Reference Manual
LANCOM LCOS 3.50
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Contents
LANCOM Reference Manual LCOS 3.50
Contents
1 Preface
10
13
15
2 System design
3 Configuration and management
3.1 Configuration tools and approaches
15
3.2 Configuration software
16
16
18
19
20
3.2.1 Configuration using LANconfig
3.2.2 Configuration with WEBconfig
3.2.3 Configuration using Telnet
3.2.4 Configuration using SNMP
3.3 Remote configuration via Dial-Up Network
20
3.3.1 This is what you need for ISDN remote configuration 21
3.3.2 The first remote connection using Dial-Up Networking21
3.3.3 The first remote connection using a PPP client and Telnet
21
3.4 LANmonitor—know what's happening
3.4.1 Extended display options
23
24
24
3.4.2 Monitor Internet connection
3.5 Trace information—for advanced users
3.5.1 How to start a trace
26
26
27
27
28
29
3.5.2 Overview of the keys
3.5.3 Overview of the parameters
3.5.4 Combination commands
3.5.5 Examples
3.6 Working with configuration files
29
3.7 New firmware with LANCOM FirmSafe
3.7.1 This is how LANCOM FirmSafe works
3.7.2 How to load new software
30
30
31
3.8 Command line interface
3.8.1 Command line reference
32
33
3.9 Scheduled Events
34
4 Management
37
4.1 N:N mapping
37
3
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Contents
4.1.1 Application examples
38
4.1.2 Configuration
4.1.3
42
45
5 Diagnosis
46
5.1 LANmonitor—know what's happening
5.1.1 Extended display options
46
46
47
5.1.2 Monitor Internet connection
5.2 Trace information—for advanced users
5.2.1 How to start a trace
48
48
49
49
50
51
5.2.2 Overview of the keys
5.2.3 Overview of the parameters
5.2.4 Combination commands
5.2.5 Examples
6 Security
52
6.1 Protection for the configuration
6.1.1 Password protection
6.1.2 Login barring
52
52
54
6.1.3 Restriction of the access rights on the configuration 55
6.2 Protecting the ISDN connection
6.2.1 Identification control
6.2.2 Callback
58
58
60
6.3 The security checklist
61
7 Routing and WAN connections
64
7.1 General information on WAN connections
7.1.1 Bridges for standard protocols
64
64
7.1.2 What happens in the case of a request from the LAN? 64
7.2 IP routing
66
66
68
69
73
7.2.1 The IP routing table
7.2.2 Local routing
7.2.3 Dynamic routing with IP RIP
7.2.4 SYN/ACK speedup
7.3 The hiding place—IP masquerading (NAT, PAT)
7.3.1 Simple masquerading
74
74
78
79
7.3.2 Inverse masquerading
7.3.3 Unmasked Internet access for server in the DMZ
4
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Contents
LANCOM Reference Manual LCOS 3.50
7.4 N:N mapping
7.4.1 Application examples
7.4.2 Configuration
80
81
85
7.5 Configuration of remote stations
7.5.1 Name list
89
89
90
7.5.2 Layer list
7.6 Establishing connection with PPP
7.6.1 The protocol
91
92
94
94
96
7.6.2 Everything o.k.? Checking the line with LCP
7.6.3 Assignment of IP addresses via PPP
7.6.4 Settings in the PPP list
7.7 Extended connection for flat rates—Keep-alive
97
7.8 Callback functions
98
98
7.8.1 Callback for Microsoft CBCP
7.8.2 Fast callback using the LANCOM process
7.8.3 Callback with RFC 1570 (PPP LCP extensions)
7.8.4 Overview of configuration of callback function
99
100
100
7.9 Channel bundling with MLPPP
101
8 Firewall
8.1 Threat analysis
8.1.1 The dangers
104
104
104
105
105
106
8.1.2 The ways of the perpetrators
8.1.3 The methods
8.1.4 The victims
8.2 What is a Firewall?
107
107
108
8.2.1 Tasks of a Firewall
8.2.2 Different types of Firewalls
8.3 The LANCOM Firewall
114
8.3.1 How the LANCOM Firewall inspects data packets 115
8.3.2 Special protocols
119
121
125
131
134
137
141
151
8.3.3 General settings of the Firewall
8.3.4 Parameters of Firewall rules
8.3.5 Alerting functions of the Firewall
8.3.6 Strategies for Firewall settings
8.3.7 Hints for setting the Firewall
8.3.8 Configuration of Firewall rules
8.3.9 Firewall diagnosis
5
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Contents
8.3.10 Firewall limitations
159
8.4 Protection against break-in attempts: Intrusion Detection
8.4.1 Examples for break-in attempts
160
160
161
8.4.2 Configuration of the IDS
8.5 Protection against “Denial of Service” attacks
8.5.1 Examples of Denial of Service attacks
8.5.2 Configuration of DoS blocking
162
162
165
8.5.3 Configuration of ping blocking and Stealth mode 166
9 Quality of Service
168
9.1 Why QoS?
168
9.2 Which data packets to prefer?
9.2.1 Guaranteed minimum bandwidths
9.2.2 Limited maximum bandwidths
168
171
172
9.3 The queue concept
172
172
175
9.3.1 Queues in transmission direction
9.3.2 Queues for receiving direction
9.4 Reducing the packet length
176
178
182
9.5 QoS parameters for Voice over IP applications
9.6 QoS in sending or receiving direction
9.7 QoS configuration
183
183
185
187
189
189
9.7.1 Evaluating ToS and DiffServ fields
9.7.2 Defining minimum and maximum bandwidths
9.7.3 Adjusting transfer rates for interfaces
9.7.4 Sending and receiving direction
9.7.5 Reducing the packet length
10 Virtual LANs (VLANs)
192
10.1 What is a Virtual LAN?
192
10.2 This is how a VLAN works
10.2.1 Frame tagging
192
193
194
195
10.2.2 Conversion within the LAN interconnection
10.2.3 Application examples
10.3 Configuration of VLANs
10.3.1 The network table
198
198
199
200
10.3.2 The port table
10.3.3 Configuration with LANconfig
6
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Contents
LANCOM Reference Manual LCOS 3.50
10.3.4 Configuration with WEBconfig or Telnet
201
11 Wireless LAN – WLAN
203
11.1 What is a Wireless LAN?
203
203
11.1.1 Standardized radio transmission by IEEE
11.1.2 Operation modes of Wireless LANs and base stations
206
11.2 Developments in WLAN security
11.2.1 Some basic concepts
11.2.2 WEP
213
214
215
219
220
223
230
231
11.2.3 WEPplus
11.2.4 EAP and 802.1x
11.2.5 TKIP and WPA
11.2.6 AES and 802.11i
11.2.7 Summary
11.3 Protecting the wireless network
232
11.4 Configuration of WLAN parameters
11.4.1 WLAN security
233
234
243
244
250
254
11.4.2 General WLAN settings
11.4.3 The physical WLAN interfaces
11.4.4 The logical WLAN interfaces
11.4.5 Additional WLAN functions
11.5 Establishing outdoor wireless networks
11.5.1 Geometrical layout of the transmission path
11.5.2 Antenna power
256
256
258
261
264
11.5.3 Emitted power and maximum distance
11.5.4 Transmission power reduction
12 Office communications with LANCAPI
265
12.1 What are the advantages of LANCAPI?
265
12.2 The client and server principle
12.2.1 Configuring the LANCAPI server
12.2.2 Installing the LANCAPI client
12.2.3 Configuration of the LANCAPI clients
265
265
268
269
12.3 How to use the LANCAPI
270
270
12.4 The LANCOM CAPI Faxmodem
7
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Contents
13 Server services for the LAN
272
13.1 Automatic IP address administration with DHCP
13.1.1 The DHCP server
272
272
273
274
13.1.2 DHCP—'on', 'off' or 'auto'?
13.1.3 How are the addresses assigned?
13.2 DNS
277
277
279
280
283
284
13.2.1 What does a DNS server do?
13.2.2 DNS forwarding
13.2.3 Setting up the DNS server
13.2.4 URL blocking
13.2.5 Dynamic DNS
13.3 Call charge management
285
285
286
287
13.3.1 Charge-based ISDN connection limits
13.3.2 Time dependent ISDN connection limit
13.3.3 Settings in the charge module
13.4 The SYSLOG module
287
288
288
13.4.1 Setting up the SYSLOG module
13.4.2 Example configuration with LANconfig
14 Virtual Private Networks—VPN
291
14.1 What does VPN offer?
291
293
294
14.1.1 Private IP addresses on the Internet?
14.1.2 Secure communications via the Internet?
14.2 LANCOM VPN: an overview
14.2.1 VPN example application
14.2.2 Advantages of LANCOM VPN
14.2.3 LANCOM VPN functions
295
295
296
297
14.3 VPN connections in detail
298
298
299
14.3.1 LAN-LAN coupling
14.3.2 Dial-in connections (Remote Access Service)
14.4 What is LANCOM Dynamic VPN?
14.4.1 A look at IP addressing
300
300
301
14.4.2 This is how LANCOM Dynamic VPN works
14.5 Configuration of VPN connections
306
14.5.1 VPN tunnel: Connections between VPN gateways 307
14.5.2 Set up VPN connections with the Setup Wizard
14.5.3 Inspect VPN rules
14.5.4 Manually setting up VPN connections
308
309
309
8
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Contents
LANCOM Reference Manual LCOS 3.50
14.5.5 Prepare VPN network relationships
311
314
318
322
14.5.6 Configuration with LANconfig
14.5.7 Configuration with WEBconfig
14.5.8 Diagnosis of VPN connections
14.6 Specific examples of connections
14.6.1 Static/static
322
323
323
324
14.6.2 Dynamic/static
14.6.3 Static/dynamic (with LANCOM Dynamic VPN)
14.6.4 Dynamic/dynamic (with LANCOM Dynamic VPN) 325
14.7 How does VPN work?
326
327
328
14.7.1 IPSec—The basis for LANCOM VPN
14.7.2 Alternatives to IPSec
14.8 The standards behind IPSec
329
329
329
330
332
335
14.8.1 IPSec modules and their tasks
14.8.2 Security Associations – numbered tunnels
14.8.3 Encryption of the packets – the ESP protocol
14.8.4 Authentication – the AH protocol
14.8.5 Key management – IKE
15 Appendix: Overview of functions for LANCOM models and LCOS
versions 337
16 Index
338
9
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 1: Preface
1 Preface
User’s manual and reference manual
The documentation of your device consists of two parts: The user’s manual
and the reference manual.
̈ The hardware of the LANCOM devices is documented in the respective
user’s manuals. Apart from a description of the specific feature set of the
different models, you find in the user’s manual information about inter-
faces and display elements of the devices, as well as instructions for basic
configuration by means of the wizards.
̈ You are now reading the reference manual. The reference manual
describes all functions and settings of the current version of LCOS, the
operating system of all LANCOM routers and LANCOM Wireless Access
Points. The reference manual refers to a certain software version, but not
to a special hardware.
It completes the user’s manual and describes topics in detail, which are
valid for several models simultaneously. These are for example:
୴ Systems design of the LCOS operating system
୴ Configuration
୴ Management
୴ Diagnosis
୴ Security
୴ Routing and WAN functions
୴ Firewall
୴ Quality of Service (QoS)
୴ Virtual Private Networks (VPN)
୴ Virtual Local Networks (VLAN)
୴ Backup solutions
୴ LANCAPI
୴ Further server services (DHCP, DNS, charge management)
LCOS, the operating system of LANCOM devices
All LANCOM routers and LANCOM Wireless Access Points use the same oper-
ating system: LCOS. The operating system developed by LANCOM itself is not
attackable from the outside, and thus offers high security. The consistent use
of LCOS ensures a comfortable and constant operation of all LANCOM prod-
10
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 1: Preface
LANCOM Reference Manual LCOS 3.50
ucts. The extensive feature set is available throughout all LANCOM products
(provided respective support by hardware), and continuously receives further
enhancements by free, regular software updates.
This reference manual applies to the following definitions of software, hard-
ware and manufacturers:
̈ ’LCOS’ describes the device-independent operating system
̈ ’LANCOM’ stands as generic term for all LANCOM routers and LANCOM
Wireless Access Points
̈ ’LANCOM’ stands as shortened form for the manufacturer, LANCOM Sys-
tems GmbH from Würselen, Germany
Validity
The present reference manual applies to all
LANCOM routers and LANCOM
Wireless Access Points with firmware version 3.32 or better.
The functions and settings described in this reference manual are not sup-
ported by all models and/or all firmware versions. A table can be found in the
appendix denoting the individual functions, from which firmware version they
are supported in the respective devices (’Appendix: Overview of functions for
LANCOM models and LCOS versions’ →page 337).
Illustrations of devices, as well as screenshots always represent just examples,
which need not necessarily correspond to the actual firmware version.
Security settings
For a carefree use of your device, we recommend to carry out all security set-
tings (e.g. Firewall, encryption, access protection, charge lock), which are not
already activated at the time of purchase of your device. The LANconfig wizard
’Check Security Settings’ will support you accomplishing this. Further informa-
tion regarding this topic can be found in chapter ’Security’ →page 52.
We ask you additionally to inform you about technical developments and
load new software versions if necessary.
This documentation was compiled …
...by several members of our staff from a variety of departments in order to
ensure you the best possible support when using your LANCOM product.
In case you encounter any errors, or just want to issue critics or enhance-
ments, please do not hesitate to send an email directly to:
11
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 1: Preface
clock should you have any queries regarding the topics discussed in
this manual or require any further support. In addition, support from
LANCOM Systems is also available to you. Telephone numbers and
contact information for LANCOM Systems support can be found on a
separate insert, or at the LANCOM Systems website.
Notes symbols
Very important instructions. If not followed, damage may result.
Important instruction should be followed.
Additional instructions which can be helpful, but are not
required.
Special formatting in body text
Bold
Menu commands, command buttons, or text boxes
Inputs and outputs for the display mode
Placeholder for a specific value
Code
<Value>
12
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 2: System design
LANCOM Reference Manual LCOS 3.50
2 System design
The LANCOM operating system LCOS is a collection of different software mod-
ules, the LANCOM devices themselves have different interfaces to the WAN
and LAN. Depending on the particular application, data packets flow through
different modules on their way from one interface to another.
The following block diagram illustrates in abstract the general arrangement
of LANCOM interfaces and LCOS modules. In the course of this reference man-
ual the descriptions of the individual functions will refer to this illustration to
show important connections of the particular applications and to deduce the
resulting consequences.
The diagram can thus explain for which data streams the firewall comes into
play, or, in case of address translations (IP masquerading or N:N mapping), at
which place which addresses are valid.
VPN services
VPN / PPTP
LAN interfaces
Firewall / IDS / DoS / QoS
LAN / Switch
IP router
WAN interfaces
DSLoL
connection via LAN/Switch
WLAN-1
WLAN-2
ADSL
IP module: NetBIOS, DNS,
DHCP server, RADIUS, RIP, NTP,
SNMP, SYSLOG, SMTP
DSL
DMZ
Configuration &
management:
ISDN
WEBconfig, Telnet,
IPX router
LANCAPI
IPX over PPTP/VPN
Notes regarding the respective modules and interfaces:
̈ The IP router takes care of routing data on IP connections between the
interfaces from LAN and WAN.
̈ The firewall (with the services “Intrusion Detection”, “Denial of Service”
and “Quality of Service”) encloses the IP router like a shield. All connec-
tions via the IP router automatically flow through the firewall as well.
̈ LANCOM devices provide either a separate LAN interface or an integrated
switch with multiple LAN interfaces as interfaces to the LAN.
13
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 2: System design
̈ LANCOM Wireless access points resp. LANCOM routers with wireless
modules offer additionally one or, depending on the respective model,
also two wireless interfaces for the connection of Wireless LANs.
̈ A DMZ interface enables for some models a ’demilitarized zone’ (DMZ),
which is also physically separated within the LAN bridge from other LAN
interfaces.
̈ The LAN bridge provides a protocol filter that enables blocking of dedi-
cated protocols on the LAN. Additionally, single LAN interfaces can be
separated by the “isolated mode”. Due to VLAN functions, virtual LANs
may be installed in the LAN bridge, which permit the operating of several
logical networks on a physical cabling.
̈ Applications can communicate with different IP modules (NetBIOS, DNS,
DHCP server, RADIUS, RIP, NTP, SNMP, SYSLOG, SMTP) either via the IP
router, or directly via the LAN bridge.
̈ The functions “IP masquerading” and “N:N mapping” provide suitable IP
address translations between private and public IP ranges, or also
between multiple private networks.
̈ Provided according authorization, direct access to the configuration and
management services of the devices (WEBconfig, Telnet, TFTP) is provided
from the LAN and also from the WAN side. These services are protected
by filters and login barring, but do not require any processing by the fire-
wall. Nevertheless, a direct access from WAN to LAN (or vice versa) using
the internal services as a bypass for the firewall is not possible.
̈ The IPX router and the LANCAPI access on the WAN side only the ISDN
interface. Both modules are independent from the firewall, which controls
only data traffic through the IP router.
̈ The VPN services (including PPTP) enable data encryption in the Internet
and thereby enable virtual private networks over public data connections.
̈ Depending on the specific model, either xDSL/Cable, ADSL or ISDN are
available as different WAN interfaces.
̈ The DSLoL interface (DSL over LAN) is no physical WAN interface, but
more a “virtual WAN interface”. With appropriate LCOS settings, it is pos-
sible to use on some models a LAN interface as an additional xDSL/Cable
interface.
14
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
3 Configuration and management
This section will show you the methods and ways you can use to access the
device and specify further settings. You will find descriptions on the following
topics:
̈ Configuration tools
̈ Monitoring and diagnosis functions of the device and software
̈ Backup and restoration of entire configurations
̈ Installation of new firmware in the device
3.1 Configuration tools and approaches
LANCOM are flexible devices that support a variety of tools (i.e. software) and
approaches (in the form of communication options) for their configuration.
First, a look at the approaches.
You can connect to an LANCOM with three different access methods (accord-
ing to the connections available).
̈ Through the connected network (LAN as well as WAN—inband)
̈ Through the configuration interface (config interface) on the rear of the
router (also known as outband)
̈ Remote configuration via ISDN access
What is the difference between these three possibilities?
On one hand, the availability: Configuration via outband is always available.
Inband configuration is not possible, however, in the event of a network fault.
Remote configuration is also dependent on an ISDN connection.
On the other hand, whether or not you will need additional hardware and
software: The inband configuration requires one of the computers already
available in the LAN or WAN, as well as only one suitable software, such as
LANconfig or WEBconfig (see following section). In addition to the configura-
tion software, the outband configuration also requires a the computers with
a serial port. The preconditions are most extensive for ISDN remote configu-
ration: In addition to an ISDN capable LANCOM, an ISDN card is needed in
the configuration PC or alternatively, access via LANCAPI to an additional
LANCOM that is ISDN capable.
15
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
3.2 Configuration software
Situations in which the device is configured vary—as do the personal require-
ments and preferences of the person doing the configuration. LANCOM rout-
ers thus feature a broad selection of configuration software:
̈ LANconfig – nearly all parameters of the LANCOM can be set quickly and
with ease using this menu-based application. Outband, inband and
remote configuration are supported, even for multiple devices simultane-
ously.
̈ WEBconfig – this software is permanently installed in the router. All that
is required on the workstation used for the configuration is a web
browser. WEBconfig is thus independent of operating systems. Inband
and remote configuration are supported.
̈ SNMP – device-independent programs for the management of IP net-
works are generally based on the SNMP protocol. It is possible to access
the LANCOM inband and via remote configuration using SNMP.
̈ Terminal program, Telnet – an LANCOM can be configured with a ter-
minal program via the config interface (e.g. HyperTerminal) or within an
IP network (e.g. Telnet).
̈ TFTP – the file transfer protocol TFTP can to a limited extent also be used
within IP networks (inband and remote configuration).
Please note that all procedures access the same configuration data.
For example, if you change the settings in LANconfig, this will also
have a direct effect on the values under WEBconfig and Telnet.
3.2.1 Configuration using LANconfig
Start LANconfig by, for example, using the Windows Start menu: Start ̈
Programs ̈ LANCOM ̈ LANconfig. LANconfig will now automatically
search for devices on the local network. It will automatically launch the setup
wizard if a device which has not yet been configured is found on the local area
network LANconfig.
Find new devices
Click on the Find button or call up the command with Device / Find to initi-
ate a search for a new device manually. LANconfig will then prompt for a loca-
tion to search. You will only need to specify the local area network if using the
inband solution, and then you're off.
16
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
Once LANconfig has finished its search, it displays a list of all the devices it
has found, together with their names and, perhaps a description, the IP
address and its status.
The expanded range of functions for professionals
Two different display options can be selected for configuring the devices with
LANconfig:
̈ The 'Simple configuration display' mode only shows the settings required
under normal circumstances.
̈ The 'Complete configuration display' mode shows all available configura-
tion options. Some of them should only be modified by experienced users.
Select the display mode in the View / Options menu.
Double-clicking the entry for the highlighted device and then clicking the
Configure button or the Device / Configure option reads the device's cur-
rent settings and displays the 'General' configuration selection.
The integrated Help function
The remainder of the program's operation is self-explanatory or you can use
the online help. You can click on the 'Help' button top right in any window or
right-click on an unclear term at any time to call up context-sensitive help.
17
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
Management of multiple devices
LANconfig supports multi device remote management. Simply select the
desired devices, and LANconfig performs all actions for all selected devices
then, one after the other. The only requirement: The devices must be of the
same type.
In order to support an easy management, the devices can be grouped
together. Therefore, ensure to enable ’Folder Tree’ in the View menu, and
group the devices by ’drag an drop’ into the desired folders.
LANconfig shows only those parameters that are suitable for multi
device configuration when more than one device is selected, e.g. MAC
Access Control Lists for all LANCOM Wireless Access Points.
3.2.2 Configuration with WEBconfig
You can use any web browser, even text-based, for basic setup of the device.
The WEBconfig configuration application is integrated in the LANCOM. All
you need is a web browser in order to access WEBconfig.
Functions with any web browser
WEBconfig offers setup wizards similar to LANconfig and has all you need for
easy configuration of the LANCOM—contrary to LANconfig but under all
operating systems for which a web browser exists.
A LAN or WAN connection via TCP/IP must be established to use WEBconfig.
WEBconfig is accessed by any web browser via the IP address of the LANCOM,
via the name of the device (if previously assigned), or via any name if the
device has not been configured yet.
http://<IP address or device name>
18
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
Secure with HTTPS
WEBconfig offers an encrypted transmission of the configuration data for
secure (remote) management via HTTPS.
https://<IP address or device name>
For maximum security, please ensure to have installed the latest ver-
sion of your Internet browser. For Windows 2000, LANCOM Systems
recommends to use the “High Encryption Pack” or at least Internet
Explorer 5.5 with Service Pack 2 or above.
3.2.3 Configuration using Telnet
Start configuration using Telnet, e.g. from the Windows command line with
the command:
C:\>telnet 10.0.0.1
Telnet will then establish a connection with the device using the IP address.
After entering the password (if you have set one to protect the configuration),
all configuration commands are available.
Change the language of the display.
The terminal can be set to English and German modes. The display language
of your LANCOM is set to English at the factory. In the remaining documen-
tation, all configuration commands will be provided in English. To change the
display language to German, use the following commands:
Configuration tool Run (when English is the selected language)
WEBconfig
Telnet
Expert configuration ̈ Setup ̈ Config-module ̈ Language
set /Setup/Config module/Language German
TFTP
Certain functions cannot be run at all, or not satisfactorily, with Telnet. These
include all functions in which entire files are transferred, for example the
uploading of firmware or the saving and restoration of configuration data. In
this case TFTP is used.
TFTP is available by default under the Windows 2000 and Windows NT oper-
ating systems. It permits the simple transfer of files with other devices across
the network.
19
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
The syntax of the TFTP call is dependent on the operating system. With Win-
dows 2000 and Windows NT the syntax is:
tftp -i <IP address Host> [get|put] source [target]
With numerous TFTP clients the ASCII format is preset. Therefore, for
the transfer of binary data (e.g. firmware) the binary transfer must
usually be explicitly selected.This example for Windows 2000 and
Windows NT shows you how to achieve this by using the '-i' param-
eter.
3.2.4 Configuration using SNMP
The Simple Network Management Protocol (SNMP V.1 as specified in RFC
1157) allows monitoring and configuration of the devices on a network from
a single central instance.
There are a number of configuration and management programs that run via
SNMP. Commercial examples are Tivoli, OpenView from Hewlett-Packard,
SunNet Manager and CiscoWorks. In addition, numerous programs also exist
as freeware and shareware.
Your LANCOM can export a so-called device MIB file (Management Informa-
tion Base) for use in SNMP programs.
Configuration tool Run
WEBconfig
TFTP
Get Device SNMP MIB (in main menu)
tftp 10.0.0.1 get readmib file1
3.3 Remote configuration via Dial-Up Network
The complete section on remote configuration applies only to
LANCOM with ISDN interface.
Configuring routers at remote sites is particularly easy using the remote con-
figuration method via a Dial-Up Network from Windows. The device is acces-
sible by the administrator immediately without any settings being made after
it is switched on and connected to the WAN interface. This means that you
save a lot of time and costs when connecting other networks to your network
because you do not have to travel to the other network or instruct the staff
on-site on configuring the router.
20
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
You can also reserve a special calling number for remote configuration. Then
the support technician can always access the router even if it is really no
longer accessible due to incorrect settings.
3.3.1 This is what you need for ISDN remote configuration
̈ An LANCOM with an ISDN connection
̈ A computer with a PPP client, e.g. Windows Dial-Up Network
̈ A program for inband configuration, e.g. LANconfig or Telnet
̈ A configuration PC with an ISDN card or access via LANCAPI to an
LANCOM with ISDN access.
3.3.2 The first remote connection using Dial-Up Networking
ቢ In the LANconfig program select Device / New, enable 'Dial-Up connec-
tion' as the connection type and enter the calling number of the WAN
interface to which the LANCOM is connected. If you wish, you can also
enter the time period after which an idle connection is to be disconnected
automatically.
ባ LANconfig now automatically generates a new entry in the Dial-Up Net-
work. Select a device that supports PPP (e.g. the NDIS-WAN driver
included with the LANCAPI) for the connection and press OK to confirm.
ቤ Then the LANconfig program will display a new device with the name
'Unknown' and the dial-up call number as the address in the device list.
When an entry in the device list is deleted, the related connection in
the Windows Dial-Up Network is also deleted.
ብ You can configure the device remotely just like all other devices.
LANconfig establishes a dial-up connection enabling you to select a con-
figuration.
3.3.3 The first remote connection using a PPP client and Telnet
ቢ Establish a connection to the LANCOM with your PPP client using the fol-
lowing details:
୴ User name 'ADMIN'
୴ The password selected in LANCOM
୴ An IP address for the connection, only if required
21
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
ባ Open a Telnet session to the LANCOM. Use the following IP address for
this purpose:
୴ '172.17.17.18', if you have not defined an IP address for the PPP cli-
ent. The LANCOM automatically uses this address if no other address
has been defined. The PC making the call will respond to the IP
'172.17.17.17'.
୴ Raise the IP address of the PC by one, if you have defined an address.
Example: You have set the IP '10.0.200.123' for the PPP client, the
LANCOM then responds to '10.0.200.124'. Exception: If the digits
'254' are at the end of the IP address, the router responds to 'x.x.x.1'.
ቤ You can configure the LANCOM remotely just like all other devices.
The default layer for remote field installations
The PPP connection of any other remote site to the router, of course, will only
succeed if the device answers every call with the corresponding PPP settings.
This is the case using the factory default settings because the default protocol
(default layer) is set to PPP.
You may, however, want to change the default layer for LAN-to-LAN connec-
tions, for example, to a different protocol after the first configuration run.
Then the device will no longer take calls on the dial-up connection using the
PPP settings. The solution to this is to agree upon a special calling number for
configuration access:
The administrator access for ISDN remote management
If the device receives a call on this number, it will always use PPP, regardless
of any other settings made on the router. Only a specific user name which is
automatically entered by the LANconfig program during call establishment
will be accepted during the PPP negotiations:
22
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
ቢ Switch to the 'Security' tab in the 'Management' configuration section.
ባ Enter a number at your location which is not being used for other pur-
poses in the 'Configuration access' area.
Alternatively, enter the following command:
set /setup/config-module/Farconfig 123456
Always provide additional protection for the settings of the device by
setting a password. Alternatively, enter the following command dur-
ing a Telnet or terminal connection:
passwd
You will then be prompted to enter and confirm a new password.
3.4 LANmonitor—know what's happening
The LANmonitor includes a monitoring tool with which you can view the most
important information on the status of your routers on your monitor at any
23
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
time under Windows operating systems—of all of the LANCOM routers in the
network.
Many of the internal messages generated by the devices are converted to
plain text, thereby helping you to troubleshoot.
You can also use LANmonitor to monitor the traffic on the router's various
interfaces to collect important information on the settings you can use to opti-
mize data traffic.
In addition to the device statistics that can also be read out during a Telnet or
terminal session or using WEBconfig, a variety of other useful functions are
also available in the LANmonitor, such as the enabling of an additional charge
limit.
With LANmonitor you can only monitor those devices that you can
access via IP (local or remote). With this program you cannot access a
router via the serial interface.
3.4.1 Extended display options
Under View / Show Details you can activate and deactivate the following
display options:
̈ Error messages
̈ Diagnostic messages
̈ System information
Many important details on the status of the LANCOM are not dis-
played until the display of the system information is activated. These
include, for example, the ports and the charge management.There-
fore, we recommend that interested users activate the display of the
system information.
3.4.2 Monitor Internet connection
To demonstrate the functions of LANmonitor we will first show you the types
of information LANmonitor provides about connections being established to
your Internet provider.
ቢ To start LANmonitor, go to Start ̈ Programs ̈ LANCOM ̈
LANmonitor. Use Device ̈ New to set up a new device and in the fol-
lowing window, enter the IP address of the router that you would like to
24
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
monitor. If the configuration of the device is protected by password, enter
the password too.
Alternatively, you can select the device via the LANconfig and monitor it
using Tools / Monitor Device.
ባ LANmonitor automatically creates a new entry in the device list and ini-
tially displays the status of the transfer channels. Start your Web browser
and enter any web page you like. LANmonitor now shows a connection
being established on one channel and the name of the remote site being
called. As soon as the connection is established, a plus sign against the
communication channel entry indicates that further information on this
channel is available. Click on the plus sign or double-click such entry to
open a tree structure in which you can view various information.
In this example, you can determine from the PPP protocol information the
IP address assigned to your router by the provider for the duration of the
connection and the addresses transmitted for the DNS and NBNS server.
Under the general information you can watch the transmission rates at
which data is currently being exchanged with the Internet.
ቤ To break the connection manually, click on the active channel with the
right mouse button. You may be required to enter a configuration pass-
word.
ብ If you would like a log of the LANmonitor output in file form, select
Device ̈ Properties and go to the 'Logging' tab. Enable logging and
25
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
specify whether LANmonitor should create a log file daily, monthly, or on
an ongoing basis.
3.5 Trace information—for advanced users
Trace outputs may be used to monitor the internal processes in the router dur-
ing or after configuration. One such trace can be used to display the individual
steps involved in negotiating the PPP. Experienced users may interpret these
outputs to trace any errors occurring in the establishment of a connection. A
particular advantage of this is: The errors being tracked may stem from the
configuration of your own router or that of the remote site.
The trace outputs are slightly delayed behind the actual event, but are
always in the correct sequence. This will not usually hamper interpre-
tation of the displays but should be taken into consideration if making
precise analyses.
3.5.1 How to start a trace
Trace output can be started in a Telnet session, for example. The command to
call up a trace follows this syntax:
trace [code] [parameters]
The trace command, the code, the parameters and the combination com-
mands are all separated from each other by spaces. And what is the meaning
of these codes and parameters?
26
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
3.5.2 Overview of the keys
This code...
... in combination with the trace causes the following:
displays a help text
?
+
switches on a trace output
-
switches off a trace output
#
switches between different trace outputs (toggle)
displays the current status of the trace
no code
3.5.3 Overview of the parameters
The available traces depend individually on the particular model and
can be listed by entering tracewith no arguments on the com-
mand line.
This parameter...
... brings up the following display for the trace:
status messages for the connection
error messages for the connection
LANCOM protocol negotiation
IPX routing
Status
Error
LANCOM
IPX-router
PPP
PPP protocol negotiation
SAP
IPX Service Advertising Protocol
IPX watchdog spoofing
IPX-watchdog
SPX-watchdog
LCR
SPX watchdog spoofing
Least-Cost Router
Script
script processing
RIP
IPX Routing Information Protocol
IP routing
IP-router
IP-RIP
IP Routing Information Protocol
Address Resolution Protocol
Internet Control Message Protocol
processes in the masquerading module
Dynamic Host Configuration Protocol
ARP
ICMP
IP masquerading
DHCP
27
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
This parameter...
NetBIOS
... brings up the following display for the trace:
NetBIOS management
DNS
Domain Name Service Protocol
Packet dump
D-channel-dump
ATM
display of the first 64 bytes of a package in hexadecimal form
trace on the D channel of the connected ISDN bus
spoofing at the ATM packet level
ADSL
ADSL connections status
VPN-Status
VPN-Packet
SMTP-Client
SNTP
IPSec and IKE negotiation
IPSec and IKE packets
E-Mail processing of the integrated mail client
Simple Network Time Protocol information
3.5.4 Combination commands
This combination
command...
... brings up the following display for the trace:
All
all trace outputs
Display
Protocol
TCP-IP
IPX-SPX
Time
status and error outputs
LANCOM and PPP outputs
IP-Rt., IP-RIP, ICMP and ARP outputs
IPX-Rt., RIP, SAP, IPX-Wd., SPX-Wd., and NetBIOS outputs
displays the system time in front of the actual trace output
Source
includes a display of the protocol that has initiated the output in
front of the trace
Any appended parameters are processed from left to right. This means that it
is possible to call a parameter and then restrict it.
28
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
3.5.5 Examples
This code...
... in combination with the trace causes the following:
trace
displays all protocols that can generate outputs during the config-
uration, and the status of each output (ON or OFF)
trace + all
switches on all trace outputs
trace + protocol dis-
play
switches on the output for all connection protocols together with
the status and error messages
trace + all - icmp
switches on all trace outputs with the exception of the ICMP proto-
col
trace ppp
displays the status of the PPP
trace # ipx-rt display
toggles between the trace outputs for the IPX router and the dis-
play outputs
trace - time
switches off the system time output before the actual trace output
3.6 Working with configuration files
The current configuration of an LANCOM can be saved as a file and reloaded
in the device (or in another device of the same type) if necessary.
Additionally, configuration files can be generated and edited offline for any
LANCOM device, firmware option and software version:
Backup copies of configuration
With this function you can create backup copies of the configuration of your
LANCOM. Should your LANCOM (e.g. due to a defect) lose its configuration
data, you simply reload the backup copy.
29
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
Convenient series configuration
However, even when you are faced with the task of configuring several
LANCOM of the same type, you will come to appreciate the function for saving
and restoring configurations. In this case you can save a great deal of work
by first importing identical parameters as a basic configuration and then only
making individual settings to the separate devices.
Running function
Configuration tool Run
LANconfig
Edit ̈ Save Configuration to File
Edit ̈ Restore Configuration from File
Edit ̈ New Configuration File
Edit ̈ Edit Configuration File
Edit ̈ Print Configuration File
WEBconfig
TFTP
Save Configuration ̈ Load Configuration (in main menu)
tftp 10.0.0.1 get readconfig file1 tftp
10.0.0.1 put file1 writeconfig
3.7 New firmware with LANCOM FirmSafe
The software for devices from LANCOM is constantly being further developed.
We have fitted the devices with a flash ROM which makes child's play of
updating the operating software so that you can enjoy the benefits of new
features and functions. No need to change the EPROM, no need to open up
the case: simply load the new release and you're away.
3.7.1 This is how LANCOM FirmSafe works
LANCOM FirmSafe makes the installation of the new software safe: The used
firmware is not simply overwritten but saved additionally in the device as a
second firmware.
Of the two firmware versions saved in the device only one can ever be active.
When loading a new firmware version the active firmware version is not over-
written. You can decide which firmware will be activated after the upload:
̈ 'Immediate': The first option is to load the new firmware and activate it
immediately. The following situations can result:
୴ The new firmware is loaded successfully and works as desired. Then
all is well.
30
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
୴ The device no longer responds after loading the new firmware. If an
error occurs during the upload, the device automatically reactivates
the previous firmware version and reboots the device.
̈ 'Login': To avoid problems with faulty uploads there is the second option
with which the firmware is uploaded and also immediately booted.
୴ In contrast to the first option, the device will wait for five minutes until
it has successfully logged on. Only if this login attempt is successful
does the new firmware remain active permanently.
୴ If the device no longer responds and it is therefore impossible to log
in, it automatically loads the previous firmware version and reboots
the device with it.
̈ 'Manual': With the third option you can define a time period during which
you want to test the new firmware yourself. The device will start with the
new firmware and wait for the preset period until the loaded firmware is
manually activated and therefore becomes permanently effective.
3.7.2 How to load new software
There are various ways of carrying out a firmware upload, all of which produce
the same result:
̈ LANconfig
̈ WEBconfig
̈ Terminal program
̈ TFTP
All settings will remain unchanged by a firmware upload. All the same you
should save the configuration first for safety's sake (with Edit ̈ Save Con-
figuration to File if using LANconfig, for example).
If the newly installed release contains parameters which are not present in the
device's current firmware, the device will add the missing values using the
default settings.
LANconfig
When using LANconfig, highlight the desired device in the selection list and
click on Edit ̈ Firmware Management ̈ Upload New Firmware, or
click directly on the Firmware Upload button. Then select the directory in
which the new version is located and mark the corresponding file.
31
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
LANconfig then tells you the version number and the date of the firmware in
the description and offers to upload the file. The firmware you already have
installed will be replaced by the selected release by clicking Open.
You also have to decide whether the firmware should be permanently acti-
vated immediately after loading or set a testing period during which you will
activate the firmware yourself. To activate the firmware during the set test
period, click on Edit ̈ Firmware Management . After upload, start the
new firmware in test mode.
WEBconfig
Start WEBconfig in your web browser. On the starting page, follow the Per-
form a Firmware Upload link. In the next window you can browse the folder
system to find the firmware file and click Start Upload to start the installa-
tion.
Terminal program (e.g. Telix or Hyperterminal in Windows)
If using a terminal program, you should first select the 'set mode-firmsafe'
command on the 'Firmware' menu and select the mode in which you want the
new firmware to be loaded (immediately, login or manually). If desired, you
can also set the time period of the firmware test under 'set Timeout-firmsafe'.
Select the 'Firmware-upload' command to prepare the router to receive the
upload. Now begin the upload procedure from your terminal program:
̈ If you are using Telix, click on the Upload button, specify 'XModem' for
the transfer and select the desired file for the upload.
̈ If you are using Hyperterminal, click on Transfer ̈ Send File, select the
file, specify 'XModem' as the protocol and start the transfer with OK.
TFTP
TFTP can be used to install new firmware on LANCOM. This can be done with
the command (or target) writeflash. For example, to install new firmware in
a LANCOM with the IP address 10.0.0.1, enter the following command under
Windows 2000 or Windows NT:
tftp -i 10.0.0.1 put Lc_16xxu.282 writeflash
3.8 Command line interface
The LANCOM command line interface is always structured as follows:
32
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
̈ Status
Contains all read-only statistics of the individual SW modules
̈ Setup
Contains all configurable parameters of all SW modules of the device
̈ Firmware
Contains all firmware-management relevant actions and tables
̈ Other
Contains dialling, boot, reset and upload actions
3.8.1 Command line reference
Navigating the command line can be accomplished by DOS and UNIX style
commands as follows:
Command
cd <directory>
Description
Change the current directory. Certain abbreviations exists,
e.g. ”cd ../..” can be abbreviated to ”cd ...” etc.
del <name>
rm <name>
Delete the table entry with the index <name>
dir [<directory>]
list[<directory>]
ls [<directory>]
ll [<directory>]
Display the contents of a directory
do <name> [<parameters>]
Execute the action <name> in the current directory.
Parameters can be specified
exit/quit/x
Close the console session
feature <code>
passwd
Unlock the feature with the specified feature code
change password
ping [IP address]
readconfig
Issues an ICMP echo request to the specified IP address
Displays the complete configuration of the device in
”readconfig” syntax
readmib
display SNMP Management Information Base
repeat <VALUE> <command>
repeats command every VALUE seconds until terminated
by new input
stop
stop ping
set <name> <value(s)>
Set a configuration item to the specified value. If the item
is a table entry, multiple values must be given (one for
each table column). A ”*” as a value indicates that the
column in question should be left at its previous value.
33
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
Command
Description
set [<name>] ?
Show which values are allowed for a configuration item. If
<name> is empty, this is displayed for each item in the
current directory.
show <options>
Shows internal data. Run show ? for a list of available
items, e.g. boot history, firewall filter rules, vpn rules and
memory usage
sysinfo
Shows basic system information
trace […]
Configures the trace output system for several modules,
see ’How to start a trace’ →page 26
writeconfig
writeflash
Accept a new configuration in ”readconfig” syntax. All
subsequent lines are interpreted as configuration values
until two blank lines in a row are encountered
load new firmware via TFTP
̈ All commands and directory/item names may be abbreviated as long as
no ambiguity exists. For example, it is valid to shorten the ”sysinfo”
command to ”sys” or a ”cd Management” to ”c ma”. Not allowed
would be ”cd /s”, since that could mean either ”cd /Setup” or
”cd /Status”.
̈ Names with blanks in them must be enclosed in double quotes.
̈ Additionally, there is a command-specific help function available by call-
ing functions with a question mark as the argument, i.e. entering “ping
?” displays the options for the built-in PING command.
̈ A complete listing of available commands for a particular device is avail-
able by entering ’?’ from the command line.
3.9 Scheduled Events
Regular Execution of Commands
This feature is intended to allow the device to execute predefined commands
in a telnet-like environment, at times defined by the user. The functionality is
equivalent to the UNIX cron service. Subject of execution can be any
LANCOM command line command. Therefore, the full feature set of all
LANCOM devices can be controlled by this facility.
Application examples include:
̈ scheduled connections
̈ time-dependant firewall rules
34
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 3: Configuration and management
LANCOM Reference Manual LCOS 3.50
̈ regular firmware or configuration updates
Configuration Tool
WEBconfig
Run
Expert-Configuration ̈ Config-module ̈ Cron-table
Terminal/Telnet
setup/config-module/cron-table
The data is stored in a table with the following layout:
Entry
Index
Description
Unambiguously identifies this entry in the table
Base
The Basefield rules whether the time check is done against the device's
operation time or the real time. Rules based on real time are only executed if
the device has acquired the current time, e.g. via NTP. For real-time based
rules, all four columns have a meaning, while operation-time based rules
only take the minute/hour fields into account.
Minute
Hour
The entries Minuteto Monthform a mask that lets the user define at
which times a command will be executed. Entries in the mask field may be
DayOfWeek blank to mark that the respective component shall not be part of the com-
Day
Month
pare operation; otherwise, a field may contain a list of comma-separated
items that may either be a single number or a number range, given as mini-
mum and maximum concatenated with a hyphen.
For the DayOfWeek field, the usual cron interpretation applies:
0
1
2
3
4
5
6
Sunday
Monday
Tuesday
Wednesday
Thursday
Friday
Saturday
Command
The command itself may be a list of command line commands, separated by
semicolons.
For example, the entry given below would connect the device each weekday
at 6 PM with a remote site ’HEADQUARTERS’
Base
Realtime
Minute
Hour
18
DayOfWeek 1,2,3,4,5,
Day
Month
Command
do /o/man/con HEADQUARTERS
35
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 3: Configuration and management
Time-controlled rules will not necessarily be executed at precisely zero
seconds of real time, but at some indeterminate point of time in the
minute in question.
36
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 4: Management
LANCOM Reference Manual LCOS 3.50
4 Management
4.1 N:N mapping
Network Address Translation (NAT) can be used for several different matters:
̈ for better utilizing the IP4 addresses ever becoming scarcer
̈ for coupling of networks with same (private) address ranges
̈ for producing unique addresses for network management
In the first application the so-called N:1 NAT, also known as IP masquerading
(’The hiding place—IP masquerading (NAT, PAT)’ →page 74) is used. All
addresses (“N”) of the local network are mapped to only one (“1”) public
address. This clear assignment of data streams to the respective internal PCs
is generally made available by the ports of the TCP and UDP protocols. That’s
why this is also called NAT/PAT (Network Address Translation/Port Address
Translation).
Due to the dynamic assignment of ports, N:1 masquerading enables only
those connections, which have been initiated by the internal network. Excep-
tion: an internal IP address is staticly exposed on a certain port, e.g. to make
a LAN server accessible from the outside. This process is called “inverse mas-
querading” (’Inverse masquerading’ →page 78).
A N:N mapping is used for network couplings with identical address ranges.
This transforms unambiguously multiple addresses (“N”) of the local network
to multiple (“N”) addresses of another network. Thereby, an address conflict
can be resolved.
Rules for this address translation are defined in a static table in the LANCOM.
Thereby new addresses are assigned to single stations, parts of the network,
or the entire LAN, by which the stations can contact other networks then.
Some protocols (FTP, H.323) exchange parameters during their protocol nego-
tiation, which can have influence on the address translation for the N:N map-
ping. For a correct functioning of the address translation, the connection
information of these protocols are tracked appropriately by functions of the
firewall in a dynamic table, and are additionally considered to the entries of
the static table.
The address translation is made “outbound”, i.e. the source address is
translated for outgoing data packets and the destination address for
incoming data packets, as long as the addresses are located within
37
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 4: Management
the defined translation range. An “inbound” address mapping, whe-
reby the source address is translated (instead of the destination
address), needs to be realized by an appropriate “outbound” address
translation on the remote side.
4.1.1 Application examples
The following typical applications are described in this section:
̈ Coupling of private networks utilizing the same address range
̈ Central remote monitoring by service providers
Network coupling
An often appearing scenario is the coupling of two company networks which
internally use the same address range (e. g. 10.0.0.x). This is often the case,
when one company should get access to one (or more) server(s) of the other
one:
Network of firm A:
Network of firm B:
10.0.0.x
10.0.0.x
N:N mapping to 192.168.2.x
N:N mapping to 192.168.1.x
Gateway
Gateway
VPN tunnel
Target: 192.168.2.1
Server_A1: 10.0.0.1
Server_A2: 10.0.0.2
Server_B1: 10.0.0.1
Server_B2: 10.0.0.2
In this example network servers of company A and B should have access over
a VPN tunnel to the respective other network. All stations of the LAN should
have access to the server of the remote network. For the time being, there is
no access possible to the other network, because both networks use the same
address range. If one station of the network of company A wants to access
server 1 of company B, the addressee (with an address from the 10.0.0.x net-
work) will be searched within the own local network, and the inquiry even
does not reach the gateway.
38
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 4: Management
LANCOM Reference Manual LCOS 3.50
With the help of N:N mapping, all addresses of the LAN can be translated to
a new address range for the coupling with the other network. The network of
company A e. g. will be translated to 192.168.1.x, the network of company B
to 192.168.2.x. Under these new addresses the two LANs are now reachable
for the respective other network. The station from the network of company A
is now addressing server 1 of company B under the address 192.168.2.1. The
addressee does not reside anymore within the own network, the inquiry is
now passed on to the gateway, and the routing to the other network is wor-
king as desired.
Remote monitoring and remote control of networks
Remote maintenance and control of networks become more and more impor-
tance because of the possibilities given by VPN. With the use of the nearly ubi-
quitous broadband Internet connections, the administrator of such
management scenarios is no longer dependent of the different data commu-
nication technologies or expensive leased lines.
39
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 4: Management
Customer B, office 1:
Gateway, e.g. Customer A, office 1:
10.1.2.1
10.1.2.x, 255.255.255.0
10.1.2.x, 255.255.255.0
Customer B, headquarters:
10.1.x.x, 255.255.0.0
Gateway
Customer A, headquarters:
10.1.x.x, 255.255.0.0
VPN tunnel
Customer B, office 2:
10.1.3.x, 255.255.255.0
Customer A, office 2:
10.1.3.x, 255.255.255.0
Hot Spot, e.g.
172.16.10.11
Internet
Customer D:
172.16.10.x,
255.255.255.0
Gateway
Gateway
Customer C:
Gateway, e.g.
172.16.10.x, 255.255.255.0
80.123.123.123 (public)
and 172.16.10.11 (intern)
Service provider:
172.16.10.x,
255.255.255.0
In this example, a service provider monitors the networks of different clients
out of a central control. For this purpose, the SNMP-capable devices should
send the respective traps of important events automatically to the SNMP trap
addressee (e. g. LANmonitor) of the network of the service provider. So the
LAN administrator of the service provider has an up-to-date view of the state
of the devices at any time.
The individual networks can be structured very differently: Clients A and B
integrate their branches with own networks via VPN connections to their LAN,
client C operates a network with several public WLAN base stations as hot
spots, and client D has got an additional router for ISDN dial-up accesses in
his LAN.
40
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 4: Management
LANCOM Reference Manual LCOS 3.50
The networks of client A and B use different address ranges in the
respective head office and the connected branches. A standard net-
work coupling via VPN is therefore possible between these networks.
