANs

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50277Server services for the LANChecking of IP addresses in the LANThe DHCP t

Seite 199 - 10.3.2 The port table

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN278Server services for the LANpart specifies the domain. Specifying the dom

Seite 200

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50279Server services for the LAN Finally, the DNS server checks whether the

Seite 201

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management28Configuration and manage-ment3.5.4 Combination commandsAny appended param

Seite 202

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN280Server services for the LAN Initially the router checks whether a DNS s

Seite 203 - 11 Wireless LAN – WLAN

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50281Server services for the LAN햳 Enter the domain in which the DNS server is

Seite 204 - Wireless LAN – WLAN

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN282Server services for the LAN that are accessible via the router.With the

Seite 205

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50283Server services for the LANThe DNS server may either be specified by the

Seite 206

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN284Server services for the LANTo only block the access of a certain compute

Seite 207

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50285Server services for the LANThe current WAN IP address of a LANCOM can be

Seite 208

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN286Server services for the LANmum of 830 charge units may be used in six da

Seite 209

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50287Server services for the LAN13.3.3 Settings in the charge moduleIn the ch

Seite 210

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN288Server services for the LAN13.4.1 Setting up the SYSLOG module13.4.2 Exa

Seite 211

 Chapter 13: Server services for the LAN LANCOM Reference Manual LCOS 3.50289Server services for the LANshows the alignment between the internal sour

Seite 212

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5029Configuration and manage-ment3.5.5 Examples3.6 Working with configuration

Seite 213

LANCOM Reference Manual LCOS 3.50  Chapter 13: Server services for the LAN290Server services for the LAN햶 After you have set all the parameters, conf

Seite 214 - 11.2.1 Some basic concepts

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50291Virtual Private Networks—VPN14 Virtual Private Networks—VPN14.1 What do

Seite 215 - 11.2.2 WEP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN292Virtual Private Networks—VPN The central LAN has a connection to the I

Seite 216

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50293Virtual Private Networks—VPN The subsidiary also has its own connectio

Seite 217

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN294Virtual Private Networks—VPNRouting at the IP level with VPNIP connecti

Seite 218

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50295Virtual Private Networks—VPNthe Internet. With the proper technology, t

Seite 219 - 11.2.3 WEPplus

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN296Virtual Private Networks—VPNfollowing example illustrates a typical app

Seite 220 - 11.2.4 EAP and 802.1x

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50297Virtual Private Networks—VPN When VPN clients are dialing in with the

Seite 221

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN298Virtual Private Networks—VPN DES, key length 56 bit IKE key exchange

Seite 222

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50299Virtual Private Networks—VPNIn practice, LAN-LAN couplings are frequent

Seite 223 - 11.2.5 TKIP and WPA

 Contents LANCOM Reference Manual LCOS 3.503ContentsContents1 Preface 102 System design 133 Configuration and management 153.1 Configuration tool

Seite 224

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management30Configuration and manage-mentConvenient series configurationHowever, even

Seite 225

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN300Virtual Private Networks—VPNsoftware then sets up a tunnel to the VPN g

Seite 226

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50301Virtual Private Networks—VPNof the Internet and a private one by which

Seite 227

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN302Virtual Private Networks—VPN static – dynamic dynamic – dynamicDynami

Seite 228

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50303Virtual Private Networks—VPNStatic – dynamicIf, on the other hand, comp

Seite 229

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN304Virtual Private Networks—VPNtranslation via dynamic DNS services, a sol

Seite 230 - 11.2.6 AES and 802.11i

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50305Virtual Private Networks—VPNThe LLC element is not available in 1TR6, t

Seite 231 - 11.2.7 Summary

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN306Virtual Private Networks—VPNaddress for the DNS name translation. This

Seite 232

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50307Virtual Private Networks—VPNindividual computers (RAS) or the connectio

Seite 233

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN308Virtual Private Networks—VPN14.5.2 Set up VPN connections with the Setu

Seite 234 - 11.4.1 WLAN security

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50309Virtual Private Networks—VPN14.5.3 Inspect VPN rulesVPN rules represent

Seite 235 - Configuration tool Menu/Table

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5031Configuration and manage-ment The device no longer responds after loadin

Seite 236

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN310Virtual Private Networks—VPN Definition of the tunnel endpoints Defin

Seite 237

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50311Virtual Private Networks—VPN14.5.5 Prepare VPN network relationshipsThe

Seite 238

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN312Virtual Private Networks—VPN When only a portion of the local intranet

Seite 239

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50313Virtual Private Networks—VPNThe firewall rules for generating VPN rules

