3.7.2 Loading firmware, device configuration or script via HTTP(S)....................................................66
3.7.3 Loading firmware, device configuration or script via HTTP(S) or TFTP.......................................67
3.8 How to reset the device?..........................................................................................................................68
4.5.4 Organize access points...........................................................................................................274
4.5.5 Rogue AP and rogue client detection with the WLANmonitor.................................................275
4.6 Addition(s) to LCOS 7.80........................................................................................................................279
4.7 Addition(s) to LCOS 8.84........................................................................................................................279
4.7.1 Enhancements to LANconfig..................................................................................................279
4.8 Addition(s) to LCOS 9.00........................................................................................................................284
4.8.1 Enhancements to LANconfig..................................................................................................284
4.8.2 Enhancements to LANmonitor................................................................................................286
4.9 Addition(s) to LCOS 9.10........................................................................................................................291
4.9.1 Proxy authentication via NTLM...............................................................................................291
4.9.2 Special LANconfig icon for devices in a cluster or using Config Sync......................................292
4.9.3 Special LANmonitor icon for devices in a cluster or using Config Sync....................................294
5.3.2 Structure of SYSLOG messages...............................................................................................320
5.3.3 Configuring SYSLOG using LANconfig....................................................................................322
5.3.4 Configuring SYSLOG using Telnet or WEBconfig.....................................................................323
5.3.5 Addition(s) to LCOS 8.80........................................................................................................325
5.3.6 Addition(s) to LCOS 8.82........................................................................................................326
5.4 The ping command................................................................................................................................329
5.5 Monitoring the switch............................................................................................................................331
5.7 Addition(s) to LCOS 8.80........................................................................................................................332
5.7.1 Trace output for the XML interface.........................................................................................332
5.8 Addition(s) to LCOS 8.84........................................................................................................................334
5.8.1 Documenting events at the xDSL interfaces............................................................................334
5.8.2 SYSLOG: Extended status display of the login to the cellular network.....................................335
5.9 Addition(s) to LCOS 9.10........................................................................................................................337
5.9.1 Advanced config version information under Status.................................................................337
5.9.2 SSH identifier in the event log................................................................................................338
6.4 The security checklist.............................................................................................................................349
6.5 Addition(s) to LCOS 8.60........................................................................................................................352
6.5.1 Support for TLS 1.1 / 1.2........................................................................................................352
7 Routing and WAN -connections.....................................................................................353
7.1 General information ..............................................................................................................................353
7.1.1 Bridges for standard protocols...............................................................................................353
7.1.2 What happens in the case of a request from the LAN?...........................................................353
7.2 IP routing...............................................................................................................................................354
7.2.1 The IP routing table...............................................................................................................354
7.5 IP masquerading....................................................................................................................................371
7.10 Establishing connection with PPP.........................................................................................................388
7.10.1 The protocol.........................................................................................................................388
7.10.2 Everything o.k.? Checking the line with LCP.........................................................................389
7.10.3 Assignment of IP addresses via PPP.....................................................................................390
7.10.4 Settings in the PPP list.........................................................................................................390
7.10.5 The meaning of the DEFAULT remote site.............................................................................391
7.10.6 RADIUS authentication of PPP connections..........................................................................392
7.11 DSL dial-in over PPTP...........................................................................................................................392
7.11.1 Configuration of PPTP..........................................................................................................392
7.11.2 Addition(s) to LCOS 7.80......................................................................................................393
7.12 Extended connection for flat rates—Keep-alive...................................................................................394
7.12.1 Configuration of Keep-alive function....................................................................................394
7.17 WAN RIP..............................................................................................................................................405
7.18 The rapid spanning tree protocol.........................................................................................................406
7.18.1 Classic and rapid spanning tree...........................................................................................406
8
Reference Manual
Contents
7.18.2 Improvements from rapid spanning tree..............................................................................407
7.18.3 Configuring the Spanning Tree Protocol...............................................................................407
7.18.4 Status reports via the Spanning Tree Protocol......................................................................409
7.19 The Action table...................................................................................................................................411
8.1.1 The dangers...........................................................................................................................493
9
Reference Manual
Contents
8.1.2 The ways of the perpetrators..................................................................................................493
8.1.3 The methods..........................................................................................................................494
8.1.4 The victims.............................................................................................................................494
8.2 What is a Firewall?.................................................................................................................................494
8.2.1 Tasks of a Firewall..................................................................................................................495
8.2.2 Different types of Firewalls.....................................................................................................495
8.3 The LANCOM Firewall............................................................................................................................498
8.3.1 How the LANCOM Firewall inspects data packets..................................................................499
8.3.2 Special protocols....................................................................................................................500
8.3.3 General settings of the Firewall..............................................................................................502
8.3.4 Parameters of Firewall rules...................................................................................................504
8.3.5 Alerting functions of the Firewall...........................................................................................508
8.3.6 Strategies for Firewall settings...............................................................................................512
8.3.7 Hints for setting the Firewall..................................................................................................513
8.4 Configuring the firewall with LANconfig................................................................................................516
10.2.3 Limited maximum bandwidths.............................................................................................693
10.3 The queue concept...............................................................................................................................693
10.3.1 Queues in transmission direction..........................................................................................693
10.3.2 Queues for receiving direction..............................................................................................695
10.4 Reducing the packet length.................................................................................................................695
10.5 QoS parameters for Voice over IP applications.....................................................................................696
10.6 QoS in sending or receiving direction...................................................................................................699
12.1 What is a Virtual LAN?.........................................................................................................................905
12.2 This is how a VLAN works....................................................................................................................905
20.3 Radio channels..................................................................................................................................2018
20.3.1 Radio channels in the 2,4 GHz frequency band..................................................................2018
20.3.2 Radio channels in the 5 GHz frequency band.....................................................................2018
20.3.3 Radio channels and frequency ranges for Indoor and Outdoor operating...........................2019
Libble takes abuse of its services very seriously. We're committed to dealing with such abuse according to the laws in your country of residence. When you submit a report, we'll investigate it and take the appropriate action. We'll get back to you only if we require additional details or have more information to share.
Product:
Forumrules
To achieve meaningful questions, we apply the following rules:
First, read the manual;
Check if your question has been asked previously;
Try to ask your question as clearly as possible;
Did you already try to solve the problem? Please mention this;
Is your problem solved by a visitor then let him/her know in this forum;
To give a response to a question or answer, do not use this form but click on the button 'reply to this question';
Your question will be posted here and emailed to our subscribers. Therefore, avoid filling in personal details.
Register
Register getting emails for Lancom LCOS 9.10 at:
new questions and answers
new manuals
You will receive an email to register for one or both of the options.
Get your user manual by e-mail
Enter your email address to receive the manual of Lancom LCOS 9.10 in the language / languages: English as an attachment in your email.
The manual is 54,4 mb in size.
You will receive the manual in your email within minutes. If you have not received an email, then probably have entered the wrong email address or your mailbox is too full. In addition, it may be that your ISP may have a maximum size for emails to receive.
The manual is sent by email. Check your email
If you have not received an email with the manual within fifteen minutes, it may be that you have a entered a wrong email address or that your ISP has set a maximum size to receive email that is smaller than the size of the manual.
The email address you have provided is not correct.
Please check the email address and correct it.
Your question is posted on this page
Would you like to receive an email when new answers and questions are posted? Please enter your email address.