In order to avoid the effort to building up its own VPN tunnel to each indivi-
dual subnetwork of the clients A and B, the service provider makes only one
VPN connection to the head office, and uses the existing VPN lines between
head office and branches for communication with the branches.
Traps from the networks report to the service provider whether e. g. a VPN
tunnel has been build up or cut, if an user has been tried to log in three times
with a wrong password, if an user has been applied for a hot spot, or if some-
where a LAN cable has been pulled out of a switch.
A complete list of all SNMP traps supported by LANCOM can be found
in the appendix of this reference manual (’SNMP traps’ →page 287).
Routing of these different networks reaches very fast its limiting factors, if two
or more clients use same address ranges. Additionally, if some clients use the
same address range as the service provider as well, further address conflicts
are added. In this example, one of the hot spots of client C has got the same
address as the gateway of the service provider.
There are two different variants to resolve these address conflicts:
Loopback:
decentralized
1:1 mapping
̈ In the decentralized variant, alternative IP addresses for communicating
with the SNMP addressee are assigned to each of the monitored devices
by means of an 1:1 mapping. This address is in technical language also
known as “loopback address”, the method accordingly as “loopback
method”.
The loopback addresses are valid only for communication with certain
remote stations on the connections belonging to them. Thus a
LANCOM is not generally accessible via this IP address.
Alternative:
central
N:N mapping
̈ Even more appealing is the solution of a central mapping: instead of con-
figuring each single gateway in the branch networks, the administrator
configures solely one central address translation in the gateway of the
head office. On this occasion, also all subnetworks located “behind” the
head office are supplied with the needed new IP addresses.
In this example, the administrator of the service provider selects 10.2.x.x as
central address translation for the network of client B, so that both networks
41
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 4: Management
with actual same address range looks like two different networks for the gate-
way of the service provider.
The administrator selects the address ranges 192.168.2.x and 192.168.3.x for
client C and D, so that the addresses of these networks do differ from the own
network of the service provider.
In order to enable the gateway of the provider to monitor the networks of cli-
ents C and D, the administrator sets up an address translation to 192.168.1.x
also for the own network.
4.1.2 Configuration
Setting up address translation
Configuration of N:N mapping succeeds with only few information. Since a
LAN can be coupled with several other networks via N:N, different destinati-
ons can have also different address translations for a source IP range. The NAT
table can contain 64 entries at maximum, including the following information:
̈ Index: Unambiguous index of the entry.
̈ Source address: IP address of the workstation or network that should
get an alternative IP address.
̈ Source mask: Netmask of source range.
̈ Remote station: Name of the remote station over that the remote net-
work is reachable.
̈ New network address: IP address or address range that should be used
for the translation.
For the new network address, the same netmask will be used as the source
address already uses. For assignment of source and mapping addresses the
following hints apply:
̈ Source and mapping can be assigned arbitrarily for the translation of sin-
gle addresses. Thus, for example, it is possible to assign the mapping
address 192.168.1.88 to a LAN server with the IP address 10.1.1.99.
̈ For translation of entire address ranges, the station-related part of the IP
address will be taken directly, only appended to the network-related part
of the mapping address. Therefore, in an assignment of 10.0.0.0/
255.255.255.0 to 192.168.1.0, a server of the LAN with IP address
10.1.1.99 will get assigned the mapping address 192.168.1.99.
42
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 4: Management
LANCOM Reference Manual LCOS 3.50
The address range for translation must be at minimum as large as the
source address range.
Please notice that the N:N mapping functions are only effective when
the firewall has been activated. (’Firewall/QoS enabled’ →page 121)!
Additional configuration hints
By setting up address translation in the NAT table, the networks and worksta-
tions become only visible under another address at first in the higher network
compound. But for a seamless routing of data between the networks some
further settings are still necessary:
̈ Entries in the routing tables for packets with new addresses to find the
way to their destination.
̈ DNS forwarding entries, in order that inquiries about certain devices in the
respective other networks can be resolved into mapped IP addresses
(’DNS forwarding’ →page 279).
̈ The firewall rules of the gateways must be adjusted such that (if neces-
sary) authorized stations resp. networks from the outside are permitted to
set up connections.
̈ VPN rules for loopback addresses in order to transmit the newly assigned
IP addresses through an according VPN tunnel.
The IP address translation takes place in the LANCOM between fire-
wall and IP router on one hand, and the VPN module on the other
hand. All rules related to the own network use therefore the “unmap-
43
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 4: Management
ped” original addresses. The entries of the remote network use the
“mapped” addresses of the remote side, valid on the VPN connection.
Target address
Source address
WAN interface,
e.g. ISDN
LAN
Firewall / IDS / DoS
WAN interface,
e.g. ADSL
IP router
WLAN
DMZ
WAN interface,
e.g. Ethernet
Configuration with different tools
LANconfig
With LANconfig you adjust the address translation for the configuration range
’IP router’ on register card 'N:N-Mapping':
44
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 4: Management
LANCOM Reference Manual LCOS 3.50
WEBconfig, Telnet
Under WEBconfig and Telnet you find the NAT table for configuration of N:N
mapping at the following positions of the menu tree:
Configuration tool Run
WEBconfig
Expert configuration / Setup / IP router / NAT table
Setup / IP router module / NAT table
Terminal/Telnet
When starting a new entry under WEBconfig, the NAT table shows up as fol-
lows:
4.1.3
45
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 5: Diagnosis
5 Diagnosis
5.1 LANmonitor—know what's happening
The LANmonitor includes a monitoring tool with which you can view the most
important information on the status of your routers on your monitor at any
time under Windows operating systems—of all of the LANCOM routers in the
network.
Many of the internal messages generated by the devices are converted to
plain text, thereby helping you to troubleshoot.
You can also use LANmonitor to monitor the traffic on the router's various
interfaces to collect important information on the settings you can use to opti-
mize data traffic.
In addition to the device statistics that can also be read out during a Telnet or
terminal session or using WEBconfig, a variety of other useful functions are
also available in the LANmonitor, such as the enabling of an additional charge
limit.
With LANmonitor you can only monitor those devices that you can
access via IP (local or remote). With this program you cannot access a
router via the serial interface.
5.1.1 Extended display options
Under View / Show Details you can activate and deactivate the following
display options:
̈ Error messages
̈ Diagnostic messages
̈ System information
Many important details on the status of the LANCOM are not dis-
played until the display of the system information is activated. These
include, for example, the ports and the charge management.There-
fore, we recommend that interested users activate the display of the
system information.
46
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 5: Diagnosis
LANCOM Reference Manual LCOS 3.50
5.1.2 Monitor Internet connection
To demonstrate the functions of LANmonitor we will first show you the types
of information LANmonitor provides about connections being established to
your Internet provider.
ቢ To start LANmonitor, go to Start ̈ Programs ̈ LANCOM ̈
LANmonitor. Use Device ̈ New to set up a new device and in the fol-
lowing window, enter the IP address of the router that you would like to
monitor. If the configuration of the device is protected by password, enter
the password too.
Alternatively, you can select the device via the LANconfig and monitor it
using Tools / Monitor Device.
ባ LANmonitor automatically creates a new entry in the device list and ini-
tially displays the status of the transfer channels. Start your Web browser
and enter any web page you like. LANmonitor now shows a connection
being established on one channel and the name of the remote site being
called. As soon as the connection is established, a plus sign against the
communication channel entry indicates that further information on this
channel is available. Click on the plus sign or double-click such entry to
open a tree structure in which you can view various information.
In this example, you can determine from the PPP protocol information the
IP address assigned to your router by the provider for the duration of the
connection and the addresses transmitted for the DNS and NBNS server.
47
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 5: Diagnosis
Under the general information you can watch the transmission rates at
which data is currently being exchanged with the Internet.
ቤ To break the connection manually, click on the active channel with the
right mouse button. You may be required to enter a configuration pass-
word.
ብ If you would like a log of the LANmonitor output in file form, select
Device ̈ Properties and go to the 'Logging' tab. Enable logging and
specify whether LANmonitor should create a log file daily, monthly, or on
an ongoing basis.
5.2 Trace information—for advanced users
Trace outputs may be used to monitor the internal processes in the router dur-
ing or after configuration. One such trace can be used to display the individual
steps involved in negotiating the PPP. Experienced users may interpret these
outputs to trace any errors occurring in the establishment of a connection. A
particular advantage of this is: The errors being tracked may stem from the
configuration of your own router or that of the remote site.
The trace outputs are slightly delayed behind the actual event, but are
always in the correct sequence. This will not usually hamper interpre-
tation of the displays but should be taken into consideration if making
precise analyses.
5.2.1 How to start a trace
Trace output can be started in a Telnet session, for example. The command to
call up a trace follows this syntax:
trace [code] [parameters]
The trace command, the code, the parameters and the combination com-
mands are all separated from each other by spaces. And what is the meaning
of these codes and parameters?
48
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 5: Diagnosis
LANCOM Reference Manual LCOS 3.50
5.2.2 Overview of the keys
This code...
... in combination with the trace causes the following:
displays a help text
?
+
switches on a trace output
-
switches off a trace output
#
switches between different trace outputs (toggle)
displays the current status of the trace
no code
5.2.3 Overview of the parameters
The available traces depend individually on the particular model and
can be listed by entering tracewith no arguments on the com-
mand line.
This parameter...
... brings up the following display for the trace:
status messages for the connection
error messages for the connection
LANCOM protocol negotiation
IPX routing
Status
Error
LANCOM
IPX-router
PPP
PPP protocol negotiation
SAP
IPX Service Advertising Protocol
IPX watchdog spoofing
IPX-watchdog
SPX-watchdog
LCR
SPX watchdog spoofing
Least-Cost Router
Script
script processing
RIP
IPX Routing Information Protocol
IP routing
IP-router
IP-RIP
IP Routing Information Protocol
Address Resolution Protocol
Internet Control Message Protocol
processes in the masquerading module
Dynamic Host Configuration Protocol
ARP
ICMP
IP masquerading
DHCP
49
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 5: Diagnosis
This parameter...
NetBIOS
... brings up the following display for the trace:
NetBIOS management
DNS
Domain Name Service Protocol
Packet dump
D-channel-dump
ATM
display of the first 64 bytes of a package in hexadecimal form
trace on the D channel of the connected ISDN bus
spoofing at the ATM packet level
ADSL connections status
ADSL
VPN-Status
VPN-Packet
SMTP-Client
SNTP
IPSec and IKE negotiation
IPSec and IKE packets
E-Mail processing of the integrated mail client
Simple Network Time Protocol information
5.2.4 Combination commands
This combination
command...
... brings up the following display for the trace:
All
all trace outputs
Display
Protocol
TCP-IP
IPX-SPX
Time
status and error outputs
LANCOM and PPP outputs
IP-Rt., IP-RIP, ICMP and ARP outputs
IPX-Rt., RIP, SAP, IPX-Wd., SPX-Wd., and NetBIOS outputs
displays the system time in front of the actual trace output
Source
includes a display of the protocol that has initiated the output in
front of the trace
Any appended parameters are processed from left to right. This means that it
is possible to call a parameter and then restrict it.
50
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 5: Diagnosis
LANCOM Reference Manual LCOS 3.50
5.2.5 Examples
This code...
... in combination with the trace causes the following:
trace
displays all protocols that can generate outputs during the config-
uration, and the status of each output (ON or OFF)
trace + all
switches on all trace outputs
trace + protocol dis-
play
switches on the output for all connection protocols together with
the status and error messages
trace + all - icmp
switches on all trace outputs with the exception of the ICMP proto-
col
trace ppp
displays the status of the PPP
trace # ipx-rt display
toggles between the trace outputs for the IPX router and the dis-
play outputs
trace - time
switches off the system time output before the actual trace output
51
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
6 Security
You certainly would not like any outsider to have easy access to or to be able
to modify the data on your computer. Therefore this chapter covers an impor-
tant topic: safety. The description of the security settings is divided into the
following sections:
̈ Protection for the configuration
୴ Password protection
୴ Login barring
୴ Access verification
̈ Securing ISDN access
At the end of the chapter you will find the most important security settings as
a checklist. It ensures that your LANCOM is excellently protected.
Some further LCOS features to enhance the data security are
described in separate chapters:
୴ ’Firewall’ →page 104
୴ ’The hiding place—IP masquerading (NAT, PAT)’ →page 74
୴ ’Virtual LANs (VLANs)’ →page 192
6.1 Protection for the configuration
A number of important parameters for the exchange of data are established
in the configuration of the device. These include the security of your network,
monitoring of costs and the authorizations for the individual network users.
Needless to say, the parameters that you have set should not be modified by
unauthorized persons. The LANCOM thus offers a variety of options to protect
the configuration.
6.1.1 Password protection
The simplest option for the protection of the configuration is the establish-
ment of a password.
As long as a password hasn't been set, anyone can change the con-
figuration of the device. For example, your Internet account informa-
tion could be stolen, or the device could be reconfigured in a way that
the protection-mechanisms for the local network could by bypassed.
52
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
Note: If a password has not been set, the Power LED flashes, until the
devices have been configured correctly.
Tips for proper use of passwords
We would like to give you a few tips here for using passwords:
̈ Keep a password as secret as possible.
Never write down a password. For example, the following are popular but
completely unsuitable: Notebooks, wallets and text files in computers. It
sounds trivial, but it can't be repeated often enough: don't tell anyone
your password. The most secure systems surrender to talkativeness.
̈ Only transmit passwords in a secure manner.
A selected password must be reported to the other side. To do this, select
the most secure method possible. Avoid: Non-secure e-mail, letter, or fax.
Informing people one-on-one is preferable. The maximum security is
achieved when you personally enter the password at both ends.
̈ Select a secure password.
Use random strings of letters and numbers. Passwords from common lan-
guage usage are not secure. Special characters such as '&“?#-*+_:;,!°'
make it difficult for potential attackers to guess your password and
increase the security of the password.
̈ Never use a password twice.
If you use the same password for several purposes, you reduce its security
effect. If the other end is not secure, you also endanger all other connec-
tions for which you use this password at once.
̈ Change the password regularly.
Passwords should be changed as frequently as possible. This requires
effort, however considerably increases the security of the password.
̈ Change the password immediately if you suspect someone else
knows it.
If an employee with access to a password leaves the company, it is high
time to change this password. A password should also always be changed
when there is the slightest suspicion of a leak.
If you comply with these simple rules, you will achieve the highest possible
degree of security.
Entering the password
You will find the box to enter the password in LANconfig in the configuration
area 'Management' on the 'Security' tab. Under WEBconfig you run the wiz-
53
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
ard Security Settings. In a terminal or Telnet session you set or change the
password with the command passwd
.
Configuration tool Run
LANconfig
Management ̈ Security ̈ Configuration password
WEBconfig
Security settings
Terminal/Telnet
passwd
Protecting the SNMP access
At the same time you should also protect the SNMP read access with a pass-
word. For SNMP the general configuration password is used.
Configuration tool Run
LANconfig
Management ̈ Security ̈ Password required for SNMP read
permission
WEBconfig
Expert Configuration ̈ Setup ̈ SNMP-module ̈ Password-
required-for-SNMP-read-access
Terminal/Telnet
setup/SNMP module/password-required
6.1.2 Login barring
The configuration in the LANCOM is protected against “brute force attacks“
by barring logins. A brute-force attack is the attempt by an unauthorized per-
son to crack a password to gain access to a network, a computer or another
device. To achieve this, a computer can, for example, go through all the pos-
sible combinations of letters and numbers until the right password is found.
As a measure of protection against such attacks, the maximum allowed
number of unsuccessful attempts to login can be set. If this limit is reached,
access will be barred for a certain length of time.
If barring is activated on one port all other ports are automatically barred too.
The following entries are available in the configuration tools to configure login
barring:
̈ Lock configuration after (Login-errors
)
54
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
̈ Lock configuration for (Lock-minutes
)
Configuration tool Run
LANconfig
Management ̈ Security
WEBconfig
Expert Configuration ̈ Setup ̈ Config-module
Terminal/Telnet
Setup/Config module
6.1.3 Restriction of the access rights on the configuration
Access to the internal functions of the devices can be restricted separately for
each access method as follows:
̈ ISDN administrative account
̈ Network
୴ LAN
୴ WAN
For network-based configuration access further restrictions can be made, e.g.
that solely specified IP addresses or dedicated LANCAPI clients are allowed to
do so. Additionally, all internal functions are separately selectable.
The term ’internal function’ denotes configuration sessions via LANconfig
(TFTP), WEBconfig (HTTP, HTTPS), SNMP or Terminal/Telnet.
Restrictions on the ISDN administrative account
This paragraph applies only to models with ISDN interface.
55
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
ቢ Change to the register card 'Security in the 'Management' configuration
area:
ባ Enter as call number within 'configuration access' a call number of your
connection, which is not used for other purposes.
Enter alternatively the following instruction:
set /setup/config-module/farconfig-(EAZ-MSN) 123456
The ISDN administrative account is excluded as only configuration
method from in the following described restrictions of network access
methods. I.e. all on the Admin MSN incoming connections are not
limited by the access restrictions of remote networks
If you want to completely switch off the ISDN remote management,
leave the field with Admin MSN empty.
Limit the network configuration access
The access to the internal functions can be controlled separately for accesses
from the local or from distant networks - for all configuration services sepa-
56
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
rately. The configuration access can generally be permitted or forbidden,
a
pure read access or - if your model is equipped with VPN - also can be per-
mitted only over VPN.
If you want to remove the network access to the router over the WAN
completely, set the configuration access from distant nets for all
methods to 'denied'.
Restriction of the network configuration access to certain IP
addresses
With a special filter list the access to the internal functions of the devices can
be limited to certain IP addresses:
57
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
By default, this table does not contain entries. Thus the device can be
accessed over TCP/IP from computers with arbitrary IP addresses. With the
first entry of a IP address (as well as the associated net mask) the filter is acti-
vated, and solely the IP addresses contained in this entry are entitled to use
the internal functions then. With further entries, the number of the entitled
ones can be extended. The filter entries can designate both individual com-
puters and whole networks.
Configuration tool Run
LANconfig
WEBconfig
TCP/IP ̈ General ̈ Access list
Expert Configuration ̈ Setup ̈/ TCP-IP-module
Access-list
Terminal/Telnet
/setup/TCP-IP-module/access-list
6.2 Protecting the ISDN connection
For a device with an ISDN connection basically any ISDN subscriber can dial
into your LANCOM. To prevent undesired intruders, you must therefore pay
particular attention to the protection of the ISDN connection.
The protection functions of the ISDN connection can be divided into two
groups:
̈ Identification control
୴ Access protection using name and password
୴ Access protection via caller ID
̈ Callback to defined call numbers
6.2.1 Identification control
For identification monitoring either the name of the remote site or the so-
called caller ID can be used. The caller ID is the telephone number of the caller
that is normally transmitted to the remote site with the call with ISDN.
Which “Identifier” is to be used to identify the caller is set in the following list:
Configuration Tool Run
LANconfig
Communication ̈ Call accepting
WEBconfig
Expert Configuration ̈ Setup ̈ WAN-module ̈ Protect
setup/WAN-module/protect
Terminal/Telnet
58
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
You have a choice of the following:
̈ all: Calls are accepted from any remote station.
̈ by number: Only calls from those remote stations whose Calling Line Iden-
tification number (CLIP) is entered in the number list are accepted.
̈ by approved number: Only calls from those remote stations whose Calling
Line Identification number (CLIP) is entered in the name list and whose
number is approved by the Central Office.
It is an obvious requirement for identification that the corresponding informa-
tion is sent by the caller.
Verification of name and password
In the case of PPP, a user name (and in conjunction with PAP, CHAP or MS-
CHAP, a password) is sent to the remote station during connection establish-
ment. When a computer dials into the LANCOM, the communications soft-
ware, for example Windows Dial-Up Network, prompts the user for the user
name and password to be transferred.
If the router establishes the connection itself, for instance, to an ISP, it is using
the user name and password from the PPP list. If no user name is listed there,
the device name is used in its place.
The PPP list can be found as follows:
Configuration tool Run
LANconfig
Communication ̈ Protocols ̈ PPP list
WEBconfig
Expert Configuration ̈ Setup ̈ WAN-module ̈ PPP-list
/setup/WAN-module/PPP-list
Terminal/Telnet
In addition, the PPP protocol also permits the caller to require an authentica-
tion from the remote station. The caller then requests a user or device name
and password from the remote station.
Of course you will not need to use the PAP, CHAP or MS CHAP security
procedures if you are using the LANCOM to dial up an Internet service
provider yourself, for example.You will probably not be able to per-
suade the ISP to respond to a request for a password...
59
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
Checking the number
When a call is placed over an ISDN line, the caller's number is normally sent
over the D channel before a connection is even made (CLI – Calling Line Iden-
tifier).
Access to your own network is granted if the call number appears in the
number list, or the caller is called back if the callback option is activated. If
the LANCOM is set to provide security using the telephone number, any calls
from remote stations with unknown numbers are denied access.
You can use call numbers as a security measure with any B-channel protocol
(layers).
6.2.2 Callback
The callback function offers a special form of access privilege: This requires the
'Callback' option to be activated in the name list for the desired caller and the
call number to be specified, if required.
Configuration tool Run
LANconfig
WEBconfig
Communications ̈ Remote site ̈ Name list (ISDN)
Expert configuration ̈ Setup ̈ WAN module ̈
ISDN-name-list
Terminal/Telnet
/Setup/WAN-module/Name list
Using the settings in the name and number list and the selection of the pro-
tocol (LANCOM or PPP), you can control the callback behaviour of your router :
̈ The router can refuse to call back.
̈ It can call back using a preset call number.
̈ First the name can be checked and then a preset telephone number can
be called back.
̈ The caller can opt to specify the call number to be used for callback.
And all the while you can use the settings to dictate how the cost of the con-
nection is to be apportioned. The router accepts all unit charges, except for
the unit required to send the name, if call back 'With name' is set in the name
list. The caller also accepts a unit if the caller is not identified via CLIP (Calling
Line Identifier Protocol). On the other hand, the caller incurs no costs if iden-
tification of the caller's number is possible and is accepted (callback via the D
channel).
60
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
An especially effective callback method is the fast-callback procedure (patent
pending). This speeds up the callback procedure considerably. The procedure
only works if it is supported by both stations. All current LANCOM routers are
capable of fast callback.
Additional information on callback can be found in section ’Callback
functions’ →page 98.
6.3 The security checklist
In the following checklist you will find an overview of the most important
security functions. That way you can be quite sure not to have overlooked any-
thing important during the security configuration of your LANCOM.
̈ Have you assigned a password for the configuration?
The simplest option for the protection of the configuration is the estab-
lishment of a password. As long as a password hasn't been set, anyone
can change the configuration of the device. The box for entering the pass-
word is located in LANconfig in the 'Management' configuration area on
the 'Security' tab. It is particularly advisable to assign a password to the
configuration if you want to allow remote configuration.
̈ Have you permitted remote configuration?
If you do not require remote configuration, then deactivate it. If you
require remote configuration, then be sure to assign a password protec-
tion for the configuration (see previous section). The field for deactivating
the remote configuration is also contained in LANconfig in the 'Manage-
ment' configuration area on the 'Security' tab.
̈ Have you assigned a password to the SNMP configuration?
Also protect the SNMP configuration with a password. The field for pro-
tection of the SNMP configuration with a password is also contained in
LANconfig in the 'Management' configuration area on the 'Security' tab.
̈ Have you allowed remote access?
If you do not require remote access, deactivate call acceptance by deac-
tivating a call acceptance 'by number' and leaving the number list blank
in LANconfig in the 'Communication' configuration area on the 'Call
accepting' tab.
̈ Have you activated the callback options for remote access and is
CLI activated?
61
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 6: Security
When a call is placed over an ISDN line, the caller's number is normally
sent over the D channel before a connection is even made (CLI – Calling
Line Identifier). Access to your own network is granted if the call number
appears in the number list, or the caller is called back if the callback
option is activated (this callback via the D channel is not supported by the
Windows Dial-Up Network). If the LANCOM is set to provide security
using the telephone number, any calls from remote stations with
unknown numbers are denied access.
̈ Have you activated the Firewall?
The Stateful Inspection Firewall of the LANCOM ensures that your local
network cannot be attacked from the outside . The Firewall can be ena-
bled in LANconfig under ’Firewall/QoS’ on the register card ’General’.
̈ Do you make use of a ’Deny All’ Firewall strategy?
For maximum security and control you prevent at first any data transfer
through the Firewall. Only those connections, which are explicitly desired
have to allowed by the a dedicated Firewall rule then. Thus ’Trojans’ and
certain Email viruses loose their communication way back. The Firewall
rules are summarized in LANconfig under ’Firewall/Qos’ on the register
card ’Rules’. A guidance can be found under ’Set-up of an explicit "Deny
All" strategy’ →page 138.
̈ Have you activated the IP masquerading?
IP masquerading is the hiding place for all local computers for connection
to the Internet. Only the router module of the unit and its IP address are
visible on the Internet. The IP address can be fixed or assigned dynami-
cally by the provider. The computers in the LAN then use the router as a
gateway so that they themselves cannot be detected. The router separates
Internet and intranet, as if by a wall. The use of IP masquerading is set
individually for each route in the routing table. The routing table can be
found in the LANconfig in the 'IP router' configuration section on the
'Routing' tab.
̈ Have you excluded certain stations from access to the router?
Access to the internal functions of the devices can be restricted using a
special filter list. Internal functions in this case are configuration sessions
via LANconfig, WEBconfig, Telnet or TFTP. This table is empty by default
and so access to the router can therefore be obtained by TCP/IP using Tel-
net or TFTP from computers with any IP address. The filter is activated
when the first IP address with its associated network mask is entered and
from that point on only those IP addresses contained in this initial entry
62
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 6: Security
LANCOM Reference Manual LCOS 3.50
will be permitted to use the internal functions. The circle of authorized
users can be expanded by inputting further entries. The filter entries can
describe both individual computers and whole networks. The access list
can be found in LANconfig in the 'TCP/IP' configuration section on the
'General' tab.
̈ Is your saved LANCOM configuration stored in a safe place?
Protect the saved configurations against unauthorized access in a safe
place. A saved configuration could otherwise be loaded in another device
by an unauthorized person, enabling, for example, the use of your Inter-
net connections at your expense.
63
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
7 Routing and WAN connections
This chapter describes the most important protocols and configuration entries
used for WAN connections. It also shows ways to optimize WAN connections.
7.1 General information on WAN connections
WAN connections are used for the following applications.
̈ Internet access
̈ LAN to LAN coupling
̈ Remote access
7.1.1 Bridges for standard protocols
WAN connections differ from direct connections (for example, via the
LANCAPI) in that the data in the WAN are transmitted via standardized net-
work protocols also used in the LAN. Direct connections, on the other hand,
operate with proprietary processes that have been specially developed for
point-to-point connections.
Via WAN connections a LAN is extended, and with direct connections only one
individual PC establishes a connection to another PC. WAN connections form
a kind of bridge for the communication between networks (or for connecting
individual computers to the LAN).
Close cooperation with router modules
Characteristic of WAN connections is the close cooperation with the router
modules in the LANCOM. The router modules (IP and IPX) take care of con-
necting LAN and WAN. They make use of the WAN modules to fulfil requests
from PCs within the LAN for external resources.
7.1.2 What happens in the case of a request from the LAN?
Initially the router modules only determine the remote station to which a data
packet is to be sent. The various parameters for all required connections must
be arranged so that a given connection can be selected and established as
required. These parameters are stored in a variety of lists, the interaction of
which permits the correct connections.
64
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
A simplified example will clarify this process. Here we assume that the IP
address of the computer being searched for is known in the Internet.
Data packet with
IP target address
Internet user's PC
DSL/ISDN/
ADSL
Internet
LANCOM
Provider
IP routing tab. IP address Î remote station name
Name-list
Remote station Îinterface, connection parame-
ters (ISDN: telephone number), communications
layer
PPP-list
Terminal Î user name and password
ቢ Selecting the correct route
A data packet from a computer initially finds the path to the Internet
through the IP address of the receiver. The computer sends the packet
with this address over the LAN to the router. The router determines the
remote station in its IP routing table via which the target IP address can
be reached, e.g. 'Provider_A'.
ባ Connection data for the remote station
Using these names, the router checks the names list and finds the neces-
sary connection data for provider A. Included in these connection data
are, for instance, the WAN interface (DSL, ISDN) through which the pro-
vider is connected to, protocol information, or the necessary number for
an ISDN call connection. The router also obtains the user name and pass-
word required for login from the PPP list.
ቤ Establishing the WAN connection
The router can then establish a connection to provider via a WAN inter-
face. It authenticates itself with a user name and password.
65
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
ብ Transmission of data packets
As soon as the connection is established, the router can send the data
packet to the Internet.
7.2 IP routing
An IP router works between networks which use TCP/IP as the network proto-
col. This only allows data transmissions to destination addresses entered in
the routing table. This section explains the structure of the IP routing table of
an LANCOM router, as well as the additional functions available to support IP
routing.
7.2.1 The IP routing table
The IP routing table is used to tell the router which remote station (which
other router or computer) it should send the data for particular IP addresses
or IP address ranges to. This type of entry is also known as a “route“ since it
is used to describe the path of the data packet. This procedure is also called
“static routing” since you make these entries yourself and they remain
unchanged until you either change or delete them yourself. Naturally,
“dynamic routing” also exists. The routers use the routes in this way to
exchange data between themselves and continually update it automatically.
The static routing table can hold up to 256 entries, the dynamic table can hold
128. The IP router looks at both tables when the IP RIP is activated.
You also use the IP routing table to tell the router the length of this route's
path so that it can select the most suitable route in conjunction with IP RIP
where there are several routes to the same destination. The default setting for
the distance to another router is 2, i.e. the router can be reached directly. All
devices which can be reached locally, such as other routers in the same LAN
or workstation computers connected via proxy ARP are entered with the dis-
tance 0. The “quality level” of this route will be reduced if the entry addressed
has a higher distance (up to 14). “Unfavourable” routes like this will only be
used if no other route to the remote station in question can be found.
66
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
Configuration of the routing table
Configuration tool Run
LANconfig
WEBconfig
IP router ̈ Routing ̈ Routing table
Expert Configuration ̈ Setup ̈ IP-router-module ̈
IP-routing-table
Terminal/Telnet
cd /setup/IP-router/IP-routing-table
An IP routing table can, for example, look like this:
IP address IP netmask Router Distance Masquerading
192.168.120.0 255.255.255.0 MAIN
2
3
0
Off
Off
Off
192.168.125.0 255.255.255.0 NODE1
192.168.130.0 255.255.255.0 191.168.140.123
What do the various entries on the list mean?
̈ IP addresses and netmasks
This is the address of the destination network to which data packets may
be sent and its associated network mask. The router uses the network
mask and the destination IP address of the incoming data packets to
check whether the packet belongs to the destination network in question.
The route with the IP address '255.255.255.255' and the network mask
'0.0.0.0' is the default route. All data packets that cannot be routed by
other routing entries are sent over this route.
̈ Router
The router transmits the appropriate data packets to the IP address and
network mask to this remote station. A name is entered at this point if the
remote station is a router in another network or an individual workstation
computer. This is where the IP address of another router which knows the
path to the destination network is entered if the router on the network
cannot address the remote station itself.
The router name indicates what should happen with the data packets that
match the IP address and network mask.
Routes with the router name '0.0.0.0' identify exclusion routes. Data
packets for this “zero route“ are rejected and are not routed any further.
67
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
That way routes which are forbidden on the Internet (private address
spaces, e.g. '10.0.0.0'), for example, are excluded from transmission.
If an IP address is input as router name, this is a locally available router,
which is responsible for transfer of the relevant data packets.
̈ Distance
Number of routers between your own and the destination router. This
value is often equated with the cost of the transmission and used to dis-
tinguish between inexpensive and expensive call paths for wide-area con-
nections. The distance values entered are propagated as follows:
୴ All networks which can be reached while a connection exists to a des-
tination network are propagated with a distance of 1.
୴ All non-connected networks are propagated with the distance
entered in the routing table (but with a minimum distance of 2) as
long as a free transmitting channel is still available.
୴ The remaining networks are propagated with a distance of 16
(= unreachable) if there are no longer any channels available.
୴ Remote stations connected using proxy ARP are an exception to this.
These “proxy hosts“ are not propagated at all.
̈ Masquerading
Use the 'Masquerade' option in the routing table to inform the router
which IP addresses to use when transferring packets from local networks.
For further information see the section ’The hiding place—IP masquer-
ading (NAT, PAT)’ →page 74.
7.2.2 Local routing
You know the following behaviour of a workstation within a local network:
The computer searches for a router to assist with transmitting a data packet
to an IP address which is not on its own LAN. This router is normally intro-
duced to the operating system with an entry as standard router or standard
gateway. It is often only possible to enter one default router which is supposed
to be able to reach all the IP addresses which are unknown to the workstation
computer if there are several routers in a network. Occasionally, however, this
default router cannot reach the destination network itself but does know
another router which can find this destination.
68
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
How can you assist the workstation computer now?
By default, the router sends the computer a response with the address of the
router which knows the route to the destination network (this response is
known as an ICMP redirect). The workstation computer then accepts this
address and sends the data packet straight to the other router.
Certain computers, however, do not know how to handle ICMP redirects. To
ensure that the data packets reach their destination anyway, use local routing.
In this way you instruct the router itself in your device to send the data packet
to other routers. In addition, in this case no more ICMP redirects will be sent.
The setting is made under:
Configuration tool Run
LANconfig
WEBconfig
IP router ̈ General ̈ Forward packets within the local network
Expert Configuration ̈ Setup ̈ IP-router-module ̈
Loc.-routing
Terminal/Telnet
set /setup/IP-router-module/Loc. routing on
Local routing can be very helpful in isolated cases, however, it should also only
be used in isolated cases. For local routing leads to a doubling of all data
packets to the desired target network. The data is first sent to the default
router and is then sent on from here to the router which is actually responsible
in the local network.
7.2.3 Dynamic routing with IP RIP
In addition to the static routing table, LANCOM routers also have a dynamic
routing table containing up to 128 entries. Unlike the static table, you do not
fill this out yourself, but leave it to be dealt with by the router itself. It uses the
Routing Information Protocol (RIP) for this purpose. All devices that support
RIP use this protocol to exchange information on the available routes.
What information is propagated by IP RIP?
A router uses the IP RIP information to inform the other routers in the network
of the routes it finds in its own static table. The following entries are ignored
in this process:
̈ Rejected routes with the '0.0.0.0' router setting.
̈ Routes referring to other routers in the local network.
̈ Routes linking individual computers to the LAN by proxy ARP.
69
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Although the entries in the static routing table are set manually, this informa-
tion changes according to the connection status of the router and so do the
RIP packets transmitted.
̈ If the router has established a connection to a remote station, it propa-
gates all the networks which can be reached via this route in the RIPs with
the distance '1'. Other routers in the LAN are thus informed by these
means that a connection to the remote station has been established on
this router which they can use. The establishment of additional connec-
tions by routers with dial-up connections can be prevented, thus reducing
connection costs.
̈ If this router cannot establish a further connection to another remote sta-
tion, all other routes are propagated with the distance '16' in the RIPs. The
'16' stands for “This route is not available at the moment”. A router may
be prevented from establishing a connection in addition to the present
one may be due to one of the following causes:
୴ Another connection has already been established on all the other
channels (also via the LANCAPI).
୴ Y connections for the S port have been explicitly excluded in the
0
interface table.
୴ The existing connection is using all B channels (channel bundling).
୴ The existing connection is a leased-line connection. Only a few ISDN
providers enable a dial-up connection to be established on the second
B channel in addition to a permanent connection on the first B chan-
nel.
Which information does the router take from received IP RIP packets?
When the router receives such IP RIP packets, it incorporates them in its
dynamic routing table, which looks something like this:
IP address
IP netmask
255.255.255.0
255.255.255.0
255.255.255.0
Time
Distance
Router
192.168.120.0
192.168.130.0
192.168.140.0
1
5
1
2
3
5
192.168.110.1
192.168.110.2
192.168.110.3
What do the entries mean?
IP address and network mask identify the destination network, the distance
shows the number of routers between the transmitter and receiver, the last
70
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
column shows which router has revealed this route. This leaves the 'Time'. The
dynamic table thus shows how old the relevant route is. The value in this col-
umn acts as a multiplier for the intervals at which the RIP packets arrive. A '1',
therefore, stands for 30 seconds, a '5' for about 2.5 minutes and so on. New
information arriving about a route is, of course, designated as directly reach-
able and is given the time setting '1'. The value in this column is automatically
incremented when the corresponding amount of time has elapsed. The dis-
tance is set to '16' after 3.5 minutes (route not reachable) and the route is
deleted after 5.5 minutes.
Now if the router receives an IP RIP packet, it must decide whether or not to
incorporate the route contained into its dynamic table. This is done as follows:
̈ The route is incorporated if it is not yet listed in the table (as long as there
is enough space in the table).
̈ The route exists in the table with a time of '5' or '6'. The new route is then
used if it indicates the same or a better distance.
̈ The route exists in the table with a time of '7' to '10' and thus has the dis-
tance '16'. The new route will always be used.
̈ The route exists in the table. The new route comes from the same router
which notified this route, but has a worse distance than the previous
entry. If a device notifies the degradation of its own static routing table in
this way (e.g. releasing a connection increases the distance from 1 to 2,
see below), the router will believe this and include the poorer entry in its
dynamic table.
RIP packets from the WAN will be ignored and will be rejected imme-
diately. RIP packets from the LAN will be evaluated and will not be
propagated in the LAN.
The interaction of static and dynamic tables
The router uses the static and dynamic tables to calculate the actual IP routing
table it uses to determine the path for data packets. In doing so, it includes
the routes from the dynamic table which it does not know itself or which indi-
cate a shorter distance than its own (static) route with the routes from its own
static table.
Routers without IP RIP support
Routers which do not support the Routing Information Protocol are also occa-
sionally present on the local network. These routers cannot recognize the RIP
71
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
packets and look on them as normal broadcast or multicast packets. Connec-
tions are continually established by the RIPs if this router holds the default
route to a remote router. This can be prevented by entering the RIP port in the
filter tables.
Scaling with IP RIP
If you use several routers in a local network with IP RIP, you can represent the
routers outwardly as one large router. This procedure is also known as “scal-
ing”. As a result of the constant exchange of information between the routers,
such a router theoretically has no limits to the transmission options available
to it.
Configuration of IP-RIP function
Configuration tool Menu/table
LANconfig
WEBconfig
IP router ̈ General ̈ RIP options
Expert Configuration ̈ Setup ̈ IP-router-module ̈
RIP-config
Terminal/Telnet
setup/IP-router-module/RIP-config
̈ In the field 'RIP support' (or 'RIP type') the following selection is possible:
୴ 'off': IP-RIP is not used (default).
୴ 'RIP-1': RIP-1 and RIP-2 packets are received but only RIP-1 packets
are sent.
୴ 'RIP-1 compatible': RIP-1 and RIP-2 packets are received. RIP-2 pack-
ets are sent as an IP broadcast.
୴ 'RIP-2': Similar to 'RIP-1 compatible', except that all RIP packets are
sent to the IP multicast address 224.0.0.9.
̈ The entry under 'RIP-1 mask' (or 'R1 mask') can be set to the following
values:
୴ 'class' (default): The network mask used in the RIP packet is derived
directly from the IP address class, i.e. the following network masks are
used for the network classes:
Class A
Class B
Class C
255.0.0.0
255.255.0.0
255.255.255.0
72
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
୴ 'address': The network mask is derived from the first bit that is set in
the IP address entered. This and all high-order bits within the network
mask are set. Thus, for example, the address 127.128.128.64 yields
the IP network mask 255.255.255.192.
୴ 'class + address': The network mask is formed from the IP address
class and a part attached after the address procedure. Thus, the
above-mentioned address and the network mask 255.255.0.0 yield
the IP network mask 255.128.0.0.
Routers with RIP capabilities dispatch the RIP packets approximately
every 30 seconds.The router is only set up to send and receive RIPs if
it has a unique IP address.The IP RIP module is deselected in the
default setting using the IP address xxx.xxx.xxx.254.
7.2.4 SYN/ACK speedup
The SYN/ACK speedup method is used to accelerate IP data traffic. With SYN/
ACK speedup IP check characters (SYN for synchronization and ACK for
acknowledge) a given preference within the transmission buffer over simple
data packets. This prevents the situation that check characters remain in the
transmission queue for a longer time and the remote station stop sending
data as a result.
The greatest effect occurs with SYN/ACK speedup with fast connections when
data quantities are simultaneously transferred in both directions at high
speed.
The SYN/ACK speedup is activated at the factory.
Switching off in case of problems
Due to the preferred handling of individual packets, the original packet order
is changed. Although TCP/IP does not ensure a certain packet order, problems
may result in a few isolated applications. This only concerns applications that
73
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
assume a certain order that differs from the protocol standard. In this case the
SYN/ACK speedup can be deactivated:
Configuration tool Menu/table
LANconfig
IP router ̈ General ̈ Pass on TCP SYN and ACK packets prefer-
entially
WEBconfig
Expert Configuration ̈ Setup ̈ IP-router-module ̈
Routing-method ̈ SYN/ACK-speedup
Terminal/Telnet
cd /setup/IP-router-module/routing-
method set SYN/ACK-speedup OFF
7.3 The hiding place—IP masquerading (NAT, PAT)
One of today's most common tasks for routers is connecting the numerous
workstation computers in a LAN to the network of all networks, the Internet.
Everyone should have the potential to access, for example, the WWW from his
workstation and be able to fetch bang up-to-date information for his work.
7.3.1 Simple masquerading
IP masquerading provides a hiding place for every computer while connected
with the Internet. Only the router module of the LANCOM and its IP address
are visible on the Internet. The IP address can be fixed or assigned dynamically
by the provider. The computers in the LAN then use the router as a gateway
so that they themselves cannot be detected. Thereby, the router separates
Internet and Intranet.
How does IP masquerading work?
Masquerading makes use of a characteristic of TCP/IP data transmission,
which is to use port numbers for destination and source as well as the source
and destination addresses. When the router receives a data packet for transfer
it now notes the IP address and the sender's port in an internal table. It then
gives the packet its unique IP address and a new port number, which could be
74
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
any number. It also enters this new port on the table and forwards the packet
with the new information.
Source: 10.0.0.100
Target: 80.123.123.123
Source: 80.146.74.146, Port 3456
Target: 80.123.123.123
IP: 10.0.0.100
Internet
internal IP: 10.0.0.1
public IP: 80.146.74.146
Source IP
Port
10.0.0.100
3456
The response to this new packet is now sent to the IP address of the router
with the new sender port number. The entry in the internal table allows the
router to assign this response to the original sender again.
Source: 80.123.123.123
Target: 10.0.0.100
Source: 80.123.123.123
Target: 80.146.74.146, Port 3456
IP: 10.0.0.100
Internet
internal IP: 10.0.0.1
public IP: 80.146.74.146
Source IP
Port
10.0.0.100
3456
75
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Which protocols can be transmitted using IP masquerading?
IP masquerading for all IP protocols that are based on TCP, UDP, or ICMP and
communicate exclusively through ports. One example of this type of uncom-
plicated protocol is the one the World Wide Web is based on: HTTP.
Individual IP protocols do use TCP or UDP, but do not, however communicate
exclusively through ports. This type of protocol calls for a corresponding spe-
cial procedure for IP masquerading. Among the group of protocols supported
by IP masquerading in the LANCOM are:
̈ FTP (using the standard ports)
̈ H.323 (to the same extent as used by Microsoft Netmeeting)
̈ PPTP
̈ IPSec
̈ IRC
Configuration of IP masquerading
The use of IP masquerading is set individually for each route in the routing
table. The routing table can be reached as follows:
Configuration tool Run
LANconfig
WEBconfig
IP router ̈ Routing ̈ Routing table
Expert Configuration ̈ Setup ̈ IP-router-module
IP-routing-table
Terminal/Telnet
/setup/IP-router-module/IP-routing-table
Multiple addresses for the router
Masquerading pits two opposing requirements of the router against one
another: While it must have an IP address which is valid on the local network,
it must also have an address valid on the Internet. Since these two addresses
may not in principle be located on the same logical network, there is only one
solution: two IP addresses are required. Therefore, most standard Internet
connections assign the router’s Internet IP address dynamically during the PPP
negotiation.
76
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
On the local side, the router supports two different networks: The Intranet
and the DMZ (’de-militarized zone’). The DMZ marks a distinct, separate local
network, usually for servers, that must be accessible from the Internet.
Intranet
(LAN)
LAN IP:
public IP:
10.0.0.1
80.146.74.146
DMZ IP:
192.168.2.1
DMZ
The routing table’s Masquerading entry informs the router module whether
local Intranet or DMZ addresses should be hidden behind the router’s Internet
IP address or not:
̈ IP Masquerading switched off: No masquerading.
This variant is intended for Internet access with multiple static IP
addresses (to be entered under DMZ network address and DMZ netmask).
Examples would be to connect servers to the Internet, or to connect two
Intranet subnets via VPN.
̈ masking Intranet and DMZ (default): This setting masks all local
addresses. Additionally to the Intranet, a second local network (DMZ) with
private IP addresses can be connected to the Internet as well.
̈ masking Intranet only: This setting is ideally suited for Internet access
with multiple static IP addresses. Other than with ’IP Masquerading
switched off’: Additionally to the DMZ, an Intranet with private IP
addresses is supported simultaneously.
The DMZ and Intranet address assignment of the LANCOM can be entered
at the following places:
Configuration tool Run
LANconfig
TCP/IP ̈ General
WEBconfig
Expert Configuration ̈ Setup ̈ TCP-IP--Module
/Setup/TCP-IP-Module
Terminal/Telnet
77
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
7.3.2 Inverse masquerading
This masking operates in both directions: The local network behind the IP
address of the router is masked if a computer from the LAN sends a packet to
the Internet (simple masquerading).
If, on the other hand, a computer sends a packet from the Internet to, for
example, an FTP server on the LAN (’exposed host’), from the point of view of
this computer the router appears to be the FTP server. The router reads the IP
address of the FTP server in the LAN from the entry in the service table. The
packet is forwarded to this computer. All packets that come from the FTP
server in the LAN (answers from the server) are hidden behind the IP address
of the router.
Source: 80.123.123.123
Target: 80.146.74.146, Port 21
IP: 10.0.0.10
Ports
Target IP
20 to 21
10.0.0.10
The only small difference is that:
̈ Access to a service (port) in the intranet from outside must be defined in
advance by specifying a port number. The destination port is specified
with the intranet address of, for example, the FTP server, in a service table
to achieve this.
̈ When accessing the Internet from the LAN, on the other hand, the router
itself makes the entry in the port and IP address information table.
The table concerned can hold up to 2048 entries, that is it allows 2048
simultaneous transmissions between the masked and the unmasked
network.
After a specified period of time, the router, however, assumes that the
entry is no longer required and deletes it automatically from the table.
78
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
Configuration of the inverse masquerading
Configuration tool Run
LANconfig
WEBconfig
IP router ̈ Masq. ̈ Service list
Expert Configuration ̈ Setup ̈ IP-router-module ̈
Masquerading ̈ Service-table
Terminal/Telnet
/setup/IP-router-module/masquerading/
service-table
Stateful Inspection and inverse masquerading
If in the Masquerading module a port is exposed (i.e. all packets received on
this port should be forwarded to a server in the local area network), then this
requires with a Deny All Firewall strategy an additional entry in the Stateful
Inspection Firewall, which enables the access of all stations to the respective
server.
7.3.3 Unmasked Internet access for server in the DMZ
While the inverse masquerading described in the proceeding paragraph
allows to expose at least one service of each type (e.g. one Web, Mail and FTP
server), this method is bound to some restrictions.
̈ The masquerading module must support and ’understand’ the particular
server service of the ’exposed host’. For instance, several VoIP servers use
proprietary, non-standard ports for extended signalling. Thus such server
could be used on unmasked connections solely.
̈ From a security point of view, it must be considered that the ’exposed
host’ resides within the LAN. When the host is under control of an
attacker, it could be misused as a starting point for further attacks against
machines in the local network.
In order to prevent attacks from a cracked server to the local network,
some LANCOM provide a dedicated DMZ interface (LANCOM 7011
VPN) or are able to separate their LAN ports on Ethernet level by hard-
ware (LANCOM 821 ADSL/ISDN and LANCOM 1621 ADSL/ISDN with
the Switch set to ’Private Mode’).
Two local networks - operating servers in a DMZ
This feature requires an Internet access with multiple static IP addresses.
Please contact you ISP for an appropriate offer.
79
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Example: You are assigned the IP network address 123.45.67.0 with the net-
mask 255.255.255.248 by your provider. Then you can assign the IP addresses
as follows:
DMZ IP
address
Meaning/use
123.45.67.0
123.45.67.1
123.45.67.2
network address
LANCOM as a gateway for the Intranet
Device in the LAN which is to receive unmasked access to the Internet, e.g.
web server connected at the DMZ port
123.45.67.3
broadcast address
All computers and devices in the Intranet have no public IP address, and
therefore appear with the IP address of the LANCOM (123.45.67.1) on the
Internet.
Separation of Intranet and DMZ
Although Intranet and DMZ may be already separated on a Ethernet
level by distinct interfaces, an appropriate Firewall rules must be set
up in any case so that the DMZ is being separated from the LAN on
the IP level as well.
