LANCOM Reference Manual LCOS 3.50 ̈ Chapter 6: Security
52
Security
6 Security
You certainly would not like any outsider to have easy access to or to be able
to modify the data on your computer. Therefore this chapter covers an impor-
tant topic: safety. The description of the security settings is divided into the
following sections:
̈ Protection for the configuration
୴ Password protection
୴ Login barring
୴ Access verification
̈ Securing ISDN access
At the end of the chapter you will find the most important security settings as
a checklist. It ensures that your LANCOM is excellently protected.
Some further LCOS features to enhance the data security are
described in separate chapters:
୴ ’Firewall’ →page 104
୴ ’The hiding place—IP masquerading (NAT, PAT)’ →page 74
୴ ’Virtual LANs (VLANs)’ →page 192
6.1 Protection for the configuration
A number of important parameters for the exchange of data are established
in the configuration of the device. These include the security of your network,
monitoring of costs and the authorizations for the individual network users.
Needless to say, the parameters that you have set should not be modified by
unauthorized persons. The LANCOM thus offers a variety of options to protect
the configuration.
6.1.1 Password protection
The simplest option for the protection of the configuration is the establish-
ment of a password.
As long as a password hasn't been set, anyone can change the con-
figuration of the device. For example, your Internet account informa-
tion could be stolen, or the device could be reconfigured in a way that
the protection-mechanisms for the local network could by bypassed.