Seite 240

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN314Virtual Private Networks—VPN14.5.6 Configuration with LANconfigThe sect

Seite 241

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50315Virtual Private Networks—VPNgateway”, enter the public address of the r

Seite 242

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN316Virtual Private Networks—VPNaccessible in the remote and in the local L

Seite 243 - 11.4.2 General WLAN settings

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50317Virtual Private Networks—VPNAs a rule, it is recommended that you keep

Seite 244

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN318Virtual Private Networks—VPNThe only difference is that the source and

Seite 245

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50319Virtual Private Networks—VPN햴 Under Configuration  VPN  Connection li

Seite 246

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management32Configuration and manage-mentLANconfig then tells you the version number

Seite 247

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN320Virtual Private Networks—VPNaccessible in the remote and in the local L

Seite 248

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50321Virtual Private Networks—VPN“VPN-GW1-REMOTE”). Enter each subnet in the

Seite 249

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN322Virtual Private Networks—VPNonly difference is that the source and the

Seite 250

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50323Virtual Private Networks—VPN14.6.1 Static/staticA VPN tunnel via the In

Seite 251

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN324Virtual Private Networks—VPNHeadquarters has a fixed, static address. W

Seite 252

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50325Virtual Private Networks—VPNAlternatively, this application can be solv

Seite 253

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN326Virtual Private Networks—VPNThe entries for the ISDN connection are nee

Seite 254

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50327Virtual Private Networks—VPN14.7.1 IPSec—The basis for LANCOM VPNThe or

Seite 255

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN328Virtual Private Networks—VPN14.7.2 Alternatives to IPSecIPSec is an ope

Seite 256

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50329Virtual Private Networks—VPNAll of these layer-2 protocols only support

Seite 257 - √ (λ * d)

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5033Configuration and manage-ment StatusContains all read-only statistics of

Seite 258 - 11.5.2 Antenna power

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN330Virtual Private Networks—VPN Security Parameter Index (SPI)ID to disti

Seite 259

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50331Virtual Private Networks—VPNIn transport mode, the IP header of the ori

Seite 260

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN332Virtual Private Networks—VPNThe result is a nominal key length of 168 b

Seite 261

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50333Virtual Private Networks—VPNThe AH process in the senderIn the sender,

Seite 262 - Mbps P2P P2mP

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN334Virtual Private Networks—VPNpacket. The comparison with the sent ICV of

Seite 263 -  Assumed cable loss: 6 dB

 Chapter 14: Virtual Private Networks—VPN LANCOM Reference Manual LCOS 3.50335Virtual Private Networks—VPNGeneration of the authentication dataIn the

Seite 264

LANCOM Reference Manual LCOS 3.50  Chapter 14: Virtual Private Networks—VPN336Virtual Private Networks—VPN햵 In two further messages, the devices exch

Seite 265 - Office communications with

 Chapter 15: Appendix LANCOM Reference Manual LCOS 3.5033715 Appendix: Overview of functions for LANCOM models and LCOS versions 1) Port Sep

Seite 266

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index338Index16 IndexNumerics11 mapping 41, 843 DES 297, 3313-DES 3374-Port Switch 337802.11i 213

Seite 267

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42339IndexCommand line reference 33Common ISDN Application Programming Interface (CAPI) 265Comput

Seite 268

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management34Configuration and manage-ment All commands and directory/item names may

Seite 269

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index340IndexDynamic – static 302, 323Examples 323How it works 301ICMP 324Introduction 300PPP lis

Seite 270 - 12.4 The LANCOM CAPI Faxmodem

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42341IndexIKE 298, 335Inband 15inbandConfiguration via Inband 15with Telnet 19Initial Vector 2

Seite 271

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index342IndexMAC frame 194Mail server 282Main mode 297Maximum bandwidth 170, 172Microsoft Network

Seite 272 - 13.1.1 The DHCP server

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42343IndexPrecedence 170Pre-Shared Key 214Preshared key 298Priority control 268Private Mode 33

Seite 273 - Server services for the LAN

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index344IndexTCP-Stealth-Modus 124Teardrop 164Telnet 21Temporal Key Integrity Protocol 224Term 97

Seite 274

 Chapter 16: Index LANCOM Reference Manual LCOS 3.42345IndexStatic – dynamic 324static - static 323VPN client 299VPN connectionsDiagnosis 322Manu

Seite 275

LANCOM Reference Manual LCOS 3.42  Chapter 16: Index346IndexVPN pass-through 207WEP group keys 241WLAN interfacelogical 250physical 244WLAN secur