Thereby, the server service shall be available from the Internet and
from the Intranet, but any IP traffic from the DMZ towards the Intranet
must be prohibited. For the above example, this reads as follows:
̈ With a ’Allow All’ strategy (default): Deny access from 123.45.67.2 to “All
stations in local network“
̈ With a ’Deny All’ strategy (see ’Set-up of an explicit "Deny All" strategy’
→page 138): Allow access from "All stations in local network" to
123.45.67.2
7.4 N:N mapping
Network Address Translation (NAT) can be used for several different matters:
̈ for better utilizing the IP4 addresses ever becoming scarcer
̈ for coupling of networks with same (private) address ranges
̈ for producing unique addresses for network management
80
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
In the first application the so-called N:1 NAT, also known as IP masquerading
(’The hiding place—IP masquerading (NAT, PAT)’ →page 74) is used. All
addresses (“N”) of the local network are mapped to only one (“1”) public
address. This clear assignment of data streams to the respective internal PCs
is generally made available by the ports of the TCP and UDP protocols. That’s
why this is also called NAT/PAT (Network Address Translation/Port Address
Translation).
Due to the dynamic assignment of ports, N:1 masquerading enables only
those connections, which have been initiated by the internal network. Excep-
tion: an internal IP address is staticly exposed on a certain port, e.g. to make
a LAN server accessible from the outside. This process is called “inverse mas-
querading” (’Inverse masquerading’ →page 78).
A N:N mapping is used for network couplings with identical address ranges.
This transforms unambiguously multiple addresses (“N”) of the local network
to multiple (“N”) addresses of another network. Thereby, an address conflict
can be resolved.
Rules for this address translation are defined in a static table in the LANCOM.
Thereby new addresses are assigned to single stations, parts of the network,
or the entire LAN, by which the stations can contact other networks then.
Some protocols (FTP, H.323) exchange parameters during their protocol nego-
tiation, which can have influence on the address translation for the N:N map-
ping. For a correct functioning of the address translation, the connection
information of these protocols are tracked appropriately by functions of the
firewall in a dynamic table, and are additionally considered to the entries of
the static table.
The address translation is made “outbound”, i.e. the source address is
translated for outgoing data packets and the destination address for
incoming data packets, as long as the addresses are located within
the defined translation range. An “inbound” address mapping,
whereby the source address is translated (instead of the destination
address), needs to be realized by an appropriate “outbound” address
translation on the remote side.
7.4.1 Application examples
The following typical applications are described in this section:
̈ Coupling of private networks utilizing the same address range
̈ Central remote monitoring by service providers
81
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Network coupling
An often appearing scenario is the coupling of two company networks which
internally use the same address range (e. g. 10.0.0.x). This is often the case,
when one company should get access to one (or more) server(s) of the other
one:
Network of firm A:
Network of firm B:
10.0.0.x
10.0.0.x
N:N mapping to 192.168.2.x
N:N mapping to 192.168.1.x
Gateway
Gateway
VPN tunnel
Target: 192.168.2.1
Server_A1: 10.0.0.1
Server_A2: 10.0.0.2
Server_B1: 10.0.0.1
Server_B2: 10.0.0.2
In this example network servers of company A and B should have access over
a VPN tunnel to the respective other network. All stations of the LAN should
have access to the server of the remote network. For the time being, there is
no access possible to the other network, because both networks use the same
address range. If one station of the network of company A wants to access
server 1 of company B, the addressee (with an address from the 10.0.0.x net-
work) will be searched within the own local network, and the inquiry even
does not reach the gateway.
With the help of N:N mapping, all addresses of the LAN can be translated to
a new address range for the coupling with the other network. The network of
company A e. g. will be translated to 192.168.1.x, the network of company B
to 192.168.2.x. Under these new addresses the two LANs are now reachable
for the respective other network. The station from the network of company A
is now addressing server 1 of company B under the address 192.168.2.1. The
addressee does not reside any more within the own network, the inquiry is
now passed on to the gateway, and the routing to the other network is work-
ing as desired.
82
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
Remote monitoring and remote control of networks
Remote maintenance and control of networks become more and more impor-
tance because of the possibilities given by VPN. With the use of the nearly
ubiquitous broadband Internet connections, the administrator of such man-
agement scenarios is no longer dependent of the different data communica-
tion technologies or expensive leased lines.
Gateway, e.g. Customer A, office 1:
Customer B, office 1:
10.1.2.x, 255.255.255.0
10.1.2.1
10.1.2.x, 255.255.255.0
Customer A, headquarters:
10.1.x.x, 255.255.0.0
Customer B, headquarters:
10.1.x.x, 255.255.0.0
Gateway
VPN tunnel
Customer B, office 2:
10.1.3.x, 255.255.255.0
Customer A, office 2:
10.1.3.x, 255.255.255.0
Hot Spot, e.g.
172.16.10.11
Internet
Customer D:
172.16.10.x,
255.255.255.0
Gateway
Gateway
Customer C:
Gateway, e.g.
172.16.10.x, 255.255.255.0
80.123.123.123 (public)
and 172.16.10.11 (intern)
Service provider:
172.16.10.x,
255.255.255.0
In this example, a service provider monitors the networks of different clients
out of a central control. For this purpose, the SNMP-capable devices should
send the respective traps of important events automatically to the SNMP trap
addressee (e. g. LANmonitor) of the network of the service provider. So the
LAN administrator of the service provider has an up-to-date view of the state
of the devices at any time.
The individual networks can be structured very differently: Clients A and B
integrate their branches with own networks via VPN connections to their LAN,
83
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
client C operates a network with several public WLAN base stations as hot
spots, and client D has got an additional router for ISDN dial-up accesses in
his LAN.
The networks of client A and B use different address ranges in the
respective head office and the connected branches. A standard net-
work coupling via VPN is therefore possible between these networks.
In order to avoid the effort to building up its own VPN tunnel to each individ-
ual subnetwork of the clients A and B, the service provider makes only one
VPN connection to the head office, and uses the existing VPN lines between
head office and branches for communication with the branches.
Traps from the networks report to the service provider whether e. g. a VPN
tunnel has been build up or cut, if an user has been tried to log in three times
with a wrong password, if an user has been applied for a hot spot, or if some-
where a LAN cable has been pulled out of a switch.
A complete list of all SNMP traps supported by LANCOM can be found
in the appendix of this reference manual (’SNMP traps’ →page 287).
Routing of these different networks reaches very fast its limiting factors, if two
or more clients use same address ranges. Additionally, if some clients use the
same address range as the service provider as well, further address conflicts
are added. In this example, one of the hot spots of client C has got the same
address as the gateway of the service provider.
There are two different variants to resolve these address conflicts:
Loopback:
decentralized
1:1 mapping
̈ In the decentralized variant, alternative IP addresses for communicating
with the SNMP addressee are assigned to each of the monitored devices
by means of an 1:1 mapping. This address is in technical language also
known as “loopback address”, the method accordingly as “loopback
method”.
The loopback addresses are valid only for communication with certain
remote stations on the connections belonging to them. Thus a
LANCOM is not generally accessible via this IP address.
Alternative:
central
N:N mapping
̈ Even more appealing is the solution of a central mapping: instead of con-
figuring each single gateway in the branch networks, the administrator
configures solely one central address translation in the gateway of the
84
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
head office. On this occasion, also all subnetworks located “behind” the
head office are supplied with the needed new IP addresses.
In this example, the administrator of the service provider selects 10.2.x.x as
central address translation for the network of client B, so that both networks
with actual same address range looks like two different networks for the gate-
way of the service provider.
The administrator selects the address ranges 192.168.2.x and 192.168.3.x for
client C and D, so that the addresses of these networks do differ from the own
network of the service provider.
In order to enable the gateway of the provider to monitor the networks of cli-
ents C and D, the administrator sets up an address translation to 192.168.1.x
also for the own network.
7.4.2 Configuration
Setting up address translation
Configuration of N:N mapping succeeds with only few information. Since a
LAN can be coupled with several other networks via N:N, different destina-
tions can have also different address translations for a source IP range. The
NAT table can contain 64 entries at maximum, including the following infor-
mation:
̈ Index: Unambiguous index of the entry.
̈ Source address: IP address of the workstation or network that should
get an alternative IP address.
̈ Source mask: Netmask of source range.
̈ Remote station: Name of the remote station over that the remote net-
work is reachable.
̈ New network address: IP address or address range that should be used
for the translation.
For the new network address, the same netmask will be used as the source
address already uses. For assignment of source and mapping addresses the
following hints apply:
̈ Source and mapping can be assigned arbitrarily for the translation of sin-
gle addresses. Thus, for example, it is possible to assign the mapping
address 192.168.1.88 to a LAN server with the IP address 10.1.1.99.
̈ For translation of entire address ranges, the station-related part of the IP
address will be taken directly, only appended to the network-related part
85
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
of the mapping address. Therefore, in an assignment of 10.0.0.0/
255.255.255.0 to 192.168.1.0, a server of the LAN with IP address
10.1.1.99 will get assigned the mapping address 192.168.1.99.
The address range for translation must be at minimum as large as the
source address range.
Please notice that the N:N mapping functions are only effective when
the firewall has been activated. (’Firewall/QoS enabled’ →page 121)!
Additional configuration hints
By setting up address translation in the NAT table, the networks and worksta-
tions become only visible under another address at first in the higher network
compound. But for a seamless routing of data between the networks some
further settings are still necessary:
̈ Entries in the routing tables for packets with new addresses to find the
way to their destination.
̈ DNS forwarding entries, in order that inquiries about certain devices in the
respective other networks can be resolved into mapped IP addresses
(’DNS forwarding’ →page 279).
̈ The firewall rules of the gateways must be adjusted such that (if neces-
sary) authorized stations resp. networks from the outside are permitted to
set up connections.
̈ VPN rules for loopback addresses in order to transmit the newly assigned
IP addresses through an according VPN tunnel.
The IP address translation takes place in the LANCOM between fire-
wall and IP router on one hand, and the VPN module on the other
hand. All rules related to the own network use therefore the
“unmapped” original addresses. The entries of the remote network
86
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
use the “mapped” addresses of the remote side, valid on the VPN con-
nection.
Target address
Source address
VPN services
VPN / PPTP
LAN interfaces
Firewall / IDS / DoS / QoS
LAN / Switch
IP router
WAN interfaces
DSLoL
connection via LAN/Switch
WLAN-1
WLAN-2
IP module: NetBIOS, DNS,
ADSL
DHCP server, RADIUS, RIP,
NTP, SNMP, SYSLOG, SMTP
DSL
DMZ
Configuration &
ISDN
management:
WEBconfig, Telnet,
IPX router
IPX over PPTP/VPN
LANCAPI
87
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Configuration with different tools
LANconfig
With LANconfig you adjust the address translation for the configuration range
’IP router’ on register card 'N:N-Mapping':
WEBconfig, Telnet
Under WEBconfig and Telnet you find the NAT table for configuration of N:N
mapping at the following positions of the menu tree:
Configuration tool Run
WEBconfig
Expert configuration / Setup / IP router / NAT table
Setup / IP router module / NAT table
Terminal/Telnet
88
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
When starting a new entry under WEBconfig, the NAT table shows up as fol-
lows:
7.5 Configuration of remote stations
Remote stations are configured in two tables:
̈ In the name list(s) all information is set that applies individually to only
one remote station.
̈ Parameters for the lower protocol levels (below IP or IPX) are defined in
the communication layer table.
The configuration of the authentication (protocol, user name, pass-
word) is not covered in this section.Information on authentication is
contained in the section ’Establishing connection with PPP’
→page 91.
7.5.1 Name list
The available remote stations are created in the name list with a suitable name
and additional parameters.
Configuration tool Menu/table
LANconfig
Communication ̈ Remote sites ̈ Name list
WEBconfig
Expert configuration ̈ Setup ̈ WAN module ̈ Name-list
Terminal/Telnet
cd /Setup/WAN module
set name list[...]
89
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
7.5.2 Layer list
With a layer, a collection of protocol settings are defined, which should be
used when connecting to specific remote stations. The list of the communica-
tion layers can be found under:
Configuration tool List
LANconfig
Communication ̈ General ̈ Communication layers
WEBconfig
Expert Configuration ̈ Setup ̈ WAN-module ̈ Layer-list
Terminal/Telnet
cd /setup/WAN
module/ set layer-list [...]
In the communication layer list the common protocol combinations are
already predefined. Changes or additions should only be made when remote
stations are incompatible to the existing layers. The possible options are con-
tained in the following list.
Please note that the parameters located in LANCOM depend upon the
functionality of the unit. It is possible that your unit does not offer all
of the options described here.
Parameter
Meaning
Layer name
The layer is selected in the name list under this name.
Encapsulation Additional encapsulations can be set for data packets.
'Transparent' No additional encapsulations.
'Ethernet'
'LLC-MUX'
Encapsulation in the form of ethernet frames.
Multiplexing via ATM with LLC/SNAP encapsulation
according to RFC 2684. Several protocols can be transmit-
ted over the same VC (Virtual Channel).
'VC-MUX'
Multiplexing with ATM by establishing additional VCs
according to RFC 2684.
90
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
Parameter
Meaning
Layer-3
The following options are available for the switching layer or network layer:
'Transparent' No additional header is inserted.
'PPP'
The connection is established according to the PPP proto-
col (in the synchronous mode, i.e. bit-oriented). The con-
figuration data are taken from the PPP table.
'AsyncPPP'
Like 'PPP', only the asynchronous mode is used. This
means that PPP functions character-oriented.
'... with
script'
All options can be run with their own script if desired. The
script is specified in the script list.
'DHCP'
Assignment of the network parameters via DHCP.
Layer-2
In this field the upper section of the security layer (Data Link Layer) is con-
figured. The following options are available:
'Transparent' No additional header is inserted.
'PPPoE'
Encapsulation of the PPP protocol information in ethernet
frames.
'PPPoE'
The PPP negotiation runs via Ethernet. The PPP packets are
encapsulated in Ethernet frames for this purpose. This
process is frequently used for DSL connections.
Options
Layer-1
Here you can activate the compression of the data to be transmitted and
the bundling of channels. The selected option only becomes active when it
is supported by both the ports used and the selected Layer-2 and Layer-3
protocols. For further information see section ’Channel bundling with
MLPPP’ →page 101.
In this field the lower section of the security layer (Data Link Layer) is con-
figured. The following options are available:
'AAL-5'
'ETH-10'
'HDLC'
ATM adaptation layer
Transparent Ethernet as per IEEE 802.3.
Securing and synchronization of the data transfer as per
HDLC (in the 7 or 8-bit mode).
'V.110'
Transmission as per V.110 with a maximum of 38,400 bps.
Modem transmission (requires Fax Modem option)
Modem
7.6 Establishing connection with PPP
LANCOM routers also support the point-to-point protocol (PPP). PPP is a
generic term for a whole series of WAN protocols which enable the interaction
91
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
of routers made by different manufacturers since this protocol is supported by
practically all manufacturers.
Due to the increasing importance of this protocol family and the fact that PPP
is not associated with any specific operating mode of the routers, we will be
introducing the functions of the devices associated with the PPP here in a sep-
arate section.
7.6.1 The protocol
What is PPP?
The point-to-point protocol was developed specifically for network connec-
tions via serial channels and has asserted itself as the standard for connec-
tions between routers. It implements the following functions:
̈ Password protection according to PAP, CHAP or MS CHAP
̈ Callback functions
̈ Negotiation of the network protocol to be used over the connection
established (IP or IPX, for example). Included in this are any parameters
necessary for these protocols, for example IP addresses. This process is
carried out using IPCP (IP Control Protocol).
̈ Verification of the connection through the LCP (Link Control Protocol)
̈ Combining several ISDN channels (MultiLink PPP)
PPP is the standard used by router connections for communication between
devices or the WAN connection software of different manufacturers. Connec-
tion parameters are negotiated and a common denominator is agreed using
standardized control protocols (e.g. LCP, IPCP, CCP) which are contained in
PPP, in order to ensure successful data transfer where possible.
What is PPP used for?
It is best to use the point-to-point protocol in the following applications:
̈ for reasons of compatibility when communicating with external routers,
for example
̈ remote access from remote workstations with ISDN cards
̈ Internet access (when sending addresses)
The PPP which is implemented by LANCOM can be used synchronously or
asynchronously not only via a transparent HDLC connection, but also via an
X.75 connection.
92
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
The phases of PPP negotiation
Establishment of a connection using PPP always begins with a negotiation of
the parameters to be used for the connection. This negotiation is carried out
in four phases which should be understood for the sake of configuration and
troubleshooting.
̈ Establish phase
Once a connection has been made at the data communication level,
negotiation of the connection parameters begins through the LCP.
This ascertains whether the remote site is also ready to use PPP, and the
packet sizes and authentication protocol (PAP, CHAP, MS-CHAP or none)
are determined. The LCP then switches to the opened state.
̈ Authenticate phase
Passwords will then be exchanged, if necessary. The password will only be
sent once if PAP is being used for the authentication process. An
encrypted password will be sent periodically at adjustable intervals if
CHAP or MS CHAP is being used.
Perhaps a callback is also negotiated in this phase via CBCP (Callback
Control Protocol).
̈ Network phase
LANCOM, supports the protocols IPCP and IPXCP.
After the password has been successfully transmitted, the IPCP and/or
IPXCP network layer can be established.
IP and/or IPS packets can be transferred from the router modules to the
opened line if the negotiation of parameters is successful for at least one
of the network layers.
̈ Terminate phase
In the final phase the line is cleared, when the logical connections for all
protocols are cleared.
PPP negotiation in the LANCOM
The progress of a PPP negotiation is logged in the devices' PPP statistics and
the protocol packets listed in detail there can be used for checking purposes
in the event of an error.
The PPP trace outputs offer a further method of analysis. You can use the com-
mand
trace + ppp
93
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
to begin output of the PPP protocol frames exchanged during a terminal ses-
sion. You can perform a detailed analysis once the connection has been bro-
ken if this terminal session has been logged in a log file.
7.6.2 Everything o.k.? Checking the line with LCP
The devices involved in the establishment of a connection through PPP nego-
tiate a common behaviour during data transfer. For example, they first decide
whether a connection can be made at all using the security procedure, names
and passwords specified.
The reliability of the line can be constantly monitored using the LCP once the
connection has been established. This is achieved within the protocol by the
LCP echo request and the associated LCP echo reply. The LCP echo request is
a query in the form of a data packet which is transferred to the remote station
along with the data. The connection is reliable and stable if a valid response
to this request for information is returned (LCP echo reply). This request is
repeated at defined intervals so that the connection can be continually mon-
itored.
What happens when there is no reply? First a few retries will be initiated to
exclude the possibility of any short-term line interference. The line will be
dropped and an alternative route sought if all the retries remain unanswered.
If, for example, the high-speed connection refuses to work, an existing ISDN
port can open the way to the Internet as a backup.
During remote access of individual workstations with Windows oper-
ating systems, we recommend switching off the regular LCP requests
since these operating systems do not reply to LCP echo requests.
The LCP request behaviour is configured in the PPP list for each indi-
vidual connection. The intervals at which LCP requests should be
made are set by the entries in the 'Time' and 'Retr.' fields, along with
the number of retries that should be initiated without a response
before the line can be considered faulty. LCP requests can be switched
off entirely by setting the time at '0' and the retries at '0'.
7.6.3 Assignment of IP addresses via PPP
In order to connect computers using TCP/IP as the network protocol, all par-
ticipating computers require a valid and unique IP address. If a remote station
does not have its own IP address (such as the individual workstation of a
94
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
telecomputer), the LANCOM assigns it an IP address for the duration of the
connection, enabling communications to take place.
This type of address assignment is carried out during PPP negotiation and
implemented only for connections via WAN. In contrast, the assignment of
addresses via DHCP is (normally) used within a local network.
Assignment of an IP address will only be possible if the LANCOM can
identify the remote station by its call number or name when the call
arrives, i.e. the authentication process has been successful.
Examples
̈ Remote access
Address assignment is made possible by a special entry in the IP routing
table. 255.255.255.255 is specified as the network mask as the IP address
to be assigned to the remote site in the 'Router-name' field. In this case,
the router name is the name, with which the remote site must identify
itself to the LANCOM.
In addition to the IP address, the addresses of the DNS and NBNS servers
(Domain Name Server and NetBIOS Name Server) including the backup
server from the entries in the TCP/IP module are transmitted to the remote
station during this configuration.
So that everything functions properly, the remote site must also be
adjusted in such a way that it can obtain the IP address and the name
server from the LANCOM. This can be accomplished with Windows dial-
up networking through the settings in the 'TCP settings' under 'IP
address' and 'DNS configuration'. This is where the options 'IP address
assigned by server' and 'Specify name server addresses' are activated.
̈ Internet access
If Internet access for a local network is realized via the LANCOM, the
assignment of IP addresses can occur in a reverse manner. Configurations
are possible in which the LANCOM does not have a valid IP address in the
Internet and is assigned one by the Internet provider for the duration of
the connection. In addition to the IP address, the LANCOM also receives
information via the DNS server of the provider during the PPP negotiation.
In the local network, the LANCOM is only known by its internal valid
intranet address. All workstations in the local network can then access the
same Internet account and also reach e.g. the DNS server.
95
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Windows users are able to view the assigned addresses via LANmonitor. In
addition to the name of the remote station, the current IP address as well as
the addresses of DNS and NBNS servers can be found there. Options such as
channel bundling or the duration of the connection are also displayed.
7.6.4 Settings in the PPP list
You can specify a custom definition of the PPP negotiation for each of the
remote sites that contact your net.
Configuration tool List
LANconfig
WEBconfig
Communication ̈ Protocols ̈ PPP list
Expert Configuration ̈ Setup ̈ WAN-module ̈
PPP-list
Terminal/Telnet
cd /setup/WAN module
set PPP-list [...]
The PPP list may have up to 64 entries and contain the following values:
In this column of
the PPP list...
...enter the following values:
Remote site
(device name)
Name the remote site uses to identify itself to your router.
User name
Password
The name with which your router logs onto the remote site. The
device name of your router is used if nothing is specified here.
Password transferred by your router to the remote site
(if demanded).
An asterisk (*) in the list indicates that an entry is present.
Auth.
Security method used on the PPP connection ('PAP', 'CHAP' or
'none'). Your own router demands that the remote site observes
this procedure. Not the other way round.
This means that 'PAP', 'CHAP' security is not useful when connect-
ing to Internet service providers, who may not wish to provide a
password. Select 'none' as the security attribute for connections
such as these.
96
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
In this column of
the PPP list...
...enter the following values:
Time
Time between two checks of the connection with LCP (see the fol-
lowing section). This is specified in multiples of 10 seconds
(i.e. 2 for 20 seconds, for instance).
The value is simultaneously the time between two verifications of
the connection to CHAP. Enter this time in minutes.
The time must be set to '0' for remote sites using a Windows oper-
ating system.
Retr.
Number of retries for the check attempt. You can eliminate the
effect of short-term line interference by selecting multiple retries.
The connection will only be dropped if all attempts are unsuccess-
ful. The time interval between two retries is 1/10 of the time inter-
val between two checks.
Simultaneously the number of the “Configure requests“ that the
router maximum sends before it assumes a line error and clears the
connection itself.
Conf, Fail, Term
These parameters are used to affect the way in which PPP is imple-
mented. The parameters are defined in RFC 1661 and are not
described in greater detail here. You will find troubleshooting
instructions in this RFC in connection with the router's PPP statis-
tics if you are unable to establish any PPP connections.
The default settings should generally suffice.
These parameters can only be modified via LANconfig, SNMP or
TFTP!
7.7 Extended connection for flat rates—Keep-alive
The term flat rate is used to refer to all-inclusive connection rates that are not
billed according to connection times, but instead as a flat fee for fixed periods.
With flat rates, there is no longer any reason to disconnect. On the contrary:
New e-mails should be reported directly to the PC, the home workplace is to
be continuously connected to the company network and users want to be able
to reach friends and colleagues via Internet messenger services (ICQ etc.)
without interruption. This means it is desirable to continuously maintain con-
nections.
With the LANCOM the Keep-alive function ensures that connections are
always established when the remote station has disconnected them.
Configuration of Keep-alive function
The keep alive procedure is configured in the name list.
If the holding time is set to 0 seconds, a connection is not actively discon-
nected by the LANCOM. The automatic disconnection of connections over
which no data has been transmitted for a longer time is deactivated with a
97
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
holding time of 0 seconds then. However, connections interrupted by the
remote site are not automatically re-established with this setting.
With a holding time of 9,999 seconds the connection is always re-established
after any disconnection. Additionally, the connection is re-established after a
reboot of the device (’auto reconnect’).
7.8 Callback functions
The LANCOM supports automatic callback via its ISDN port.
In addition to callback via the D channel, the CBCP (Callback Control Protocol)
specified by Microsoft and callback via PPP as per RFC 1570 (PPP LCP exten-
sions) are also offered. There is also the option of a particularly fast callback
using a process developed by LANCOM. PCs with Windows operating system
can be called back only via the CBCP.
7.8.1 Callback for Microsoft CBCP
With Microsoft CBCP, the callback number can be determined in various ways.
̈ The party called does not call back.
̈ The party called allows the caller to specify the callback number itself.
̈ The party called knows the callback numbers and only calls these back.
Via CBCP, it is possible to establish connection to the LANCOM from a PC with
Windows operating system and also to be called back by this PC. Three pos-
sible settings are selected in the name list via the callback entry as well as the
calling number entry.
98
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
No callback
For this setting, the callback entry must be set to 'off' when configuring via
WEBconfig or in the console.
Callback number specified by caller
For this setting the callback entry must be set to 'Call back the remote site
after name verification' (or must have the value 'Name' in WEBconfig or in the
console). In the name list no telephone number may be specified.
After the Authentication an input window appears on the caller's screen in
Windows that requests the ISDN telephone number of the PC.
The calling number is determined in the LANCOM
For this setting the callback entry must be set to 'Call back the remote site
after name verification' (or must be set to the value 'Name' in WEBconfig or
in the console). In the name list one telephone number must be specified.
Some Windows versions (especially Windows 98) prompt the user to confirm
the callback to the telephone number stored in the LANCOM ('Administrator
Specified') with an input window. Other Windows versions only inform the
user that the PC is waiting for the callback from the LANCOM.
The callback to a Windows workstation occurs approx. 15 seconds after the
first connection has been dropped. This time setting cannot be decreased
since it is a Windows default setting.
7.8.2 Fast callback using the LANCOM process
This fast, LANCOM-specific process is ideal if two LANCOM are to communi-
cate with one another via callback.
̈ The caller who may wish to be called back can activate the function 'Wait
for callback from remote site' in the name list (or 'Looser' when configur-
ing via WEBconfig, terminal program or Telnet).
99
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
̈ The callback party selects 'Call back the remote site (fast procedure)' in
the name list and enters the calling number ('LANCOM' when configuring
via WEBconfig, terminal program or Telnet).
For fast callback using the LANCOM method, the number list for
answering calls must be kept up to date at both ends.
7.8.3 Callback with RFC 1570 (PPP LCP extensions)
The callback as per 1570 is the standard method for calling back routers of
other manufacturers. This protocol extension describes five possibilities for
requesting a callback. All versions are recognized by LANCOM. All versions
will be processed in the same way, however:
The LANCOM drops the connection after authenticating the remote station
and then calls back the station a few seconds later.
Configuration
For callback as per PPP you select the option 'Call back the remote site' in
LANconfig or 'Auto' with configuration via WEBconfig, terminal program or
Telnet.
For callback as per PPP the number list for answering calls in the
LANCOM must be up to date.
7.8.4 Overview of configuration of callback function
The following options are available in the name list under WEBconfig and ter-
minal program/telnet for the callback function:
With this
entry ...
... you set up the callback in this manner:
'Off'
No callback occurs.
'Auto' (not for
Windows operat-
ing systems, see
below)
The remote station will be called back if so specified in the name list.
At first, the call is denied and as soon as the channel is clear again, it
is called back (duration is approx. 8 seconds). If the remote station is
not found in the numerical list, it is first accepted as the DEFAULT
remote station, and the callback is negotiated during the protocol
negotiation. A charge of one unit is incurred for this.
100
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
With this
entry ...
... you set up the callback in this manner:
'Name'
Before a callback occurs, a protocol negotiation is always carried out
even when the remote station was found in the numerical list (e.g. for
computers with Windows having direct dialing on the device). Here
only minor charges result.
'LANCOM'
When the remote station is found in the numerical list, a quick call-
back is carried out, i.e., the LANCOM sends a special signal to the
remote station and calls back immediately when the channel is clear
again. After approx. 2 seconds, the connection is established. If the
remote station does not take back the call immediately after the sig-
nal, then after two seconds the situation reverts back to normal call-
back procedures (duration is once again approx. 8 seconds). This
process is only available for DSS1 connections.
'Looser'
Use the 'Looser' option when a callback is expected from the remote
station. This setting carries out two functions simultaneously. On the
one hand, it ensures that a custom connection setup is taken back
when there is an incoming call from the called remote station, and on
the other hand, the function is activated with this setting to be able to
react to the rapid callback procedure. In other words, in order to be
able to use rapid callback, the caller must be in the 'Looser' mode
while the party being called must discontinue callback with 'LAN-
COM'.
The setting 'Name' offers the greatest security when an entry is made
into the number list as well as the PPP list. The setting 'LANCOM'
offers the fastest callback method between two LANCOM routers.
With Windows remote stations, the 'Name' setting must be selected.
7.9 Channel bundling with MLPPP
When establishing an ISDN connection to a remote station with PPP capabil-
ity, you can transmit data more quickly. Data can be compressed and/or sev-
eral B channels can be used for data transmission (channel bundling).
Connecting with cable bundling is distinguished from “normal” connections
in that not only one, but rather several B channels are used parallel for data
transmission.
MLPPP (Multilink PPP) is used for channel bundling. This procedure is of
course only available when PPP is used as the B-channel protocol. MLPPP is
used e.g. for Internet access via Internet provider, which also operate remote
stations with MLPPP capability from your direct dialing nodes.
101
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 7: Routing and WAN connections
Two methods of channel bundling
̈ Static channel bundling
If a connection is established with static channel bundling, the LANCOM
tries to establish the second B channel immediately after setting up the
first B channel. If this does not work because, for example, this channel is
already taken by another device or a different connection within the
LANCOM, the connection attempt is automatically and regularly repeated
until the second channel is available for it.
̈ Dynamic channel bundling
In the case of a connection with dynamic channel bundling, the LANCOM
first only establishes one B channel and begins transmitting data. If, dur-
ing this connection, it determines that the throughput rate lies above a
certain threshold value, it tries to add the second channel.
If the second channel is established and the data throughput rate drops
below the threshold value, the LANCOM waits for the set B2 timeout
period and then automatically closes the channel again. In this way, the
per minute charges are fully utilized so long as rate information is com-
municated during the connection. Therefore, the LANCOM only uses the
second B channel if and as long as it really needs it.
Here's how to configure your system to combine channels
The configuration of channel bundling for a connection is made up of three
settings.
ቢ Select a communication layer for the remote station from the layer list that
has bundling activated in the Layer-2 options. Select from the following
Layer-2 options:
୴ compr. according to the LZS data compression procedure (Stac)
reduces the amount of data if the data hasn't already been com-
pressed. This procedure is also supported by routers of other manu-
facturers and by ISDN adapters under Windows operating systems.
୴ bundle uses two B channels per connection.
୴ bnd+cmpr uses both (compression and channel bundling) and pro-
vides the maximum possible data transmission performance.
ባ Now create a new entry in the name list. When doing so, watch the hold-
ing times for the connection. Please observe the following rules:
102
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 7: Routing and WAN connections
LANCOM Reference Manual LCOS 3.50
୴ Depending on the type of application, the B1 hold time should be
increased to such a level so that the connection is not dropped pre-
maturely because of packets not being transmitted for a short time.
Experience has shown that values between 60 and 180 seconds are a
good basis which can be adapted as required during operation.
୴ The B2 holding time determines whether static or dynamic channel
bundling will be used (see above). A B2 holding time of '0' or '9999'
ensures that the bundling will be static; values in between permit
dynamic channel bundling. The B2 holding time defines how long the
data throughput may lie below the threshold for dynamic channel
bundling without the second B channel automatically being discon-
nected.
ቤ Use the entry for the Y connection in the Router interface list to determine
what should happen if a second connection to a different remote station
is requested during an existing connection using channel bundling.
WEBconfig
Expert Configuration ̈ Setup̈ WAN-module ̈
Router-interface-list
Terminal/Telnet
cd /setup/WAN-module
set router-interface-list [...]
୴ Y connection On: The router interrupts the bundled connection to
establish a connection to the other remote station. When the second
channel is free again, the originally bundled connection automatically
takes the channel back (always in the case of static bundling, only as
required when using dynamic bundling).
୴ Y connection Off: The router maintains the existing bundled connec-
tion; the establishment of the new connection must wait.
Please note that if channel bundling is used, the cost of two connec-
tions is charged.Here no additional connections via the LANCAPI are
possible! So you should only use channel bundling if the double trans-
mission capacity can really be used in full.
103
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
8 Firewall
For most companies and many private users a work without the Internet is no
longer conceivable. E-mail and web are indispensable for communication and
information search. But each connection of the workstations from the own,
local network to the Internet represents however a potential danger: Unau-
thorized users can try to see your data via this Internet connection, to modify
it or to manipulate your PCs.
Therefore this chapter covers an important topic: the firewall as defensive
measure against unauthorized access. Besides a brief introduction to the topic
of Internet security, we show you which protection a LANCOM is able to offer
you by right configuration and how to make the needed specific settings.
8.1 Threat analysis
To plan and to realize suitable measures to guarantee security, it is advisable
to know first all possible sources of danger:
̈ Which imminent dangers exist for the own LAN resp. the own data?
̈ Which are the ways intruders take for the access to your network?
We denote the intrusion into protected networks in the following as
“attack” according to the general usage, and the intruder thus as
“attacker”.
8.1.1 The dangers
The dangers in the Internet arise in principle from completely different
motives. On the one hand the perpetrators try to enrich themselves personally
or to damage the victims systematically. By the ever increasing know-how of
the perpetrators, the “hacking” became already a kind of sports, in which
young people often measure who takes at first the hurdles of Internet security.
Regardless of the individual motivation, the intention of the perpetrators
mostly leads to the following aims:
̈ Inspect confidential information such as trade secrets, access information,
passwords for bank accounts etc.
̈ Use of LAN workstations for purposes of the attackers, e. g. for the distri-
bution of own contents, attacks to third workstations etc.
̈ Modify data of LAN workstations, e. g. to obtain even further ways for
access.
104
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ Destroy data on the workstations of the LAN.
̈ Paralyse workstations of the LAN or the connection to the Internet.
We restrict ourselves in this section to the attacks of local networks
(LAN) resp. to workstations and servers in such LANs.
8.1.2 The ways of the perpetrators
In order to undertake their objectives, the perpetrators need at first a way to
access your PCs and data. In principle, the following ways are open as long
as they are neither blocked nor protected:
̈ Via the central Internet connection, e. g. via routers.
̈ Via decentral connections to the Internet, e. g. modems of single PCs or
mobile phones on notebooks.
̈ Via wireless networks operating as a supplement to wired networks.
In this chapter we only deal with the ways via the central Internet con-
nection, via the router.
For hints on the protection of wireless networks, please refer to the
respective chapters of this reference manual resp. of the appropriate
device documentation.
8.1.3 The methods
Normally strangers have of course no access to your local area network or to
the workstations belonging to it. Without the appropriate access data or pass-
words nobody can thus access the protected area. If spying out of these access
data is not possible, the attackers will try another way to achieve their goals.
A fundamental starting point is to smuggle data on one of the allowed ways
for data exchange into the network, which opens from the inside the access
for the attacker. Small programs can be transferred on a computer by appen-
dices in e-mails or active contents on web pages, e.g., in order to lead after-
wards to a crash. The program uses the crash to install a new administrator
on the computer, which can then be used from distance for further actions in
the LAN.
If the access via e-mail or www is not possible, the attacker can also look out
for certain services of servers in the LAN, which are useful for his purposes.
Because services of the servers are identified over certain ports of the TCP/IP
105
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
protocol, the search for open ports is also called “port scanning”. On the occa-
sion, the attacker starts an inquiry for particular services with a certain pro-
gram, either generally from the Internet, or, only on certain networks and
unprotected workstations, which in turn will give the according answer.
A third possibility is to access an existing data connection and use it as a free-
rider. The attacker observes here the Internet connection of the victim and
analyses the connections. Then he uses e. g. an active FTP connection to
smuggle his own data packets into the protected LAN.
A variant of this method is the “man-in-the-middle” attack. The attacker
observes here first the communication of two workstations, and gets then in
between.
8.1.4 The victims
The question about the degree of exposure for an attack influences to a con-
siderable degree the expenditure one wants to or must meet for defending. In
order to assess whether your network would be particularly interesting for an
attacker as a potential victim, you can consult the following criteria:
̈ Particulary endangered are networks of common known enterprises or
institutions, where valuable information is suspected. Such information
would be e.g. the results of research departments, which are gladly seen
by industrial spies. Or, on the other hand, bank servers, on which big
money is distributed.
̈ Secondly, also networks of smaller organisations are endangered, which
perhaps are only interesting to special groups. On the workstations of tax
consultants, lawyers or doctors do slumber certainly some information
quite interesting for third persons.
̈ Last but not least also workstations and networks are victims of attackers,
which obviously offers no use for the attackers. Just the “script kiddies”
testing out their possibilities by youthful ambition are sometimes just
searching for defenceless victims in order to practise for higher tasks.
The attack against an unprotected, apparently not interesting workstation
of a private person can also serve the purpose to prepare a basis for fur-
ther attacks against the real destination in a second step. The workstation
of “no interest” becomes source of attacks in a second step, and he
attacker can disguise his identity.
All things considered, we can resume that the statistical probability for an
attack to the network of a global player of the industry may be higher than to
a midget network of the home office. But probably it is only a matter of time
106
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
that a defenceless workstation installed in the Internet will - perhaps even
accidentally - become the victim of attacks.
8.2 What is a Firewall?
The term “Firewall” is interpreted very differently. We want to define at this
point the meaning of “Firewall” within the boundaries of this reference man-
ual:
A Firewall is a compilation of components, which monitors at a central place the data exchange
between two networks. Mostly the Firewall monitors the data exchange between an internal,
local network (LAN), and an external network like the Internet.
The Firewall can consist of hard and/or software components:
̈ In pure hardware systems the Firewall software often runs on a proprie-
tary operating system.
̈ The Firewall software can also run on a conventional workstation, which
is dedicated to this task under Linux, Unix or Windows.
̈ As a third and frequently used alternative, the Firewall software runs
directly within the router, which connects the LAN to the Internet.
In the following sections we only look at the Firewall in a router.
The functions “Intrusion Detection” and “DoS protection“ are part of
the content of a Firewall in some applications. The LANCOM contains
these functions also, but they are realised as separate modules beside
the Firewall.
Further information can be found in the section ’Protection against
break-in attempts: Intrusion Detection’ →page 160 and ’Protection
against “Denial of Service” attacks’ →page 162.
8.2.1 Tasks of a Firewall
Checking data packets
How does the Firewall supervises the data traffic? The Firewall works in prin-
ciple like a door keeper for data packets: Each packet will be checked,
whether it may pass the door of the network (Firewall) in the desired direction
or not. For such a checking different criteria are used, in common language of
Firewalls called “rules” or “guidelines”. Depending on the kind of information,
107
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
which are used for creation of the rules and which are checked during the
operation of the Firewall, one distinguishes different types of Firewalls.
Above all, the aspect of the “central” positioning is very Important: Only when
the entire data traffic between “inside” and “outside” goes through the Fire-
wall, it can fulfil its task reliably under any circumstances. Each alternative
way can reduce or even turn off the security of the Firewall. This central posi-
tion of the Firewall simplifies by the way also the maintenance: One Firewall
as common passage between two networks is certainly easier to maintain
than a “Personal Firewall” on each of the workstations belonging to the LAN.
In principle, Firewalls operate at the interconnection between two or
more networks. For the following explanation, we only look as exam-
ple at the passage between a local network of a company and the
Internet. These explanations can be transferred however in a general
manner also to other network constellations, e.g. for the protection of
a subnetwork of the personnel department of a company against the
remaining network users.
Logging and alerting
An important function of the Firewall is beside the checking of data packets
and the right reaction to the results of this checking also the logging of all
actions triggered by the Firewall. By analyzing these protocols, the adminis-
trator can draw conclusions from the occurred attacks and on the basis of this
information he can, if necessary, go on to improve the configuration of the
Firewall.
But sometimes, logging alone comes too late. Often, an immediate interven-
tion of the administrator can prevent a major danger. That is why Firewalls
have mostly an alerting function, by which the Firewall notifies the adminis-
trator e.g. by e-mail.
8.2.2 Different types of Firewalls
During the last years, the operating principles of Firewalls have more and
more evolved. Under the generic term “Firewall”, a whole range of different
technical concepts is offered to protect the LAN. Here we introduce the most
important ones.
108
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
Packet filters
One speaks about a packet filter-based Firewall, if the router only checks the
details in the header of the data packets and decides on the basis of this infor-
mation, whether the packet may pass or not. The following details belong to
the analyzed information:
̈ IP address of source and destination
̈ Transfer protocol (TCP, UDP or ICMP)
̈ Port numbers of source and destination
̈ MAC address
The rules defined in a packet filter-orientated Firewall determine e.g., whether
the packets may pass on by a special IP address range into the local network,
or whether packets should be filtered for special services (i.e. with special port
numbers). By these measures, the communication with certain workstations,
entire networks or via special services can be reduced or even prevented.
Besides, the rules are combinable, so that e.g. only workstations with special
IP addresses get access to the Internet via the TCP port 80, while this services
remains blocked for all other workstations.
The configuration of packet filtering Firewalls is quite simple, and the list with
the permitted or forbidden packets can be extended very easily. Because also
the performance requirements of a packet filter can be address with quite little
means, the packet filters are often directly implemented in routers, which
operate as interface between the networks anyway.
An unfavourable effect on the packet filters is, that the list of rules becomes
uncomfortable after a while. Besides, for some services the connection ports
are negotiated dynamically. To enable communication then, the administrator
has to leave open all possibly used ports, which is contrary to the basic orien-
tation of most security concepts.
One example for a process, which is quite problematical for simple packet fil-
ters, is the establishing of a FTP connection from a workstation of the own
LAN to a FTP server in the Internet. By the generally used active FTP, the client
(of the protected LAN) sends an inquiry from a port of the upper range
(>1023) to port 21 of the server. The client informs the server, over which port
109
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
it is expecting the connection. The server will establish as a result from its port
20 a connection to the desired port of the client.
Destination
port 21
Source port 4321
Source port 20
Destination port 4322
Client
Server
To enable this process, the administrator of the packet filter must open all
ports for incoming connections, because he does not know in advance for
which port the client will inquire the FTP connection. An alternative is to use
passive FTP. Thereby, the client establishes the connection itself to the server
over a particular port, which was told to the server before. This process is,
however, not supported by all clients/servers.
If we furthermore compare the Firewall with a porter, this door keeper only
checks, whether he knows or not the courier with the packet at the door. If
the courier is known and came ever into the building before, he has the per-
mission to go in without hindrance and without being checked also for all fol-
lowing orders up to the workplace of the addressee.
Stateful Packet Inspection
Stateful Packet Inspection (SPI), or briefly Stateful Inspection, enhances the
packet filter approach by checking further connection state information.
Beside the more static table with the permitted ports and address ranges, a
dynamic table will be kept up in this variant, in which information about the
connection state of the individual connections is held. This dynamic table ena-
bles to first block all endangered ports, and to selectively open only if required
a port for a permitted connection (adjusted by source and destination
address). The opening of ports is always made from the protected network to
the unprotected one, that means mostly from LAN to WAN (Internet). Data
110
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
packets that do not belong to one of the tracked session of the connection
state table will be automatically discarded.
Stateful Inspection: direction-dependent checking
The filter sets of a Stateful Inspection Firewall are - contrary to classical port filter Firewalls -
dependent on their direction. Connections can only be established from source to their desti-
nation point. The other direction would require an explicit filter entry as well. Once a connec-
tion has been established, only the data packets belonging to this connection will be
transmitted - in both directions, of course. So you can block in a reliable way all traffic not
belonging to a known session, not coming from the local network.
Additionally, the Stateful Inspection is able to track from the connection set
up, whether additional channels are negotiated for data exchange or not.
Some protocols like e.g. FTP (for data transfer), T.120, H.225, H.245 and
H.323 (for netmeeting or IP telephony), PPTP (for VPN tunnels) or IRC (for
chatting) signalize when establishing the connection from the LAN to the
Internet by a particular used source port whether they are negotiating further
ports with the remote station. The Stateful Inspection dynamically adds also
these additional ports into the connection state list, of course limited to the
particular source and destination addresses only.
Let’s have once again a look at the FTP download example. When starting the
FTP session, the client establishes a connection from source port '4321' to the
destination port '21' of the server. The Stateful Inspection allows this first set
up, as long as FTP is allowed from local workstations to the outside. In the
dynamic connection state table, the Firewall enters source and destination
and the respective port. Simultaneously, the Stateful Inspection can inspect
the control information, sent to port 21 of the server. These control signals
indicate that the client requires a connection of the server from its port 20 to
port 4322 of the client. The Firewall also enters these values into the dynamic
111
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
table, because the connection to the LAN has been initiated from the client.
Afterwards, the server can send so the desired data to the client.
Source IP
Dest. IP
Sc. port
Dst. port
21
10.0.0.1
80.190.240.17 4321
80.190.240.17 10.0.0.1
20
4322
outgoing connection
permitted incoming connection
unauthorized incoming
connection
Dest. port 4322
Source port 20
IP: 80.146.204.15
But if another workstation from the Internet tries to use the just opened port
4322 of the LAN to file itself data from its port 20 on the protected client, the
Firewall will stop this try, because the IP address of the attacker does not fit
to the permitted connection!
After the successful data transfer, the entries disappear automatically
from the dynamic table and the ports will be closed again.
Moreover, a Firewall with Stateful Inspection is mostly able to re-assemble the
received data packets, that means to buffer the individual parts and to assem-
ble them again to an complete packet. Therefore, complete IP packets can be
checked by the Firewall, rather than individual parts only.
This porter is making a definite better job. When somebody in this company
orders a courier, he must also inform the porter that he is expecting a courier,
when he will be arriving and what information should be found on the delivery
note. Only when this information matches the logbook entries of the porter,
the courier may pass. If the courier brings not only one packet, but rather two,
112
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
only the one with the correct delivery note will pass. Likewise, a second cou-
rier demanding access to the employee will be rejected, too.
Application Gateway
By checking of contents on application level, Application Gateways increase
the address checking of the packet filters and the connection monitoring of
the Stateful Packet Inspection. The Application Gateway runs mostly on a sep-
arate workstation, because of the high demands to the hardware perform-
ance. This workstation is between the local network and the Internet. Seen
from both directions, this workstation is the only possibility to exchange data
with the respective other network. There doesn’t exist any direct connection
between these two networks, but just to the Application Gateway.
Internet
Application gateway
Local network
The Application Gateway is thus a kind of proxy for each of the two networks.
Another term for this constellation is the “dualhomed gateway”, because this
workstation is so to speak at home in two networks.
For each application to be allowed through this gateway, an own service will
be set up, e.g. SMTP for mail, HTTP for surfing the Internet or FTP for data
downloads.
Mail
SMTP
HTTP
FTP
Local network
This service accepts data received by either one of the two sides and depicts
it to the respective other side. What seems to be at first sight a needless mir-
roring of existing data, is on closer examination the far-reaching concept of
113
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Application Gateways: It never exists a direct connection e.g. between a client
of the local network and a server of the Internet. The LAN workstations only
see the proxy, the workstations of the Internet likewise. This physical separa-
tion of LAN and WAN, makes it quite difficult for attackers to intrude into the
protected network.
Applied to the porter example, the packet will be left at the gate, the courier
is not allowed to enter the company premises. The porter takes the packet,
will open it after checking address and delivery note and will control also the
content. When the packet has taken these hurdles successfully, then the com-
pany internal courier will bring it himself to the addressee of the company. He
became proxy of the courier on company premises. The other way around, all
employees, wanting to send a packet, have to inform the porter, which has to
collect the packet at the workstation place and which will hand over the
packet to the ordered courier at the gate.
Functions of Application Gateways are not supported by the
LANCOM, mainly because of the high hardware demands.
8.3 The LANCOM Firewall
After general explanations concerning the dangers of the Internet and the
tasks and types of Firewalls, this chapter describes special functions of the
LANCOM Firewall and concrete configurations.
114
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
8.3.1 How the LANCOM Firewall inspects data packets
The Firewall filters only those data packets out of the entire data stream run-
ning through the IP router of the LANCOM, for which a special treatment has
been defined.
115
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
The Firewall only checks routed data packets!
LAN interfaces
VPN services
Firewall / IDS / DoS / QoS
VPN / PPTP
WAN interfaces
LAN / Switch
IP router
DSLoL
connection via LAN/Switch
WLAN-1
WLAN-2
ADSL
DSL
IP module: NetBIOS, DNS,
DHCP server, RADIUS, RIP,
NTP, SNMP, SYSLOG, SMTP
DMZ
Configuration &
management:
ISDN
WEBconfig, Telnet,
IPX router
LANCAPI
IPX over PPTP/
VPN
The Firewall only checks data packets routed by the IP router of the LANCOM. In general,
these are the data packets, which are exchanged between one of the WAN interfaces and
the internal networks (LAN, WLAN, DMZ).
