LANCOM Reference Manual LCOS 3.50 ̈ Contents
4
Contents
4.1.1 Application examples 38
4.1.2 Configuration 42
4.1.3 45
5 Diagnosis 46
5.1 LANmonitor—know what's happening 46
5.1.1 Extended display options 46
5.1.2 Monitor Internet connection 47
5.2 Trace information—for advanced users 48
5.2.1 How to start a trace 48
5.2.2 Overview of the keys 49
5.2.3 Overview of the parameters 49
5.2.4 Combination commands 50
5.2.5 Examples 51
6 Security 52
6.1 Protection for the configuration 52
6.1.1 Password protection 52
6.1.2 Login barring 54
6.1.3 Restriction of the access rights on the configuration 55
6.2 Protecting the ISDN connection 58
6.2.1 Identification control 58
6.2.2 Callback 60
6.3 The security checklist 61
7 Routing and WAN connections 64
7.1 General information on WAN connections 64
7.1.1 Bridges for standard protocols 64
7.1.2 What happens in the case of a request from the LAN? 64
7.2 IP routing 66
7.2.1 The IP routing table 66
7.2.2 Local routing 68
7.2.3 Dynamic routing with IP RIP 69
7.2.4 SYN/ACK speedup 73
7.3 The hiding place—IP masquerading (NAT, PAT) 74
7.3.1 Simple masquerading 74
7.3.2 Inverse masquerading 78
7.3.3 Unmasked Internet access for server in the DMZ 79