Seite 276

 Chapter 3: Configuration and management LANCOM Reference Manual LCOS 3.5035Configuration and manage-ment regular firmware or configuration updates

Seite 277 - 13.2 DNS

LANCOM Reference Manual LCOS 3.50  Chapter 3: Configuration and management36Configuration and manage-mentTime-controlled rules will not necessarily b

Seite 278

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5037Management4 Management4.1 N:N mappingNetwork Address Translation (NAT) can be used for seve

Seite 279 - 13.2.2 DNS forwarding

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management38Managementthe defined translation range. An “inbound” address mapping, whe-reby the source

Seite 280 - Configuration tool Run/Table

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5039ManagementWith the help of N:N mapping, all addresses of the LAN can be translated toa new

Seite 281

LANCOM Reference Manual LCOS 3.50  Contents4Contents4.1.1 Application examples 384.1.2 Configuration 424.1.3 455 Diagnosis 465.1 LANmonitor—kno

Seite 282

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management40ManagementIn this example, a service provider monitors the networks of different clientsout

Seite 283 - 13.2.4 URL blocking

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5041ManagementThe networks of client A and B use different address ranges in therespective head

Seite 284 - 13.2.5 Dynamic DNS

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management42Managementwith actual same address range looks like two different networks for the gate-way

Seite 285 - 13.3 Call charge management

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5043ManagementThe address range for translation must be at minimum as large as thesource addres

Seite 286

LANCOM Reference Manual LCOS 3.50  Chapter 4: Management44Managementped” original addresses. The entries of the remote network use the“mapped” addres

Seite 287 - 13.4 The SYSLOG module

 Chapter 4: Management LANCOM Reference Manual LCOS 3.5045ManagementWEBconfig, TelnetUnder WEBconfig and Telnet you find the NAT table for configurat

Seite 288

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis46Diagnosis5 Diagnosis5.1 LANmonitor—know what's happeningThe LANmonitor includes a monit

Seite 289 - Source Meaning Facility

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5047Diagnosis5.1.2 Monitor Internet connectionTo demonstrate the functions of LANmonitor we will

Seite 290 - /var/log/lancom.log

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis48DiagnosisUnder the general information you can watch the transmission rates atwhich data is

Seite 291 - 14.1 What does VPN offer?

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5049Diagnosis5.2.2 Overview of the keys5.2.3 Overview of the parametersThe available traces depe

Seite 292 - Virtual Private Networks—

 Contents LANCOM Reference Manual LCOS 3.505Contents7.4 N:N mapping 807.4.1 Application examples 817.4.2 Configuration 857.5 Configuration of rem

Seite 293

LANCOM Reference Manual LCOS 3.50  Chapter 5: Diagnosis50Diagnosis5.2.4 Combination commandsAny appended parameters are processed from left to right.

Seite 294

 Chapter 5: Diagnosis LANCOM Reference Manual LCOS 3.5051Diagnosis5.2.5 ExamplesThis code... ... in combination with the trace causes the following:t

Seite 295 - 14.2 LANCOM VPN: an overview

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security52Security6 SecurityYou certainly would not like any outsider to have easy access to or to be a

Seite 296

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5053SecurityNote: If a password has not been set, the Power LED flashes, until thedevices have be

Seite 297 - 14.2.3 LANCOM VPN functions

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security54Securityard Security Settings. In a terminal or Telnet session you set or change thepassword

Seite 298 - 14.3.1 LAN-LAN coupling

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5055Security Lock configuration for (Lock-minutes)6.1.3 Restriction of the access rights on the

Seite 299

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security56Security햲 Change to the register card 'Security in the 'Management' configurat

Seite 300

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5057Securityrately. The configuration access can generally be permitted or forbidden, apure rea

Seite 301

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security58SecurityBy default, this table does not contain entries. Thus the device can beaccessed over

Seite 302

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5059SecurityYou have a choice of the following: all: Calls are accepted from any remote station.

Seite 303

LANCOM Reference Manual LCOS 3.50  Contents6Contents8.3.10 Firewall limitations 1598.4 Protection against break-in attempts: Intrusion Detection 16

Seite 304

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security60SecurityChecking the numberWhen a call is placed over an ISDN line, the caller's number

Seite 305

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5061SecurityAn especially effective callback method is the fast-callback procedure (patentpending

Seite 306

LANCOM Reference Manual LCOS 3.50  Chapter 6: Security62SecurityWhen a call is placed over an ISDN line, the caller's number is normallysent ove

Seite 307

 Chapter 6: Security LANCOM Reference Manual LCOS 3.5063Securitywill be permitted to use the internal functions. The circle of authorizedusers can be

Seite 308

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections64Routing and WAN connections7 Routing and WAN connectionsThis chapter descr

Seite 309 - 14.5.3 Inspect VPN rules

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5065Routing and WAN connectionsA simplified example will clarify this process.