For example, the communication between LAN and WLAN is normally not carried out by the
router, as long as the LAN bridge allows a direct exchange. Thus the Firewall rules do not
apply here. The same applies to the so-called “internal services” of the LANCOM like Telnet,
TFTP, SNMP and the web server for the configuration with WEBconfig. The data packets of
these services do not run through the router, and therefore aren’t influenced by the Firewall.
Due to the positioning behind the masquerading module (seen from the WAN), the
Firewall operates with the “real” internal IP addresses of the LAN stations, and not
with the outside known Internet address of the LANCOM.
116
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
The LANCOM Firewall uses several lists for checking data packets, which are
automatically generated from Firewall rules, resulting Firewall actions or by
active data connections:
̈ Host block list
̈ Port block list
̈ Connection list
̈ Filter list
When a data packet should be routed via the IP router, the Firewall uses the
lists as follows:
ቢ The first check is, whether the packet was coming from a workstation
belonging to the host block list. If the sender is blocked, the packet will
be discarded.
ባ If the sender is not blocked in this list, the port block list will be checked,
if the used port/protocol combination on the destination PC is closed. In
this case the packet will be discarded.
ቤ If sender and destination are not blocked in the first two lists, then it will
be checked whether a connection entry exists for this packet in the con-
nection list. If such an entry exists, then the packet will be handled as
noted in this list.
ብ If no entry has been found for the packet, then the filter list will be
searched, whether a suitable entry exists and the action indicated in this
117
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
list will be carried out. If the action intends to accept the packet, then an
entry is made in the connection list, as well as for any further actions.
Host blocked?
The Firewall checks with several lists
Port blocked?
Active connection?
Filter list?
VPN services
VPN / PPTP
LAN / Switch
LAN interfaces
IP router
WAN interfaces
DSLoL
connection via
LAN/Switch
Firewall / IDS / DoS / QoS
WLAN-1
WLAN-2
ADSL
IP module: NetBIOS, DNS,
DHCP server, RADIUS, RIP,
NTP, SNMP, SYSLOG, SMTP
DSL
DMZ
Configuration &
management:
ISDN
WEBconfig, Telnet,
IPX router
LANCAPI
IPX over PPTP/
VPN
If no explicit Firewall rule exists for a data packet, the packet will be
accepted (’Allow-All’). That grants a backward-compatibility for exist-
ing installations. For maximum protection by the Stateful Inspection,
please note the section ’Set-up of an explicit "Deny All" strategy’
→page 138.
The four lists obtain their information as follows:
̈ In the host block list are all those stations listed, which are blocked for
a certain time because of a Firewall action. The list is dynamic, new entries
can be added continuously with appropriate actions of the Firewall.
Entries automatically disappear after exceeding the timeout.
̈ In the port block list those protocols and services are filed, which are
blocked for a certain time because of a Firewall action. This list is likewise
118
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
a dynamic one, new entries can be added continuously with the appropri-
ate Firewall actions. Entries automatically disappear after exceeding the
timeout.
̈ For each established connection an entry is made in the connection list,
if the checked packet has been accepted by the filter list. In the connec-
tion list is noted from which source to which destination, over which pro-
tocol and which port a connection is actually allowed. The list contains in
addition, how long an entry will stay in the list and which Firewall rule is
responsible for the entry. This list is very dynamic and permanently “mov-
ing”.
̈ The filter list is made of the Firewall rules. The containing filters are static
and only changed when Firewall rules are added, edited or deleted.
Thus all lists, which are consulted by the Firewall to check data packets, finally
base on the Firewall rules (’Parameters of Firewall rules’ →page 125).
8.3.2 Special protocols
One important point during the connection tracking is the treatment of pro-
tocols that dynamically negotiate ports and/or addresses, over which further
communication is done. Examples of these kinds of protocols are FTP, H.323
or also many UDP-based protocols. Thereby it is necessary that further con-
nections must be opened, additionally to the first connection. See also ’Dif-
ferent types of Firewalls’ →page 108.
UDP connections
UDP is actually a stateless protocol, nevertheless one can speak regarding
UDP-based protocols also of a (only short term) connection, since UDP mostly
carries Request/Response based protocols, with which a client directs its
requests to a well known port of a server (e.g. 53 for DNS), which in turn sends
its responds to the source port selected by the client:
Client port
Connection
Server port
12345
53
Request
12345
53
Response
119
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
However, if the server wants to send larger sets of data (e.g. TFTP) and would
not like or can not differentiate on the well known port between requests and
acknowledges, then it sends the response packets to the source port of the
sender of the original request, but uses as its own source port a free port, on
which it reacts now only to those packets, which belong to the data commu-
nication:
Client port
Connection
Server port
12345
69
Request
12345
12345
12345
54321
54321
54321
Response
Ack/Data
Data/Ack
While the data communication takes place now over the ports 12345 and
54321, the server on the well-known port (69) can accept further requests. If
the LANCOM pursues a "Deny All" strategy, the answer packets of an entry of
the port filter Firewall, which permits only a connection to port 69 of the
server, would simply be discarded. In order to prevent this, when creating the
entry in the connection state database, the destination port of the connection
is kept free at first, and set only with the arrival of the first answer packet,
whereby both possible cases of an UDP connection are covered.
TCP connections
TCP connections cannot be tracked only by examination of the ports. With
some protocols (e.g. FTP, PPTP or H.323) examinations of the utilizable data
are necessary to open all later negotiated connections, and to accept only
those packets belonging really to the connections. This corresponds to a sim-
plified version of IP masquerading, but without addresses or ports to be re-
mapped here. It is sufficient to pursue the negotiation to open appropriate
ports, and link them with the main connection, so that these ports are closed
likewise with the closing of the main connection, and traffic on the secondary
connection keeping open also the main connection.
120
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
ICMP connections
For ICMP two cases must be differentiated: The ICMP request/reply connec-
tions, like to be used with "ping", and the ICMP error messages, which can be
received as an answer to any IP packet.
ICMP request/reply connections can be clearly assigned to the identifier used
by the initiator, i.e. in the status database an entry will be provided with the
sending of an ICMP request, which lets through only ICMP replies with the
correct identifier. All other ICMP replies will get discarded silently.
In ICMP error messages, the IP header and the first 8 bytes of the IP packet
(on behalf UDP or TCP headers) can be found within the ICMP packet. With
the help of this information, the receipt of an ICMP error message triggers
automatically the search for the accessory entry in the status database. The
packet passes only if such an entry exists, otherwise it is discarded silently.
Additionally, potentially dangerous ICMP error messages (redirect route) are
filtered out.
Connections of other protocols
For all other protocols no related connections can be followed up, i.e. with
them only a connection between involved hosts can occur in the status data-
base. These can be initiated also only from one side, unless, in the port filter
Firewall exists a dedicated entry for the "opposite direction".
8.3.3 General settings of the Firewall
Apart from individual Firewall rules, which ensure the entries in the filter, con-
nection and block lists, some settings apply generally to the Firewall:
̈ Firewall/QoS enabled
̈ Default VPN rules (→page 122)
̈ Administrator email (→page 122)
̈ Fragments (→page 122)
̈ Re-establishing of the session (→page 123)
̈ Ping blocking (→page 123)
̈ Stealth mode(→page 124)
̈ Mask authentication port (→page 124)
Firewall/QoS enabled
This option switches on or off the entire Firewall, including Quality of Service
functions.
121
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Please notice that the N:N mapping functions (’N:N mapping’
→page 80) are only active when the Firewall has been switched on!
Default VPN rules
A VPN rule consists, apart from some VPN specific information and among
other things, of the definition of source and destination networks. The infor-
mation about source and destination can get in principle from the IP routing
table, the TCP/IP settings (Intranet addresses and DMZ addresses), or from the
Firewall rules.
Similar to Quality of Service functions, VPN connections also use existing Fire-
wall functions in order to classify e. g. the packets according to their subnet-
works. Therefore, the Firewall is a central source for the VPN rules. It can be
defined in the Firewall whether further sources should be used for the VPN
rules or not. The according option can take on the following values:
̈ Create automatically: With this setting, all available sources for gener-
ating VPN rules will be consulted, i.e. IP routing table, TCP/IP settings and
Firewall rules.
̈ Specify manually: With this setting only the manually specified Firewall
rules are used as base for creating VPN rules.
For detailed information about VPN rules, please see the appropriate
VPN documentation.
Administrator email
One of the actions a Firewall can trigger is alerting of an network administra-
tor via email. The “administrator email” is the email account, to which the
alerting mails are sent to.
Fragments
Some attacks from the Internet try to outsmart the Firewall by fragmented
packets (packets split into several small units). One of the main features of a
Stateful Inspection like in the LANCOM is the ability to re-assemble frag-
mented packets in order to check afterwards the entire IP packet.
You can centrally adjust the desired behaviour of the Firewall. The following
options are available:
̈ Filter: Fragmented packets are directly discarded by the Firewall.
122
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ Route: Fragmented packets are passed on without any further checking
by the Firewall, as long as permitted by valid filter settings.
̈ Re-assemble: Fragmented packets are buffered and re-assembled to
complete IP packets. The re-assembled packets will then be checked and
treated according to the valid filter settings.
Session recovery
The Firewall enters all actual permitted connections into the connection list.
Entries disappear automatically from the connection list after a certain time
(timeout), when no data has been transmitted over this connection any more
re-triggering the timeout.
Sometimes connections are ended according to the general TCP aging set-
tings, before data packets requested by an inquiry have been received by the
remote station. In this case perhaps an entry for a permitted connection still
exists in the connection list, but the connection itself is no more existing.
The parameter “Session recovery” determines the behaviour of the Firewall for
packets that indicate a former connection:
̈ Always denied: The Firewall re-establishes the session under no circum-
stances and discards the packet.
̈ Denied for default route: The Firewall re-establishes the session only if
the packet wasn’t received via the default route (e.g. Internet).
̈ Denied for WAN: The Firewall re-establishes the session only if the
packet wasn’t received over one of the WAN interfaces.
̈ Always allowed: The Firewall re-establishes the connection in principle
if the packet belongs to a former connection of the connection list.
Ping blocking
One - not undisputed - method to increase security is hiding the router. Based
loosely on the method: “Who doesn’t see me neither tries to attack me...”.
Many attacks begin with the searching for workstations and/or open ports by
actual harmless inquiries, e. g. with the help of the “ping” command or with
a portscan. Each answer to these inquiries, even the answer “I’m not here”
indicates to the attacker that he has found a potential destination. Because
anybody who answers must be existing, too. In order to prevent this conclu-
sion, the LANCOM is able to suppress the answers to these inquiries.
In order to achieve this, the LANCOM can be instructed not to answer ICMP
echo requests any more. At the same time TTL-exceeded messages of a "trace
123
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
route" are also suppressed, so that the LANCOM cannot be found, neither by
"ping" nor by "trace route".
Possible settings are:
̈ Off: ICMP answers are not blocked.
̈ Always: ICMP answers are always blocked.
̈ WAN only: ICMP answers are blocked on all WAN connections.
̈ Default route only: ICMP answers are blocked on default route (usually
Internet).
TCP Stealth mode
Apart from ICMP messages, also the behaviour in case of TCP and UDP con-
nections gives information on the existence or non-existence of the addressed
workstation. Depending on the surrounding network it can be useful to simply
reject TCP and UDP packets instead of answering with a TCP RESET resp. an
ICMP message (port unreachable), if no listener for the respective port exists.
The desired behaviour can be adjusted in the LANCOM.
If ports without listener are hidden, this generates a problem on
masked connections, since the "authenticate" - resp. "ident" service
does no longer function properly (resp. do no longer correctly reject).
The appropriate port can so be treated separately (’Mask authentica-
tion port’ →page 124).
Possible settings are:
̈ Off: All ports are closed and TCP packets are answered with a TCP reset.
̈ Always: All ports are hidden and TCP packets are silently discarded.
̈ WAN only: On the WAN side all ports are hidden and on the LAN side
closed.
̈ Default route only: Ports are hidden on the default route (usually Inter-
net) and closed on all other routes.
Mask authentication port
When TCP or UDP ports are hidden, inquiries of mail servers to authenticate
users can no more be answered correctly. Inquiries of the servers run into a
timeout, and delivery of mails will be considerably delayed.
Also when the TCP Stealth mode is activated, the Firewall detects the intention
of a station in the LAN to establish a connection to a mail server. As a result,
124
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
the needed port will be opened for a short time (20 seconds) solely for the
authentication inquiry.
This behaviour of the Firewall in TCP Stealth mode can be suppressed specif-
ically with the parameter “Always mask authentication port, too“.
The activation of the option “Mask authentication port“ can lead to
considerable delays for the dispatch and receipt of e. g. e-mails or
news!
A mail or a news server, which requests any additional information from the
user with the help of this service, runs first into a disturbing timeout, before it
begins to deliver the mails. This service needs thus its own switch to hide and/
or to hold it “conformingly”.
The problem thereby is however that a setting, which hides all ports, but
rejects the ident port is unreasonable - alone by the fact that rejecting the
ident port would make the LANCOM visible.
The LANCOM offers now the possibility to reject ident inquiries only by mail
and news servers, and to discard those of all other PCs. For this, the ident
inquiries of the respective servers are rejected for a short time (20 seconds)
when a mail (SMTP, POP3 IMAP2) or a news server (NNTP) is calling up.
When the timeout is exceeded, the port will be hidden again.
8.3.4 Parameters of Firewall rules
In this section we describe the components of Firewall rules and the available
options to set up the different parameters.
Information regarding definition of Firewall rules with the different
kinds of configuration tools (LANconfig, WEBconfig or Telnet) can be
found in chapter ’Configuration of Firewall rules’ →page 141.
Components of a Firewall rule
A Firewall rule is at first defined by its name and some further options:
̈ On/Off switch: Is the rule active for the Firewall?
̈ Priority: Which is the priority of the rule? (→page 126)
̈ Observe further rules: Should further Firewall rules be observed when
this rule applies to a data packet? (→page 126)
125
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ Create VPN rule: Is this Firewall rule also used to create a VPN rule?
(→page 127)
Priority
When setting up the filter list of the Firewall rules, the LANCOM will automat-
ically sort the entries. Thereby the “grade of detail“ will be considered: All
specified rules are observed at first, after that the general ones (e. g. Deny All).
If after the automatic sorting the desired behaviour of the Firewall does not
turn out, it is possible to change the priority manually. The higher the priority
of the Firewall rule, the earlier it will be placed in the according filter list.
For complex rule types please check the filter list as described in sec-
tion ’Firewall diagnosis’ →page 151.
Observe further rules
There are requirements to a Firewall, which cannot be covered by a single rule.
If the Firewall is used to limit the Internet traffic of different departments (in
own IP subnetworks), individual rules cannot e.g. illustrate the common upper
limit at the same time. If to everyone of e.g. three departments should be
granted a bandwidth of maximal 512 kbps, but the entire data rate of the
three departments should not exceed a limit of 1024 kbps, then a multi-level
checking of the data packets must be installed:
̈ In a first step it will be checked, if the actual data rate of the individual
department does not exceed the limit of 512 kbps.
̈ In a second step it will be checked, if the data rate of all departments
together does not exceed the overall limit of 1024 kbps.
Normally the list of the Firewall rules is applied sequentially to a received data
packet. If a rule applies, the appropriate action will be carried out. The check-
ing by the Firewall is terminated then, and no further rules will be applied to
the packet.
In order to reach a two-stage or multi-level checking of a data packet, the
“Observe further rules option“ will be activated for the rules. If a Firewall rule
with activated observation of further rules applies to a data packet, the appro-
priate action will be carried out at first, but then the checking in the Firewall
will continue. If one of the further rules applies also to this data packet, the
action being defined in this rule will also be carried out. If also for this follow-
ing rule the observe further rules option is activated, the checking will be con-
tinued until
126
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ either a rule applies to the packet, for which observe further rules is not
activated.
̈ or the list of the Firewall rules has been completely worked through with-
out applying a further rule to the packet.
To realize this aforementioned scenario it is necessary to install for each sub-
network a Firewall rule that rejects from a data rate of 512 kbps up additional
packets of the protocols FTP and HTTP. For these rules the observe further rules
option will be activated. Defined in an additional rule for all stations of the
LAN, all packets will be rejected which exceed the 1024 kbps limit.
VPN rules
As described in section ’Default VPN rules’ →page 122, a VPN rule can
receive its information about source and destination network from Firewall
rules.
By activating the option “This rule is used to create VPN rules” for a Firewall
rule, you determine that a VPN rule will be derived from this Firewall rule.
For detailed information about VPN rules please see the appropriate
VPN documentation.
Apart from this basic information, a Firewall rule answers the question when
and/or on what it should apply to and which actions should be executed:
̈ Stations / Service: To which stations/networks and services/protocols
does the rule refer to? (→page 128)
̈ Conditions: Is the effectiveness of the rule reduced by other conditions?
(→page 129)
̈ Trigger: On exceeding of which threshold shall the rule being triggered?
(→page 130)
̈ Action: What should happen to the data packets when the condition
applies and the limit is reached? (→page 130)
̈ Further measures: Should further measures be initiated apart from the
packet action? (→page 130)
̈ Quality of Service (QoS): Are data packets of certain applications or
with the corresponding markings transferred preferentially by assurance
of special Quality of Services? (→page 131)
Condition, limit, packet action and other measures form together a
so-called “action set”. Each Firewall rule can contain a number of
127
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
action sets. If the same trigger is used for several action sets, the
sequence of action sets can be adjusted.
In section ’How the LANCOM Firewall inspects data packets’ →page 115 we
have already described that in the end the lists for checking data packets are
created from Firewall rules. Thus the extension of the block diagram looks like
as follows:
Structure of the Firewall rules
Connection
Condition
Limit/trigger
Packet action
Host?
Port?
Connection?
Filter?
Other
QoS
VPN services
VPN / PPTP
LAN / Switch
LAN interfaces
IP router
WAN interfaces
DSLoL
connection via
LAN/Switch
Firewall / IDS / DoS / QoS
WLAN-1
WLAN-2
ADSL
IP module: NetBIOS, DNS,
DHCP server, RADIUS, RIP,
NTP, SNMP, SYSLOG, SMTP
DSL
DMZ
Configuration &
management:
ISDN
WEBconfig, Telnet,
IPX router
LANCAPI
IPX over PPTP/
VPN
Connection
The connection of a Firewall rule defines to which data packets the rule should
refer to. A connection is defined by its source, its destination and the used
services. The following details can be used to specify the source or destina-
tion:
̈ All stations
128
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ The entire local network (LAN)
̈ Certain remote stations (described by the name of the name list)
̈ Certain stations of the LAN described by the host name)
1
̈ Certain MAC addresses
̈ Ranges of IP addresses
̈ Complete IP networks
You can only operate with host names, when your LANCOM is able to trans-
form the names into IP addresses. For that purpose the LANCOM must have
learned the names via DHCP or NetBIOS, or the assignment must be entered
staticly in the DNS or IP routing table. An entry in the IP routing table can
therefore assign a name to a whole network.
If the source or the destination for a Firewall rule has not been deter-
mined at greater detail, the rule applies generally to data packets
“from all stations” resp. “to all stations”.
The service is determined by the combination of an IP protocol with respective
source and/or destination port. For frequently used services (www, mail, etc.)
the appropriate combinations are already predefined in the LANCOM, others
can be compiled additionally as required.
Condition
The effectiveness of a Firewall rule is also reduced with additional conditions.
The following conditions are available:
̈ Only packets with certain ToS and/or DiffServ markings.
̈ Only, if the connection does not yet exist.
̈ Only for default route (Internet).
̈ Only for VPN routes.
1. MAC is the abbreviation for Media Access Control and it is the crucial factor for communi-
cation inside of a LAN. Every network device has its own MAC address. MAC addresses are
worldwide unique, similar to serial numbers. MAC addresses allow distinguishing between
the PCs in order to give or withdraw them dedicated rights on an IP level. MAC addresses
can be found on most networking devices in a hexadecimal form (e.g. 00:A0:57:01:02:03).
129
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Limit / Trigger
The limit or trigger describes a quantified threshold value that must be
exceeded on the defined connection before the filter action gets executed for
a data packet. A limit is composed by the following parameters:
̈ Unit (kbit, kbyte or packets)
̈ Amount, that means data rate or number.
̈ Reference value (per second, per minute, per hour or absolute)
Additionally, you can adjust for the limit whether it refers to a logical connec-
tion or to all connections together, which exist between the defined destina-
tion and source stations via the corresponding services. Thus it is controlled
whether the filter takes effect, if e.g. all HTTP connections of the users in the
LAN exceed the limit in sum, or whether it is sufficient that only one of the
parallel established HTTP connections exceeds the threshold value.
For absolute values it is additionally possible to specify whether the counter
belonging to it will be reset to zero when the limit has been reached.
In any case, data will be transferred if a limit has not been reached
yet! With a trigger value of zero a rule becomes immediately active, as
soon as data packets arrive for transmission on the specified connec-
tion.
Packet action
✔
The Firewall has three possibilities to treat a filtered packet:
̈ Transmit: The packet will be transferred normally.
̈ Drop: The packet will be discarded silently.
̈ Reject: The packet will be rejected, the addressee receives an appropriate
message via ICMP.
Further measures
The Firewall does not only serve to discard or accept the filtered data packets,
but it can also take additional measures when a data packet has been regis-
tered by the filter. The measures here are devided into the fields “protocolling/
notification” and “prevent further attacks”:
̈ Send a Syslog message: Sends a message via the SYSLOG module to a
SYSLOG client, as defined in configuration field “Log & Trace”.
̈ Send an email message: Sends an email message to the administrator,
using the account specified in the configuration field “Log & Trace”.
130
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ SNMP/LANmonitor: Sends a SNMP trap, that will be analyzed e. g. by
LANmonitor.
Each of these three message measures leads automatically to an entry
in the Firewall event table.
̈ Disconnect: Cuts the connection, over which the filtered packet has been
received.
On the occasion, the physical connection will be cut off (e. g. the
Internet connection), not only the logical connection between the two
involved PCs!
̈ Lock source address: Blocks the IP address from that the filtered packet
has been received for a given time.
̈ Lock target port: Blocks the destination port to that the filtered packet
has been sent for a given time.
Quality of Service (QoS)
Apart from the restrictions for the transfer of data packets, the Firewall can
also concede a “special treatment” to certain applications. QoS settings use
features of the Firewall to specifically identify data packets of certain connec-
tions or services.
For further information about QoS and the appropriate configuration
please see chapter ’Quality of Service’ →page 168.
8.3.5 Alerting functions of the Firewall
This paragraph describes the Firewall alerts in detail that are sent on security-
relevant events. The following message types are available:
̈ Email notification
̈ SYSLOG report
̈ SNMP trap
Alerts are triggered either separately by the intrusion detection system, by the
denial of service protection or by arbitrary trigger conditions specified in the
131
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Firewall. The specific parameters for the different alerting types such as the
relevant email account can be set at the following places:
Configuration tool Run
LANconfig
WEBconfig
Log & Trace SMTP Account SNMP SYSLOG
Expert Configuration Setup SMTP SNMP Module SYSLOG
Module
Terminal/Telnet
/Setup/SMTP resp. SNMP Module or SYSLOG Module
An example:
Let us assume a filter named 'BLOCKHTTP', which blocks all access to a HTTP
server 192.168.200.10. In case some station would try to access the server
nevertheless, the filter would block any traffic from and to this station, and
inform the administrator via SYSLOG also.
SYSLOG notifications
If the Firewall drops an appropriate packet, a SYSLOG notification is created
(see ’Setting up the SYSLOG module’ →page 288) as follows:
PACKET_ALERT:
Dst:
192.168.200.10:80
{},
Src:
10.0.0.37:4353 {} (TCP): port filter
Ports are printed only for port-based protocols. Station names are printed, if
the LANCOM can resolve them directly (without external DNS request).
If the SYSLOG flag is set for a filter entry (%saction), then this notification
becomes more detailed. Then the filter name, the exceeded limit and the filter
action carried out are printed also. For the example above this should read as:
PACKET_ALERT:
Dst:
192.168.200.10:80
{},
Src:
10.0.0.37:4353 {} (TCP): port filter
PACKET_INFO:
matched filter: BLOCKHTTP
exceeded limit: more than 0 packets transmitted or received
on a connection
actions: drop; block source address for 1 minutes; send
syslog message;
Notification by email
If the email system of the LANCOM is activated, then you can use the com-
fortable notification by email:
132
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
FROM: [email protected]
SUBJECT: packet filtered
Date: 9/24/2002 15:06:46
The packet below
Src:
10.0.0.37:4353
{cs2}
Dst:
192.168.200.10:80
{ntserver} (TCP)
45 00 00 2c ed 50 40 00 80 06 7a a3 0a 00 00 25 | E..,.P@.
..z....%
c0 a8 c8 0a 11 01 00 50 00 77 5e d4 00 00 00 00 | .......P
.w^.....
60 02 20 00 74 b2 00 00 02 04 05 b4 | `. .t... ....
matched this filter rule: BLOCKHTTP
and exceeded this limit: more than 0 packets transmitted
or received on a connection
because of this the actions below were performed:
drop
block source address for 1 minutes
send syslog message
send SNMP trap
send email to administrator
Notification by SNMP trap
If as notification method dispatching SNMP traps was activated (see also
’Configuration using SNMP’ →page 20), then the first line of the logging
table is sent away as enterprise specific trap 26. This trap contains additionally
the system descriptor and the system name from the MIB-2.
For the example the following trap is thus produced:
SNMP: SNMPv1; community = public; SNMPv1 Trap; Length = 443
(0x1BB)
SNMP: Message type = SNMPv1
SNMP: Version = 1 (0x0)
SNMP: Community = public
SNMP: PDU type = SNMPv1 Trap
SNMP: Enterprise = 1.3.6.1.4.1.2356.400.1.6021
SNMP: Agent IP address = 10.0.0.43
133
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
SNMP: Generic trap = enterpriseSpecific (6)
SNMP: Specific trap = 26 (0x1A)
SNMP: Time stamp = 1442 (0x5A2)
SNMP: OID = 1.3.6.1.2.1.1.1.0 1.
System descriptor
SNMP: String Value = LANCOM Business 6021 2.80.0001 /
23.09.2002 8699.000.036
Device string
SNMP: OID = 1.3.6.1.2.1.1.5.0 2. System-Name
SNMP: String Value = LANCOM Business 6021
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.2.1 3.
SNMP: String Value = 9/23/2002 17:56:57
Time stamp
Source address
Destination address
Protocol (6 = TCP)
Source port
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.3.1 3.
SNMP: IP Address = 10.0.0.37
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.4.1 4.
SNMP: IP Address = 192.168.200.10
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.5.1 5.
SNMP: Integer Value = 6 (0x6) TCP
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.6.1 6.
SNMP: Integer Value = 4353 (0x1101)
Destination port
(80 = HTTP)
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.7.1 7.
SNMP: Integer Value = 80 (0x50)
Name of the filter
rule
SNMP: OID = 1.3.6.1.4.1.2356.400.1.6021.1.10.26.1.8.1 8.
SNMP: String Value = BLOCKHTTP
This trap and all different in the LANCOM generated traps are sent to
all manually configured trap receivers, just like to each registered
LANmonitor, which can evaluate this and possibly all other traps.
8.3.6 Strategies for Firewall settings
Firewalls are the interface between networks, and they restrict to a smaller or
larger extent an unhindered data exchange. Thus Firewalls have opposite
objectives than networks, although they are a part of them: networks should
connect workstations, Firewalls should prevent the connection.
134
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
This contradiction shows the dilemma of the responsible administrators who
have developed subsequently different strategies to solve this problem.
Allow All
The Allow All strategy favours unhindered communication of the employees
compared over security. Any communication is allowed at first, the LAN is still
open for attackers. The LAN becomes gradually more secured by configuration
of the administrator, by settings of more and more new rules, which restrict or
prevent parts of communication.
Deny All
The Deny All strategy proceeds at first according to the method “Block all!”.
The Firewall blocks completely the communication between the protected
network and the rest of the world. In a second step, the administrator opens
address ranges or ports, which are necessary e.g. for daily communication
with the Internet.
This approach ensures superior security for the LAN security compared to the
Allow All strategy, but may lead especially in its initial stages to difficulties for
the users. After activation of the Deny All strategy, some things just may
behave differently than before, some stations may not reached any more etc.
Firewall with DMZ
The demilitarized zone (DMZ) is a special range of the local network, which is
shielded by a Firewall both against the Internet and against the normal LAN.
All stations or servers that should be accessible from the unsecured network
(Internet) should be placed into this network. These include for example own
FTP and web servers.
The Firewall protects at first the DMZ against attacks from the Internet. Addi-
tionally, the Firewall protects also the LAN against the DMZ. To do so, the Fire-
wall is configured in this way that only the following accesses are possible:
̈ Stations from the Internet can access to the servers in the DMZ, but no
access from the Internet to the LAN is possible.
̈ The stations of the LAN can access the Internet, as well as servers in the
DMZ.
̈ Servers of the DMZ have no access to the stations of the LAN. That guar-
antees that no “cracked” server of the DMZ becomes a security risk for the
LAN.
135
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Local network
DMZ
FTP server
Web server
Internet
Some LANCOM models support this structure by a separate LAN interface only
used for the DMZ. Looking at the path of data through the LANCOM, then the
function of the Firewall for shielding the LAN against the DMZ becomes visi-
ble.
VPN services
VPN / PPTP
Firewall / IDS / DoS / QoS
LAN / Switch
LAN interfaces
IP router
WAN interfaces
DSLoL
connection via
LAN/Switch
WEP WLAN-1
WEP WLAN-2
IP module: NetBIOS, DNS,
ADSL
DHCP server, RADIUS, RIP,
DSL
NTP, SNMP, SYSLOG, SMTP
DMZ
Configuration &
ISDN
management:
WEBconfig, Telnet,
IPX router
LANCAPI
IPX over PPTP/
VPN
136
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
A direct data exchange between LAN and DMZ via LAN bridge is not possible
if a dedicated DMZ port is used. The path from LAN to DMZ and vice versa is
therefore only possible through the router, and thus also only through the
Firewall! This shields the LAN against inquiries from the DMZ, similar to the
LAN against inquiries from the Internet.
The shielding of the DMZ against the Internet on one side and the LAN
on the other is solved in many network structures with two separate
Firewalls. When using a LANCOM with DMZ port, only one device for
this setup is needed, which e.g. results in a clearly simplified config-
uration.
8.3.7 Hints for setting the Firewall
The LANCOM Firewall is an extremely flexible and powerful tool. In order to
help you to creating individual Firewall rules, you'll find in the following some
hints for your specific application.
The default settings of the Firewall
On delivery there is exactly one entry in the Firewall rule table: “WINS”. This
rule prevents unwanted connection set-ups on the default route (gen. to the
Internet) by the NetBIOS protocol. Windows networks send inquiries in regular
intervals into the network to find out if known stations are still available. This
leads in case of a time-based account of a network coupling to unwanted
connection set-ups.
The LANCOM can prevent this by the integrated NetBIOS proxy also
for network couplings, by pretending an answer for the concerned
resource, until a real access takes place.
Security by NAT and Stateful Inspection
If no further Firewall rule will be entered, the local area network is protected
by the interaction of Network Address Translation and Stateful Inspection:
Only connections from the local area network produce an entry in the NAT
table, whereupon the LANCOM opens a communication port. The Stateful
Inspection supervises communication via this port: Only packets, which
belong exactly to this connection may communicate via this port. For accesses
from the outside to the local network results thus an implicit "Deny All" strat-
egy.
137
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
If you operate a web server in your LAN, that has been permitted
access to this service from the outside (see ’The hiding place—IP
masquerading (NAT, PAT)’ →page 74), stations from the Internet can
establish from the outside connections to this server. The inverse mas-
querading has priority over the Firewall in this case, as long as no
explicit "Deny All" rule has been set.
Set-up of an explicit "Deny All" strategy
For maximum protection and optimum control of the data traffic it is recom-
mended to prevent first any data transfer by the Firewall. Then only the nec-
essary functions and communication paths are allowed selectively. This offers
e.g. protection against so-called "Trojans" and/or e-mail viruses, which set up
actively an outgoing connection on certain ports.
Deny All: The most important Firewall rule!
The Deny All rule is by far the most important rule to protect local networks. By this rule the
Firewall operates according to the principle: “All actions, which are not explicitly allowed,
remain forbidden!“ Only by this strategy the administrator can be sure not to have “forgotten”
an access method, because only those accesses exist, which have been opened explicitly by
himself.
We recommend to set up the Deny All rule before connecting the LAN via a LANCOM to the
Internet. Then you can analyse in the logging table (to start e. g. via LANmonitor), which con-
nection attempts have been blocked by the Firewall. With the help of this information the Fire-
wall and the “Allow rules“ can be gradually extended.
Some typical applications are shown in the following.
All filters described here can be installed very comfortably with the
Firewall wizard, and if necessary be further refined with e.g.
LANconfig.
138
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
̈ Example configuration “Basic Internet”
Rule name
Source
Destination Action
Service
(target
port)
ALLOW_HTTP
ALLOW_FTP
Local network
Local network
All stations
All stations
All stations
transmit
transmit
transmit
transmit
transmit
HTTP, HTTPS
FTP
ALLOW_EMAIL Local network
MAIL, NEWS
DNS
ALLOW_DNS_F IP address of
ORWARDING
DENY_ALL
LANOM (or: Local
network)
All stations
reject
reject
ANY
̈ If you want to permit a VPN dial-in to a LANCOM acting as VPN gateway,
then you need a Firewall rule allowing incoming communication from the
client to the local network:
Rule
Source
Destination Action Service
ALLOW_VPN_DIAL_IN remote site name Local network transmit ANY
̈ In case a VPN is not terminated by the LANCOM itself (e.g. a VPN Client
in the local area network, or LANCOM as Firewall in front of an additional
VPN gateway), you'd have to allow IPSec and/or PPTP (for the "IPSec over
PPTP" of the LANCOM VPN Client) ports additionally:
Rule
Source
Destination
Action
Service
(target port)
ALLOW_VPN
VPN Client
VPN Server
transmit
IPSEC, PPTP
̈ For ISDN or V.110 dial-in (e.g. by HSCSD mobile phone) you have to allow
the particular remote site (see also ’Configuration of remote stations’
→page 89):
Rule
Source
Destination
Action Service
ALLOW_DIAL_IN
remote site name
Local network
transmit
ANY
139
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ For a network coupling you permit additionally the communication
between the involved networks:
Rule
Source Destination
Action
transmit
transmit
Service
ANY
ALLOW_LAN1_TO_LAN2
ALLOW_LAN2_TO_LAN1
LAN1
LAN2
LAN2
LAN1
ANY
̈ If you operate e.g. an own web server, you selectively allow access to the
server:
Rule
Source Destina-
tion
Action
Service
(target port)
ALLOW_WEBSERVER
ANY
Webserver
transmit
HTTP, HTTPS
̈ For diagnostic purposes it is helpful to allow ICMP protocols (e.g. ping):
Rule
Source
Destination
Action
Service
ALLOW_PING
Local network
ANY
transmit
ICMP
These rules can now be refined as needed - e.g. by the indication of minimum
and maximum bandwidths for the server access, or by a finer restriction on
certain services, stations or remote sites.
The LANCOM automatically sorts Firewall rules when creating the fil-
ter list. Thereby, the rules are sorted into the filter list on the basis of
their level of detail. First all specific rules are considered, afterwards
the general ones (e.g. Deny All). Examine the filter list in case of com-
plex rule sets, as described in the following section.
140
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
LANconfig
The filters can be installed very comfortably with LANconfig. Starting from the
general register card "Firewall / QoS / Rules", you reach after "Add" or "Edit"
the dialogue to define the Firewall rules:
Within the dialogue for the definition of filter rules, the following options can
be found on different index cards:
̈ General: Here the name of the Firewall rule is specified, as well as if fur-
ther rules should be considered after this rule matched, and whether a
VPN rule should be derived from this rule.
142
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
୴ The option 'Observe further rules ...' can be used to create complex
functions ensuring e.g. certain bandwidths with QoS (’Connection’
→page 128)
୴ The option 'This rule is used to create VPN rules' enables to utilize the
information about source and destination networks of this rule also to
define VPN networks (’Default VPN rules’ →page 122).
̈ Actions: Here the Firewall actions are defined, consisting of condition,
trigger, packet action and further measures.
̈ QoS: Here you can assign minimum bandwidths for data packets speci-
fied by according Firewall rules (see also ’Defining minimum and maxi-
mum bandwidths’ →page 185).
143
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ Stations: Here the stations – as sender or addressee of the packets – are
specified, for which the filter rule shall match.
̈ Services: Here the IP protocols, source and destination ports are specified
for which the filter rule shall apply. For example, it can be specified here
that only access to web pages and emails shall be permissible.
144
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
WEBconfig, Telnet
Under WEBconfig or Telnet the Firewall rules are configured in the following
menus and lists:
Configuration tool Run
WEBconfig
Expert Configuration / Setup / IP Router Module/ Firewall: Rule
Table, Object Table, Actions Table
Terminal/Telnet
Setup / IP Router Module/ Firewall / Rule Table, Object Table,
Actions Table
There is a special syntax in LCOS for the description of the Firewall rules. This
syntax allows to describe also complex relations for checking and treatment
of data packets within the Firewall just with a few characters.
Rules are defined in the rule table. Pre-defined objects can be saved in two
additional tables in order to prevent entering frequently used objects each
time again in LCOS syntax:
̈ The action table contains Firewall actions
̈ The object table contains stations and services
Objects from these tables can be used for rule definition, but this is
not a must. They simply facilitate the use of frequently used objects.
Rule table
The rule table combines different information to a Firewall rule. The rule con-
tains the protocol to be filtered, the source, the destination as well as the Fire-
wall action to be executed. For each Firewall rule there is an additional on/off-
switch, a priority, the option for a linkage with other rules and an activation
of the rule for VPN connections. General information concerning these param-
eters can be found in section ’Parameters of Firewall rules’ →page 125.
The definition of the Firewall rules can be composed of entries of the object
table for protocols, services, stations (→page 146), and of entries of the
145
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
action table for Firewall actions(→page 147). It can also contain direct
descriptions in the appropriate LCOS syntax (e. g. %P6 for TCP).
For direct entering of rule parameters in LCOS syntax, the same guide-
lines apply as described in the following sections for protocols, source
and destination, as well as for Firewall actions.
Object table
The object table defines elements and objects that apply to the rule table of
the Firewall. Objects can be:
̈ Single PCs (MAC or IP address, host name)
̈ Entire networks
̈ Protocols
̈ Services (ports or port ranges, e. g. HTTP, Mail&News, FTP, ...)
Any combination of these elements is possible. Furthermore, objects can be
defined hierarchically. So one can first define objects for TCP and UDP proto-
cols, then objects for e.g. FTP (= TCP + ports 20 and 21), HTTP (= TCP + port
80) and DNS (= TCP, UDP + port 53). All these single objects can be assembled
subsequently into a new object, which contains all previously defined single
objects then.
146
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
Stations and services can be described according to the following rules in the
object table:
Description
Local network
Remote stations
Object ID
%L
Examples and notes
%H
Name must be in DSL /ISDN /PPTP or
VPN name list
Host name
MAC address
IP address
%D
%E
%A
Note advice for host names (→page 129)
00:A0:57:01:02:03
%A10.0.0.1, 10.0.0.2;
%A0 (all addresses)
Netmask
%M
%P
%S
%M255.255.255.0
%P6 (for TCP)
Protocol (TCP/UDP/ICMP etc.)
Service (port)
%S20-25 (for ports 20 to 25)
Equal identifier can generate comma-separated lists as for example host lists/
address lists (%A10.0.0.1, 10.0.0.2), or hyphen-separated ranges like port
ranges (%S20-25). The occurrence of a "0" or an empty string represents the
’any’ object.
When configuring via console (Telnet or terminal program), the com-
bined parameters (port, destination, source) must be embraced with
inverted commas (character ").
Action table
As described above, a Firewall action consists of condition, limit, packet
action and further measures. In the action table Firewall actions are composed
as any combination of the following elements:
147
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ Conditions
Condition
Description
Object
ID
Connect filter
DiffServ filter
The filter is active when no physical connection to the
packet destination exists.
@c
The filter is active when the packet contains the indicated @d (plus
Differentiated Services Code Point (DSCP) (’Evaluating
DSCP)
ToS and DiffServ fields’ →page 183.
Internet filter
VPN filter
The filter is active when the packet is received or will be
transmitted via default route.
@i
The filter is active when the packet is received or will be
transmitted via VPN connection.
@v
If no further actions are specified in a “connect” or “Internet” filter, then
implicitly a combination of these filters with the “reject” action is
assumed.
̈ Limits/Trigger
Each Firewall action can be tied together with a limit, whose excess leads
to the triggering of the action. Also, several limits for a filter thereby can
build action chains.
Limit objects are generally introduced by %L, followed by:
୴ Reference: per connection (c) or globally (g)
୴ Kind: Data rate (d), number of packets (p) or packet rate (b)
୴ Value of the limit
୴ Further parameters (e. g. period and quantity)
The following limitations are available:
Limit
Description
Object
ID
Data (abs)
Data (rel)
Absolute number of kilobytes on the connection after
which the action is executed.
%lcd
Number of kilobytes/second, minute, hour on the con-
nection after which the action is executed.
%lcds
%lcdm
%lcdh
Packet (abs)
Absolute number of packets on the connection after
which the action is executed.
%lcp
148
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
Limit
Description
Object
ID
Packet (rel)
Number of packets/second, minute, hour on the connec- %lcps
tion after which the action is executed.
%lcpm
%lcph
Global data
(abs)
Global data (abs): Absolute number of kilobytes received %lgd
from the destination station or sent to it, after which the
action is executed.
Global data (rel) Number of kilobytes/second, minute or hour received
%lgds
from the destination station or sent to it, after which the %lgdm
action is executed.
%lgdh
Global packet
(abs)
Absolute number of packets received from the destina-
tion station or sent to it, after which the action is exe-
cuted.
%lgp
Global packet
(rel)
Number of packets/second, minute or hour received
%lgps
from the destination station or sent to it, after which the %lgpm
action is executed.
%lgph
Receive option
Limit restriction to the direction of reception (this affects %lgdsr
in the context with above limitations). In the ID object
column, examples are indicated.
%lcdsr
Transmit option Limit restriction to the sending direction (this affects in
%lgdst
the context with above limitations). In the ID object col- %lcdst
umn, examples are indicated.
If an action is given without any associated limit, then implicitly a
packet limit is assumed that is immediately exceeded with the first
packet.
̈ Packet action
Packet
action
Description
Object
ID
Accept
Reject
The packet will be accepted.
%a
%r
The packet will be rejected with the corresponding error
message.
Drop
The packet will be discarded silently.
%d
These packet actions can be combined arbitrarily. If you choose absurd or
ambiguous actions (e. g.: Accept + Drop), then the more secured action
will be taken (here: “Drop”).
149
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ Further measures
Measure
Description
Object
ID
Syslog
Gives a detailed notification via SYSLOG.
Sends an email to the administrator.
Sends a SNMP trap.
%s
Mail
%m
%n
%p
%h
SNMP
Close port
Deny host
Disconnect
Closes the destination port for a given time.
Locks out the sender address for a given time.
Disconnects the connection to the remote site from which %t
the packet was received or sent.
Zero limit
Resets the limit counter to 0 again upon exceeding of the %z
trigger threshold.
Fragmenta-
tion
Forces a fragmentation of all packets not matching to the %f
rule.
If the "close port" action is executed, an entry in a block list is made, by
which all packets, which are sent at the respective computer and port, get
rejected. For the "close port" object a timeout can be given in seconds,
minutes or hours, which is inserted directly behind the object ID. This time
value is composed of the designator of the time unit (h, m, s for hour,
minute and second), and the actual time. Thus e.g. %pm10 closes a port
for 10 minutes. If no time unit is provided, then implicitly "minutes" apply
(and thus %p10 is equivalent to %pm10).
If the "Deny host" action is executed, then the sender of the packet is reg-
istered in a block list. Starting from this moment, all packets received from
the blocked server will be rejected. Also the "Deny host" object can be
provided with a time-out, which is formed similarly to the "CLOSE port"
option.
If you want to limit e.g. the permissible data rate for a connection to 8 kbps
and to lock out the aggressor committing a flooding attempt, and furthermore
150
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
send at the same time an email to the administrator, then the description of
the object for the action reads as follows:
̈ This description permits traffic (%a) at the beginning. A simple %a at the
beginning of the description is equivalent to a %lp0%a (= accept, if the
limit was exceeded on zero packets, i.e. with the first packet).
̈ If over the current connection now 8 kbit (%lcds8) is transferred in one
second, then all further packets - up to the expiration of the second - will
be silently discarded (%d), thus automatically creating a Traffic Shaping.
̈ If 100 packets for the server (destination address of the connection) arrive
(
%lgbs100) in one second, then the remote host (source address) is
locked for 10 minutes (%h10), and an email is sent to the administrator
%m) .
(
Similar to the address and service objects of the object table, action objects
can be provided with a name, and can arbitrarily be combined recursively,
whereby the maximum recursion depth is limited to 16. In addition, they can
be entered directly into the action field of the rule table.
When building the actual filter table, action objects get minimized similarly to
the address and service objects to the smallest necessary number, i.e. multiple
definitions of an action get eliminated, and contradictory actions are turned
into the "safest". Thus e.g. %a(accept) and %d(drop) becomes only %d,and
%r(reject) and %dbecomes %r.
8.3.9 Firewall diagnosis
All events, conditions and connections of the Firewall can be logged and
monitored in detail.
The most comfortable inspection is accomplished by displaying the logging
table (see below) with LANmonitor. LANmonitor displays under ’Firewall’ the
151
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
last five events, that were triggered either by a Firewall rule, the DoS, or the
IDS system with activated ’SNMP/LANmonitor’ option.
A new window with the complete logging table opens by clicking the right
mouse button in the Firewall Event Log context menu. (→page 152).
All lists and tables described in this section can be found under the following
menu options:
Configuration tool
Run
WEBconfig
Expert Configuration Status IP-Router-Statistics
Terminal/Telnet
/Status/IP-Router-Statistics
The Firewall table
If an event occurred that had to be logged in either way, i.e. a log action was
specified with the receipt of a packet, or a report by e-mail, Syslog or SNMP
was generated, then this event is held in the logging table.
152
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
If you call up the logging table via LANmonitor, it looks like the following
depiction:
If you call up the logging table via WEBconfig, it looks like the following
depiction:
The table contains the following values:
Element
Idx.
Element meaning
Current index (so that the table can be polled also via SNMP)
System time
System time in UTC codification (will be transformed on displaying of the
table into clear text)
Src address
Dst address
Prot.
Source address of the filtered packet
Destination address of the filtered packet
Protocol (TCP, UDP etc.) of the filtered packet
153
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Element
Src-p
Element meaning
Source port of the filtered packet (only with port-related protocols)
Dst-p
Destination port of the filtered packet (only with port-related protocols)
Name of the rule, which has raised the entry.
Filter-Rule
Limit
Bit field, which describes the crossed limit, which has filtered the packet.
The following values are defined at present:
0x01 Absolute number
0x02 Number per second
0x04 Number per minute
0x08 Number per hour
0x10 Global limit
0x20 Byte limit (if not set, it concerns a packet-related limit)
0x40 Limit applies only in receiving direction
0x80 limit applies only in transmission direction
Threshold
Action
Exceeded limit value of the trigger limit
Bit field, which specifies all implemented actions. At present the following
values are defined:
0x00000001 Accept
0x00000100 Reject
0x00000200 Connect filter
0x00000400 Internet- (Default route-) filter
0x00000800 Drop
0x00001000 Disconnect
0x00004000 Block source address
0x00020000 Block destination address and port
0x20000000 Send SYSLOG notification
0x40000000 Send SNMP trap
0x80000000 Send email
All Firewall actions are likewise displayed within the IP router trace
(’How to start a trace’ →page 48). Furthermore, some LANCOM mod-
els have a Firewall LED, which signals each filtered packet.
The filter list
The filter list allows to examine filters generated by rules defined in the action,
object and rule table.
Please note that manually entered filter rules do not generate a fault
indication and also no error message. If you configure filters manually,
you should in each case examine on the basis of the filter list whether
the desired filters were generated or not.
154
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
On Telnet level, the content of the filter list can be displayed with the com-
mand show filter
:
Under WEBconfig the filter list has the following structure:
The individual fields in the filter list have the following meaning:
Entry
Idx.
Description
Current index
Prot
Protocol to be filtered, e.g. 6 for TCP or 17 for UDP.
Src MAC
Ethernet source address of the packet to be filtered or 000000000000, if the
filter should apply to all packets.
155
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Entry
Description
Src address
Source mask
Source IP address or 0.0.0.0, if the filter should apply to all packets.
Source network mask, which determinates the source network together with
the source IP address, or 0.0.0.0, if the filter should apply to packets from all
networks.
Q start
Q end
Start source port of the packets to be filtered.
End source port of the packets to be filtered. Makes up the port range
together with the start source port, in which the filter takes effect. If start
and end port are 0, then the filter is valid for all source ports.
Dst MAC
Ethernet destination address of the packet to be filtered or 000000000000,
if the filter should apply to all packets.
Dst address
Dst mask
Destination address or 0.0.0.0, if the filter should apply to all packets.
Destination network mask, which determinates the destination network
together with the destination IP address, or 0.0.0.0, if the filter should apply
to packets to all networks.
Z start
Z end
Start destination port of the packets to be filtered.
Destination port of the packets to be filtered. Makes up the port range
together with the start destination port, in which the filter takes effect. If
start and end port are 0, so the filter is valid for all destination ports.
Action
Into this column, the "main action" is unveiled as a text, which will be exe-
cuted when the first limit has been exceeded. The first limit can be also an
implicit limit, e.g. if only one limit for the restriction of the throughput was
configured. Then an implicit limit - linked with an "accept" action - is
inserted. In this case, "accept" is unveiled as main action.
You can see the complete actions under the command show filter.
Linked
Prio
Indicates whether it concerns a "first Match" rule (linked = no). Only with
linked rules in the case of applying of this rule, also further rules are evalu-
ated.
Priority of the rule having generated the entry.
The connection list
The connection table files source address, destination address, protocol,
source port, destination port, etc. of a connection, as well as possible actions.
This table is sorted according to source address, destination address, protocol,
source port and destination port of the packet, which caused the entry in the
table.
Under WEBconfig the filter list has the following structure:
156
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
The table contains the following elements:
Element
Src addr.
Dst addr.
Protocol
Src port
Element meaning
Source address of the connection
Destination address of the connection
Used protocol (TCP/UDP etc.). The protocol is decimally indicated.
Source port of the connection. The port is only indicated with port-related
protocols (TCP/UDP) or protocols, which own a comparable field (ICMP/
GRE).
Dst port
Timeout
Flags
Destination port of the connection (with UDP connections, this one is occu-
pied only with the first answer).
Each entry ages out with the time of this table, thus the table does not over-
flow with "died" connections.
In the flags the condition of the connection and further (internal) informa-
tion are stored in a bit field.(→page 158)
As conditions the following values are possible: new, establish, open,
closing, closed, rejected (corresponding to the TCP flags: SYN, SYN ACK,
ACK, FIN, FIN ACK and RST).
UDP connections know the conditions new, open and closing (the last one
only, if the UDP connection is linked with a condition-afflicted control path.
This is e.g. the case with protocol H.323.).
Src route
Dst route
Filter rule
Name of the remote station, over which the first packet has been received.
Name of the remote station, where the first packet will be sent to.
Name of the rule, which has generated the entry (determines also the
actions to be executed), when a suitable packet is received.
157
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
Meaning of the flags of the connection list
Flag
Flag meaning
00000001
00000002
00000004
00000008
00000010
00000020
00000040
00000080
00000100
00000400
00000800
00001000
00002000
00010000
00020000
00040000
00080000
00100000
00200000
00800000
01000000
TCP: SYN sent
TCP: SYN/ACK received
TCP: waiting for ACK of the server
all: open connection
TCP: FIN received
TCP: FIN sent
TCP: RST sent or received
TCP: session will be re-established
FTP: passive FTP connection will be established
H.323: belonging to T.120 connection
connection via loopback interface
checking concatenated rules
rule is catenated
destination is on "local route"
destination is on default route
destination is on VPN route
physical connection is not established
source is on default route
source is on VPN route
no route for destination
contains global actions with condition
Port block list
Address, protocol and port of a destination station are filed in the port block
list, if blocking of the destination port on the destination station was selected
as a filter’s packet action. This table is likewise a sorted semi-dynamic table.
158
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
Sorting is done according to address, protocol and port. The table contains the
following elements:
Element
Address
Protocol
Port
Element meaning
Address of the station, to which the blocking should apply.
Used protocol (TCP/UDP etc.) The protocol is decimally indicated.
Port to close at the station. If the respective protocol is not port related, then
the entire protocol for this station becomes closed.
Timeout
Duration of the blocking in minutes.
Filter rule
Name of the rule, which has produced the entry (determines also the actions
to be executed), when a suitable packet is received.
Host block list
The address of a station is filed in the host block list, if blocking of the sender
was selected in a filter’s packet action. This table is a sender address sorted
semi-dynamic table and contains the following elements:
Element
Address
Element meaning
Address of the station, to which the blocking should apply.
Duration of the blocking in minutes.
Timeout
Filter rule
Name of the rule, which has generated the entry (determines also the
actions to be executed), when a suitable packet is received.
8.3.10 Firewall limitations
Apart from understanding the functioning of Firewalls, it is also very impor-
tant to discern their limitations and to extend them if necessary. The Firewall
does not protect against malicious contents coming through the permitted
ways into your local network. It is true that certain effects of some viruses and
worms are stopped, because communication is blocked via the required ports,
but no Firewall alone is a comprehensive protection against viruses.
Also monitoring of sensitive data in the Internet is not be prevented by a Fire-
wall. If data once reaches the unsecured net beyond the Firewall, then it is
exposed to well-known dangers. Despite using a Firewall, any confidential
information such as contracts, passwords, development information etc.
should be transmitted only over protected connections, i.e. by using suitable
data encryption and VPN connections.
159
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
8.4 Protection against break-in attempts: Intrusion
Detection
A Firewall has the task to examine data traffic across borders between net-
works, and to reject those packets, which do not have a permission for trans-
mission. Beside attempts to access directly a computer in the protected
network, there are also attacks against the Firewall itself, or attempts to out-
wit a Firewall with falsified data packets.
Such break-in attempts are recognized, repelled and logged by the Intrusion
Detection system (IDS). Thereby it can be selected between logging within the
device, email notification, SNMP traps or SYSLOG alarms. IDS checks the data
traffic for certain properties and detects in this way also new attacks proceed-
ing with conspicuous patterns.
8.4.1 Examples for break-in attempts
Typical break-in attempts are falsified sender addresses ("IP Spoofing") and
port scans, as well as the abuse of special protocols such as e.g. FTP in order
to open a port on the attacked computer and the Firewall in front of it.
IP Spoofing
With IP Spoofing the sender of a packet poses itself as another computer. This
happens either in order to trick the Firewall, which trusts packets from the
own network more than packets from untrusted networks, or in order to hide
the author of an attack (e.g. Smurf).
The LANCOM Firewall protects itself against spoofing by route examination,
i.e. it examines, whether a packet was allowed to be received over a certain
interface at all, from which it was received.
Portscan Detection
The Intrusion Detection system tries to recognize Portscans, to report and to
react suitably on the attack. This happens similarly to the recognition of a ’SYN
Flooding’ attack (see ’SYN Flooding’ →page 162): The "half-open" connec-
tions are counted also here, whereby a TCP RESET, which is sent by the
scanned computer, leaves a "half-open" connection open again.
If a certain number of half-open connections between the scanned and the
scanning computer exist, then this is reported as a port scan.
Likewise, the receipt of empty UDP packets is interpreted as an attempted port
scan.
160
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
8.4.2 Configuration of the IDS
LANconfig
Parameters of the Intrusion Detection System are set in LANconfig in the con-
figuration tool 'Firewall/QoS' on index card 'IDS':
Apart from the maximum number of port inquiries, fragment action and the
possible registration mechanisms, also these reactions are possible:
̈ The connection will be cut off.
̈ The sender address will be blocked for an adjustable period of time.
̈ The destination port of the scan will be blocked for an adjustable period
of time.
WEBconfig, Telnet
The behaviour of the Intrusion Detection Systems can be configured here
under WEBconfig or Telnet:
Configuration tool Run
WEBconfig
Expert Configuration: Setup/IP Router Module/Firewall
Setup/IP Router Module/Firewall
Terminal/Telnet
161
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
8.5 Protection against “Denial of Service” attacks
Attacks from the Internet can be break-in attempts, as well as attacks aiming
to block the accessibility and functionality of individual services. Therefore a
LANCOM is equipped with appropriate protective mechanisms, which recog-
nize well-known hacker attacks and which guarantee functionality.
8.5.1 Examples of Denial of Service attacks
Denial of service attacks do profit from fundamental weaknesses of TCP/IP
protocols, as well as from incorrect implementations of TCP/IP protocol stacks.
Attacks, which profit from fundamental weaknesses are e.g. SYN Flood and
Smurf. Attacks aiming at incorrect implementations are all attacks, which
operate with incorrectly fragmented packets (e.g. Teardrop), or which work
with falsified sender addresses (e. g. Land). In the following some of these
attacks are described, their effects and possible countermeasures.
SYN Flooding
SYN Flooding means that the aggressor sends in short distances TCP packets
with set SYN flag and with constantly changing source ports on open ports of
its victim. The attacked computer establishes as a result a TCP connection,
replies to the aggressor a packet with set SYN and ACK flags and waits now
in vain for the confirmation of the connection establishment. Hundreds of
"half-open" TCP connections are staying thereby, and just consume resources
(e.g. memory) of the attacked computer. This procedure can go that far that
the victim can accept no more TCP connection or crashes due to the lack of
memory.
An appropriate countermeasure of a Firewall is to supervise the number of
"half-open" TCP connections, which exists between two stations and to limit
it. That means, if further TCP connections between these workstations were
established, these connections would be blocked by the Firewall.
Smurf
The Smurf attack works in two stages and paralyzes two networks at once. In
the first step a Ping (ICMP echo Request) packet with a falsified sender
address is sent to the broadcast address of the first network, whereupon all
workstations in this network answer with an ICMP echo Reply to the falsified
sender address, which is located in the second network. If the rate of incom-
ing echo requests is high enough, as well as the number of answering work-
stations, then the entire incoming traffic of the second network is blocked
162
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
during the attack and, moreover, the owner of the falsified address cannot
receive normal data any more during the attack. If the falsified sender address
is the broadcast address of the second network, also all workstations are
blocked in this network, too.
In this case the DoS recognition of the LANCOM blocks passing packets, which
are addressed to the local broadcast address.
LAND
The land attack is a TCP packet that is sent with set SYN flag and falsified
sender address to the victim workstation. The bottom line is that the falsified
sender address is equal to the address of the victim. With an unfortunate
implementation of TCP, the victim interprets the sent SYN-ACK again as SYN,
and a new SYN-ACK is sent. This leads to a continuous loop, which lets the
workstation freeze.
In a more up to date variant, the loopback address “127.0.0.1” is taken as
sender address, but not the address of the attacked workstation. Sense of this
deception is to outwit personal firewalls, which react in fact to the classical
variant (sender address = destination address), but which pass through the
new form without hindrance. This variant is also recognized and blocked by a
LANCOM.
Ping of Death
The Ping of Death belongs to those attacks, which use errors when frag-
mented packets are reassembled. This functions as follows:
In the IP header there is a field "fragment offset" that indicates in which place
the received fragment is to be assembled into the resulting IP packet. This field
is 13 bits long and gives the offset in 8 byte steps, and can form an offset from
0 to 65528. With a MTU on the Ethernet of 1500 bytes, an IP packet can be
made up to 65528 + 1500 - 20 = 67008 bytes. This can lead to an overrun of
internal counters or to buffer overruns, and thus it can provoke the possibility
to the aggressor of implementing own code on the victim workstation.
In this case, the Firewall offers two possibilities:
Either, the Firewall reassembles the entire incoming packet and examines its
integrity, or solely the fragment which goes beyond the maximum packet size
is rejected. In the first case, the Firewall itself can become the victim when its
implementation was incorrect. In the second case "half" reassembled packets
accumulate at the victim, which are only rejected after a certain time, whereby
163
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
a new Denial of Service attack can result thereby if the memory of the victim
is exhausted.
Teardrop
The Teardrop attack works with overlapping fragments. After the first frag-
ment another one is sent, which overlaps completely within the first one, i.e.
the end of the second fragment is located before the end of the first. If - due
to the indolence of the IP stack programmer - it is simply counted "new end"
- "old end" when determining the number of bytes to copy for the reassembly,
then a negative value results, resp. a very large positive value, by which during
the copy operation parts of the memory of the victim are overwritten and
thereupon the workstation crashes.
The Firewall has again two possibilities:
Either the Firewall reassembles and rejects if necessary the entire packet, or it
holds only minimum offset and maximum end of the packet and rejects all
fragments, whose offset or end fall into this range. In the first case the imple-
mentation within the Firewall must be correct, so that the Firewall does not
become the victim itself. In the other case "half" reassembled packets accu-
mulate again at the victim.
Bonk/Fragrouter
Bonk is a variant of the Teardrop attack, which targets not at crashing the
attacked computer, but to trick simple port filter Firewalls, which accept also
fragmented packets and thus to penetrate into the network being protected.
During this attack, the UDP or TCP Header of the first fragment is overwritten
by skillful choice of the fragment offset. Thereby, simple port filter Firewalls
accept the first packet and the appropriate fragments while overwriting the
first packet's header by the second fragment. Thus suddenly a permissible
packet is created, which rather actually should be blocked by the Firewall.
Concerning this occurrence, the Firewall can itself either reassemble or filter
only the wrong fragment (and all following), leading to the problems already
indicated by either one of the other solutions above.
By default installation all items are configured as "secure", i.e. maxi-
mal 100 permissible half-open connections by different workstations
(see SYN Flooding), at most 50 half-open connections of a single
computer (see Portscan) of fragmented packets to be reassembled.
164
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
8.5.2 Configuration of DoS blocking
LANconfig
Parameters against DoS attacks are set in the LANconfig in the configuration
tool 'Firewall/QoS' on the register card 'DoS':
In order to drastically reduce the susceptibility of the network for DoS
attacks in advance, packets from distant networks may be only
accepted, if either a connection has been initiated from the internal
network, or the incoming packets have been accepted by an explicit
filter entry (source: distant network, destination: local area network).
This measure already blocks a multitude of attacks.
For all permitted accesses explicitly connection state, source addresses and
correctness of fragments are tracked in a LANCOM. This happens for incoming
and for outgoing packets, since an attack could be started also from within
the local area network.
This part is configured centrally in order not to open a gate for DoS attacks by
incorrect configuration of the Firewall. Apart from specifying the maximum
number of half-open connections, fragment action and possible notification
mechanisms, also these more extensive possibilities of reaction exist:
165
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 8: Firewall
̈ The connection will be cut off.
̈ The sender address will be blocked for an adjustable period of time.
̈ The destination port of the scan will be blocked for an adjustable period
of time.
WEBconfig, Telnet
The behaviour of the DoS detection and blocking can be configured here
under WEBconfig or Telnet:
Configuration tool Run
WEBconfig
Expert Configuration: Setup/IP Router Module/Firewall
Setup/IP Router Module/Firewall
Terminal/Telnet
However, always active are the following protection mechanisms:
̈ Address examination (against IP Spoofing)
̈ Blocking of broadcasts into local area network (against Smurf and Co).
8.5.3 Configuration of ping blocking and Stealth mode
LANconfig
Parameters for ping blocking and Stealth mode can be set with LANconfig
under 'Firewall/QoS' on register card 'General':
166
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 8: Firewall
LANCOM Reference Manual LCOS 3.50
WEBconfig, Telnet
With WEBconfig or Telnet the suppression of responses can be configured
here:
Configuration tool Run
WEBconfig
Expert Configuration: Setup/IP Router Module/Firewall
Setup/IP Router Module/Firewall
Terminal/Telnet
167
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
9 Quality of Service
This chapter dedicates itself to quality: Under the generic term Quality of Serv-
ice (short: QoS) those LCOS functions are summarized, which are concerned
with the guarantee of certain service availabilities.
9.1 Why QoS?
The main objective of Quality of Service is to transfer certain data packets
either particularly safe or as immediately as possible:
̈ It may happen during a data transfer that data packets are not delivered
to the addressee. But for some applications it is very important that all
sent packets really do arrive. An e-mail, for example, divided into several
small data packets, can only be assembled together again, when all parts
have arrived completely. Whether one or an other packet arrives with little
time delay does not make any difference. These applications often count
on the connection-orientated Transmission Control Protocol (TCP). This
protocol ensures that data will be transferred correctly and chronologi-
cally via the net. It automatically adjusts the sending rate downwards if
the confirmation of sent data packets is outstanding for longer times, and
also takes care of repeated transmission in case of packet losses.
̈ In other applications, e.g. telephony via the Internet (Voice-over-IP, VoIP),
it is - differently to the case above - very important that the data packets
arrive at the addressee with only little time delay. But it really doesn’t
matter if once a data packet gets lost in this case. The participant at the
other end of the connection will understand the caller, even if small parts
of the speech got lost. This application aims at the fastest sending of data
packets as possible. The connectionless User Datagram Protocol (UDP) is
often used for this kind of application. Also this protocol has very little
administrative overhead. But chronological delivery of packets is not
guaranteed, data packets are simply sent out. Because no confirmation
receipt exists, lost packets never get delivered again.
9.2 Which data packets to prefer?
The necessity of a QoS concept results only from the fact that the available
bandwidth is not always sufficient for transferring all pending data packets
reliably and on time. Load peaks result easily from running simultaneously
large FTP downloads, while exchanging e-mails and using IP telephones over
the data line. In order to meet also in these situations the demands of the
168
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
desired data transfer, certain data packets must be treated preferentially. It is
necessary for this, that at first a LANCOM recognizes which data packets
should be preferred at all.
There are two possibilities to signal the need for a preferential treatment of
data packets in the LANCOM:
̈ The application, as e.g. the software of certain IP telephones, is itself able
to mark the data packets appropriately. This marking, the “tag”, is set
within the header of the IP packets. The two different variants of this
marking “ToS” and “DiffServ” can simply described assume the following
states:
୴ ToS “Low Delay“
୴ ToS “High Reliability“
୴ DiffServ “Expedited Forwarding“
୴ DiffServ “Assured Forwarding“
The IP header bits of the ToS resp. DiffServ field are copied in case of
a VPN route also into the enclosing IP header of the IPSec VPN packet.
Thus QoS is available also for VPN routes over the Internet, as long as
your provider treats according packets preferentially also in the WAN.
̈ When the application itself has no possibility to mark the data packets
appropriately, the LANCOM can ensure the correct treatment. For this, it
uses the existing functions of the firewall, which can classify e.g. data
packets according to subnets or services (applications). Due to these func-
tions it is e. g. possible to treat individually data packets of a FTP connec-
tion or those of a certain department (in a separate subnet).
For treatment of data packets classified by the firewall the following two
possibilities can be chosen:
୴ Guaranteed minimum bandwidth
169
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
୴ Limited maximum bandwidth
What is DiffServ?
DiffServ stands for “Differentiated Services” and is a quite recent model to signal the priority
of data packets. DiffServ is based on the known Type-of-Service(ToS) field and uses the same
byte within the IP header.
ToS is using the first three bits to describe the priorities (precedence) 0 to 7, as well as four
further bits (the ToS bits) to optimize the data stream (e.g. “Low Delay” and “High Reliability”).
This model is rather inflexible, and this is why it has been used quite rarely in the past.
The DiffServ model uses the first 6 bits to make distinctions of different classes. Up to 64 grad-
ings are thus possible (Differentiated Services Code Point, DSCP) which enable a finer priori-
sation of the data stream:
̈ To ensure downward compatibility with ToS implementations, the previous precedence
levels can be depicted with the “Class Selectors” (CS0 to CS7). Thereby, the level “CS0”
denotes so-called “Best Effort” (BE) and stands for usual transfer of data packets without
special treatment.
̈ The “Assured Forwarding” classes are used for a secured transfer of data packets. The first
digit of the AF class describes each the priority of the transfer (1 to 4), the second digit
the “drop probability“ (1 to 3). Packets with AFxx marking are transferred in a secured
way, and thus not dropped.
̈ Finally, the class “Expedited Forwarding” marks those packets, that shall be transferred
preferentially, before all other packets.
Code
point
DSCP
bits
Dec.
Code
point
DSCP
bits
Dec.
Code
point
DSCP
bits
Dec.
CS0 (BE) 000000
0
8
AF11
AF12
AF13
AF21
AF22
AF23
AF31
AF32
001010 10
001100 12
001110 14
010010 18
010100 20
010110 22
011010 26
011100 28
AF33
AF41
AF42
AF43
EF
011110 30
100010 34
100100 36
100110 38
101110 46
CS1
CS2
CS3
CS4
CS5
CS6
CS7
001000
010000 16
011000 24
100000 32
101000 40
110000 48
111000 56
170
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
9.2.1 Guaranteed minimum bandwidths
Hereby you give priority to enterprise-critical applications, e.g. Voice-over-IP
(VoIP) PBX systems or certain user groups.
Full dynamic bandwidth management for sending
Concerning the sending direction, the bandwidth management takes place
dynamically. This means that e.g. a guaranteed minimum bandwidth is only
available, as long as the corresponding data transfer really exists.
An example:
For the transmission of VoIP data of an appropriate VoIP gateway, a band-
width of 256 Kbps is to be guaranteed always. Thereby, each individual VoIP
connection consumes 32 Kbps.
As long as nobody telephones, the entire bandwidth is at the disposal to other
services. Per adjacent VoIP connection 32 Kbps less is available to other appli-
cations, until 8 VoIP connections are active. As soon as a VoIP connection is
terminated, the corresponding bandwidth is available again to all other appli-
cations.
For correct functioning of this mechanism, the sum of the configured
minimum bandwidth must not exceed the effectively available trans-
mission bandwidth.
Dynamic bandwidth management also for reception
For receiving bandwidth control, packets can be buffered and only belatedly
confirmed. Thus TCP/IP connections regulate themselves automatically on a
smaller bandwidth.
Each WAN interface is assigned a maximum reception bandwidth. This band-
width will be accordingly degraded by every QoS rule that guarantees a min-
imum bandwidth of reception on this interface.
̈ If the QoS rule has been defined connection-related, the reserved band-
width will be unblocked immediately after releasing the connection and
the maximum available bandwidth will increase accordingly on the WAN
interface.
̈ If the QoS rule has been defined globally, then the reserved bandwidth
will be unblocked only after the ending of the last connection.
171
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
9.2.2 Limited maximum bandwidths
Hereby you limit e.g. the entire or connection-related maximum bandwidth
for server accesses.
An example:
You operate both a Web server and a local network on a shared Internet
access.
To prevent that your productive network (LAN) is paralyzed by many Internet
accesses to your Web server, all server accesses are limited to half of the avail-
able bandwidth. Furthermore, in order to guarantee that your server services
are available equally to many users at the same time, a certain maximum
bandwidth per each server connection is set.
Combination possible
Minimum and maximum bandwidths can be used together in combination.
Thus the available bandwidth can be distributed accordingly depending on
your requirements, e.g. on certain user groups or applications.
9.3 The queue concept
9.3.1 Queues in transmission direction
Quality of Service requirements are realized in LCOS by using different queues
for the data packets. For the transmission side, the following queues are uti-
lized:
̈ Urgent queue I
This queue is always processed at first before all others. The following
data packets are handled here:
୴ Packets with ToS “Low Delay“
୴ Packets with DiffServ “Expedited Forwarding“
୴ All packets that have been assigned a certain minimum bandwidth, as
long as the guaranteed minimum bandwidth is not exceeded.
୴ TCP control packets can be likewise dispatched by this queue prefer-
entially (see ’SYN/ACK speedup’ →page 73).
̈ Urgent queue II
This is for all packets that have been assigned a guaranteed minimum
bandwidth, but whose connection has exceeded this minimum band-
width.
172
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
As long as the interval for the minimum bandwidth is not exceeded (i.e.
up to the end of the current second), all packets in this queue are treated
without further special priority. All packets of this queue, of the "secured
queue" and the "standard queue" share now the existing bandwidth. The
packets are taken in order from the queues when sending in exactly the
same sequence, in which they have been placed into these queues. If the
interval runs off, all blocks, which are at this time still in the "Urgent queue
II" up to the exceeding of the in each case assigned minimum bandwidth,
are placed again into the "Urgent queue I". The rest remains in the
"Urgent queue II".
With this procedure it is guaranteed that prioritized connections do not
crush the remaining data traffic.
̈ Secured queue
This queue does not have a separate priority. However, packets in this
queue are never dropped (transmission guaranteed).
୴ Packets with ToS “High Reliability“
୴ Packets with DiffServ “Assured Forwarding“
̈ Standard queue
The standard queue contains all not classified data traffic. Packets in this
queue are dropped at first when packets cannot be delivered fast enough.
The queue concept can, however, only work out when a “traffic congestion“
of data packets has been accumulated at the interface from LAN to the WAN.
Such a congestion is created when the interface within the LANCOM can sub-
mit fewer data to the WAN than data are delivered in peak periods from the
LAN. This is e.g. the case, if the interface to the WAN is an integrated ADSL
interface with comparatively low transmission speed (“upstream”). The inte-
grated ADSL modem automatically reports back to the LANCOM how many
173
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
data packets it is still able to receive, and thus brakes the data stream already
within the router. As a result, the queues will automatically fill up.
n x 64 kBps
54 MBps
100 MBps
61248KKBBitp/ss
Internet
Queues
Different is the case, if an Ethernet interface represents the connection to the
WAN. From the LANCOM’s point of view, the connection to the Internet via
an external broadband modem looks like an Ethernet segment. On the dis-
tance from the LANCOM to the DSL modem, data will be transferred with full
LAN speed of 10 or 100 Mbps. Because of an equal input and output speed,
no natural congestion will be produced then. Furthermore, the Ethernet
between the LANCOM and the broadband modem does not report anything
about the capacity of the connection. The consequence: a congestion will only
be happen within the broadband modem. But because no queues are
deployed therein, surplus data will be lost. Thus a prioritisation of “preferred”
data is not possible!
n x 64 kBps
54 MBps
100 MBps
100 MBps
128 KBps
Internet
dropped data
To solve this problem, the transfer rate of the LANCOM’s WAN interface will
be reduced artificially. This interface will thereby be adjusted to the transfer
rate that is available for the actual data transport towards the WAN. For a
174
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
standard DSL connection, the DSL interface is thus adjusted in the LANCOM
to the appropriate upstream rate (e.g. 128 kbps).
Data rates indicated by providers are mostly likely net rates. The gross data
rate, which is available for the interface is a little bit higher than the net
data rate guaranteed by the provider. If you know the gross data rate of
your provider, you can enter this value for the interface and slightly
increase in this way the data throughput. However, with entering the net
data rate you play safe in any case!
9.3.2 Queues for receiving direction
Apart from the data transfer rate in transmission direction, the same consid-
eration applies also to the receiving direction. Due to its 10 or 100 Mbps
Ethernet interface, the LANCOM’s WAN interface is fed by clearly fewer data
from the broadband modem than would actually be receiveable. All data
packets received on the WAN interface are transferred to the LAN with equal
rights.
In order to be able to prioritise incoming data as well, thus an artificial “brake”
must be added also in this direction. Like already incorporated for the
upstream direction, the data transfer rate of the interface is therefore adapted
to the provider’s offer in the downstream direction. For a standard DSL con-
nection thus e.g. a downstream rate of 768 kbps applies. Again, the gross
data rate can be entered here, if known.
Reducing the receiving bandwidth makes possible to treat received data pack-
ets suitably. Preferred data packets will be directly passed on to the LAN up to
the guaranteed minimum bandwidth, all remaining data packets are running
into congestion. This congestion produces generally a delayed confirmation of
the packets. For a TCP connection, the sending server will react to this delay
by reducing its sending frequency and adapting itself to the available band-
width.
The following queues operate on the receiving side:
̈ Deferred Acknowledge Queue
Each WAN interface contains additionally a QoS reception queue, which
takes up those packets that should be „slowed down“. The storage period
of each individual packet depends on its length and on the actual permit-
ted reception bandwidth on the receiving side. Packets with a minimum
reception bandwidth assigned by a QoS rule are passing through without
any further delay, as long as the minimum bandwidth is not exceeded.
175
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
̈ Standard reception queue
All packets that do not need special treatment because of an active QoS
rule on the receiving side end up here. Packets of this queue are directly
passed on resp. confirmed without consideration of maximum band-
widths.
9.4 Reducing the packet length
The preferential treatment of data packets belonging to important applica-
tions can be endangered - depending on the situation - by very long data
packets of other applications. This is the case e.g. when IP telephony and a
FTP data transfer are simultaneously active on the WAN connection.
The FTP transfer uses quite large data packets of 1500 byte, whereas, the
Voice over IP connection sends packets of e.g. 24 byte net in relatively short
intervals. If FTP packets are in the sending queue of the LANCOM just at the
moment when a VoIP packet is to be transferred, then the VoIP packet can
only be sent after the line is free again. Depending on the transfer rate of the
connection, this may cause a noticeable delay of the speech transmission.
This annoying behaviour can be compensated if all data packets, which are
not belonging to the connection preferred by QoS, do not exceed a certain
packet length. While doing so, the data packets of the FTP connection will be
divided into such small sections that the time-critical VoIP connection is able
to deliver the packets without noticeable delay within the required time slots.
176
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
A resulting delay has no disadvantageous effect to the TCP-secured FTP trans-
fer.
Two different procedures exist to influence the packet length:
̈ The LANCOM can inform the peers of a data connection that they should
only send data packets up to a certain length. Thereby, an appropriate
PMTU (Path Maximum Transmission Unit) is enforced on the sending side.
This procedure is called PMTU reduction”.
The PMTU reduction can be used for sending as well as for receiving direc-
tion. For the sending direction, the data source of the own LAN is adjusted
with the PMTU reduction to a smaller packet size, for the receiving direc-
tion the data source of the WAN, e.g. web or FTP servers in the Internet.
Provided that the data connection already exists when the VoIP connec-
tion is started, the senders regulate packet lengths very quickly to the per-
mitted value. When setting up new data connections while a VoIP
connection is already established, the maximum permitted packet length
is negotiated directly during the connection phase.
The reduced packet length on the data connection still remains also
after terminating the VoIP connection, as long as the sender checks
the PMTU value again.
̈ The LANCOM is able to split packets to be sent above an adjustable max-
imum size (e.g. 256 byte) into smaller units itself. But such a procedure
called ”fragmentation” is not supported by all servers of the Internet,
because dealing with fragmented packets is considered as a security risk,
and therefore is turned off by many servers. That’s why disturbances can
occur e.g. while downloading or while transmitting web pages.
Thus, this procedure is recommended only for connections without involv-
ing unknown servers, e.g. for a direct connection of branches to their head
177
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
office via VPN connection, over which the Internet traffic is not running
simultaneously.
9.5 QoS parameters for Voice over IP applications
An important task when configuring VoIP systems is to guarantee a sufficient
voice quality. Two factors considerably influence the voice quality of a VoIP
connection: The voice delay on its way from sender to addressee, as well as
the loss of data packets, which do not arrive or do not arrive in time at the
addressee. The “International Telecommunications Union” (ITU) has examined
in extensive tests, what human beings perceive as sufficient voice quality, and
has published as the result in the ITU G.114 recommendation.
Packet loss
Jitter
20 %
10 %
5 %
10 ms
100 ms
150 ms
300 ms
Delay
In case of a delay of not more than 100 ms, and a packet loss of less than 5%,
the quality is felt like a “normal” telephone connection. In case of more than
150 ms delay and less than 10% packet loss, the telephone user perceives still
a very good quality. Up to 300 ms and 20%, some listeners feel this quality
like still suitable, beyond that the connection is considered as no more suita-
ble for voice transmission.
Apart from the average delay time, also a variation in this delay is perceived
by the human ear. Delay differences of the voice information from sender to
addressee (jitter) are still tolerated up to 10 ms, and values beyond considered
as irritating.
178
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
Accordingly, a VoIP connection should be configured such that the criteria for
good speech quality are met: Packet loss up to 10%, delay up to 150 ms and
jitter up to 10ms.
̈ Jitter can be removed in the receiving station by an appropriate buffer. In
this buffer (jitter buffer) the packets are stored intermediately, and passed
on at a constant rate to the addressee. By this intermediate buffering, the
delay variations due to individual transmission times of the individual
packets can be removed.
̈ The delay is influenced by several components:
୴ Time of processing (packeting, coding and compression by the sender
and the addressee), duration of handing over the packet from appli-
cation to the interface (serialization), and the time for transmitting via
the WAN distance (propagation) contribute to the fixed part of delay.
୴ The variable part is determined by the jitter resp. by the setting of the
jitter buffer.
These two parts together compose a delay, which should ideally not
exceed 150 ms.
Delay < 150 ms!
Processing
Processing
Serialization
Propagation
̈ Apart from the general loss by network transmission, the packet loss is
significantly influenced by the jitter buffer. If packets arrive with a larger
delay than it can be balanced by the jitter buffer, the packets will be dis-
carded and will increase the packet loss. The larger the jitter buffer, the
smaller is the loss. Conversely, the entire delay will increase with the jitter
buffer size. That means for configuration, that the jitter buffer should be
selected as small as the quality can be considered still as sufficient.
179
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
In detail, delay is determined especially by the codec used, the resulting
packet size and the available bandwidth:
In comparison: satellite quality
Jitter buffer
Processing
Serialization
Propagation
150ms
̈ The time for processing is determined by the used codec. For a sampling
time of 20 ms, exactly each 20 ms a new packet is generated. Times for
compression can mostly be neglected.
̈ The time for handing over the packet to the interface is defined by the
quotient of packet size and available bandwidth:
Packet size in bytes
1
64
9
128
18
16
8
256
36
32
16
8
512
73
64
32
16
8
1024 1500
56 Kbps
0,14
0,13
0,06
0,03
0,016
0,010
0,005
146
128
64
32
16
11
5
215
187
93
47
23
16
8
64 Kbps
8
128 Kbps
256 Kbps
512 Kbps
768 Kbps
1536 Kbps
4
2
4
1
2
4
0,6
0,3
1,3
0,6
2,6
1,3
5
3
A 512 byte packet of an FTP connection occupies the line at 128 Kbps
upstream for at least 32 ms.
Besides, the packets of the VoIP connection are often much larger than
the pure net payload. The additional headers of the IP and Ethernet pack-
ets, as well eventual IPsec headers have to be added as well. The net load
results from the product of net data rate and sampling time of the used
codec. For all codecs, each 40 bytes UDP header and at least 20 bytes for
180
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
the IPSec header must be added (RTP and IPSec headers can be larger,
depending on the configuration).
Codec
Net data
rate
Sampling Packets
per sec.
payload
IP packet IPsec
packet
Band-
width
G.723.1
G.711
6,3 Kbit/s
64 Kbit/s
30 ms
20 ms
33,3
50
24 byte
64 byte
84 byte
22,3 Kbps
160 byte
200 byte
276 byte
110.4 Kbps
Since packets encrypted with DES, 3DES, or AES, are only able to grow in
block sizes of 64 bytes, the IPSec packet for G.711 consists of 160 bytes
payload + 96 bytes up to the next block limit + 20 bytes IPsec header =
276 bytes.
A similar “quote of loss“ can also occur for the G.723 codec, if e.g. the
RTP header is longer than 12 bytes. Then, the IP packet will grow up to
the next block limit of 128 bytes; plus 20 bytes for the IPsec header cre-
ates packets of an overall length of 128 bytes, which means more than
the sixfold net load!
The required bandwidth for transmission results finally from the quotient
of packet size and sampling time.
̈ The time for transmission via Internet depends on the distance (about 1
ms per 200 km), and on the thereby passed routers (about 1 ms per hop).
This time can be approximated by the half average ping time to the
remote station.
̈ The jitter buffer can be adjusted directly at many IP telephones, e.g. as
fixed number of packets, which should be used for buffering. The tele-
phones load then up to 50% of the adjusted packets and begin afterwards
to replay. The jitter buffer correspond therefore to half of the entered
packets multiplied with the sampling time of the codec.
̈ Conclusion: The total delay is composed as follows for the according
bandwidth, a ping time of 100 ms to the remote station and a jitter buffer
of 4 packets for both codecs in this example:
Codec
Process-
ing
Serializa- Propga-
Jitter
buffer
Sum
tion
tion
G.723.1
G.711
30 ms
20 ms
32 ms
32 ms
50 ms
50 ms
60 ms
40 ms
172 ms
142 ms
181
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
The transfer time of the packets to the interface (serialization) assumes a
PMTU of 512 bytes on a 128 Kbps connection. Therefore, for slower inter-
faces or other codecs it is eventually necessary to adjust jitter buffers and/
or PMTU values.
Please notice that the bandwidths are required in the sending and
receiving direction, as well as just for one single connection.
9.6 QoS in sending or receiving direction
For controlling data transfer by means of QoS one can select whether the
according rule applies to the sending or to the receiving direction. But which
direction refers to sending and receiving for a given a data transfer depends
on the particular point of view. The following two variants apply:
̈ The direction corresponds to the logical connection setup
̈ The direction corresponds to the physical data transfer over the appropri-
ate interface
The differences are unveiled by looking at a FTP transfer. A client of the LAN
is connected to the Internet through a LANCOM.
̈ During an active FTP session, the client sends by the PORT command the
information to the server, on which port the DATA connection is expected.
As the result, the server establishes the connection to the client and sends
the data in the same direction. In this case, the logical connection as well
as the real data stream over the interface go from the server to the client,
and the LANCOM takes both as the receiving direction.
̈ Different is the case of a passive FTP session. Here the client itself estab-
lishes the connection to the server. The logical connection setup thus is
from client to server, but the data transmission over the physical interface
flows in the reverse direction from server to client.
With standard settings, a LANCOM assumes the sending or receiving direction
depending on the logical connection setup. Because such a point of view may
not be easy to follow in certain application scenarios, the point of view can
alternatively be changed to the flow of the physical data stream.
The differentiation between sending and receiving direction applies
only to the installation of maximum bandwidths. For a guaranteed
minimum bandwidth, as well as for fragmentation and PMTU reduc-
182
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
tion always the physical data transfer via the respective interface
applies as the direction!
9.7 QoS configuration
9.7.1 Evaluating ToS and DiffServ fields
ToS or DiffServ?
LANconfig
For configuration with LANconfig, select the configuration field 'IP router'.
Adjust on index card 'General' whether the 'Type of service field' or alterna-
tively the 'DiffServ field' is to be observed for prioritisation of data packets.
When both options are turned off, the ToS/DiffServ field will be ignored.
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, your decision for the evaluation
of the ToS or DiffServ fields are entered at the following places:
Configuration tool
WEBconfig
Run
Setup/IP router module/Routing method
Setup/IP router module/Routing method
Telnet
Feature settings for routing method values are the following:
̈ Standard: The ToS/DiffServ field is ignored.
̈ TOS: The ToS/DiffServ field is considered as ToS field, the bits “Low delay”
and “High reliability” will be evaluated.
183
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
̈ DiffServ: The ToS/DiffServ field is interpreted as DiffServ field and evalu-
ated as follows:
DSCP code points
Kind of transmission
normal transmission
secured transmission
preferred transmission
CSx (including CS0 = BE)
AFxx
EF
DiffServ in Firewall rules
The code points from the DiffServ field can be evaluated by Firewall rules for
further control of QoS parameters such as minimum bandwidth or PMTU
reduction.
LANconfig
The parameters for evaluating the DiffServ fields are adjusted when defining
the QoS rule in LANconfig:
According to your selection of the DSCP type (BE, CS, AF, EF) the valid values
can be adjusted in additional drop down lists. Alternatively, the DSCP decimal
value can be entered directly. A table listing valid values can be found under
’What is DiffServ?’ →page 170.
184
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the parameters are entered at the
following places into a new Firewall rule:
Configuration tool
WEBconfig
Run
Setup/IP router module/Firewall/Rule list
Setup/IP router module/Firewall/Rule list
Telnet
The Firewall rule is extended by condition “@d” and the DSCP (Differentiated
Services Code Point). The code point can either be indicated with its name
(CS0 - CS7, AF11 to AF 43, EF or BE) or its decimal resp. hexadecimal depic-
tion. “Expedited Forwarding” can therefore be indicated as “@dEF”, “@d46”
or “@d0x2e”. Furthermore, collective names (CSx resp. AFxx) are possible.
Examples:
̈ %Lcds0 @dAFxx %A: Accept (secured transmission) on DiffServ “AF”,
limit “0”
̈ %Qcds32 @dEF: Minimum bandwidth for DiffServ “EF” of 32 kbps
̈ %Fprw256 @dEF: PMTU reduction for reception for DiffServ “EF” to 256
bytes
These examples reserve a desired bandwidth for Voice over IP phone calls. The
first element “%Lcds0 @dAFxx %A“ accepts DSCP “AFxx” marked packets of
signalling calls. Voice data marked with “EF” is transferred preferentially by
the entry “%Qcds32 @dEF“, and a bandwidth of 32 Kbps is guaranteed
thereby as well. In parallel, the PMTU is reduced to 256 byte by “%Fprw256
@dEF“, which enables ensuring the required bandwidth in receiving direction
at all.
Further information about defining Firewall rules can be found in
chapter ’Firewall’ →page 104.
9.7.2 Defining minimum and maximum bandwidths
LANconfig
A minimum bandwidth for certain applications is defined in LANconfig by a
Firewall rule according to the following conditions:
̈ The rule does not need an action, because QoS rules always implicitly
assume “transfer” as action.
185
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
̈ The guaranteed bandwidth is defined on index card 'QoS'.
୴ The option 'Action only for default route' limits the rule to those pack-
ets, which are sent or received via default route.
୴ The option 'Action only for VPN route' limits the rule to those packets,
which are sent or received via VPN tunnel.
୴ The option 'Per connection' resp. 'Globally' specifies, whether the
minimum bandwidth set here is valid for each single connection cor-
responding to this this rule (’per connection’), or, if this should be the
upper limit for the sum of all connections together (’globally’).
̈ Like for other Firewall rules, index cards 'Stations' and 'Services' deter-
mine for which stations in the LAN / WAN and for which protocols this rule
applies.
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the minimum resp. maximum
bandwidths are entered into a new Firewall rule at the following places:
Configuration tool
WEBconfig
Run
Setup/IP router module/Firewall/Rule list
Setup/IP router module/Firewall/Rule list
Telnet
A required minimum bandwidth is introduced by “%Q”. Here it is implicitly
assumed that the respective rule is an “Accept” action, and that the packets
will thus be transmitted.
186
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
A maximum bandwidth is simply defined by a limit rule, which discards by a
“Drop” action all packets, which exceed the defined bandwidth.
Examples:
̈ %Qcds32: Minimum bandwidth of 32 kbps for each connection
̈ %Lgds256 %d: Maximum bandwidth of 256 kbps for all connections
(globally)
Further information about defining Firewall rules can be found in
chapter ’Firewall’ →page 104.
9.7.3 Adjusting transfer rates for interfaces
Devices with built-in ADSL/SDSL modem resp. with an ISDN adapter
make these settings independently for the respective interface. For a
LANCOM model with Ethernet and ISDN interface, these settings
have to be made solely for the Ethernet interface.
LANconfig
Data rate restrictions for Ethernet, DSL and DSLoL interfaces are entered in
LANconfig under configuration field 'Management' on index card 'Interfaces'
within the settings for the different WAN interfaces:
̈ An Ethernet WAN (DSL/cable) and DSLoL interface can be switched off
completely in this dialogue.
̈ As upstream and downstream rate the gross data rates are entered, which
are usually a little bit higher than the net data rates indicated by the pro-
vider as the guaranteed data rate (see also ’The queue concept’
→page 172).
̈ The “external overhead” considers information added to the packets dur-
ing the data transfer. Concerning applications with small data packets
187
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
(e.g. Voice over IP), this extra overhead is quite noticeable. Examples for
the external overhead:
Transfer
External
Note
overhead
PPPoEoA
PPTP
36 bytes
24 bytes
22 bytes
additional headers, loss by not completely used ATM cells
additional headers, loss by not completely used ATM cells
additional headers, loss by not completely used ATM cells
additional headers, loss by not completely used ATM cells
direct transfer of Ethernet packets
IPoA (LLC)
IPoA (VC-MUX) 18 bytes
Cable modem
0
WEBconfig, Telnet
Under WEBconfig or Telnet the restrictions of data transfer rates for Ethernet,
DSL and DSLoL interfaces are entered at the following places:
Configuration tool
WEBconfig
Run
Setup/Interfaces/DSL Interfaces
Setup/Interfaces/DSL Interfaces
Telnet
Only upstream and downstream rates are indicated by Kbps, external
overhead in bytes/packet.
188
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
9.7.4 Sending and receiving direction
LANconfig
The interpretation of the data transfer direction can be adjusted in LANconfig
when defining the QoS rule:
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the interpretation of the data
transfer direction is specified at the following places in a new Firewall rule by
parameters “R” for receive, “T” for transmit (send) and “W” for reference to
the WAN interface:
Configuration tool
WEBconfig
Run
Setup/IP router module/Firewall/Rule list
Setup/IP router module/Firewall/Rule list
Telnet
A restriction of data transfer to 16 Kbps in sending direction applying to the
physical WAN interface is e.g. made by the following Firewall rule:
̈ %Lcdstw16%d
9.7.5 Reducing the packet length
The length reduction of the data packets is defined by a Firewall rule accord-
ing to the following conditions:
̈ The reduction refers to all packets, which will be sent to the interface and
which do not correspond to the rule.
189
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 9: Quality of Service
̈ Not packets of certain protocols are reduced, rather than all packets glo-
bally on that interface.
LANconfig
The length reduction of the data packets is set in LANconfig when defining
the QoS rule:
WEBconfig, Telnet
For configuration with WEBconfig or Telnet, the reduction is entered at the
following places in a new Firewall rule by parameter “P” for PMTU reduction
(Path MTU, MTU = Maximum Transmission Unit) and “F” for the fragment size:
Configuration tool
WEBconfig
Run
Setup/IP router module/Firewall/Rule list
Setup/IP router module/Firewall/Rule list
Telnet
PMTU reduction and fragmentation refer always to the physical con-
nection. Indicating parameter “W” for WAN sending direction is not
required here and hence will be ignored if existing.
190
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 9: Quality of Service
LANCOM Reference Manual LCOS 3.50
The following example shows a setting for Voice over IP telephony:
Rule
Source
Destination
Action
Protocol
VOIP
IP addresses of IP
telephones in the
LAN, all ports
IP addresses of IP
telephones in the
LAN, all ports
%Qcds32 %Prt256
UDP
This rule defines the minimum bandwidth for sending and receiving to 32
Kbps, forces and reduces the PMTU while sending and receiving to packets of
256 byte size. For the TCP connection, the maximum segment size of the local
workstation is determined to 216, so that the server will send packets of max-
imum 256 byte (reduction of the PMTU in sending and receiving direction).
191
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
10 Virtual LANs (VLANs)
10.1 What is a Virtual LAN?
The increasing availability of inexpensive layer 2 switches enables the setup
of LANs much larger than in the past. Until now, smaller parts of a network
had been combined with hubs. These individual segments (collision domains)
had been united via routers to larger sections. Since a router represents
always a border between two LANs, several LANs with own IP address ranges
arose by this structure.
By using switches, it is possible to combine much more stations to one large
LAN. By the specific control of data on the individual ports, the available
bandwidth can be utilized much better than by using hubs, and the configu-
ration and maintenance of routers within the network can omitted.
But also a network structure based on switches has disadvantages:
̈ Broadcasts are sent like hubs over the entire LAN, even if the respective
data packets are only important for a certain segment of the LAN. A suf-
ficient number of network stations can thus lead to a clear reduction of
the available bandwidth in the LAN.
̈ The entire data traffic on the physical LAN is “public”. Even if single seg-
ments are using different IP address ranges, each station of the LAN is
theoretically able to tap data traffic from all logical networks on the Ether-
net segment. The protection of individual LAN segments with Firewalls or
routers increases again the requirements to network administration.
One possibility to resolve these problems are virtual LANs (VLANs), as
described in IEEE 802.1p/q. By this concept, several virtual LANs are defined
on a physical LAN, which do not obstruct each other, and which also do not
receive or tap data traffic of the respective other VLANs on the physical Ether-
net segment.
10.2 This is how a VLAN works
By defining VLANs on a LAN the following goals should be achieved:
̈ Data traffic of certain logical units should be shielded against other net-
work users.
̈ Broadcast traffic should also be reduced to logical units, not bearing a
burden on the entire LAN.
192
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 10: Virtual LANs (VLANs)
LANCOM Reference Manual LCOS 3.50
̈ Data traffic of certain logical units should be transmitted with a specific
priority compared to other network users.
An example to clarify: A switch is connected to a hub within a LAN, which
connects four stations from the marketing department to the network. One
server and two stations of the accounting department are directly connected
to the switch. The last section is the base station of a wireless network, where
four WLAN clients reside from the sales department.
LAN segment
marketing
WLAN
sales
Server
Accounting stations
Hub
WLAN
base station
Switch
The stations from marketing and sales should be able to communicate with
each other. Additionally, they should be able to access the server. The
accounting department needs also access to the server, but should otherwise
be shielded against the other stations.
10.2.1 Frame tagging
In order to shield or, if necessary, to prioritise data traffic of a virtual LAN
against the other network users, data packets must have an additional feature
(a “tag”). That’s why the respective process is also called “frame tagging”.
Frame tagging must be realized such that the following requirements are ful-
filled:
̈ Data packets with and without frame tagging must be able to exist in par-
allel on a physical LAN.
̈ Stations and switches in a LAN, which do not support VLAN technology,
must ignore the data packets with frame tagging and/or treat them as
“normal” data packets.
193
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
The tagging is realized by an additional field within the MAC frame. This field
contains two important information for the virtual LAN:
̈ VLAN ID: A unique number describes the virtual LAN. This ID defines the
belonging of data packets a logical (virtual) LAN. With this 12 bit value it
is possible to define up to 4094 different VLANs (VLAN IDs “0” and
“4095” are reserved resp. inadmissible).