Seite 310

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections66Routing and WAN connections햵 Transmission of data packetsAs soon as the co

Seite 311

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5067Routing and WAN connectionsConfiguration of the routing tableAn IP routing

Seite 312

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections68Routing and WAN connectionsThat way routes which are forbidden on the Inte

Seite 313

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5069Routing and WAN connectionsHow can you assist the workstation computer now

Seite 314

 Contents LANCOM Reference Manual LCOS 3.507Contents10.3.4 Configuration with WEBconfig or Telnet 20111 Wireless LAN – WLAN 20311.1 What is a Wire

Seite 315

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections70Routing and WAN connectionsAlthough the entries in the static routing tabl

Seite 316

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5071Routing and WAN connectionscolumn shows which router has revealed this rou

Seite 317

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections72Routing and WAN connectionspackets and look on them as normal broadcast or

Seite 318

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5073Routing and WAN connections 'address': The network mask is deri

Seite 319

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections74Routing and WAN connectionsassume a certain order that differs from the pr

Seite 320

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5075Routing and WAN connectionsany number. It also enters this new port on the

Seite 321

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections76Routing and WAN connectionsWhich protocols can be transmitted using IP mas

Seite 322

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5077Routing and WAN connectionsOn the local side, the router supports two diff

Seite 323 - 14.6.2 Dynamic/static

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections78Routing and WAN connections7.3.2 Inverse masqueradingThis masking operates

Seite 324 - Branch_office

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5079Routing and WAN connectionsConfiguration of the inverse masqueradingStatef

Seite 325

LANCOM Reference Manual LCOS 3.50  Contents8Contents13 Server services for the LAN 27213.1 Automatic IP address administration with DHCP 27213.1.1

Seite 326 - 14.7 How does VPN work?

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections80Routing and WAN connectionsExample: You are assigned the IP network addres

Seite 327

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5081Routing and WAN connectionsIn the first application the so-called N:1 NAT,

Seite 328 - 14.7.2 Alternatives to IPSec

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections82Routing and WAN connectionsNetwork couplingAn often appearing scenario is

Seite 329

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5083Routing and WAN connectionsRemote monitoring and remote control of network

Seite 330

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections84Routing and WAN connectionsclient C operates a network with several public

Seite 331

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5085Routing and WAN connectionshead office. On this occasion, also all subnet

Seite 332

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections86Routing and WAN connectionsof the mapping address. Therefore, in an assign

Seite 333

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5087Routing and WAN connectionsuse the “mapped” addresses of the remote side,

Seite 334

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections88Routing and WAN connectionsConfiguration with different toolsLANconfigWith

Seite 335 - 14.8.5 Key management – IKE

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5089Routing and WAN connectionsWhen starting a new entry under WEBconfig, the

Seite 336

 Contents LANCOM Reference Manual LCOS 3.509Contents14.5.5 Prepare VPN network relationships 31114.5.6 Configuration with LANconfig 31414.5.7 Conf

Seite 337

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections90Routing and WAN connections7.5.2 Layer listWith a layer, a collection of p

Seite 338 - 16 Index

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5091Routing and WAN connections7.6 Establishing connection with PPPLANCOM rout

Seite 339

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections92Routing and WAN connectionsof routers made by different manufacturers sinc

Seite 340

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5093Routing and WAN connectionsThe phases of PPP negotiationEstablishment of a

Seite 341

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections94Routing and WAN connectionsto begin output of the PPP protocol frames exch

Seite 342

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5095Routing and WAN connectionstelecomputer), the LANCOM assigns it an IP addr

Seite 343

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections96Routing and WAN connectionsWindows users are able to view the assigned add

Seite 344

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5097Routing and WAN connections7.7 Extended connection for flat rates—Keep-ali

Seite 345

LANCOM Reference Manual LCOS 3.50  Chapter 7: Routing and WAN connections98Routing and WAN connectionsholding time of 0 seconds then. However, connec

Seite 346

 Chapter 7: Routing and WAN connections LANCOM Reference Manual LCOS 3.5099Routing and WAN connectionsNo callbackFor this setting, the callback entry

Kommentare zu diesen Handbüchern

Keine Kommentare