VLAN ID “1” is used by many devices as the Default VLAN ID. Con-
cerning unconfigured devices, all ports belong to this Default VLAN.
However, this assignment can also be changed by configuration. (’The
port table’ →page 199).
̈ Priority: The priority of a VLAN-tagged data packet is indicated by a 3 bit
value. “0” represents the lowest priority, “7” the highest one. Data pack-
ets without VLAN tag are treated with priority “0”.
This additional field makes the MAC frames longer than actually allowed.
These “overlong” packets can only be recognized and evaluated by VLAN-
capable stations and switches. Frame tagging incidentally leads to the desired
behaviour for network users without VLAN support:
̈ Switches without VLAN support simply pass on these data packets and
ignore the additional fields within the MAC frame.
̈ Stations without VLAN support are not able to recognize the protocol type
due to the inserted VLAN tag and discard the packets silently.
Older switches in the LAN are perhaps not able to pass on correctly
the overlong frames between the individual ports and will reject the
tagged packets.
10.2.2 Conversion within the LAN interconnection
Certain stations shall be grouped to logical units by virtual LANs. But the sta-
tions themselves are usually neither able to generate the required VLAN tags,
nor able to handle them.
Data traffic between network users always runs over different interfaces of the
distributors in the LAN. These distributors (switches, base stations) have got
the task to insert VLAN tags according to the desired application into the data
packets, to evaluate them and, if necessary, to remove them again. Because
logical units are each connected to different interfaces of the distributors, the
194
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 10: Virtual LANs (VLANs)
LANCOM Reference Manual LCOS 3.50
rules for generating and processing of the VLAN tags are assigned to the sin-
gle interfaces.
Coming back again to the first example:
Data packet without VLAN tag
LAN segment
marketing
WLAN
sales
Data packet without VLAN tag
Data packet with VLAN ID=3
A workstation from the marketing sends a data packet to a workstation of the
sales department. The marketing hub passes the packet simply on to the
switch. The switch receives the packet at its port no. 1, and recognizes that
this port belongs to a VLAN with the VLAN ID “3”. It inserts an additional field
into the MAC frame with the appropriate VLAN tag, and issues the packet only
on ports (2 and 5), which also belong to VLAN 3. The base station of the sales
department will receive the packet on its LAN interface. By its settings, the
base station can recognize that the WLAN interface belongs also to VLAN 3.
It will remove the VLAN tag from the MAC frame, and issues the packet again
on the wireless interface. The WLAN client can handle the packet then, which
has a “usual” length again, like each other data packet without VLAN tag-
ging.
10.2.3 Application examples
Main application of virtual LANs is to install different logical networks on a
physical Ethernet segment, whose data traffic is protected against the other
logical networks.
The following sections present examples for the operation of virtual LANs on
behalf of this background.
195
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
Management and user traffic on a LAN
Several hot spots are installed on an university campus, so that students
equipped with notebooks and WLAN cards have access to the Internet and to
the server of the library. The hot spots are connected to the university LAN. Via
this LAN the administrators also access the base stations to carry out several
management tasks via SNMP.
Data traffic without
VLAN tag
VLAN ID=3
By setting up a virtual LAN between the base stations and the administrator’s
switch, management data is shielded against all “public” traffic on the LAN.
Different organisations on one LAN
The flexibility of the modern world of work raises new challenges for admin-
istrators concerning planning and maintenance of network structures. The
occupation of the rooms by leaseholders changes permanently in public office
buildings, and also inside of a company, teams are often newly assembled. In
both cases, the individual units must have an independent, protected LAN.
196
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 10: Virtual LANs (VLANs)
LANCOM Reference Manual LCOS 3.50
But this task is very burdensome to realize by hardware changes, or even not
at all, because e.g. only one single central cabling exists in the office building.
Company
A, sales
Company A,
accounts dep.
VLAN ID=3
VLAN ID=5
VLAN ID=3, 5
VLAN ID=11
Comp. A, administrat.
central network cabling
Comp. B
VLAN ID=3, 5, 11
Virtual LANs enable to perform this task in a very smart way. Also when
departments or companies change at a later time inside of the building, the
network structure can be easily adjusted.
All network users in this example use the central Ethernet, which is, like the
connected devices, supervised by a service provider. Company A has three
departments on two floors. The sales department can communicate with the
administration department via VLAN ID 3, the accounts department with the
administration via VLAN ID 5. The networks of accounts department and sales
do not see each other. Company B is also shielded by VLAN ID 11 against all
other networks, only the service provider can access all devices for mainte-
nance purposes.
197
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
10.3 Configuration of VLANs
VLAN technology functions are presently only supported by LANCOM
Wireless devices.
The configuration of LANCOM Wireless devices within the VLAN realm has to
perform two important tasks:
̈ Defining virtual LANs and assigning them a name, a VLAN ID and the
affected interfaces.
̈ Defining for the interfaces how to proceed with data packets with or with-
out VLAN tags.
10.3.1 The network table
In the network table are those virtual LANs defined, in which the LANCOM
should participate. The table contains 32 entries at maximum with the follow-
ing information:
̈ Name: The VLAN name serves only as a description during configuration.
This name is used at no other place.
̈ VLAN ID: This number marks the VLAN unambiguously. Possible values
range from 1 to 4094.
̈ Port list: All LANCOM interfaces belonging to the VLAN are entered into
this list. As ports can be entered:
୴ “LAN-n” for all Ethernet ports of the device.
୴ “WLAN-n” for point-to-station WLAN ports.
୴ “P2P-n” for point-to-point WLAN ports.
Given a device with a LAN interface and a WLAN port, e.g. ports “LAN-1”
and “WLAN-1” can be entered. In case of port ranges, the individual ports
must be separated by a tilde: “P2P-1~P2P-4”.
The available ports can be found in the port table (→page 199).
198
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 10: Virtual LANs (VLANs)
LANCOM Reference Manual LCOS 3.50
Example for a network table:
Name
Default
Sales
VLAN ID Port list
1
2
3
LAN-1, WLAN-1, WLAN-2
LAN-1, WLAN-1
LAN-1, WLAN-2
Marketing
10.3.2 The port table
The port table configures the individual ports of the device for use by the
VLAN. The table has got an entry for each port of the device with the following
values:
̈ Port: Name of the port, not editable.
̈ Use tagging: This option indicates, whether data packets should be
tagged on this port. The tagging refers only to data packets sent over this
port.
̈ Allow untagged frames: This option indicates, whether untagged data
packets are passed on, which have been received on this port.
̈ Allow all VLANs: This option indicates, if tagged data packets with any
VLAN IDs should be accepted even if the port itself is not belonging to the
same VLAN ID.
̈ Default ID: This VLAN ID has two functions:
୴ Untagged packets received on this port are provided with this VLAN
ID.
୴ If tagging for sent packets is switched on, this VLAN ID will not be
assigned to the packets. If a packet with this VLAN ID is received, it
will be passed on without this ID, although tagging has been
switched on.
Example for a port table:
Port
Use
Allow
Allow
Default ID
tagging
untagged frames all VLANs
LAN-1
On
Off
Off
Off
On
On
On
On
On
Off
Off
Off
1
1
1
1
WLAN-1
WLAN-2
P2P-1
199
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
Port
Use
Allow
Allow
Default ID
tagging
untagged frames all VLANs
P2P-2
P2P-3
P2P-4
P2P-5
P2P-6
Off
Off
Off
Off
Off
On
On
On
On
On
Off
Off
Off
Off
Off
1
1
1
1
1
10.3.3 Configuration with LANconfig
Parameters for virtual networks can be set with LANconfig under 'Manage-
ment' on the register card 'VLAN':
200
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 10: Virtual LANs (VLANs)
LANCOM Reference Manual LCOS 3.50
The definition of the used virtual networks can be accessed via the button
VLAN table :
The button Port table opens a drop down list where a VLAN port can be
selected for editing:
10.3.4 Configuration with WEBconfig or Telnet
Under WEBconfig or Telnet the tables for configuring the VLANs can be found
via the following paths:
Configuration tool Menue/table
WEBconfig
Expert Configuration ̈ Setup ̈ LAN Management module ̈
VLAN Configuration
Terminal/Telnet
cd /Setup/LAN Management module/VLAN Configura-
tion
201
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 10: Virtual LANs (VLANs)
The VLAN configuration shows up under WEBconfig as follows:
202
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
11 Wireless LAN – WLAN
11.1 What is a Wireless LAN?
The following sections are a general description of the LCOS operating
system functions in wireless networks. The precise functions suppor-
ted by your device are described in its manual.
In this chapter we will show you briefly the technology of wireless networks.
In addition, we give you an overview of the various applications, functions
and abilities of your base station.
A Wireless LAN connects single terminals (e.g. PCs or notebooks) to a local
network (also LAN – Local Area Network). In contrast to a conventional LAN,
communication takes place via radio links rather than via network cables. This
is the reason why a Wireless LAN is also called a Wireless Local Area Network
(WLAN).
All functions of a cable-bound network are also available in a Wireless LAN:
access to files, servers, printers etc. is as possible as the connection of individ-
ual stations to an internal mail system or to the Internet access.
The advantages of Wireless LANs are obvious: notebooks and PCs can be set
up just where they are needed. Due to Wireless LANs, problems with missing
connections or structural alterations belong to the past.
11.1.1 Standardized radio transmission by IEEE
IEEE 802.11
LANCOM network products comply with the IEEE 802.11 standards. These
standard’s family represents an extension to the already existing IEEE stand-
ards for LANs, of which IEEE 802.3 for Ethernet is the most popular one.
Within the IEEE 802.11 family, different standards exist for the radio transmis-
sion in different frequency ranges and with different speeds. LANCOM base
stations and AirLancer client adapters support according to their respective
type different standards:
̈ IEEE 802.11a with up to 54 Mbps transfer rate in the 5 GHz band
̈ IEEE 802.11b with up to 11 Mbps transfer rate in the 2,4 GHz band
̈ IEEE 802.11g with up to 54 Mbps transfer rate in the 2,4 GHz band
203
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
IEEE 802.11a: 54 Mbps
IEEE 802.11a describes the operation of Wireless LANs in the 5 GHz frequency
band (5,15 GHz to 5,75 GHz), with up to 54 Mbps maximum transfer rate. The
real throughput depends however on the distance and/or on the quality of the
connection. With increasing distance and diminishing connecting quality, the
transmission rate lowers to 48 Mbps, afterwards to 36 Mbps etc., up to a min-
imum of 6 Mbps. The distance of transmission ranges from up to 125 m in
open expanses, in buildings typically up to 25 m. The IEEE 802.11a standard
uses OFDM (Orthogonal Frequency Division Multiplexing) as modulation
scheme.
OFDM
In the 5 GHz frequency band, the OFDM modulation scheme is used for IEEE
802.11a. OFDM is a modulation scheme, which utilizes multiple independent
carrier frequencies for the signal transmission, and which modulates these
multiple carriers each with a reduced data transfer rate. Thus the OFDM mod-
ulation scheme is very insensitive in particular to echoes and other impair-
ments and enables high data transfer rates.
Turbo mode
In ’turbo mode’, LANCOM Wireless base stations are able to use simultane-
ously two radio channels and can so increase the transfer rate up to maximum
108 Mbps. The turbo mode can be used in conjunction with the IEEE 802.11a
standard between LANCOM base stations and AirLancer wireless network
cards. The increase of the transfer rate must be switched on in the base sta-
tion, but can also reduce the transmitting power and the range of the radio
connection.
IEEE 802.11b: 11 Mbps
IIEEE 802.11b describes the operation of local Wireless LANs in the ISM fre-
quency band (Industrial, Scientific, Medical: 2.4 up to 2.483 GHz). The maxi-
mum transfer rate is up to 11 Mbps. The real through-put depends however
on the distance and/or on the quality of the connection. With increasing dis-
tance and diminishing connecting quality the transmission rate lowers to 5,5
Mbps, afterwards to 2 and finally to 1 Mbps. The range of the transmission
distances is between up to 150 m in open expanses and in buildings typically
up to 30 m. Due to different frequency bands in use, IEEE 802.11b is not com-
patible to IEEE 802.11a.
DSSS
For shielding against interferences by other transmitters, which have possibly
the same frequency band, the DSSS procedure (Direct Sequence Spread Spec-
trum) is used for IEEE 802.11b in the 2,4 GHz frequency band. A transmitter
normally uses only a very narrow range of the available frequency band for
204
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
transmission. If exactly this range is used by another transmitter, interferences
in transmission would be the result. With the DSSS procedure the transmitter
uses a broader spread of the possible frequencies and becomes more insensi-
tive to narrow-band disturbances then. This procedure is also used in military
range for increasing tap-proof security.
IEEE 802.11g: 54 Mbps
The IEEE 802.11g standard works likewise with up to 54 Mbps data transmis-
sion rate in the 2,4 GHz ISM-frequency band. Contrary to IEEE 802.11b, the
OFDM modulation is used for IEEE 802.11g, like already introduced for IEEE
802.11a. IEEE 802.11g contains a special compatibility mode that ensures a
downward compatibility to the popular IEEE 802.11b standard . However, in
this compatibility mode you encounter reduced transmission speeds. Due to
the different frequency bands, IEEE 802.11g can not be compatible to IEEE
802.11a. The transmission distances of IEEE 802.11g products are compara-
ble with those of IEEE 802.11b products.
Turbo mode
The 'Turbo Mode' increases the transfer rates to a maximum of 108 Mbps with
the 802.11g standard, too.
Transfer rates
The indicated transfer rates are always to be interpreted as gross data rates,
i.e. the entire protocol overhead - as for example the complex protocols to
secure the radio transmission - is included in the indicated transfer rates. The
net data transfer rate can be thus lower than the indicated gross data rates,
typically over up to the half for all IEEE 802.11 standards mentioned above.
Ranges
The actually obtained distances for radio transfers depend strongly on the
individual environment. In particular influences of noise and obstacles have
an effect on the range. Decisive is an optimal placement of the radio stations
(both network adapters and base stations). For further increase of the transfer
distance, we recommend the operation with additional antennas (e.g.
AirLancer Extender).
IEEE standards
In order to guarantee a maximum of compatibility, LANCOM Systems fully
1
complies with the industry standards of the IEEE described in the preceding
paragraph. For this reason, your LANCOM base station operates without
problems and with reliably also with devices of other manufacturers.
205
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Your LANCOM base station supports - according to the model type - the
standards IEEE 802.11g (downward-compatible to IEEE 802.11b), and/or IEEE
802.11a.
The operation of the integrated wireless card of your base station is only pos-
sible in one single frequency band, that is, either 2,4 GHz or 5 GHz. Thus a
simultaneous operation of IEEE 802.11g and IEEE 802.11a is not possible.
Since IEEE 802.11g is downward-compatible to IEEE 802.11b, an simultane-
ous operating of these two standards is possible, but with certain speed con-
straints.
Transfer rates in compatibility mode
Please notice that the reached data transfer rates depend on the used 2,4 GHz mode. You will
achieve the highest transfer rates with a base station operating in the 802.11g mode. The
transfer rate will go down when starting the compatibility mode, even, if only inactivated
802.11b stations are near to your base station. When these 802.11b stations start to be acti-
vated in a wireless network with operating com-
patibility mode, the actual transfer rate will fall
again.
That’s why you should only activate the compati-
bility mode, when you have really operating
802.11b and 802.11g stations in your wireless
network.
Please notice that not all frequencies are permitted in each country!
You will find a table with the allotted frequencies and the permission
regulations in the appendix.
11.1.2 Operation modes of Wireless LANs and base stations
Wireless LAN technology and base stations in Wireless LANs are used in the
following operation modes:
̈ Simple direct connections between terminals without base station (ad-
hoc mode)
1. Institute of Electrical and Electronic Engineers – International association, which estab-
lished i.a. numerous technology standards.
206
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
̈ Larger Wireless LANs, connection to LANs with one or more base stations
(infrastructure network)
̈ Connecting two LANs via a direct radio link (point-to-point mode)
̈ Connecting of devices with Ethernet interface via base stations (client
mode)
̈ Extending an existing Ethernet network with WLAN (bridge mode)
̈ Multiple radia cells with one access point (Multi-SSID)
Application examples:
̈ Setting-up of an Internet access for WLAN clients
̈ Passing-through of VPN-encrypted connections with VPN pass-through
The ad-hoc mode
When two terminals are equipped with compatible wireless interfaces, they
both can communicate directly via radio. This simplest use is the so-called ad-
hoc mode.
Only in IEEE
802.11b or IEEE
802.11g standard
In ad-hoc networks you connect two or more PCs with own wireless interfaces
directly together for building a Wireless LAN.
This operation mode is generally called peer-to-peer network (spontaneous
network). PCs can immediately get in touch and exchange data.
The infrastructure network
By use of one or more base stations (also called access point), a Wireless LAN
becomes more comfortable and more efficient. A Wireless LAN with one or
more base stations is referred to as an infrastructure network in Wireless LAN
terminology.
Interesting applications arise for the Wireless LAN from the LAN connection
of base stations:
207
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
̈ Connecting the Wireless LAN to an existing LAN
̈ Extending the coverage of a Wireless LAN
Additionally, the use of a base station enables a central administration of the
Wireless LAN.
Connection to an
existing LAN
An infrastructure network is ideally suitable as an extension to existing wired
LANs. For extension of a LAN in areas, where a wiring is not possible or une-
conomical, the infrastructure network represents an ideal alternative.
Wireless
base station
LAN
Larger extension by
roaming function
The area, in which mobile stations can get in touch with a base station, is
called radio cell.
If the range of a radio cell is not sufficient any longer to serve all mobile sta-
tions of a wireless network, several base stations can be brought in action. It
is possible to change from a radio cell into another one without interruption
of the network connection. The transmission of roaming information and data
between the base stations is enabled by the wired LAN connection.
208
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Mobile station leaves
radio cell A and …
… changes
into radio cell
connectionvia
LAN
worksta-
radio cell B
radio cell A
In the example above, the roaming function of the mobile station enables the
access to the workstation in radio cell A also after changing into radio cell B.
After the radio cell change, the base station in radio cell B passes on the data
of the mobile station via LAN to the base station in radio cell A. From there,
they arrive via radio at the workstation in radio cell A. In this way, the connec-
tion between both devices remains existing at any time.
A Wireless LAN can consist of as many as desired radio cells. Thus the exten-
sion of a Wireless LAN is unlimited.
Base station as router
The LANCOM Wireless base station possesses a WAN connector for all current
broadband modems with cable-bound Ethernet connection (DSL or cable
modem). In this operation mode, the base station offers all functions of a
complete IP and IPX router as well. The base station serves in this connection
variant as gateway to the Internet. The router checks for all received data
packets whether they need to be transferred to another network or worksta-
tion. The router itself establishes the connections as required.
The integrated Stateful Inspection Firewall prevents effectively the penetration
of undesired data traffic into the own network by permitting incoming data
only as reaction to outgoing data traffic. For accessing the Internet, the IP
masquerading function of the router hides all workstations of the LAN behind
a single public IP address. The real identities (IP addresses) of the individual
workstations remain concealed. Firewall filters of the router permit specific IP
addresses, protocols and ports to be blocked. With MAC address filters it is
209
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
also possible to specifically control the access of workstations in the LAN to
the IP routing function of the device.
WLAN
firewall
LAN
Internet
WAN
base station
DSL modem or any broad-
band connection
VPN pass-through
VPN technology (VPN=Virtual Private Network) is more and more frequently
in use to protect sensitive data. The LANCOM Wireless DSL base station is able
to route and mask simultaneously the encrypted data between a VPN client of
the WLAN and another workstation of the cable-bound LAN. This “passing-
through” of VPN encrypted data is called in technical jargon “VPN pass-
through”.
VPN client
VPN remote station
The LANCOM Wireless DSL base stations support VPN pass-through
function for multiple stations within a wireless network.
Wireless bridge between two Ethernet segments
With two base stations, two LANs can be connected via a radio link (point-to-
point mode). In this so-called bridge mode, all data is transferred automati-
cally to the remote network.
210
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
By the use of narrow beam antennas (e.g. AirLancer Extender), also larger dis-
tances can be bridged securely. An additional increase of reach can be
achieved by use of further base stations, which operate in relay mode between
two LAN segments.
Point-to-multipoint
operation
It is possible to couple up to seven remote network segments to an united net-
work by wireless bridges in the so-called P2MP operation (point-to-
multipoint) mode.
Point-to-station
operation
The so-called P2Station operation (point-to-station) connects a single station
is to a remote LAN.
Base station in client mode
For binding single devices with Ethernet interfaces to a Wireless LAN,
LANCOM Wireless base stations can be put into the so-called client mode, in
which they behave like a conventional Wireless LAN adapter and not like a
211
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
base station. Due to the client mode, it is also possible to integrate devices
like PCs or printers having only one Ethernet interface into a Wireless LAN.
base stations in
client mode
base stations in
standard mode
Multiple radio cells with Multi-SSID
Conventionally, a wireless network card supports exactly one radio cell.
These radio cells are given a network name, known as the ‘SSID’ (Service Set
Identifier), that is entered into the access points and network cards during
configuration. Certain settings that apply to the radio cell can be defined
under the SSID during the configuration of the access point. The settings
include, for example, the data transfer speed and the first WEP key, which is
also used as passphrase for encryption with 802.11i and WPA. Those clients
that are programmed with the SSID can make use of the radio cell and work
with the parameters as defined. The access point treats all clients on an equal
basis
SSID='WLAN'
LAN
212
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
In some applications, however, it may be desirable to divide the clients the
radio cell into different groups, each of which is treated in a certain way by
the access point. It may be necessary, for example, to operate a public wireless
network without any encryption simultaneous to a protected, WPA- or WEP-
encrypted wireless network that excludes unauthorised parties.
The Multi-SSID function of the LANCOM access points is ideally suited to sce-
narios like this. This function enables a physical WLAN interface of an access
point to be assigned with more than one SSID. Up to eight different logical
radio cells—each with its own SSID—can be supported by a single WLAN
interface.
SSID='PUBLIC'
SSID='CLOSED'
LAN
11.2 Developments in WLAN security
The WLAN standards WPA and 802.11i are currently redeeming the reputation
of WLAN security, an issue which has recently been under attack. The
processes incorporated into the original standard proved insufficient in
practice. This lack led on the one hand to a series of proprietary extensions of
the standard, like "CKIP" from Cisco, or "KeyGuard" from Symbol
Technologies, and on the other hand to solutions which offered the required
security on higher protocol layers with tools like PPTP or IPSec. All these
processes are quite functional, but they introduce limitations, for instance
those relative to interoperability or data transmission rates.
In the recently released standard 802.11i, the IEEE Committee has redefined
the topic "WLAN and security" from the ground up. The result is a set of
standardised methods that enable the construction of secure and
manufacturer-independent WLANs in line with current standards.
213
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
On the way from the original WEP of the 802.11 standard to 802.11i, a whole
series of concepts have arisen that have tended to increase confusion and
insecurity among the users. This document should help to explain the
concepts and the processes used, in chronological order of their development.
11.2.1 Some basic concepts
Even though one constantly hears the blanket term 'Security' when talking
about computer networks, it is still important for the coming exposition to
differentiate a little more closely between the requirements it actually entails.
The first point in security is access security:
̈ Here, a protective mechanism is involved which allows access to the
network only to authorised users.
̈ On the other hand, however, it must also be ensured that the client is
connected to the precise desired access point, and not with some other
access point with the same name which has been smuggled in by some
nefarious third party. Such an authentication can be provided, for
example, using certificates or passwords.
̈ Once access is provided, one would like to ensure that data packets reach
the receiver without any falsification, that is, that no-one can change the
packets or insert other data into the communication path. The
manipulation of data packets themselves cannot be prevented, but
changed packets can indeed be identified using suitable checksum
processes, and then discarded.
Quite separate from access security is confidentiality, that is, unauthorised
third parties must not be able to read the data traffic. To this end, the data are
encrypted. This sort of encryption process is exemplified by DES, AES, RC4, or
Blowfish. Along with encryption, of course, there must also be a
corresponding decryption on the receiving end, generally with the same key
(a so-called symmetric encryption process). The problem naturally then arises,
how the sender can give the key to the receiver for the first time—a simple
transmission could very easily be read by a third party, who could then easily
decrypt the data traffic.
In the simplest case, this problem is left to the user, that is, one simply
assumes that the user can make the key known at both ends of the
connection. In this case, one speaks of pre-shared keys, or 'PSK'.
More sophisticated processes come into play when the use of pre-shared keys
is impractical, for instance in an HTTP connection built over SSL—in this case,
the user can't retrieve a key from a remote web server quite so easily. In this
214
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
case, so-called assymetric encryption methods such as RSA can be used, that
is, to decrypt the data, a different key is used than the one used to encrypt it.
Such methods are, however, much slower than symmetric encryption
methods, which leads to a two-phase solution: one side possesses an
asymmetric key pair and transmits the encryption key to the other side,
generally as a part of a certificate. The other side chooses an arbitrary
symmetric key, and encrypts this symmetric key with the asymmetric key
previously received. The owner of the asymmetric key pair can now decrypt it,
but a potential eavesdropper cannot—the aim of the secure key exchange is
achieved.
In the following sections, we will see these methods again, sometimes in
modified form.
11.2.2 WEP
WEP is an abbreviation for Wired Equivalent Privacy. The primary goal of WEP
is the confidentiality of data. In contrast to signals which are transmitted over
cables, radio waves spread out in all directions—even into the street in front
of the house and other places where they really aren't desired. The problem
of undesired interception is particularly obvious in wireless data transmission,
even though it can also arise in larger installations with wired networks—
however, access to cables is far more easily restricted than is the case with
radio waves.
During the development of the WLAN security standard, the IEEE Committee
did not intend to develop a "perfect" encryption method. Such high-security
encryption methods are, for instance, required and also used in electronic
banking—in this case, however, the applications themselves use high-quality
encryption methods, and it would be unnecessary to repeat this effort at the
radio transmission level. With the new security standards, only those
applications which normally work without encryption in wired LANs should be
provided with sufficient security against eavesdropping by unauthorised third
parties.
Figure 1 shows the process of WEP encryption—decryption runs in precisely
the opposite manner. WEP is therefore a symmetrical encryption method. WEP
uses RC4 algorithm as its basic encryption technology, a process already well-
known in other areas and considered highly secure. RC4 uses a key between
8 and 2048 bits in length, which is used to generate a pseudo-random series
of bytes using a predetermined process. The data packet is then XOR'd byte
by byte with this byte stream. The receiver simply repeats this process with the
same key and thus with the same sequence, in order to retrieve the original
215
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
data packet—a double application of the XOR operation with the same
values cancels out.
Data
CRC
Data + CRC
RC4
WEP key
+
XOR
Generator
Current IV
+1
IV
Data + CRC (encrypted)
Figure 1: WEP process
The advantage of RC4 is that the operations
̈ generation of the byte sequence from the key
̈ XOR operation on the data stream
on the sending and receiving sides are identical—so the hardware need only
be built into the WLAN card once, and then can be used for both transmission
and receiving. Since the data in the WLAN are transmitted half-duplex only,
simultaneous transmission and receiving will never occur. However, RC4 has
one serious disadvantage: one may only use a particular RC4 key once for a
single packet! If the same RC4 key is used for two different data packets, then
a potential eavesdropper is able to take the two packets and XOR them
together. This operation doesn't result in clear text, but the pseudo-random
sequence, and thus the encryption, cancels out, and one has the XOR
216
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
combination of two clear text packets. If one already knows the contents of
one of the two packets, then the clear text of the other is easily determined.
Thus WEP does not directly use the key entered by the user for the RC4
algorithm, but rather combines it with a so-called Initial Vector (IV) to arrive
at the actual RC4 key. This IV is automatically changed from packet to packet
by the sender, generally by simple incrementation, and is transmitted along
with the encrypted packet. The receiver uses the IV included in the packet in
order to reconstruct the RC4 key actually used for the packet.
WEP also calculates a CRC checksum for the unencrypted packet and appends
it to the packet before it is RC4-encrypted. The receiver can check this CRC
checksum after decryption and determine whether the decryption was
faulty—for example, due to an incorrect WEP key. In this way, WEP also
happens to offer a certain degree of access security, since an intruder without
knowledge of the WEP key can only generate "defective" packets, which will
automatically be filtered out by the WLAN card.
This additional IV explains some of the confusion one sees about the key
length in WEP—since larger key lengths sound more secure, the 24 bits of the
IV sound nice when added to the actual key length, although the user can of
course only configure the left-over portion. The IEEE standard originally
foresaw a relatively short key length of 40 bits, which was probably oriented
towards the then-existing US export restrictions on strong cryptography—this
variant is usually called WEP64 in brochures. Most WLAN cards today support
a variant in which the user can configure a 104-bit key, which results in a 128
bit long RC4 key—correspondingly, this is often called WEP128. More seldom
are key lengths of 128 bits (WEP152) or 232 bits (WEP 256).
As explained above, RC4 can in principle work with key lengths up to 2048
bits, which would correspond to WEP keys of up to 2024 bits. In the practice,
key lengths reach a simple limit at which the user can manage to enter the
columns of digits without making a mistake. Since WEP is a pure PSK method,
the keys must be entered identically on both sides of the connection. The IEEE
standard provides no mechanism to distribute WEP keys in a WLAN
automatically. Some manufacturers have, for instance, attempted to simplify
entry for users by requiring entry not of the WEP key itself, but rather a
passphrase (a sort of overly long password) from which the key can be
calculated. However, this procedure varies from manufacturer to
manufacturer so that the same passphrase for different manufacturers might
lead to different WEP keys—besides, users have a tendency to choose
passwords which are relatively easy to guess, so that the resulting keys are
217
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
usually weaker than 40 or 104 bits (the current IEEE standards, for instance,
assume that a typical password has a strength of about 2.5 bits per character.)
The IEEE standard specifies that up to four different WEP keys can exist in one
WLAN. The sender encodes the number of the WEP key used in the encrypted
packet along with the IV, so that the receiver can use the appropriate key. The
idea behind this was that old keys in a WLAN could gradually be exchanged
for new keys, in that stations which had not yet received the new key could
still use an old key during a transition period.
Based on WEP, the 802.11 standard also defines a Challenge-Response
procedure for authentication of clients. The access point sends a clear-text
packet which contains a 128-byte long challenge, which the client encrypts
and sends back with WEP. If the access point can successfully decrypt this
answer (that is, the CRC is correct) and the result is the originally transmitted
challenge, it can assume that the client has a correct WEP key and thus is
authorised for access.
Unfortunately, this process provides a potential attacker with 128 bytes of
clear text and the corresponding encrypted text, which offer scope for crypto
analysis. Furthermore, many clients don't implement this variant, so that this
process, called Shared Key, is seldom used—instead, processes started after
the WLAN registration are used for authentication, such as 802.1x (see
below).
While the WEP process theoretically sounds good up to now, in practice there
are unfortunately serious flaws which significantly reduce the advantages—
regardless of the WEP key length used. These weaknesses really should have
been found by closer analysis at the time when WEP was being defined.
Unfortunately, no cryptology experts participated in the WEP definition
process, so these flaws only became obvious once the WEP process was
massively implemented thanks to the market success of 802-11b WLAN cards
(earlier 2MB designs often included no encryption at all—WEP is an optional
function in the 802.11 standard).
The chief weakness of WEP is the IV length, which is far too short. As already
mentioned, the reuse of a key in RC4 is a serious security loophole—but it
occurs in WEP at least every 16 million packets, when the IV counter overflows
from 0xfffff to zero. An 11MB WLAN can achieve a net data rate of around
5MB/sec; with a maximum packet length of 1500 bytes, that comes to about
400 packets per second at full throttle. After about 11 hours, the IV counter
would theoretically overflow, and an eavesdropper receives the information
needed to 'crack' the WEP key. In practice, the attacker will actually receive
this information much sooner. Mathematical analyses of RC4 have shown that
218
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
for certain values of the RC4 key, conclusions may be drawn about the first
values of the pseudo-random sequence it generates—thus about the bytes
with which the beginning of the packet are encrypted. This property of RC4
can be relatively easily avoided, for instance by discarding the first bytes of the
pseudo-random byte sequence and only using the "later" bytes for
encryption, and this is often done nowadays when RC4 is used. But when this
discovery was first made WEP in its described form was already part of the
IEEE standard and indelibly incorporated into the hardware of the widely
distributed WLAN cards.
Very unfortunately, these "weak" values of RC4 keys can be recognised by
particular values in the first bytes of the RC4 key, and in WEP that happens in
the IV in each packet—which is transmitted in clear text. Once this
connection was discovered, specialised sniffer tools quickly appeared on the
Internet, which watched for packets with these 'weak IVs', and thus only had
to process a fraction of the total traffic. Depending on the amount of data
being transferred in a WLAN, such tools can crack the encryption in a fraction
of the time mentioned above. With longer WEP keys (such as 104 instead of
40 bits) this may take a little longer, but the time required for cracking grows
at best linearly with the key length, not exponentially, as is usually the case.
Unfortunately the CRC checksums contained in the packets also haven't lived
up to expectations. Ways were found to change encrypted packets under
certain conditions even without knowledge of the WEP key in such a way that
the CRC is still valid after decryption on the receiving end. So WEP therefore
cannot guarantee that a packet hasn't been changed on the way from sender
to receiver.
These weaknesses unfortunately degraded WEP to an encryption scheme
which at best could be used to protect a home network against 'accidental
eavesdroppers.' These discoveries gave rise to much controversy, gave WLAN
the reputation of being unsafe technology, and forced manufacturers to
action. WLAN is, however, a standardised technology, and better standards
don't come into being from one day to the next—which is why there were a
few intermediate steps to a secure solution, which at least blunted the worst
of WEP's design flaws.
11.2.3 WEPplus
As explained in the previous section, the use of 'weak' IV values was the
problem which weakened the WEP process most. Only a few weeks after the
publication, tools like 'WEPCrack' and 'AirSnort' appeared on the Internet,
219
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
which could automatically crack an arbitrary WLAN connection within a few
hours. With this, WEP was essentially worthless.
A first 'quick shot' to secure WLANs against this kind of program was the
simple notion that the weak IV values are known, and that they could simply
be skipped during encryption—since the IV used is after all transmitted in the
packet, this procedure would be completely compatible with WLAN cards
which didn't understand this extension, dubbed WEPplus. A true
improvement in security would naturally only result once all partners in the
WLAN were using this method.
In a network equipped with WEPplus, a potential attacker again has the chore
of listening to the entire data traffic, waiting for IV repetitions—simply
waiting for the few packets with weak IVs is no longer an option. This raised
the bar for an attacker again, particularly if one didn't simply set the IV
counter to zero when initialising a WLAN card, but rather initialised with a
random value: the IV counter at an access point only starts to count when the
first station logs in and starts transmitting data. If the access point and station
each initialised their IV counters to zero, packets with identical IV values occur
immediately after the connection is made. By initialisation to a random value,
the collision can at least be delayed by an average of 223 packets, that is, half
the space of possible IVs —with more than one station in a WLAN, this value
is naturally reduced. WEPplus is thus technically only a slight improvement—
but it did serve to calm the user base enough to make WEP acceptable again,
at least for home use (as long as a new key was configured often enough.) For
use in a professional environment, of course, that didn't suffice.
11.2.4 EAP and 802.1x
Obviously, an 'add-on' like WEPplus can't eliminate the basic problem of too-
short IVs, without changing the format of packets on the WLAN, thus
rendering all existing WLAN cards incompatible. There is, however, a
possibility of solving several of our problems with one central change: no
longer use the formerly fixed WEP key, but to negotiate them dynamically
instead. As the process to be used for this purpose, the Extensible
Authentication Protocol has emerged. As the name suggests, the original
purpose of EAP is authentication, that is, the regulated access to a WLAN—
220
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
the possibility of installing a valid WEP key for the next session is more or less
a byproduct. Figure 2 shows the basic process of a session secured by EAP.
Client
Access point
RADIUS server
WLAN registration
EAP/802.1x negotiation
Sharing of Master Secret
Session key
normal data traffic
new session key
more normal data traffic
Figure 2: Schematic process of a WLAN session with EAP/802.1x
In the first phase, the client registers with the access point as usual, and enters
the state in which it can now send and receive over the access point in normal
WEP or WEPplus—but not with EAP, because in this state the client still
doesn't have a key to secure its data traffic from eavesdropping. Instead, the
client is in an 'intermediate state' from the point of view of the access point,
in which only particular packets from the client are forwarded, and these are
only directed to an authentication server. These packets implement EAP/
802.1x as already mentioned, which can easily be distinguished from other
protocols due to its Ethernet type 0x888e. The access point packages these
packets in RADIUS queries and sends them on to the authentication server.
The access point converts the replies coming from the RADIUS server back into
EAP packets, and sends them back to the client.
221
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
The access point is thus a sort of middle man between client and server. it
doesn't have to check the contents of these packets, it just has to check that
no other data traffic to or from the client can occur.
This process has two advantages:
̈ The implementation effort in the access point is low. While the client and
the server are usually PCs with high levels of resources, access points are
devices which are limited both in memory and in computing power.
̈ New processes for authentication require no firmware upgrade on the
access point.
Over this tunnel through the access point, the client and server authenticate
one another, that is, the server checks the client's access privilege to the
network, and the client checks that it is talking to the right network. "Wild"
access points set up by hackers can be recognised in this way.
A whole series of authentication processes exist which can be used in this
tunnel. A current process (and one supported by Windows XP) is for instance
TLS, in which server and client exchange certificates; another is TTLS, in which
only the server supplies a certificate—the client is authenticated using only a
username and password.
After the authentication phase, a secure tunnel even without WEP encryption
has been set up, in which the access point is connected in the next step.
For this, the RADIUS server sends the so-called 'Master Secret', a session key
calculated during the negotiation, to the access point. The LAN behind it is
considered secure in this scenario, so that this transmission can be performed
in clear text.
With this session key, the access point now takes over the tunnel and can use
it to provide the actual WEP key to the client. Depending on the capabilities
of the access point hardware, this can be a true session key (that is, a WEP key
which will only be used for data packets between the access point and
precisely this client), or a so-called group key, which the access point will use
for communication with multiple clients. Classical WEP hardware can usually
handle only group keys, these being the four mentioned in the chapter on
WEP.
The particular advantage of this procedure is that the access point can
regularly change the WEP key over the EAP tunnel, that is, it can perform a
so-called rekeying. In this way, WEP keys can be replaced by new ones long
before they run the risk of being cracked due to IV collisions. A common 'use
time' for such WEP keys might be 5 minutes.
222
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Further advantages of this procedure include its simple implementation in the
access point, with little extension to existing hardware. The disadvantage of
the procedure is its complexity. The maintenance of the central RADIUS server
and the certificates stored there is generally only possible in large installations
with a separate IT department—it is less suitable for use in the home or in
smaller companies. Furthermore, a minimum set of procedures has not been
established which a client or a server must support. Thus scenarios are quite
thinkable in which a client and a server cannot establish an EAP tunnel,
because the sets of procedures they support don't match. These practical
hurdles have thus limited EAP/802.1x to professional use so far—the home
user must simply make do with WEPplus, or address security problems on the
applications level.
11.2.5 TKIP and WPA
As should be clear from the last section, the WEP algorithm is flawed and
insecure in principle; the measures taken so far were largely either 'quick fixes'
with limited improvement, or so complicated that they were basically
impractical for home use or smaller installations.
The IEEE started a Task Group after the discovery of the problems with WEP
which addressed the definition of better security mechanisms, and which
should eventually result in the IEEE 802.11i standard. The composition and
ratification of such a standard, however, generally takes several years. In the
meantime, market pressure had grown to the point where the industry could
no longer wait for the finalisation of 802.11i. Under the auspices of Microsoft,
therefore, the WiFi Alliance defined the Wifi Protected Access (WPA)
'standard'. The WiFi Alliance is an association of WLAN manufacturers which
promotes the manufacturer-independent function of WLAN products and, for
example, awards the Wifi logo.
In the definition of standards, and 802.11i is no exception, the basic
mechanisms are generally known fairly quickly. The publication of the
standard mostly takes such a long time because of the fine details. These
details are often important only for rare applications. WPA thus took the
pragmatic route of extracting the parts of the 802.11i proposal which were
already clear and important for the market, and packing them into their own
standard. These details include:
̈ TKIP and Michael as replacement for WEP
̈ A standardised handshake procedure between client and access point for
determination/transmission of the session key.
223
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
̈ A simplified procedure for deriving the Master Secret mentioned in the
last section, which can be performed without a RADIUS server.
̈ Negotiation of encryption procedure between access point and client.
TKIP
TKIP stands for Temporal Key Integrity Protocol. As the name suggests, it
involves an intermediate solution for temporary use until a truly strong
encryption procedure is introduced, but which deals with the problems of
WEP, never the less. One design requirement was therefore that the new
encryption procedure should be implementable on existing WEP/RC4
hardware with a reasonable effort. When TKIP was defined, it was already
foreseeable that it would be used well into the era of 54/108Mbit LANs, and
a purely software-based encryption would be associated with too high a
speed penalty on most systems. In the 'block diagram' of TKIP (Figure 3),
therefore, there are many components of WEP to be seen, which generally
exist in hardware in WEP cards and thus can effectively be used for TKIP.
Data
Michael key
Michael
CRC
TKIP
Data + Michael
Michael
Source MAC address
TKIP key
Data + Michael + CRC
Key mixing
(phase 1)
RC4
Key mixing
(phase 2)
Generator
XOR
IVHi
IVLo
Data + Michael + CRC (encrypted)
+1
Figure 3: Procedure for TKIP/Michael
IVHi
IVLo
As components already familiar from WEP, one recognises the RC4 engine
used for the actual encryption and decryption, as well as the CRC module. As
224
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
a new component (green), however, besides the CRC, the unencrypted
package also has a so-called Michael-MIC attached. This is a hash algorithm
developed especially for WLAN, which was designed so that it can be
computed on older WLAN hardware with reasonable overhead. Since in
contrast to the CRC a second key (the Michael key) must be agreed in this
hash, it can neither be calculated nor used to falsify a data packet without
detection by the receiver. This is only remains true if an attacker doesn't break
the Michael hash with brute force techniques. Due to the requirement of high
run-time efficiency, Michael makes a few compromises: although a 64-bit key
is used, the effective strength of Michael is only about 40 bits. This was still
seen as sufficient, since a potential attacker would have to break the TKIP
components in the first place in order to generate data packets which would
get past the CRC check of the WEP/RC4 components.
TKIP (red) takes care of the calculation of the actual key for the RC4 engine.
In contrast to WEP, the actual key and the IV contained in the packet are never
used directly as the RC4 key, but rather it runs through two so-called key
mixing phases along with the IV—so an attacker can draw no direct
conclusions about the RC4 key from the IV contained in clear text, which
solves the problem of 'weak' IVs in WEP (the key mixing itself is designed so
that weak RC4 keys can never occur).
Furthermore, the internally incremented IV transmitted in clear text in the
packet is 48 bits long instead of 24 - so a sender can now transmit some 280
trillion packets before the 128-bit TKIP key must be changed. Even in a
modern WLAN with a net 108 Mbps, which achieves a net rate of around 50
Mbps, using the same assumptions made above for WEP, this would
correspond to about 2000 years.
It must still be noted that the IV is split into two parts for reasons of
optimisation: a 16-bit low part and a 32-bit high part. The background for
this is that the key mixing proceeds in two phases, as shown in the illustration:
̈ For the first (computationally intensive) phase, only the upper part is
needed, so it only needs to be performed once for every 65,536 packets.
̈ The second, relatively simple phase of the key mixing uses the result of the
first phase along with the low part of the IV (which changes with each
packet) in order to create the actual RC4 key.
In contrast to WEP, it is additionally determined in TKIP that the IVs to be used
from packet to packet must increase in a strictly monotone manner, so the
receiver only has to perform phase 1 for every 65,536 received packets. The
225
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
decryption part of TKIP checks this sequentiality and discards packets which
contain an already-used IV, which prevents replay attacks.
As a further detail, TKIP also mixes the MAC address of the sender into the
first phase. This ensures that the use of identical IVs by different senders
cannot lead to identical RC4 keys and thus again to attack possibilities.
As mentioned above, the Michael hash does not represent a particularly tough
cryptographic hurdle: if the attacker can break the TKIP key or get encrypted
packets past the CRC check via modifications similar to those for WEP, then
not many barriers remain. For this reason, WPA defines countermeasures if a
WLAN card detects more than two Michael errors per minute: both the client
and the access point break data transfer off for one minute, afterwards
renegotiating TKIP and Michael keys.
The key handshake
In the discussion of 802.1x it was already noted that EAP/802.1x provides a
possibility to inform the client at the outset of a session of the key valid for it.
WPA now places that on a standardised basis, and considers the session-key
option offered by modern access points that, in addition to the four 'global'
keys, assigns each registered client with a session key that is used exclusively
with data packets to or from that client.
If you take another look at the procedure shown in Figure 2, the newly defined
key handshake replaces the phase in which the access point transmits the
WEP key to the client after receiving the Master Secret from the RADIUS server.
226
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
The key handshake breaks down into two phases: first the pairwise key
handshake, then the group key handshake (Figure 4).
Client
Access point
1 (Send ANonce)
2 (Send SNonce)
3 (Install Pairwise Key)
4 (Pairwise Key Installed)
1 (Install Group Key)
2 (Group Key Installed)
Figure 4: Key handshake in WPA
As you can see, the handshake consists of pairs of packets which each consist
in turn of a 'query' of the access point and a 'confirmation' of the client. The
first pair serves mostly for the client and access point to exchange the specific
random values (so-called nonces) to be used for this negotiation. The Master
Secret already known to both sides is now mixed with these nonces and after
a predetermined hash procedure, further keys are generated, on the one hand
to take care of securing further exchanges, and on the other to be used as a
pairwise key for this station. Since the Master Secret isn't used directly, it can
be reused later for any necessary renegotiations, since it can then be mixed
with new random value and thus will deliver different keys.
In the second pair, the access point instructs the client to install the calculated
TKIP session key, and as soon as the client confirms this, the access point does
the same. This concludes the pairwise handshake, and as a result it is now
possible to exchange data between client and access point via TKIP.
227
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
The client still can't be 'approved', however, because the access point must
still transmit a further key—the group key, which it uses to transmit broadcast
and multicast packets simultaneously to all stations. This must be determined
unilaterally by the access point, and it is simply transmitted to the station,
which confirms receipt. Since at this point a pairwise key is already installed
on both sides, both of these packets are already encrypted.
After a successful group key handshake, the access point can finally release
the client for normal data transfer. The access point is free to perform a
rekeying again during the session using the same type of packets. In principle,
the client may also request rekeying from the access point.
WPA also takes the case of older WLAN hardware into account, in which the
access point does not support pairwise keys, but only group keys. The first
phase of the handshake in this case proceeds exactly as before, but doesn't
result in the installation of a pairwise key—the group key handshake simply
proceeds in clear text, but an encryption in the EAP packets themselves
prevents an attacker from simply reading the keys.
WPA with passphrase
The handshake described in the previous section runs strictly under WPA, i.e.
the user will never have to define any TKIP or Michael keys. In environments
in which no RADIUS server is available to provide master secrets (for instance
in smaller companies or home networks), WPA therefore provides the PSK
method besides authentication using a RADIUS server; here, the user must
enter a passphrase of 8 to 32 characters on the access point and on all
stations, from which the master secret is calculated along with the SSID used
using a hash procedure. The master secret is therefore constant in such a PSK
network; the nonces ensure, however, that different TKIP keys still result.
In a PSK network—similar to classical WEP—both access security and
confidentiality depend on the passphrase not being divulged to unauthorised
people. As long as this is the case, WPA-PSK provides enormously improved
security against break-ins and eavesdropping over any WEP variant. For larger
installations in which such a passphrase would have to be made known to too
large a user community for it to be kept secret, EAP/802.11i is used in
combination with the key handshake described here.
Negotiation of the
encryption method
The original WEP definition only specified a fixed key length, so that only a
single bit was required in the registration packets from the station and access
228
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
point to show whether encryption should be used or not. This became
insufficient the moment WEP was used with key lengths other than 40 bits—
the user just had to take care that not only the same value but that the same
length was defined as well. WPA provides a mechanism with which client and
access point can agree on the encryption and authentication procedures to be
used. For this purpose, a new info element was defined which can contain the
following:
̈ The encryption method to be used for broadcasts in this network (also the
type of group key). Each client wanting to register in a WPA-WLAN must
support this procedure. Here, besides TKIP, WEP is also still allowed, in
order to support mixed WEP/WPA networks—in a pure WPA network,
TKIP will be selected.
̈ A list of encryption methods which the access point provides for the
pairwise key—here, WEP is explicitly disallowed.
̈ A list of authentication methods a client may use to show itself to the
WLAN as authorised for access—possible methods are currently EAP/
802.1x or PSK.
The access point broadcasts such an element with its beacons, so that clients
know whether this network is suitable for them or not. When registering at
the access point, the client sends another such packet, in which it gives the
desired type of pairwise key as well as its authentication scheme. The access
point then starts either the EAP/802.1x negotiation, or starts directly with the
key handshake.
Since neither beacons nor registration packets are cryptographically secured,
it is possible that a third party might interfere in this exchange and force the
client and/or the access point down onto a weaker method than the one
actually desired. Both the access point and the client are therefore required to
exchange these info elements again during the key handshake, and if the
element received doesn't match the one from the registration, they
immediately break the connection.
As mentioned, the original WPA standard specifies only TKIP/Michael as an
improved encryption method. With the further development of the 802.11i
standard, the AES/CCM method described below was added. In a WPA
network it is now possible for some clients to communicate with the access
point using TKIP, while other clients use AES.
229
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
11.2.6 AES and 802.11i
In mid-2004, the long awaited 802.11i standard was approved by the IEEE,
which should put the entire security concept of the WLAN on a new basis—
which is to be expected, since errors as serious as those encountered during
the introduction of WEP are unlikely to occur with 802.11i. As mentioned in
the last section, WPA has already implemented a whole series of concepts
from 802.11i—so in this section we will only describe the components which
are new compared to WPA.
AES
The most obvious extension is the introduction of a new encryption process,
namely AES-CCM. As the name already hints, this encryption scheme is based
on DES's successor AES, in contrast to WEP and TKIP, which are both based
on RC4. Since only the newest generation of WLAN chips contain AES
hardware, 802.11i continues to define TKIP, but with the opposite
prerequisites: any 802.11i-compliant hardware must support AES, while TKIP
is optional—in WPA that was exactly the other way around. Due to the
widespread adoption of non-AES-compatible hardware, however, it is to be
expected that every AES-capable WLAN card will still support WEP and TKIP.
WLAN devices will, however, probably provide configuration options which
prevent use of TKIP—many agencies in the USA consider TKIP insufficiently
secure, which due to the comparatively weak Michael hash is fairly well
justified.
The suffix CCM denotes the way in which AES is used in WLAN packets. The
process is actually quite complicated, for which reason CCM is only sensibly
implemented in hardware—software-based implementations are possible,
but would result in significant speed penalties due to the processors
commonly used in access points.
In contrast to TKIP, AES only requires a 128-bit key, with which both the
encryption and protection against undetected changes to packets is achieved.
Furthermore, CCM is fully symmetric, i.e. the same key is used in both
communications directions—a compliant TKIP implementation, on the other
hand, requires the use of different Michael keys in the send and receive
directions, so that CCM is significantly simpler in use than TKIP.
Occasionally one finds other AES variants in older publications or drafts of the
802.11i standard, namely AES-OCB or WRAP. In these variants, AES was used
in a different form, which was dropped in favor of CCM in the final standard.
WRAP is nowadays meaningless.
230
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Similar to TKIP, CCM uses a 48-bit Initial Vector in each packet—an IV
repetition is impossible in practice. As in TKIP, the receiver notes the last IV
used and discards packets with an IV which is equal to or less than the
comparison value.
Pre-authentication and PMK caching
As mentioned earlier, the delay in publishing standards is usually due to the
details. In the case of 802.11i, there were two details which should
particularly help with the use of WLAN for speech connection (VoIP) in
enterprise networks. Especially in connection with WLAN-based wireless
telephony, quick roaming (switching from one access point to another without
lengthy interruptions) is of special significance. In telephone conversations,
interruptions of 100 milliseconds are irritating, but the full authentication
process over 802.11x, including the subsequent key negotiation with the
access point, could take significantly longer.
For this reason, the so-called PMK caching was introduced as a first measure.
The PMK, of course, serves as the basis for key negotiation in an 802.1x
authentication for both client and access point. In VoIP environments it is
possible that a user moves back and forth among a relatively small number of
access points. Thus it may happen that a client switches back to an access
point in which it was already registered earlier. In this case it wouldn't be
sensible to repeat the entire 802.1x authentication again. For this reason, the
access point can provide the PMK with a code, the so-called PMKID, which it
transmits to the client. Upon a new registration, the client uses the PMKID to
ask whether this PMK is still stored. If yes, the 802.1x phase can be skipped
and only the exchange of six short packets is required before the connection
is restored. This optimisation is unnecessary if the PMK in a WLAN is
calculated from a passphrase as this applies everywhere and is known.
A second measure allows for some acceleration even in the case of first-time
registration, but it requires a little care on the part of the client. The client
must already detect a degrading connection to the access point during
operation and select a new access point while it is still in communication with
the old access point. In this case it has the opportunity to perform the 802,1x
negotiation with the new access point over the old one, which again reduces
the "dead time" by the time required for the 802.1x negotiation.
11.2.7 Summary
After the security loopholes in WEP encryption became public knowledge, the
presentation of short-term solutions such as WEPplus and the intermediate
231
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
steps like WPA, the IEEE committee has now presented the new WLAN security
standard 802.11i. The TKIP procedure used by WPA is based on the older RC4
algorithm, the foundation of WEP. AES is the first important and conclusive
step towards a truly secure encryption system. 802.11i/AES have confined the
practical and theoretical security loopholes in previous methods to history.
The AES procedure provides security on a level that satisfies the Federal
Information Standards (FIPS) 140-2 specifications that are required by many
public authorities.
LANCOM equips its 54Mbps products with the Atheros chip set featuring a
hardware AES accelerator. This guarantees the highest possible level of
encryption without performance loss.
The user-friendly pre-shared key procedure (entry of a passphrase of 8-63
characters in length) makes 802.11i quick and easy for anybody to set up.
Professional infrastructures with a larger number of users can make use of
802.1x and RADIUS servers.
In combination with further options such as Multi-SSID and VLAN tagging, it
is possible to provide highly secure networks for multiple user groups and with
different levels of security.
̈ LANCOM provides the PSK procedure with the LCOS version 3.50.
̈ 802.1x is foreseen for realisation in LCOS version 4.
̈ Multi-SSID is available as of LCOS 3.42.
̈ VLAN tagging is available as of LCOS version 3.32.
11.3 Protecting the wireless network
A wireless LAN does not, like conventional LAN, use cable as the transmitting
medium for data transfer, but the air instead. As this medium is openly
available to any eavesdropper, the screening of the data in a WLAN is an
important topic.
Depending on how critical WLAN security is for your data, you can take the
following steps to protect your wireless network:
ቢ Activate the "Closed network function". This excludes all WLAN clients
using "Any" as the SSID, and those that do not know your network SSID.
(’Network settings’ →page 251)
ባ Do not use your access point's default SSID. Only take a name for your
SSID that cannot be guessed easily. The name of your company, for
232
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
example, is not a particularly secure SSID. (’Network settings’
→page 251)
ቤ If you know exactly which wireless network cards are permitted to access
your WLAN, you can enter the MAC addresses of these cards into the
access control list, thus excluding all other cards from communications
with the access point. This reduces access to the WLAN only to those
clients with listed MAC addresses. (’Access Control List’ →page 235)
ብ Use encryption on the data transferred in the WLAN. Activate the
strongest possible encryption available to you ((802.11i with AES, WPA or
WEP) and enter the appropriate keys or passphrases into the access point
and the WLAN clients (’Encryption settings’ →page 238 and ’WEP group
keys’ →page 241).
ቦ Regularly change the WEP key. Also change the standard key (’Encryption
settings’ →page 238) in the configuration. Alternatively, you can use a
cron job to automatically change the key every day, for example
(’Zeitautomatik für LCOS-Befehle’ →page 46). The passphrases for
802.11i or WPA do not have to be changed regularly as new keys are
generated for each connection anyway. This is not the only reason that the
encryption with 802.11i/AES or WPA/TKIP is so much more secure that the
now aged WEP method.
ቧ If the data is of a high security nature, you can further improve the WEP
encryption by additionally authenticating the client with the 802.1x
method (’IEEE 802.1x/EAP’ →page 255) or activate an additional
encryption of the WLAN connection as used for VPN tunnels (’IPSec over
WLAN’ →page 256). In special cases, a combination of these two
mechanisms is possible.
Further information is available from our web site www.lancom-
11.4 Configuration of WLAN parameters
Changes to the wireless network settings can be made at various points in the
configuration:
̈ Some parameters concern the physical WLAN interface. Some LANCOM
models have one WLAN interface, others have the option of using a
second WLAN card as well. The settings for the physical WLAN interface
233
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
apply to all of the logical wireless networks supported by this card. These
parameters include, for example, the transmitting power of the antenna
and the operating mode of the WLAN card (access point or client).
̈ Other parameters are related solely to the logical wireless network that is
supported by a physical interface. These include, for example, the SSID or
the activation of encryption, either 802.11i with AES or WPA with TKIP or
WEP.
̈ A third group of parameters affect the wireless network operation, but are
not significant only to WLANs. These include, for example, the protocol
filter in the LAN bridge.
11.4.1 WLAN security
In this part of the configuration, you can place limitations on the
communications available to the users in the wireless network. This is done by
limiting the data transfer between user groups according to individual
stations or the protocol being used. Further, the key for the WLAN encryption
is set here.
General settings
Communications
between the WLAN
clients
Depending on the application, it may be required that the WLAN clients
connected to an access point can—or expressly cannot—communicate with
other clients. You can centrally define the permissible communication for all
physical and logical networks, and consider the three following cases in doing
so:
̈ Allow data traffic: This setting allows all WLAN clients to communicate
with other stations in their own and in other available wireless networks.
̈ Do not allow data traffic between stations that are logged on to this
access point: In this case, WLAN clients can only communicate with
mobile stations located in other available wireless networks, but not with
the stations in their own WLAN.
̈ Do not allow data traffic: This last variant prevents all communications
between the WLAN clients.
Roaming
In addition to controlling the communication between the clients, you can
define whether the mobile stations in the wireless network can change to a
neighbouring access point (roaming).
Monitor stations
In particular for public WLAN access points (public spots), the charging of
usage fees requires the recognition of stations that are no longer active.
Monitoring involves the access point regularly sending packets to logged-in
234
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
stations. If the stations do not answer these packets, then the charging
systems recognises the station as no longer active.
Configuration with
LANconfig
For configuration with LANconfig you will find the general WLAN access
settings under the configuration area 'WLAN Security' on the 'General' tab.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the general WLAN access settings
under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ WLAN module ̈ Inter-stations
traffic, monitor stations or IAAP protocol (for roaming)
Terminal/Telnet
cd /Setup/WLAN module/Inter-station traffic,
Monitor stationsor IAAP protocol(for roaming)
Access Control List
With the Access Control List (ACL) you can permit or prevent the access to
your wireless LAN by individual clients. The decision is based on the MAC
address that is permanently programmed into wireless LAN adapters.
Configuration with
LANconfig
For configuration with LANconfig you will find the general WLAN access
settings under the configuration area 'WLAN Security' on the 'Stations' tab.
235
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Check that the setting 'filter out data from the listed stations, transfer all
other' is activated. New stations that are to participate in your wireless
network are added with the button 'Stations'.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the Access Control List under the
following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ WLAN module ̈ Access list
Terminal/Telnet
cd /Setup/WLAN-Module/Access-List
Protocol filter
With the protocol filter you can influence the handling of certain protocols
during transfer from the WLAN to the LAN.
Packets from the WLAN for certain protocols/ports can be redirected
to special IP addresses in the LAN by the protocol filter. This function
known as "Redirect“ is described in detail in the section ’Redirect
function’ →page 254.
236
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Configuration with
LANconfig
For configuration with LANconfig you will find the protocol filter under the
configuration area 'WLAN Security' on the 'Protocols' tab.
Make an entry in the protocol list for each protocol that requires special
handling. Enter the following values:
̈ A name of your choice for the filter entry
̈ Protocol number, e.g. '0800' for IP. If no protocol is entered, the filter will
be applied to all packets.
̈ Subprotocol, e.g. '6' for TCP. If no subprotocol is entered, the filter will be
applied to all packets of the entered protocol.
̈ Port start and port end, e.g. each '80' for HTTP. If no ports are entered,
then this filter will be applied to all ports of the appropriate protocol/
subprotocol.
Lists of the official protocol and port numbers are available in the
Internet under www.iana.org.
̈ Action for the data packets:
୴ Let through
୴ Reject
୴ Redirect (and state the target address)
̈ List of interfaces that the filters apply to
237
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
̈ Redirect address when the 'Redirect' action is selected
Example:
Name Protocol
Subty Start
End Interface list
port
Action
Redirect IP
address
pe
port
ARP
0806
0800
0
0
0
WLAN-1-2
WLAN-1-2
WLAN-1-2
WLAN-1-2
WLAN-1-2
Let through
Let through
Redirect
0.0.0.0
DHCP
17
6
67
23
0
68
23
0
0.0.0.0
TELNET 0800
192.168.11.5
0.0.0.0
ICMP
HTTP
0800
0800
1
Let through
Redirect
6
80
80
192.168.11.5
ARP, DHCP, ICMP will be let through, Telnet and HTTP will be redirected to
192.168.11.5, all other packets will be rejected.
As soon as an entry is made in the protocol filter, all packets not
matching the filter will be automatically rejected!
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the protocol filter under the following
paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ LAN management module ̈
Protocol table
Terminal/Telnet
cd /Setup/LAN-Management-Module/Protocol-Table
Encryption settings
Access points of the LANCOM range support the most up-to-date methods of
encryption and security for data that is transferred via WLAN.
̈ The IEEE standard 802.11i/WPA stands for the highest degree of security
that is currently available for WLAN connections. This standards uses a
new encryption procedure (AES-CCM) which, in combination with other
methods, achieves levels of security equalled only by VPN connections
until now. When using AES-capable hardware (such as the 54-Mbit
AirLancer clients and the 54-Mbit LANCOM access points) the
transmissions are much faster than with comparable VPN security.
̈ WEP is also supported to ensure compatibility with older hardware. WEP
(Wired Equivalent Privacy) is the encryption method originally
238
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
incorporated in the 802.11 standard for the encryption of data in wireless
transmission. This method uses keys of 40 (WEP64), 104 (WEP128) or 128
bits (WEP152) in length. A number of security loopholes in WEP have
come to light over time, and so the latest 802.11i/WPA methods should
be used wherever possible.
Further information about the 802.11i and WPA standards are
available under ’Developments in WLAN security’ →page 213.
The tab '802.11i/WEP' in the configuration area 'WLAN Security' is used for
setting the encryption parameters for each logical WLAN. Open the list with
the button for WPA or Private WEP settings.
Type of encryption
First of all, select the type of encryption for the individual logical WLAN
interfaces:
̈ Yes—Access only for stations with encryption (recommended): In this
mode, only the WLAN clients with activated WEP and the correct key can
register with the access point.
̈ Yes—Access also for stations without encryption allowed: In this mode,
WLAN clients with activated WEP and AirLancer MC 11 clients (without
WEP) can register with this access point.
̈ No—No encryption
Method/
Key 1 length
Set the encryption method to be used here.
̈ 802.11i (WPA)-PSK – Encryption according to the 802.11i standard offers
the highest security. The 128-bit AES encryption used here offers security
equivalent to that of a VPN connection.
̈ WEP 152, WEP 128, WEP 64 – encryption according to the WEP standard
with key lengths of 128, 104 or 40 bits respectively. This setting is only to
be recommended when the hardware used by the WLAN client does not
support the modern method.
̈ WEP 152-802.1x, WEP 128-802.1x, WEP 64-802.1x – encryption
according to the WEP standard with key lengths of 128, 104 or 40 bits
respectively, and with additional authentication via 802.1x/EAP. This
setting is also only to be recommended when the hardware used by the
WLAN client does not support the 802.11i standard. The 802.1x/EAP
authentication offers a higher level of security than WEP encryption alone,
although the necessity for a RADIUS server makes very high demands of
the IT infrastructure.
239
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Key 1/passphrase
In line with the encryption method activated, you can enter a special WEP key
for the respective logical WLAN interface or a passphrase when using WPA-
PSK:
̈ The passphrase, or the 'password' for the WPA-PSK method, is entered as
a string of at least 8 and up to 63 ASCII characters.
Please be aware that the security of this encryption method depends
on the confidential treatment of this passphrase. Passphrases should
not be made public to larger circles of users.
̈ The WEP key 1, that applies only to its respective logical WLAN interface,
can be entered in different ways depending on the key length. Rules of the
entry of the keys can be found in the description of the WEP group key
’Rules for entering WEP keys’ →page 243.
WPA session key
type
If '802.11i (WPA)-PSK' has been entered as the encryption method, the
procedure for generating a session or group key can be selected here:
̈ AES – the AES method will be used.
̈ TKIP – the TKIP method will be used.
̈ AES/TKIP – the AES method will be used. If the client hardware does not
support the AES method, TKIP will be used.
Authentication
If the encryption method was set as WEP encryption, two different methods
for the authentication of the WLAN client are available:
̈ The 'Open system' method does not use any authentication. The data
packets must be properly encrypted from the start to be accepted by the
access point.
̈ With the 'Shared key' method, the first data packet is transmitted
unencrypted and must be sent back by the client correctly encrypted. This
method presents potential attackers with at least one data packet that is
unencrypted.
Default key
If WEP encryption is selected, the access point can select from four different
WEP keys for each logical WLAN interface:
̈ Three WEP keys for the physical interface
̈ An additional WEP key particular to each logical WLAN interface
The private WEP settings are used to set the additional key for each logical
WLAN interface (see 'Key 1/passphrase'). You should also select which of the
four keys is currently to be used for the encryption of the data (default key).
This setting can be used to change the key frequently, so increasing security.
240
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Rules of the entry of the keys can be found in the description of the WEP group
key ’Rules for entering WEP keys’ →page 243.
Configuration with
LANconfig
For configuration with LANconfig you will find the private WEP settings under
the configuration area 'WLAN Security' on the '802.11i/WEP' tab.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the individual key settings for logical
WLAN networks under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Encryption-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Encryption-Settings
WEP group keys
Wired Equivalent Privacy (WEP) is an effective method for the encryption of
data for wireless transmission. The WEP method uses keys of 40 (WEP64), 104
(WEP128) or 128 bits (WEP152) in length. Each WLAN interface has four WEP
241
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
keys: a special key for each logical WLAN interface and three common group
WEP keys for each physical WLAN interface.
If 802.1x/EAP is in use and the 'dynamic key generation and
transmission' is activated, the group keys from 802.1x/EAP will be
used and are consequently no longer available for WEP encryption.
Rules of the entry of the keys can be found in the description of the WEP group
key ’Rules for entering WEP keys’ →page 243.
Configuration with
LANconfig
The tab '802.11i/WEP' in the configuration area 'WLAN Security' is used for
setting the three WEP keys 2 to 4. Open the list with the button for WEP
Group Keys. These WEP keys apply to the physical WLAN interface and thus
globally to all of the associated logical WLAN interfaces.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the group keys for the physical WLAN
interface under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Group-Keys
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Group-Keys
242
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
Rules for entering WEP keys
WEP keys can be entered as ASCII characters or in hexadecimal form. The
hexadecimal form begins with the characters '0x'. The keys have a length
depending on the WEP method:
Method
ASCII
HEX
WEP 64
5 characters
Example: 'aR45Z'
10 characters
Example: '0x0A5C1B6D8E'
WEP 128
WEP 152
13 characters
16 characters
26 characters
32 characters
The ASCII character set includes the characters '0' to'9', 'a' to 'z', 'A' to 'Z' and
the following special characters:
! ” # $ % & ´ () * + , - ./ : ; < = > ? @ [ \ ] ^ _ ‘ { | } ~
The HEX form uses the numbers '0' to '9' and the letters 'A' to 'F' to display
each character as a character pair, which is why twice the number of
characters is required to display a HEX key.
Select the length and the format (ASCII or HEX) of the key depending on the
best option available in the wireless network cards that register with your
WLAN. If the encryption in an access point is set to WEP 152, some clients may
not be able to log into the WLAN as their hardware does not support the key
length.
11.4.2 General WLAN settings
Country setting
Regulations for the operation of WLAN cards differ from country to country.
The use of some radio channels is prohibited in certain countries. To limit the
operation of the LANCOM access points to the parameters that are allowed in
various countries, all physical WLAN interfaces can be set up for the country
where they are operated.
243
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Configuration with
LANconfig
For the configuration with LANconfig, the country settings can be found in the
configuration area 'Management' on the tab 'Wireless LAN' in the group
'General':
This group includes two other parameters in addition to the country setting:
ARP handling
̈ Mobile stations in the wireless network that are on standby do not answer
the ARP requests from other network stations reliably. If 'ARP handling'
is activated, the access point takes over this task and answers the ARP
requests on behalf of stations that are on standby.
Broken link
detection
̈ The 'Broken link detection' deactivates the WLAN card if the access point
loses contact to the LAN.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the general WLAN parameters under
the following paths:
Configuration tool Menu/Table
WEBconfig
Expert-Configuration ̈ Setup ̈ WLAN-Module
Terminal/Telnet
cd /Setup/WLAN
11.4.3 The physical WLAN interfaces
Setting up the WLAN card
Apart from the parameters common to all WLAN cards, there is a series of
settings to be made that are particular to each WLAN card of the access point.
Configuration with
LANconfig
For configuration with LANconfig you will find the settings for the WLAN card
under the configuration area 'Management' on the 'Wireless LAN' tab. Open
244
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
the list of physical WLAN interfaces by clicking on the button Physical WLAN
settings.
WLAN card operation
Operation mode
LANCOM Wireless devices can be operated in two basic operation modes:
̈ As an access point, it forms the link between the WLAN clients and the
cabled LAN.
̈ In Client mode the device seeks another access point and attempts to
register with a wireless network. In this case the device serves to link a
cabled network device to another access point over a wireless connection.
Select the operation mode from the tab 'Operation'. If the WLAN interface is
not required, it can be completely deactivated.
245
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you can set the operation mode for the physical
WLAN interface under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Operation-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Operation-Settings
Radio settings
Frequency band,
Subband
When selecting the frequency band on the 'Radio' tab under the physical
interface settings, you decide whether the WLAN card operates in the 2.4 GHz
or in the 5 GHz band (also see ’Standardized radio transmission by IEEE’
→page 203), and thus the available radio channels.
In the 5 GHz band, a subband can also be selected which is linked to certain
radio channels and maximum transmission powers.
In some countries, the use of the DFS method for automatic channel
selection is a legal requirement. Selecting the subband also defines
the radio channels that can be used for the automatic channel
selection.
Channel number
The radio channel selects a portion of the conceivable frequency band for data
transfer.
In the 2.4-GHz band, two separate wireless networks must be at least
three channels apart to avoid interference.
Compatibility mode
Two different wireless standards are based on the 2.4-GHz band: the
IEEE 802.11b standard with a transfer rate of up to 11 Mbps and the
IEEE 802.11g standard with up to 54 Mbps. When 2.4 GHz is selected as the
frequency band, the data transfer speed can be set as well.
Please observe that clients supporting only the slower standards may
not be able to register with the WLAN if the speeds set here are
higher.
The 802.11g/b compatibility mode offers the highest possible speeds and yet
also offers the 802.11b standard so that slower clients are not excluded. In
246
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
this mode, the WLAN card in the access point principally works with the faster
standard and falls back on the slower mode should a client of this type log
into the WLAN. In the '2Mbit compatible' mode, the access point supports
older 802.11b cards with a maximum transmission speed of 2 Mbps.
Turbo mode
Using two neighbouring, vacant channels for wireless transmissions can
increase the transfer speeds up to 108 Mbps. Set this option for the 2.4-GHz
band by selecting the drop down list '2.4 GHz mode', for the 5-GHz band in
the appropriate list '5 GHz mode' below.
Antenna gain
Transmission power
reduction
Where the transmission power of an antennae exceeds the levels permitted in
the country of operation, the power must be attenuated accordingly.
̈ The field 'Antenna gain' is for the gain of the antenna minus the actual
cable loss. For an AirLancer Extender O-18a antenna with a gain of 18dBi
and a 4m cable with a loss of 1dB/m, the 'Antenna gain' would be entered
as 18 - 4 = 14. This value for true antenna gain is dynamically used to
calculate and emit the maximum permissible power with regards to other
parameters such as country, data rate and frequency band.
̈ In contrast to this, the entry in the field 'Tx power reduction' causes a
static reduction in the power by the value entered, and ignores the other
parameters. Also see ’Establishing outdoor wireless networks’
→page 256.
The transmission power reduction simply reduces the emitted power.
The reception sensitivity (reception antenna gain) remains unaffected.
This option is useful, for example, where large distances have to be
bridged by radio when using shorter cables. The reception antenna
gain can be increased without exceeding the legal limits on
transmission power. This leads to an improvement in the maximum
247
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
possible range and, in particular, the highest possible data transfer
rates.
Access point
density
The more access points there are in a given area, the more the reception areas
of the antennae intersect. The setting 'Access point density' can be used to
reduce the reception sensitivity of the antenna.
Maximum distance
Large distances between transmitter and receiver give rise to increasing
delays for the data packets. If a certain limit is exceeded, the responses to
transmitted packets no longer arrive within an acceptable time limit. The entry
for maximum distance increases the wait time for the responses. This distance
is converted into a delay which is acceptable for wireless communications.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the radio parameters under the
following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Radio-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Radio settings
Point-to-point connections
Access points are not limited to communications with mobile clients; they can
also transfer data from one access point to another. On the 'Point-to-Point'
tab for the physical interface settings, you can allow the additional exchange
of data with other access points. You can select from:
248
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
̈ Point-to-point 'Off': The access point only communicates with mobile
clients
̈ Point-to-point 'On': The access point can communicate with other access
points and with mobile clients
̈ Point-to-point 'Exclusive': The access point only communicates with other
access points
The input fields are for the MAC addresses of the WLAN cards for the point-
to-point connections (up to 7).
Please observe that only the MAC addresses of the WLAN cards at the
other end of the connections are to be entered here! Not the access
point's own MAC address, and not the MAC addresses from any other
interfaces that may be present in the access points.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you can set the settings for the point-to-point
connections under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Interpoint-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Interpoint-Settings
Client mode
If the LANCOM Wireless device is operating as a client, the tab 'Client mode'
can be used for further settings that affect the behaviour as a client.
Network types
'Network types' controls whether the station can register only with
infrastructure networks, or also with adhoc networks. Further information
about these network types can be found under ’The ad-hoc mode’
→page 207 and ’The infrastructure network’ →page 207.
249
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Create IBBS
If the station can establish an IBBS (Independent Basic Service Set), meaning
an adhoc network, then the station can connect to other WLAN clients. For
the connection of devices with a client station, this is mostly unwanted or not
required.
Keep client
connection alive
This option ensures that the client station keeps the connection to the access
point alive even when the connected devices do not send any data packets. If
this option is switched off, the client station will automatically log off from the
wireless network if no packets are transferred over the WLAN connection
within a given time.
Scan bands
This defines whether the client station scans just the 2.4 GHz, just the 5 GHz,
or all of the available bands for access points.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the settings for the client mode under
the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Client-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Client-Settings
11.4.4 The logical WLAN interfaces
Every physical WLAN interface can support up to eight different logical
wireless networks (Multi-SSID). Parameters can be defined specifically for
each of these networks, without the need of additional access points.
Configuration with
LANconfig
For configuration with LANconfig you will find the settings for the logical
WLAN interface under the configuration area 'Management' on the 'Wireless
250
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
LAN' tab. Open the list of logical WLAN interfaces by clicking on the button
Logical WLAN settings and select the required logical interface.
Network settings
Set the SSID
Define an unambiguous SSID (network name) for each of the logical wireless
networks on the 'Network' tab for the logical interfaces. Only network cards
that have the same SSID can register with this wireless network.
Closed network
mode
You can operate your wireless LAN either in public or private mode. A wireless
LAN in public mode can be contacted by any mobile station in the area. Your
wireless LAN is put into private mode by activating the closed network
function. In this operation mode, mobile stations that do not know the
network name (SSID) are excluded from taking part in the wireless LAN.
Activate the closed network mode if you wish to prevent WLAN clients using
the SSID 'ANY' from registering with your network.
Switch logical
WLAN on and off
The switch 'WLAN network enabled' enables the logical WLAN to be switched
on or off separately.
251
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you can set the network settings for the logical
WLAN interface under the following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ Interfaces ̈ WLAN-
Interfaces̈ Network-Settings
Terminal/Telnet
cd /Setup/Interfaces/WLAN-Interfaces/
Network settings
Transmission settings
Details for the data transfer over the logical interface are set on the
'Transmission' tab.
Packet size
Smaller data packets cause fewer transmission errors than larger packets,
although the proportion of header information in the traffic increases, leading
to a drop in the effective network load. Increase the factory value only if your
wireless network is largely free from interference and very few transmission
errors occur. Reduce the value to reduce the occurrence of transmission errors.
Minimum and
maximum transmit
rate
The access point normally negotiates the data transmission speeds with the
connected WLAN clients continuously and dynamically. In doing this, the
access point adjusts the transmission speeds to the reception conditions. As
an alternative, you can set fixed values for the minimum and maximum
transmission speeds if you wish to prevent the dynamic speed adjustment.
Broadcast rate
The defined broadcast rate should allow the slowest clients to connect to the
WLAN even under poor reception conditions. A higher value should only be
set here if all clients are able to connect "faster".
252
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
RTS threshold
The RTS threshold prevents the occurrence of the "hidden station“
phenomenon.
Network coverage access point ³
Network coverage access point »
³
·
»
Here, the three access points ³, ·, and » are positioned such that no
direct wireless connection between the two outer devices is possible. If ³
sends a packet to ·, » is not aware of this as it is outside of ³'s coverage
area. » may also try, during the transmission from ³, to send a packet to
· as well, because » has no knowledge of the medium (in this case the
wireless connection) being blocked. A collision results and neither of the
transmissions from ³ nor » to · will be successful. The RTS/CTS protocol
is used to prevent collisions.
CTS signal from ·, can also be
RTS signal from ³ to ·
received by »
³
·
»
To this end, ³ precedes the actual transmission by sending an RTS packet to
·, that · answers with a CTS. The CTS sent by · is now within "listening
distance" of », so that » can wait with its packet for ·. The RTS and CTS
signals each contain information about the time required for the transmission
that follows.
A collision between the very short RTS packets is improbable, although the use
of RTS/CTS leads to an increase in overhead. The use of this procedure is only
worthwhile where long data packets are being used and the risk of collision
is higher. The RTS threshold is used to define the minimum packet length for
the use of RTS/CTS. The best value can be found using trial and error tests on
location.
Long preamble for
802.11b
Normally, the clients in 802.11b mode negotiate the length of the preamble
with the access point. "Long preamble" should only be set when the clients
require this setting to be fixed.
253
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
11.4.5 Additional WLAN functions
Apart from the different encryption methods 802.11i/AES, WPA/TKIP or WEP
and the closed network, a variety of other functions exist for securing the
operation of a wireless network. The Redirect function provides the
convenient control over the connection of WLAN clients in changing
environments. As this function has significance to other modules of the
LANCOM LCOS, the configuration parameters are to be found outside of the
WLAN settings.
Redirect function
Clients within wireless networks often have one main aspect in common: a
high degree of mobility. The clients are thus not always connected to the same
access point, but frequently change between access points and the related
LANs.
The redirect function assist the applications being used by the WLAN clients
to find the correct target computer in the LAN automatically. If a WLAN
client's HTTP request from a certain logical wireless network should always be
directed to a certain server in the LAN, then a filter setting for the appropriate
protocol with the action "redirect" will be set up for the desired logical WLAN
interface.
10.0.0.99
Logical wireless network
on interface WLAN-1-2
HTTP request to
192.168.2.25
Redirect: HTTP from
WLAN 1-2 to 10.0.0.99
All requests with this protocol from this logical wireless network will
automatically be redirected to the target server in the LAN. The returning data
packets are sent to the senders' addresses and ports according to the entries
in the connection statistics, which ensures the trouble-free operation in both
directions.
254
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
IEEE 802.1x/EAP
The international industry standard IEEE 802.1x and the Extensible
Authentication Protocol (EAP) enable access points to carry out reliable and
secure access checks. The access data can be managed centrally on a RADIUS
server and can be called up by the access point on demand.
This technology also enables the secure transmission and the regular
automatic changing of WEP keys. In this way, IEEE 802.1x improves the
security of WEP.
The IEEE-802.1x technology is already fully integrated in Windows XP. Client
software exists for other operating systems.
Configuration with
LANconfig
For the configuration with LANconfig you will find the IEEE-802.1x settings in
the configuration area 'WLAN Security'. This is where you decide if you want
to activate IEEE-802.1x. If IEEE-802.1x is activated, a RADIUS server must be
defined for the IEEE-802.1x authentication.
Configuration with
WEBconfig or Telnet
Under WEBconfig or Telnet you will find the settings for IEEE-802.1x under the
following paths:
Configuration tool Menu/Table
WEBconfig
Expert configuration ̈ Setup ̈ User authentication module ̈
EAP config
Terminal/Telnet
cd /Setup/User-Authentication-Module/EAP-Config
255
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
IPSec over WLAN
Only with the
LANCOM VPN
Option. Not
available with all
LANCOM devices.
With the help of the IPSec-over-WLAN technology in addition to the security
measures described already, a wireless network for the exchange of especially
sensitive data can be optimally secured. To this end, the LANCOM Wireless
access point is upgraded to a VPN gateway with the LANCOM VPN Option. In
addition to the encryption per 802.11i, WPA or WEP, the LANCOM Wireless
now offers the possibility of encrypting wireless connections with an IPSec-
based VPN.
11.5 Establishing outdoor wireless networks
LANCOM access points in combination with appropriate external antennae
are ideally suited to establishing point-to-point wireless connections to other
access points.
There are two main questions to be answered when setting up the wireless
connection:
̈ How should the antennae be positioned to ensure a problem-free
connection?
̈ What performance characteristics do the antennae need to ensure
sufficient data rates within legal limitations?
11.5.1 Geometrical layout of the transmission path
Antennae do not emit their signals linearly, but within an angle that depends
on the model in question. The spherical expansion of the signal waves is
characterised by constructive and destructive interference between these
waves at certain distances perpendicular to the line of sight between
256
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
transmitter and receiver. The areas where the waves amplify or cancel
themselves out are known as Fresnel zones.
Fresnel zone 3
Fresnel zone 2
Fresnel zone 1
Radius R
To ensure an optimal signal reception between transmitter and receiver, the
Fresnel zone 1 should remain free from any obstruction. Any disturbances
from elements protruding into this zone will significantly reduce the effective
signal power. The object not only screens off a portion of the Fresnel zone, but
the resulting reflections also lead to a significant reduction in the signal
reception.
The radius (R) of Fresnel zone 1 is calculated with the following formula
assuming that the signal wavelength (λ) and the distance between
transmitter and receiver (d) are known.
R = 0.5 * √(λ * d)
The wavelength in the 2.4-GHz band is approx. 0.125m, in the 5-GHz band
approx. 0.05 m.
Example: With a separating distance of 4 km between the two antennae, the
radius of Fresnel zone 1 in the 2.4-GHz band is 11 m, in the 5-GHz band 7 m.
257
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
To ensure that the Fresnel zone 1 remains unobstructed, the height of the
antennae must exceed that of the highest obstruction by this radius. The full
height of the antenna mast (M) should be as depicted:
Fresnel zone 1
Radius R
Safety margin:
Obstruction height H
Earth's curvature E
M = R + 1m + H + E (Earth's curvature)
The height of the Earth's curvature is calculated from E = d² * 0,0147 – even
at a distance of 8 km that results in almost 1m!
Example: With a distance of 8 km between the antennae, the result in the
2.4-GHz band is a mast height above the level of the highest obstruction of
approx. 13 m, in the 5-GHz band 9 m.
11.5.2 Antenna power
The power of the antenna must be high enough to ensure acceptable data
transfer rates. On the other hand, the country's legal limitations on
transmission power should not be exceeded.
The calculation of effective power considers everything from the radio module
in the transmitting access point to the radio module in the receiving access
point. In between there are attenuating elements such as the cable, plug
258
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
connections, and even the air, and amplifying elements such as the external
antennae.
Free-space loss
Amplification with
antenna gain
Amplification with
antenna gain
Loss through
Loss through
cable, plugs and
lightning
cable, plugs and
lightning
Output power of the
radio module
Input signal at the
radio module
ቢ The calculation of the power over the path begins at the transmitters's
radio module. The radio module in the LANCOM access points in 802.11a
mode emits the following power levels depending on the channel used
and the data transmission rate:
Mbps
5.150 - 5.250 5.250 -5.350 5.470 -5.725 5.725 -5.850
GHz
17
17
17
17
17
14
13
12
14
13
12
GHz
17
17
17
17
17
14
13
12
14
13
12
GHz
17
17
17
17
17
14
13
12
14
13
12
GHz
17
17
17
17
17
14
13
12
14
13
12
6
9
12
18
24
36
48
54
72 (Turbo)
96 (Turbo)
108 (Turbo)
To achieve a data transmission rate of 24 Mbps the radio module emits a
power of 17 dBm.
259
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
The data transmission rate is set according to the reception power. A
WLAN module has an input sensitivity equivalent to a power level of,
for example, -80dBm. If the received power falls below this level, then
a lower data rate can be switched in that corresponds with an
improved sensitivity with a lower level of power.
ባ Outdoor wireless connections are usually realised with external antennae
and extension cables together with lightning protection for safety. The
power loss from the cable is approx. 1 dB per metre. A cable 4 m long thus
reduces power by 4 dB, the lightning protection and the various plug
connections also lead to the loss of a further 1 dB. Thus the power of the
external antenna is:
17 dBm - 4 dB - 1 db = 12 dBm.
ቤ The power received by the antenna is then amplified. An AirLancer
Extender O-18a (with an emitting angle of 18°) supplies an antenna gain
of 18 dBm. The total power output from the antenna is thus:
12 dBm + 18 dBm = 30 dBm.
This power emission must be within the legal limits of the country
where the antenna is in operation!
ብ Radio transmission through air is subject to power attenuation from the
so-called "free-space loss" x, which is logarhythmically related to the
distance d (in km) between transmitter and receiver.
x = 100 + 20 * log (d) [dB] in the 2.4-GHz band
x = 105 + 20 * log (d) [dB] in the 5-GHz band
A 802.11a transmission over a distance of 4 km results in a free-space loss
x of:
x = 105 dB + 20 * log (4) dB = 105 dB + 12 dB = 117 dB.
ቦ A 10 dB safety margin is added to this attenuation so that the total loss
for this example can be taken as 127 dB.
ቧ This loss between the transmitting and receiving antenna is subtracted
from the output power of the transmitting antenna:
30 dBm - 127 dBm = - 97 dBm.
This determines the reception power at the receiving antenna.
260
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
ቨ The receiving end also has amplifying and attenuating elements. If the
same antenna is used as at the transmitter, the antenna gain is 18 dB and
the loss from cable (again 4m), lightning protection and plug connectors
is 5 dB. The radio signal thus arrives at the receiver's radio module with
the following power:
- 97 dBm + 18 dBi - 5 dB = -84 dBm.
ቩ From the table for reception sensitivity of the radio module, the attainable
data rate can be read off, in this case 24 Mbps:
Reception sensitivity 802.11a [dBm]
Mbps
5.150 -5.725 GHz
5.725 -5.850 GHz
6
-90
-89
-88
-87
-85
-81
-76
-73
-78
-73
-70
-85
-84
-83
-82
-80
-76
-71
-68
-73
-68
-65
9
12
18
24
36
48
54
72 (Turbo)
96 (Turbo)
108 (Turbo)
This values are the result of a calculation that includes a 'safety
margin' of 10dB. As every radio path is unique, these values can only
serve as a rough guide.
11.5.3 Emitted power and maximum distance
For a simplified calculation of attainable distances and data rates for
AirLancer Extender antennae, please refer to the following table. All tables
include a 10 dB safety reserve and can be considered to be realistic.
For each antenna, the table has a column for point-to-point mode (P2P,
connection between two access points) and for point-to-multipoint mode
261
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
(P2mP, connection from an access point to the registered clients, e.g.
notebooks).
The last column in the table shows the transmission power reduction to be set
so that the upper limits of 30 dBm (802.11a) or 20 dBm (802.11b/g) cannot
be exceeded.
The specifications for 802.11a apply only for Germany, the
Netherlands, Luxembourg and Great Britain. In Belgium, Austria and
Switzerland, only the 802.11b/g standard is approved for outdoor use.
AirLancer Extender O-18a (802.11a)
̈ Antenna gain: 18 dBi
̈ Assumed cable loss: 4 dB
Maximum distance [km]
Mbps
P2P
7,94
7.08
6,31
5,62
4,47
2,00
1,00
0,63
1,41
0,71
0,45
P2mP
1,78
1,58
1,41
1,26
1,00
0,45
0,22
0,14
0,32
0,16
0,10
6
9
12
18
24
36
48
54
72 (Turbo)
96 (Turbo)
108 (Turbo)
AirLancer Extender O-30 (802.11b/g)
̈ Antenna gain: 15 dBi
262
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 11: Wireless LAN – WLAN
LANCOM Reference Manual LCOS 3.50
̈ Assumed cable loss: 9 dB
Maximum distance [km]
Mbps
1,0
P2P
2,82
2,51
2,24
2,24
2,24
2,00
1,78
1,41
1,00
0,71
0,35
0,18
P2mP
1,58
1,41
1,26
1,26
1,26
1,12
1,00
0,79
0,56
0,40
0,20
0,10
2,0
5,5
6,0
9,0
11,0
12,0
18,0
24,0
36,0
48,0
54,0
AirLancer Extender O-70 (802.11b/g)
̈ Antenna gain: 8.5 dBi
̈ Assumed cable loss: 6 dB
Maximum distance [km]
Mbps
1,0
P2P
1,26
1,12
1,00
1,00
1,00
0,89
0,79
0,63
0,45
P2mP
1,06
0,94
0,84
0,84
0,84
0,75
0,67
0,53
0,38
2,0
5,5
6,0
9,0
11,0
12,0
18,0
24,0
263
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 11: Wireless LAN – WLAN
Maximum distance [km]
Mbps
36,0
P2P
0,32
0,16
0,08
P2mP
0,27
0,13
0,07
48,0
54,0
11.5.4 Transmission power reduction
Every country has regulations concerning the permissible output power from
WLAN antennae, often with differences according to the WLAN standard or
divided according to indoor or outdoor use. The output power from external
antennae may not exceed these maximum power levels. The relevant power
level is the result of adding the radio module power and the antenna gain,
and subtracting the loss from cable, connectors and lightning protection.
Setting the transmission power reduction is described in the section ’Radio
settings’ →page 246.
264
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 12: Office communications with LANCAPI
LANCOM Reference Manual LCOS 3.50
12 Office communications with LANCAPI
LANCAPI from LANCOM is a special version of the popular CAPI interface.
CAPI (Common ISDN Application Programming Interface) establishes the con-
nection between ISDN adapters and communications programs. For their
part, these programs provide the computers with office communications func-
tions such as a fax machine or answering machine.
This section briefly introduces the LANCAPI and its use for office communica-
tions tasks.
12.1 What are the advantages of LANCAPI?
The main advantages of using LANCAPI are economic. LANCAPI provides all
Windows workstations integrated in the LAN (local-area network) with unlim-
ited access to office communications functions such as fax machines, answer-
ing machines, online banking and eurofile transfer. All functions are supplied
via the network without the necessity of additional hardware at each individ-
ual workstation, thus eliminating the costs of equipping the workstations with
ISDN adapters or modems. All you need do is install the office communica-
tions software on the individual workstations.
For example, faxes are sent by simulating a fax machine at the workstation.
With LANCAPI, the PC forwards the fax via the network to the router which
establishes the connection to the recipient.
Please note: All LANCAPI-based applications access the ISDN directly
and do not run across the router of the device. The connect-charge
monitoring and firewall functions are thus disabled!
12.2 The client and server principle
The LANCAPI is made up of two components, a server (in the LANCOM) and
a client (on the PCs). The LANCAPI client must be installed on all computers
in the LAN that will be using the LANCAPI functions.
12.2.1 Configuring the LANCAPI server
Two basic issues are important when configuring the LANCAPI server:
̈ What call numbers from the telephone network should LANCAPI respond
to?
265
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 12: Office communications with LANCAPI
̈ Which of the computers in the local network should be able to access the
telephone network via LANCAPI?
The LANCAPI server is configured in the following menus:
Configuration tool Run command/menu
LANconfig
LANCAPI
WEBconfig
Expert Configuration / Setup / LANCAPI-module
cd /setup/LANCAPI-module
Terminal/Telnet
Example configuration with LANconfig
ቢ Open the configuration of the router by double-clicking on the device
name in the list and select the configuration area LANCAPI.
ባ Select the ISDN port you want to set.
266
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 12: Office communications with LANCAPI
LANCOM Reference Manual LCOS 3.50
ቤ Activate the LANCAPI server for the outgoing and incoming calls, or allow
only outgoing calls.
ብ In the latter case, the LANCAPI will not respond to incoming calls—to
receive faxes, for example. Permitting outgoing calls only is useful if you
do not have a specific call number available for the LANCAPI.
ቦ When the LANCAPI server is activated, enter the call numbers to which the
LANCAPI should respond in the 'Number (MSN)' field. You can enter sev-
eral call numbers separated by semicolons. If you do not enter a call
number here, all incoming calls are reported to LANCAPI.
ቧ LANCAPI is preset to use IP port '75' (any private telephony service). Do
not change this setting unless this port is already in use by a different
service in your LAN.
ቨ If you do not wish all the computers in the local network to be able to
access the LANCAPI functions, you can define all the authorized users (by
means of their IP addresses) by entering them in the access list.
If you enter more than one call number for the LANCAPI, you can, for
example, provide each individual workstation with a personal fax
machine or personal answering machine. Proceed as follows: When
installing communications programs on the different workstations,
specify the various call numbers to which the program should
respond.
267
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 12: Office communications with LANCAPI
ቩ Switch to the 'Availability' tab. Here you can determine how the LANCOM
should respond if a connection is to be established via the LANCAPI
(incoming or outgoing) when both B channels are already busy (priority
control).
The meaning of the options offered here:
୴ The connection via LANCAPI can not be performed. A fax program
using the LANCAPI will then probably attempt to send again at a later
time.
୴ The connection via the LANCAPI can then be established when a main
channel is free. A main channel is the first B channel used when a
router connection is established. Secondary channels are used for
channel bundling. The LANCAPI must wait if two router connections
are established to separate remote stations (two main channels busy).
୴ A connection via LANCAPI can always be established; an existing
router connection will be terminated for the duration of the call if
required. This can be used to ensure the permanent availability of the
fax function, for example.
12.2.2 Installing the LANCAPI client
ቢ Place the LANCOM CD in your CD-ROM drive. If the setup program does
not automatically start when you insert the CD, simply click 'autorun.exe'
in the main directory of the LANCOM CD in the Windows Explorer.
ባ Select the Install LANCOM software entry.
ቤ Highlight the LANCAPI option. Click Next and follow the instructions for
the installation routine.
268
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 12: Office communications with LANCAPI
LANCOM Reference Manual LCOS 3.50
If necessary, the system is restarted and LANCAPI is then ready to accept all
jobs from the office communications software. After successful installation, an
icon for LANCAPI will be available in the toolbar. A double-click on this icon
opens a status window that permits current information on the LANCAPI to
be displayed at any time.
The LANCAPI client starts automatically and shows the status in the windows
task bar.
= inactive
= Error
= active
12.2.3 Configuration of the LANCAPI clients
The configuration of the LANCAPI clients is used to determine which LANCAPI
servers will be used and how these will be checked. All parameters can remain
at their default settings if you are using only one LANCOM in your LAN as an
LANCAPI server.
ቢ Start the LANCAPI client in the 'LANCOM' program group. Information
regarding the drivers for the available service can be found on the 'Gen-
eral' tab.
You can also run the LANCAPI client
through the Windows task bar. To do this,
simply click with the right mouse button
on the LANCAPI symbol in the Windows
task bar next to the clock and select
Properties.
ባ In the LANCAPI client, change to the Network tab. First, select whether
the PC should find its own LANCAPI server, or specify the use of a partic-
ular server.
୴ For the former, determine the interval at which the client should
search for a server. It will continue searching until it has found the
number of servers specified in the next field. Once the required
number of servers has been found, it will stop searching.
୴ In the event that the client should not automatically search for servers,
list the IP addresses of the servers to be used by the client. This can be
useful if you are operating several LANCOM in your LAN as LANCAPI
servers and you would like to specify a server for a group of PCs, for
example.
269
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 12: Office communications with LANCAPI
୴ It is also possible to set the interval at which the client checks whether
the found or listed servers are still active.
12.3 How to use the LANCAPI
Two options are available for the use of the LANCAPI:
̈ You may use software which interacts directly with a CAPI (in this case,
the LANCAPI) port. This type of software searches for the CAPI during its
installation and uses it automatically.
̈ Other programs such as LapLink can establish a variety of connection
types, for example, using Windows Dial-Up Networking. You may select
the installed communications device that you would like to use when cre-
ating a new dial-up connection. For the LANCAPI, select the entry 'ISDN
WAN Line 1'.
12.4 The LANCOM CAPI Faxmodem
The CAPI Faxmodem provides a Windows fax driver (Fax Class 1) as an inter-
face between the LANCAPI and applications, permitting the use of standard
fax programs with an LANCOM.
270
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 12: Office communications with LANCAPI
LANCOM Reference Manual LCOS 3.50
Installation
The CAPI Faxmodem can be installed from the CD setup. Always install the
CAPI Faxmodem together with the current version of LANCAPI. After restart-
ing, the CAPI Faxmodem will be available for you, e.g. in Windows 98 under
Start ̈ Settings ̈ Control Panel ̈ Modems.
Faxing with the CAPI Faxmodem
Most major fax programs recognize the CAPI Faxmodem automatically during
installation and identify it as a 'Class 1' fax modem. Fax transmissions can
thus be realized at speeds of up to 14,400 bps. If your fax program offers you
a choice (such as WinFax and Talkworks Pro), select the option 'CLASS 1 (Soft-
ware Flow Control)' when setting up the modem.
The LANCOM CAPI Faxmodem requires LANCAPI for the transmission
of fax messages. A small CAPI icon in the lower right corner of your
screen confirms that LANCAPI is enabled. Please also take care with
the settings of the LANCAPI itself.
271
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
13 Server services for the LAN
An LANCOM offers a number of services for the PCs in the LAN. These are cen-
tral functions that can be used by workstation computers. They are in partic-
ular:
̈ Automatic address administration with DHCP
̈ Name management of computers and networks with DNS
̈ Logging of network traffic with SYSLOG
̈ Recording of charges
̈ Office communications functions with LANCAPI
̈ Time server
13.1 Automatic IP address administration with DHCP
In order to operate smoothly in a TCP/IP network, all the devices in a local net-
work must have unique IP addresses.
They also need the addresses of DNS-servers and NBNS-servers as well as that
of a default gateway through which the data packets are to be routed from
addresses that are not available locally.
In a smaller network, it is still conceivable that these addresses could be
entered manually in all the computers in the network. In a larger network with
many workstation computers, however, this would simply be too enormous of
a task.
In such situations, the DHCP (Dynamic Host Configuration Protocol) is the
ideal solution. Using this protocol, a DHCP server in a TCP/IP-based LAN can
dynamically assign the necessary addresses to the individual stations.
13.1.1 The DHCP server
As a DHCP server, the LANCOM can administer the IP addresses in its TCP/IP
network. In doing so, it passes the following parameters to the workstation
computers:
̈ IP-address
̈ network mask
̈ broadcast address
̈ standard gateway
̈ DNS server
̈ NBNS server
272
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
̈ period of validity for the parameters assigned
The DHCP server takes the IP addresses either from a freely defined address
pool or determines the addresses automatically from its own IP address (or
intranet address).
In DHCP mode, a completely unconfigured device can even automatically
assign IP addresses to itself and the computers in the network.
In the simplest case, all that is required is to connect the new device to a net-
work without other DHCP servers and switch it on. The DHCP server then
interacts with LANconfig using a wizard and handles all of the address assign-
ments in the local network itself.
13.1.2 DHCP—'on', 'off' or 'auto'?
The DHCP server can be set to three different states:
̈ 'on': The DHCP server is permanently active. The configuration of the
server (validity of the address pool) is checked when this value is entered.
୴ When correctly configured, the device will be available to the network
as a DHCP server.
୴ In the event of an incorrect configuration (e.g. invalid pool limits), the
DHCP server is disabled and switches to the 'off' state.
̈ 'off': The DHCP server is permanently disabled.
̈ 'auto': In this mode, after switching it on, the device automatically looks
for other DHCP servers within the local network. This search can be rec-
ognized by the LAN-Rx/Tx LED flashing.
୴ The device then disables its own DHCP server if any other DHCP serv-
ers are found. This prevents the unconfigured device from assigning
addresses not in the local network when switched on.
୴ The device then enables its own DHCP server if no other DHCP servers
are found.
Whether the DHCP server is active or not can be seen in the DHCP statis-
tics.
The default setting for this condition is 'auto'.
273
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
13.1.3 How are the addresses assigned?
IP address assignment
Before the DHCP server can assign IP addresses to the computers in the net-
work, it first needs to know which addresses are available for assignment.
Three options exist for determining the available selection of addresses:
̈ The IP address can be taken from the address pool selected (start address
pool to end address pool). Any valid addresses in the local network can
be entered here.
̈ If '0.0.0.0' is entered instead, the DHCP server automatically determines
the particular addresses (start or end) from the IP or intranet address set-
tings in the 'TCP-IP-module' using the following procedure:
୴ If only the Intranet address or only the DMZ address is entered, the
start or end of the pool is determined by means of the associated net-
work mask.
୴ If both addresses have been specified, the Intranet address has prior-
ity for determining the pool.
From the address used (Intranet or DMZ address) and the associated net-
work mask, the DHCP server determines the first and last possible IP
address in the local network as a start or end address for the address pool.
̈ If the router has neither an Intranet address nor an DMZ address, the
device has gone into a special operating mode. It then uses the IP address
'172.23.56.254' for itself and the address pool '172.23.56.x' for the
assignment of IP addresses in the network.
If only one computer in the network is started up that is requesting an IP
address via DHCP with its network settings, a device with an activated DHCP
module will offer this computer an address assignment. A valid address is
taken from the pool as an IP address. If the computer was assigned an IP
address at some point in the past, it requests this same address and the DHCP
server attempts to reassign it this address if it has not already been assigned
to another computer.
The DHCP server also checks whether the address selected is still available in
the local network. As soon as the uniqueness of an address has been estab-
lished, the requesting computer is assigned the address found.
Netmask assignment
The network mask is assigned in the same way as the address. If a network
mask is entered in the DHCP module, this mask is used for the assignment.
274
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
Otherwise, the network mask from the TCP/IP module is used. The order is the
same as during the assignment of the addresses.
Broadcast address assignment
Normally, an address yielded from the valid IP addresses and the network
mask is used for broadcast packets in the local network. In special cases, how-
ever (e.g. when using subnetworks for some of the workstation computers), it
may be necessary to use a different broadcast address. In this case, the broad-
cast address to be used is entered in the DHCP module.
The default setting for the broadcast address should be changed by
experienced network specialists only. Incorrect configuration of this
section can result in the undesired establishment of connections sub-
ject to connect charges!
Standard gateway assignment
The device always assigns the requesting computer its own IP address as a
gateway address.
If necessary, this assignment can be overwritten with the settings on the
workstation computer.
DNS and NBNS assignment
This assignment is based on the associated entries in the 'TCP/IP-module'.
If no server is specified in the relevant fields, the router passes its own IP
address as a DNS address. This address is determined as described under 'IP
address assignment'. The router then uses DNS-forwarding (also see 'DNS-
forwarding'), to resolve DNS or NBNS requests from the host.
Period of validity for an assignment
The addresses assigned to the computer are valid only for a limited period of
time. Once this period of validity has expired, the computer can no longer use
these addresses. In order for the computer to keep from constantly losing its
addresses (above all its IP address), it applies for an extension ahead of time
that it is generally sure to be granted. The computer loses its address only if it
is switched off when the period of validity expires.
For each request, a host can ask for a specific period of validity. However, a
DHCP server can also assign the host a period of validity that differs from what
275
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
it requested. The DHCP module provides two settings for influencing the
period of validity:
̈ Maximum lease time in minutes
Here you can enter the maximum period of validity that the DHCP server
assigns a host.
If a host requests a validity that exceeds the maximum length, this will
nevertheless be the maximum available validity!
The default setting is 6000 minutes (approx. 4 days).
̈ Default lease time in minutes
Here you can enter the period of validity that is assigned if the host makes
no request. The default setting is 500 minutes (approx. 8 hours).
Precedence for the DHCP server—request assignment
In the default configuration, almost all the settings in the Windows network
environment are selected in such a way that the necessary parameters are
requested via DHCP. Check the settings by clicking Start ̈ Settings ̈ Con-
trol Panel ̈ Network. Select the TCP/IP entry for your network adapter and
open Properties.
Check the various tabs for special entries, such as for the IP address or the
standard gateway. If you would like all of the values to be assigned by the
DHCP server, simply delete the corresponding entries.
On the 'WINS configuration' tab, the 'Use DHCP for WINS Resolution' option
must also be selected if you want to use Windows networks over IP with name
resolution using NBNS servers. In this case, the DHCP server must also have
an NBNS entry.
Priority for computer—overwriting an assignment
If a computer uses parameters other than those assigned to it (e.g. a different
default gateway), these parameters must be set directly on the workstation
computer. The computer then ignores the corresponding parameters assigned
to it by the DHCP server.
Under Windows 98, this is accomplished through the properties of the Net-
work Neighbourhood.
Click Start / Settings / Control Panel / Network. Select the 'TCP/IP' entry
for your network adapter and open Properties.
You can now enter the desired values by selecting the various tabs.
276
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
Checking of IP addresses in the LAN
Configuration tool Run/Table
WEBconfig
Expert Configuration Setup / DHCP-module
Table-DHCP
Terminal/Telnet
setup/DHCP-module/table-DHCP
The DHCP table provides a list of the IP addresses in the LAN. This table con-
tains the assigned or used IP address, the MAC address, the validity, the name
of the computer (if available) and the type of address assignment.
The 'Type' field specifies how the address was assigned. This field can assume
the following values:
̈ 'new'
The computer has made its initial request. The DHCP server verifies the
uniqueness of the address that is to be assigned to the computer.
̈ 'unknown'
While verifying uniqueness, it was determined that the address has
already been assigned to another computer. Unfortunately, the DHCP
server has no means of obtaining additional information on this compu-
ter.
̈ 'static'
A computer has informed the DHCP server that it has a fixed IP address.
This address can no longer be used.
̈ 'dynamic'
The DHCP server assigned the computer an address.
13.2 DNS
The domain name service (DNS) is responsible in TCP/IP networks for associ-
ating computer names and/or network (domains) and IP addresses. This serv-
ice is required for Internet communications, to return the correct IP address
for a request such as 'www.lancom.de' for example. However, it's also useful
to be able to clearly associate IP addresses to computer names within a local
network or in a LAN interconnection.
13.2.1 What does a DNS server do?
The names used in DNS server requests are made up of several parts: one part
consists of the actual name of the host or service to be addressed; another
277
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
part specifies the domain. Specifying the domain is optional within a local
network. These names could thus be 'www.domain.com' or 'ftp.domain.com',
for example.
If there is no DNS server in the local network, all locally unknown names will
be searched for using the default route. By using a DNS server, it's possible to
immediately go to the correct remote station for all of the names with known
IP addresses. In principle, the DNS server can be a separate computer in the
network. However, the following reasons speak for locating the DNS server
directly in the LANCOM:
̈ LANCOM can automatically distribute IP addresses for the computers in
the local network when in DHCP server mode. In other words, the DHCP
server already knows the names and IP addresses of all of the computers
in its own network that were assigned IP addresses via DHCP. With the
dynamic address assignments of a DHCP server, an external DNS server
might have difficulties in keeping the associations between the names
and IP addresses current.
̈ When routing Microsoft Networks via NetBIOS, the LANCOM also knows
the computer names and IP addresses in the other connected NetBIOS
networks. In addition, computers with fixed IP addresses can also enter
themselves in the NetBIOS table and thus be known by their names and
addresses.
̈ The DNS server in the LANCOM can also be used as an extremely conven-
ient filter mechanism. Requests for domains can be prohibited throughout
the LAN, for subnetworks, or even for individual computers—simply by
specifying the domain name.
How does the DNS server react to the request?
When processing requests for specific names, the DNS server takes advantage
of all of the information available to it:
̈ First, the DNS server checks whether access to the name is not prohibited
by the filter list. If that is the case, an error message is returned to the
requesting computer stating that access to the address has been denied.
̈ Next, it searches in its own static DNS table for suitable entries.
̈ If the address cannot be found in the DNS table, it searches the dynamic
DHCP table. The use of DHCP information can be disabled if required.
̈ If no information on the name can be located in the previous tables, the
DNS server then searches the lists of the NetBIOS module. The use of the
NetBIOS information can also be disabled if necessary.
278
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
̈ Finally, the DNS server checks whether the request to another DNS server
is to be forwarded to another DNS server via a WAN interface (special DNS
forwarding via the DNS destination table).
If the requested name cannot be found in any of the information sources
available to it, the DNS server sends the request to another server—that of
the Internet provider, for example—using the general DNS forwarding mech-
anism, or returns an error message to the requesting computer.
13.2.2 DNS forwarding
If it cannot serve the request from its own DNS tables, the DNS server forwards
the request to other DNS servers. This process is called DNS forwarding.
Here a distinction is made between
̈ special DNS forwarding
Requests for certain name areas are forwarded to certain DNS servers.
̈ general DNS forwarding
All other names not specified in detail are forwarded to the “higher-
level” DNS server.
Special DNS forwarding
With “special DNS forwarding” name areas can be defined for the resolution
of which specified DNS server are addressed.
A typical application for special DNS forwarding results for a home worksta-
tion: The user wants to be able to connect to the company intranet and
directly to the Internet at the same time. The requests sent into the intranet
must be routed to the company DNS server, and all other requests to the DNS
server of the provider.
General DNS forwarding
All DNS requests that cannot be resolved in another way are forwarded to a
DNS server. This DNS server is determined according to the following rules:
279
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
̈ Initially the router checks whether a DNS server has been entered in its
own settings. If it is successful there, it obtains the desired information
from this server. Up to two higher-level DNS servers can be specified.
LANconfig
WEBconfig
TCP/IP ̈ Addresses ̈ Primary DNS / Secondary DNS
Expert Configuration ̈ Setup ̈ TCP-IP-module ̈ DNS-default
̈ DNS-backup
Terminal/Telnet
/setup/TCP-IP-module/DNS-default
/setup/TCP-IP-module/DNS-backup
̈ If no DNS server is entered in the router, it will attempt to reach a DNS
server over a PPP connection (e.g. from the Internet provider) to get the
IP address assigned to the name from there. This can only succeed if the
address of a DNS server is sent to the router during PPP negotiation.
̈ The default route is established and the DNS server searched for there if
no connection exists.
This procedure does not require you to have any knowledge of the DNS server
address. Entering the Intranet address of your router as the DNS server for the
workstation computers is sufficient to enable you obtain the name assign-
ment. This procedure also automatically updates the address of the DNS
server. Your local network always receives the most current information even
if, for example, the provider sending the address changes the name of his DNS
server or you change to another provider.
13.2.3 Setting up the DNS server
The settings for the DNS server are contained in the following menu or list:
Configuration tool Run/Table
LANconfig
TCP/IP ̈ DNS
WEBconfig
Expert Configuration ̈ Setup ̈ DNS-module
cd /setup/DNS-module
Terminal/Telnet
Proceed as follows to set the DNS server:
ቢ Switch the DNS server on.
WEBconfig
… ̈ Operating
Terminal/Telnet
set operating on
280
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
ባ Enter the domain in which the DNS server is located. The DNS server uses
this domain to determine whether the requested name is located in the
LAN. Entering the domain is optional.
WEBconfig
… ̈ Domain
Terminal/Telnet
set domain yourdomain.com
ቤ Specify whether information from the DHCP server and the NetBIOS mod-
ule should be used.
WEBconfig
… ̈ DHCP-usage
… ̈ NetBIOS-usage
Terminal/Telnet
set DHCP-usage yes
set NetBIOS-usage yes
Activated DNS server
in the TCP IP configuration
ብ The main task of the DNS server is to distinguish requests for names in the
Internet from those for other remote stations. Therefore, enter all comput-
ers in the Host names table,
୴ for which you know the name and IP address,
୴ that are not located in your own LAN,
୴ that are not on the Internet and
281
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
୴ that are accessible via the router.
With the following commands you add stations to the Host names table:
LANconfig
TCP/IP ̈ DNS ̈ Host names ̈ Add
WEBconfig
… ̈ DNS-table ̈ Add
Terminal/Telnet
cd setup/DNS-module/DNS-
table set mail.yourdomain.com 10.0.0.99
For example, if would like to access the mail server at your headquarters
(name: mail.yourdomain.com, IP: 10.0.0.99) via the router from a branch
office, enter:
Stating the domain is optional but recommended.
When you now start your mail program, it will probably automatically look
for the server 'mail.yourdomain.com'. The DNS server thereupon returns
the IP address '10.0.0.99'. The mail program will then look for that IP
address. With the proper entries in the IP routing table and name list, a
connection is automatically established to the network in the headquar-
ters, and finally to the mail server.
ቦ To resolve entire name areas of another DNS server, add a forwarding
entry consisting of a name area and remote station:
LANconfig
TCP/IP ̈ DNS ̈ Forwarding ̈ Add
WEBconfig
… ̈ DNS destination table ̈ Add
Terminal/Telnet
cd setup/DNS-module/
DNS-destination- table set *.intern COMPANY
When entering the name areas, the wildcards '?' (for individual charac-
ters) and '*' (for multiple characters) may be used.
To reroute all domains with the ending '.intern' to a DNS server in the LAN
of the remote station 'COMPANY', create the following entry:
282
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
The DNS server may either be specified by the remote site name (for
automatic setting via PPP), or by an explicit IP address of the accord-
ing name server.
13.2.4 URL blocking
ቢ Finally, one can restrict access to certain names or domains with the filter
list.
To block the domain (in this case the web server) 'www.offlimits.com' for
all computers in the LAN, the following commands and entries are
required:
LANconfig
TCP/IP ̈ DNS Filter ̈ DNS filter... ̈ Add
WEBconfig
… ̈ Filter-list ̈ Add
Terminal/Telnet
cd setup/DNS-module/filter-list
set 001 www.blocked.com 0.0.0.0 0.0.0.0
The index '001' in the console command can be selected as desired and
is used only for clarity.
When entering the domains, the wildcards '?' (represents exactly one
character) and '*' (for any number of characters) are permitted.
283
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
To only block the access of a certain computer (e.g. with IP 10.0.0.123) to
COM domains, enter the following values:
In the console mode the command is:
set 002 *.com 10.0.0.123 255.255.255.255
The hit list in the DNS statistics contains the 64 most frequently
requested names and provides a good basis for setting up the filter
list.
If your LAN uses subnetting, you can also apply filters to individual
departments by carefully selecting the IP addresses and subnet masks.
The IP address '0.0.0.0' stands for all computers in the network, and the
subnet mask '0.0.0.0' for all networks.
13.2.5 Dynamic DNS
Systems with dynamic IP addresses become accessible over the WAN - for
example over the Internet - via so-called Dynamic DNS service providers, e.g.
www.dynDNS.org.
Thereby a LANCOM becomes available under a certain DNS-resolvable name
(FQDN -’fully qualified Domain Name’, for example "http://MyLAN-
COM.dynDNS.org").
The advantage is obvious: If you want to accomplish e.g. remote maintenance
for a remote site without ISDN available (e.g. over WEBconfig/HTTPS), or to
connect with the LANCOM VPN Client to a branch office with dynamic IP
address, then you just need to know the appropriate Dynamic DNS name.
How to deposit the current IP address at the Dynamic DNS server?
All Dynamic DNS provider support a set of client programs, which can deter-
mine the current assigned WAN IP address of a LANCOM via different meth-
ods, and transfer this address - in case of a change - to their respective
Dynamic DNS server.
284
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
The current WAN IP address of a LANCOM can be picked under the following
address:
http://<address of LANCOM>/config/1/6/8/3/
Figure: Picking the current IP address out of a LANCOM
13.3 Call charge management
The capability of the router to automatically establish connections to all
desired remote sites and to close them again when no longer required pro-
vides users with extremely convenient access, e.g. to the Internet. However,
quite substantial costs may be incurred by data transfer over paid lines if the
router is not configured properly (e.g. in the filter configuration) or by exces-
sive use of the communications opportunities (e.g. extended surfing in the
Internet).
To reduce these costs, the software provides various options:
̈ The available online minutes can be restricted to a specific period.
̈ For ISDN connections, a limit on time or charges can be set for a particular
period.
13.3.1 Charge-based ISDN connection limits
If charge information is sent to an ISDN connection, the resulting connection
charges can be limited quite easily. For example, in its default state, a maxi-
285
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
mum of 830 charge units may be used in six days. The router will not permit
the establishment of any further connections once this limit has been reached.
The best way to use the router's call charge monitoring function is if
you have “call charge information enabled during the connection” to
the ISDN network (i.e. AOCD). If necessary, subscribe to this facility
from your telecommunications carrier. Charge monitoring with the
“Charge information after connection“ feature is also possible in
principle, but in this case continuous connections may not be
detected!
If you have enabled least-cost routing on the router modules, connec-
tions may be established to providers who do not transmit any charge
information!
13.3.2 Time dependent ISDN connection limit
However, this mechanism of ISDN connection monitoring will not work if the
ISDN connection does not provide charge information. That may be the case,
for example, if the provision of charge information was not requested for the
connection, or if the telecommunications provider generally does not supply
this information.
To reduce the costs of ISDN connections even if no call charge information is
available, maximum connection lengths based on time can be regulated. This
requires setting up a time budget for a specified period. In the router's default
state, for example, connections may only be established for a maximum of
210 minutes within six days.
When the limit of a budget is reached, all open connections that were
initiated by the router itself will be shut down automatically.The budg-
ets will not be reset to permit the establishment of connections until
the current period has elapsed. Needless to say, the administrator can
reset the budgets at any time if required!
The charge and time monitoring of the router functions can be disabled by
entering a budget of 0 units or 0 minutes.
Only the router functions are protected by the charge and time mon-
itoring functions! Connections via LANCAPI are not affected.
286
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
13.3.3 Settings in the charge module
Configuration tool Run/table
LANconfig
Management ̈ Costs
WEBconfig
Expert Configuration ̈ Setup ̈ Charges-module
Terminal/Telnet
cd /setup/charges-module
In the charges module, the online time can be monitored and used to control
call establishment.
̈ Day(s)/Period
The duration of the monitoring period in days can be specified here.
̈ Budget units, Online minutes budget
The maximum number of ISDN units or online minutes in a monitoring
period
The current charge and connect-time information is retained when
rebooting (e.g. when installing new firmware) is not lost until the unit
is switched off. All the time references here are in minutes.
13.4 The SYSLOG module
The SYSLOG module gives the option of recording accesses to the LANCOM.
This function is of particular interest to system administrators, because it
allows a full history of all activities to be kept.
To be able to receive the SYSLOG messages, you will need an appropriate SYS-
LOG client or daemon. In UNIX/Linux the SYSLOG daemon, which is installed
by default, generally does the recording. It reports either directly through the
console or writes the protocol to a SYSLOG file.
In Linux the file /etc/syslog.confdirects which facilities (this expression will
be explained later) should be written to which log file. Check in the configu-
ration of the daemon whether network connections are explicitly monitored.
Windows does not have any corresponding system functions. You will need
special software that fulfills the function of a SYSLOG daemon.
287
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
13.4.1 Setting up the SYSLOG module
Configuration tool Run/Table
LANconfig
Management ̈ Log & Trace
Expert Configuration ̈ Setup ̈ SYSLOG-module
WEBconfig
Terminal/Telnet
cd /setup/SYSLOG-module
13.4.2 Example configuration with LANconfig
Create SYSLOG client
ቢ Start LANconfig. Under 'Management', select the 'Log & Trace' tab.
ባ Turn the module on and click SYSLOG clients.
ቤ In the next window click Add....
ብ First enter the IP address of the SYSLOG client, and then set the sources
and priorities.
SYSLOG comes from the UNIX world, in which specified sources are pre-
defined. LANCOM assigns its own internal sources to these predefined
SYSLOG sources, the so-called “facilities”.
The following table provides an overview of the significance of all news
sources that can be set in the LANCOM. The last column of the table also
288
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 13: Server services for the LAN
LANCOM Reference Manual LCOS 3.50
shows the alignment between the internal sources of the LANCOM and
the SYSLOG facilities.
Source
System
Login
Meaning
Facility
system messages (boot processes, timer system etc.) KERNEL
messages regarding login and logout of a user dur-
ing the PPP negotiation and errors occurring during
this process
AUTH
System time
messages regarding changes to the system time
CRON
Console login
messages regarding console logins (Telnet, outband, AUTHPRIV
etc.), logouts and errors occurring during this proc-
ess
Connections
messages regarding establishing and releasing con- LOCAL0
nections and errors occurring during this process
(display trace)
Accounting
Administration
Router
accounting information after release of a connection LOCAL1
(user, online time, transfer volume)
messages regarding configuration changes, remotely LOCAL2
executed commands etc.
regular statistics on the most frequently used serv-
ices (sorted by port numbers) and messages regard-
ing filtered packets, routing errors etc.
LOCAL3
The eight priority stages defined initially in the SYSLOG are reduced to five
stages in the LANCOM. The following table shows the relationship of
alarm level, significance and SYSLOG priorities.
Priority
Meaning
SYSLOG priority
Alert
All messages requiring the attention of the
administrator are collected under this heading.
PANIC, ALERT, CRIT
Error
All error messages that can occur during normal ERROR
operation without requiring administrative inter-
vention are sent to this level (e.g. connection
errors).
289
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 13: Server services for the LAN
Priority
Meaning
SYSLOG priority
Warning
Error messages that do not affect normal opera- WARNING
tion of the device are sent to this level.
Information All messages that are purely informative in char- NOTICE, INFORM
acter are sent to this level (e.g. accounting infor-
mation).
Debug
Transfer of all debug messages. Debug mes-
sages generate a high data volume and interfere
with the normal operation of the device. They
should therefore be disabled during normal
operation and should only be activated for trou-
bleshooting.
DEBUG
ቦ After you have set all the parameters, confirm the entries with OK. The
SYSLOG client is then entered with its parameters into the SYSLOG table.
Facilities
All messages from LANCOM can be assigned to a facility with the Facility
mapping button and then are written to a special log file by the SYSLOG cli-
ent with no additional input.
Example
All facilities are set to 'local7'. Under Linux in the file /etc/syslog.confthe
entry
local7.* /var/log/lancom.log
writes all outputs of the LANCOM to the file /var/log/lancom.log
.
290
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
14 Virtual Private Networks—VPN
14.1 What does VPN offer?
A VPN (Virtual Private Network can be used to set up cost-effective, public IP
networks, for example via the Internet.
While this may sound unspectacular at first, in practice it has profound effects.
To illustrate this, let's first look at a typical corporate network without VPN
technology. In the second step, we will see how this network can be optimized
by the deployment of VPN.
Conventional network infrastructure
First, let's have a look at a typical network structure that can be found in this
form or similar forms in many companies:
LAN
Headquarters
ᕢ
ᕢ
ᕡ
ᕣ
ISDN
ISDN
LAN
Computers
using remote
access, e.g.
Internet
home working
Branch office
The corporate network is based on the internal network (LAN) in the
headquarters. This LAN is connected to the outside world in three ways:
ᕡ A subsidiary is connected to the LAN, typically using a leased line.
ᕢ PCs dial into the central network via modem or ISDN connections (Remote
Access Service – RAS).
291
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
ᕣ The central LAN has a connection to the Internet so that its users can
access the Web, and send and receive e-mail.
All connections to the outside world are based on dedicated lines, i.e.
switched or leased lines. Dedicated lines are very reliable and secure. On the
other hand, they involve high costs. In general, the costs for dedicated lines
are dependent on the distance. Especially in the case of long-distance
connections, keeping an eye out of cost-effective alternatives can be
worthwhile.
The appropriate hardware must be available in the headquarters for every
type of required connection (analog dial-up, ISDN, leased lines). In addition
to the original investment costs, ongoing costs are also incurred for the
administration and maintenance of this equipment.
Networking via the Internet
The following structure results when using the Internet instead of direct
connections:
LAN
Headquarters
ᕡ
ᕢ
Internet
ᕣ
Computers using remote access
Branch office
All participants have fixed or dial-up connections to the Internet. Expensive
dedicated lines are no longer needed.
ᕡ All that is required is the Internet connection of the LAN in the
headquarters. Special switching devices or routers for dedicated lines to
individual participants are superfluous.
292
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
ᕢ The subsidiary also has its own connection to the Internet.
ᕣ The RAS PCs connect to the headquarters LAN via the Internet.
The Internet is available virtually everywhere and typically has low access
costs. Significant savings can thus be achieved in relation to switched or
dedicated connections, especially over long distances.
The physical connection no longer exists directly between two participants;
instead, the participants rely on their connection to the Internet. The access
technology used is not relevant in this case: ideal is the use of broadband
technologies such as DSL (Digital Subscriber Line) in combination with flatrate
contracts. But also a conventional ISDN line can be used.
The technologies of the individual participants do not have to be compatible
to one another, as would be the case for conventional direct connections. A
single Internet access can be used to establish multiple simultaneous logical
connections to a variety of remote stations.
The resulting savings and high flexibility makes the Internet (or any other IP
network) an outstanding backbone for a corporate network.
Two technical properties of the IP standard speak against using the Internet
as a part of a corporate network, however:
̈ The necessity of public IP addresses for all participants
̈ The lack of data security of unprotected data transfers
14.1.1 Private IP addresses on the Internet?
The IP standard defines two types of IP addresses: public and private. A public
IP address is valid worldwide, while a private IP address only applies within a
closed LAN.
Public IP addresses must be unique on a worldwide basis. Private IP addresses
can occur any number of times worldwide; they must only be unique within
their own closed network.
Normally, PCs in a LAN only have private IP addresses, while the router to the
Internet also has a public address. All PCs behind this router have access to
the Internet via its public IP address (IP masquerading). In such a case, only
the router itself is responsive via the Internet. PCs behind the router are not
responsive to the Internet without intervention by the router.
293
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
Routing at the IP level with VPN
IP connections must be established between routers with public IP addresses
in order to link networks via the Internet. These routers provide the
connections between multiple subnetworks. When a computer sends a packet
to a private IP address in a remote network segment, the local router forwards
the packet to the router of the remote network segment via the Internet.
VPN handles the conversion between private and public IP addresses. Without
VPN, computers without public IP addresses would not be able to
communicate with one another via the Internet.
14.1.2 Secure communications via the Internet?
The idea of using the Internet for corporate communications has been met
with skepticism. The reason for this is that the Internet lies beyond a
company's field of influence. Unlike dedicated connections, data on the
Internet travels through the network structures of third parties that are
frequently unknown to the company.
In addition, the Internet is based on a simple form of data transfer using
unencrypted data packets. Third parties can monitor and perhaps even
manipulate the contents of these packets. Anyone can access the Internet. As
a result, third parties may gain unauthorized access to the transferred data.
VPN – Security through encryption
VPN was developed as a solution to this security problem. If necessary, it can
encrypt the complete data communications between two participants. The
packets are then unreadable for third parties.
The latest and most secure encryption technologies can be used for VPN. A
very high level of security can thus be reached. VPN-protected data traffic via
the Internet offers a degree of security that at least corresponds to that of
dedicated lines.
Codes usually referred to as "keys" are agreed upon between the participants
and used for data encryption. Only the participants in the VPN know these
keys. Without a valid key, it is not possible to decrypt the data. They thus
remain "private", inaccessible to unauthorized parties.
Send your data through the tunnel – for security’s sake
This also explains the nature of a virtual private network: A fixed, physical
connection between the devices of the type required for a direct connection
does not exist at any time. Rather, the data flows via suitable routes through
294
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
the Internet. With the proper technology, third parties can monitor and even
record data traffic. As the packets are encrypted by VPN, the actual content of
the packets is inaccessible. Experts compare this state to a tunnel: it's open at
either end, but perfectly shielded in between. Secure connections within
public IP networks are thus also referred to as "tunnels".
.
Internet
VPN tunnel
The goal of modern network structures has thus been achieved: secure
connections via the largest and most low-cost public IP network: the Internet.
14.2 LANCOM VPN: an overview
14.2.1 VPN example application
VPN connections are used in many different fields of application. In most
cases, a variety of communications technologies is used for transferring both
data and audio, and VPN unites these systems into an integrated network. The
295
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
following example illustrates a typical application that is often used in
practice.
Branch_office
Headquarters
Server in
the DMZ
VPN gateway
VPN
gateway
ISDN
ISDN
Voice-over-IP
telecommunic
Access via public WLAN
(hotspot)
Voice-over-IP
telecommunicat
ions system
Internet
Branch office
Mobile user
Home office
The principal components and features of these applications:
̈ The coupling of networks, for example between headquarters and a
branch office
̈ Connecting external locations without fixed IP addresses via VPN router
̈ Connecting home offices without fixed IPs via ISDN or analog modems
̈ Connecting to Voice-over-IP telephone exchanges
̈ Connecting mobile users, for example when using public WLAN access
14.2.2 Advantages of LANCOM VPN
LANCOM VPN solutions have numerous clear advantages over other VPN
applications:
̈ When connecting remote stations with dynamic IP addresses (e.g.
branch-office networks), LANCOM VPN can work with the “Main Mode”
instead of the inferior “Aggressive Mode”. This mode offers a highly
secure solution that is also easy to implement.
296
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
̈ When VPN clients are dialing in with the appropriate client software,
extended functions in the IKE handshake of LANCOM VPN allow the use
of different Preshared Keys (PSKs). Other conventional VPN client
connections can use a single common PSK, a situation that is a
compromise in terms of security.
̈ The use of LANCOM Dynamic VPN means that the headquarters with a
static IP address can be connected to external locations that have neither
fixed IP addresses nor flatrate Internet access. As these remote stations
generally do not use dynamic DNS services, they cannot be reached via an
IP address or via a name that can be resolved by DNS. The extensions
provided by LANCOM Dynamic VPN make it possible to use ISDN
signalling to establish connections.
Further information about these features can be found in the description of
the applications.
14.2.3 LANCOM VPN functions
This section lists all of the functions and properties of LANCOM VPN. This
overview will provide a great deal of information for VPN experts. It is very
compact, but contains a lot of complex, specialized terminology. Knowledge
of the technical basics of VPN are required to understand this section. Don't
worry: it's no problem if you skip this section. The information contained here
is not required to set up and use LANCOM VPN.
̈ VPN in accordance with IPSec standard
̈ VPN tunnel via leased lines, switched connections and IP networks
̈ IPSec main and aggressive mode
̈ LANCOM Dynamic VPN: Public IP addresses can be static or dynamic
(initiation of a connection towards remote sites with dynamic IP addresses
requires ISDN)
̈ IPSec protocols AH and ESP in transport and tunnel mode
̈ Hash algorithms:
୴ HMAC-MD5-96, Hash length 128 bit
୴ HMAC-SHA-1-96, Hash length 160 bit
̈ Symmetrical encryption methods
୴ AES, key length 128 bit
୴ Triple-DES, key length 168 bit
୴ Blowfish, key length 128 - 448 bit
୴ CAST, key length 128 bit
297
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
୴ DES, key length 56 bit
̈ IKE key exchange with Preshared Keys
̈ Key exchange via Oakley, Diffie-Hellman algorithm with key lengths 768
bit, 1024 bit or 1536 bit, well-known groups 1, 2 and 5
̈ Key management in accordance with ISAKMP
̈ Apart from conventional IPSec implementations, LANCOM devices offer
extended functionality, such as the LANCOM Dynamic VPN that allows the
use of the high-security IKE Main Mode even with dynamic IP addresses.
̈ In combination with the LANCOM Advanced VPN Client, a separate pre-
shared key can be used for each connection even when using IKE
Aggressive Mode connections.
14.3 VPN connections in detail
Two types of VPN connections are available:
̈ VPN connections linking two local networks. This type of connection is
also known as a "LAN-LAN coupling".
̈ The connection of an individual computer with a network, generally via a
dial-in connection (Remote Access Service – RAS).
14.3.1 LAN-LAN coupling
The coupling of two remote networks is known as a LAN-LAN coupling. With
such a connection, the devices in one LAN can access those of the remote LAN
(assuming they have the necessary access rights).
298
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
In practice, LAN-LAN couplings are frequently used between company
headquarters and subsidiaries, or for connections to partner companies.
LAN
LAN
Internet
A VPN-enabled router (VPN gateway) is located at either end of the tunnel.
The configuration of both VPN gateways must be matched to one another.
The connections are transparent for the remaining devices in the local
networks, i.e., they appear to have a direct connection. Only the two
gateways must be configured for the VPN connection.
Internet access in parallel
The Internet access for VPN can be used simultaneously for other Internet
applications, such as web-browsing or e-mail. For security reasons, the
parallel Internet access may be unwanted in some cases. For instance, if a
branch office should be enforced to access the Internet only via a central
firewall. For such applications the parallel Internet access can be disabled as
well.
14.3.2 Dial-in connections (Remote Access Service)
Individual remote computers (hosts) can access the resources of the LAN via
dial-up connections. Practical examples of this are employees working from
home or field staff that dial into the company network.
If the dial-up connection of an individual computer to a LAN is to be realized
via VPN, that computer first connects to the Internet. A special VPN client
299
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
software then sets up a tunnel to the VPN gateway of the LAN using this
Internet connection.
LAN
Headquarters
Remote computer
with VPN client
Laptop with
VPN client
Internet
The VPN gateway of the LAN must support the establishment of VPN tunnels
with the VPN client software of the remote PC.
14.4 What is LANCOM Dynamic VPN?
LANCOM Dynamic VPN is a patent-pending LANCOM Systems technology
which permits VPN tunnels to be connected to remote stations that do not
have a static, but only a dynamic IP address.
Who needs LANCOM Dynamic VPN and how does it work? We will answer this
question in two steps: First, a look at the basics of IP addressing will show the
problem of static IP addresses. The second step shows the solution thereof
with LANCOM Dynamic VPN.
14.4.1 A look at IP addressing
Every participant on the Internet needs an IP address. Participants even need
a special kind of IP address - a public one. The administration of public IP
addresses is handled from central locations in the Internet. Each public IP
address may only occur once on the entire Internet.
Local IP-based networks do not use public, but private IP addresses. For this
reason, a number of address ranges within the entire IP address range have
been reserved for private IP addresses.
A computer connected to both a local network and directly to the Internet
therefore has two IP addresses: a public one for communication with the rest
300
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
of the Internet and a private one by which the computer can be reached within
the local network.
Static and dynamic IP addresses
Public IP addresses must be applied for and managed, which involves costs.
There is also only a limited number of public IP addresses. For this reason, not
every Internet user has his or her own fixed (static) IP address.
The alternative to static IP addresses are the so-called dynamic IP addresses.
A dynamic IP address is assigned to an Internet user by the Internet Service
Provider (ISP) upon dialling-in, and remains valid for the duration of the
connection. The ISP takes an unused address selected at random from their
pool of IP addresses. This IP address is only temporarily assigned to the user
for the duration of a given connection. When the connection is ended, the IP
address is once again free and the ISP can assign it to another user.
Many flatrate connections, too, are realised with via dynamic IP
addresses. Every 24 hours or so, the connection is forcibly interrupted.
The new connection is generally assigned with a new and different IP
address.
Advantages and disadvantages of dynamic IP addresses
This process has a very important advantage for ISPs: they only need relatively
small pools of IP addresses. Dynamic IP addresses are also favorable for users:
it's not necessary for them to apply for static IP addresses in advance - they
can connect to the Internet immediately. It's also not necessary for them to
manage IP addresses. This saves trouble and costs. The other side of the coin:
A user without a static IP address cannot be addressed directly from the
Internet.
This is a major problem when setting up VPNs. If, for example, Computer A
would like to communicate with Computer B using a VPN tunnel on the
Internet, Computer A needs the remote computer's IP address. If B only has a
dynamic address, A cannot know that address and therefore cannot contact B.
The LANCOM Dynamic VPN offers the answer here.
14.4.2 This is how LANCOM Dynamic VPN works
Let's use two examples to explain how LANCOM Dynamic VPN works
(designations refer to the IP addressing type of the two VPN gateways):
̈ dynamic – static
301
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
̈ static – dynamic
̈ dynamic – dynamic
Dynamic – static
If a user on computer B in LAN 2 wishes to connect to computer A in LAN 1,
then gateway 2 receives a request and tries to establish a VPN tunnel to
gateway 1. Gateway 1 has a static IP address and can be directly contacted
over the Internet.
A problem arises in that the IP address from gateway 2 is assigned
dynamically, and gateway 2 must communicate its current IP address to
gateway 1 when attempting to connect. In this case, LANCOM Dynamic VPN
takes care of transmitting the IP address during connection establishment.
Branch_office
Headquarters
Internet
ቢ
ባ
Gateway 2 with
dynamic IP
address
Gateway 1 with
static IP address
LAN 1
LAN 2
Computer A
Computer B
ቢ Gateway 2 connects to the Internet and is assigned a dynamic IP address.
ባ Gateway 2 contacts Gateway 1 via its known public IP address. LANCOM
Dynamic VPN enables the identification and transmission of the actual IP
address of Gateway 2. Gateway 1 initiates the VPN tunnel then.
The great advantage of LANCOM devices with this application: Instead of the
“Aggressive Mode” that is normally used when connecting VPN clients to the
headquarters, the far more secure “Main Mode” can be applied. Although
with Main Mode more unencrypted messages can be exchanged during the
IKE handshake, the method is overall more secure than Aggressive Mode.
An ISDN line is not necessary for establishing this type of connection.
The dynamic end communicates its IP address encrypted via the
Internet protocol ICMP (or alternatively via UDP).
302
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
Static – dynamic
If, on the other hand, computer A in LAN 1 requires a connection to computer
B in LAN 2, for example when headquarters carries out remote maintenance
at the external locations, then gateway 1 receives the request and attempts to
establish a VPN tunnel to gateway 2. Gateway 2 only has a dynamic IP address
and cannot be directly contacted over the Internet.
With LANCOM Dynamic VPN, the VPN tunnel can be set up nevertheless. The
connection is established in three steps:
Headquarters
Branch_office
Internet
ባ
ቤ
Gateway 2 with
dynamic IP
address
Gateway 1 with
static IP address
LAN 2
ቢ
LAN 1
Call via ISDN
ISDN
Computer A
Computer B
ቢ Gateway 1 calls Gateway 2 via ISDN. It takes advantage of the ISDN
functionality of sending its own subscriber number via the D-channel free
of charge. Gateway 2 determines the IP address of Gateway 1 from the
preconfigured VPN remote stations using the received subscriber number.
If Gateway 2 does not receive a subscriber number via the D-channel (if
that particular ISDN service feature is not available, for example) or an
unknown number is transferred, the authentication will be performed via
the B-channel. Once the negotiation was successful, Gateway 1 sends its
IP address and closes the connection on the B-channel immediately.
ባ Now its Gateway 2's turn: It first connects to its ISP and is assigned a
dynamic IP address.
ቤ Gateway 2 can now establish the VPN tunnel to Gateway 1. The static IP
address of gateway 1 is known, of course.
The advantage of LANCOM devices, for example when connecting from the
headquarters to branch offices: The functions in LANCOM Dynamic VPN also
allows access to networks without a flatrate, i.e. networks that are not always
online. The ISDN connection and an associated MSN act to substitute the
another address, such as a static IP address or the dynamic address
303
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
translation via dynamic DNS services, a solution often used with flatrate
connections.
The described connection set up requires an ISDN connection for both
VPN gateways. But usually no charges will arise for this procedure.
Dynamic – dynamic
With LANCOM Dynamic VPN, VPN tunnels can also be set up between two
gateways that both only have dynamic IP addresses. Let's modify the previous
example so that in this case Gateway 1 also has a dynamic IP address. Once
again, Computer A would like to connect to Computer B:
Gateway 1
with dynamic IP
address
Gateway 2
with dynamic
IP address
Internet
ቢ
ቤ
ብ
LAN 1
LAN 2
ባ
Call via ISDN
ISDN
Computer A
Computer B
ቢ Gateway 1 connects to its ISP and is assigned a public, dynamic IP
address.
ባ It then calls Gateway 2 via ISDN to send this dynamic address. Three
procedures are used to send the address:
୴ As information in the LLC element of the D-channel. In the D-
channel protocol of Euro-ISDN (DSS-1), the so-called LLC (Lower
Layer Compatibility) element can be used to send additional
information to the remote station. This transfer takes place before the
B-channel connection is established. Once the address has been sent
successfully, the remote station rejects the call. Charges are thus not
incurred for a B-channel connection. The IP address is sent
nevertheless for free in this case.
The LLC element is generally available as a standard feature in Euro-
ISDN that does not require registration or activation. It may be
disabled by telephone companies or individual exchanges, however.
304
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
The LLC element is not available in 1TR6, the German national ISDN.
The procedure described above thus will not work with 1TR6.
୴ As a subaddress via the D-channel. If it is not possible to send the
address via the LLC element, Gateway 1 will attempt to send the
address as a so-called subaddress. Like the LLC element, the
subaddress is an information element of the D-channel protocol that
permits short items of information to be sent free of charge. In this
case, the telephone company must enable the 'subaddressing' feature
first; this is generally subject to a charge. As with the LLC element, the
call is rejected by the remote station once the IP address has been
transferred successfully. The connection thus remains free of charge.
୴ Via the B-channel. If both attempts to send the IP address via the
D-channel fail, then a conventional connection via the B-channel
must be established to send the IP address. The connection is dropped
immediately after the IP address has been sent. This connection is
subject to the usual charges.
ቤ Gateway 2 connects to the ISP and receives a dynamic IP address.
ብ Gateway 2 now sets up the VPN tunnel to Gateway 1.
Dynamic VPN works only between LANCOM that each feature at least
one ISDN port that can be used for the ISDN connection.
Dynamic IP addresses and DynDNS
It is also possible to establish a connection between two stations using
dynamic IP addresses by using so-called dynamic DNS services (DynDNS). The
address of the tunnel end-point is not defined as an IP number (which is, of
course, dynamic and subject to frequent change) but as a static name instead
(e.g. [email protected]).
Two things are needed for translating a name to its current IP address: A
dynamic DNS server and a dynamic DNS client:
̈ The first, available from numerous providers in the Internet, is a server
that is in communication with Internet DNS servers.
̈ The dynamic DNS client is integrated in the device. It can make contact to
any one of a number of dynamic-DNS service providers and, assuming
that a user account has been set up, automatically update its current IP
305
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
address for the DNS name translation. This can be set up very conveniently
with a Wizard under LANconfig (also see ’Dynamic DNS’ auf Seite 284):
For reasons of security and availability, LANCOM recommends the use
of Dynamic VPN in preference to dynamic DNS-based VPN solutions.
Dynamic VPN is based on direct connections via the ISDN network
and ensures a higher degree of availability than dynamic DNS services
in the Internet.
14.5 Configuration of VPN connections
Two questions are answered in the configuration of VPN connections:
̈ Between which VPN gateways (remote stations) is the connection
established?
̈ What security parameters are used to secure the VPN tunnel between the
two gateways?
̈ Which networks or computers can intercommunicate via these tunnels?
This section introduces the basic considerations for configuring VPN
connections. Considered first of all is the simple connection of two
local networks. Special cases such as dialling in to LANs with
306
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
individual computers (RAS) or the connection of structured networks
will be covered subsequently.
14.5.1 VPN tunnel: Connections between VPN gateways
Virtual Private Networks (VPNs) are used to interconnect local networks over
the Internet. This involves the routing of the private LAN IP addresses via an
Internet connection between two gateways with public IP addresses.
For the secure routing of private IP addresses over the Internet, a VPN
connection, also known as a VPN tunnel, is established between the two
LANs.
The VPN tunnel has two important tasks:
̈ To shield the transported data from unauthorized access
̈ To route private IP addresses via an Internet connection that can normally
only be used to route public IP addresses.
The VPN connection between the two gateways is defined by the following
parameters:
̈ The end-points of the tunnel, the VPN gateways, each of which are
accessible via public IP addresses (static or dynamic)
̈ The IP connection between the two gateways
̈ The private IP address range that are to be routed between the VPN
gateways
̈ Setting relevant to security, such as passwords, IPSec keys etc. to shield
the VPN tunnel
This information is contained in the so-called VPN rules.
IP network: 10.1.0.0
IP network: 10.2.0.0
Net mask: 255.255.0.0
Net mask: 255.255.0.0
IP address:
IP address:
80.146.81.251
217.213.77.120
VPN tunnel with IPSec
encryption
IP connection
307
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
14.5.2 Set up VPN connections with the Setup Wizard
If possible, make use of the Setup Wizard within LANconfig to set up VPN
connections between local networks. The Wizard guides you through the
configuration and makes all the necessary settings for you. Carry out the
configuration on both routers, one after the other.
ቢ Choose your device from the selection window in LANconfig and select
the Setup Wizard button or use the menu bar Tools ̈ Setup Wizard.
ባ Follow the Wizard’s instructions and enter the necessary data. The Wizard
will inform you when the required information is complete. You can then
close the Wizard with Finish.
ቤ Once you have completed the set-up of both routers, you can start testing
the network connection. Try to communicate with a computer in the
remote LAN (e.g. with ping). The device should automatically connect to
the remote station and make contact to the requested computer.
This Wizard automatically sets up the VPN connections essential for typical
LAN-LAN coupling. In the following situations, the VPN connections will have
to be configured manually:
̈ Where no Windows computer with LANconfig is available. In this case, the
necessary parameters are set with WEBconfig or via the Telnet console.
̈ Where only selected portions of the LAN (intranet) are to communicate
with other computers via the VPN connection. This is the case where, for
example, the intranet is connected to further subnets with routers, or
when only selected portions of the intranet should have access to the VPN
connection. In such cases, additional parameters are defined
supplementary to those entered in the Setup Wizard.
̈ Configuring VPN connections to third-party devices.
308
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
14.5.3 Inspect VPN rules
VPN rules represent a combination of various pieces of information and they
are not directly defined in a LANCOM device; instead, they are compiled from
a variety of sources. This is why it is not possible to inspect the VPN rules with
LANconfig or any other configuration tool.
Information about the current VPN rules in the device can be retrieved with
the Telnet console. Start a Telnet connection to the VPN gateway and enter
the command show vpn in the console:
The output informs you of the network relationships that are relevant to VPN
connections to other networks.
In this example, the local network at a branch office (network 192.168.2.0,
netmask 255.255.255.0) is connected to the network at the headquarters
(network 10.0.0.0, netmask 255.255.255.0). The public IP address of the local
gateway is 80.146.81.251, and that of the remote VPN gateway is
217.213.77.120.
Entering “any:0” displays the protocols and ports that can be used
over the connection.
Further output is displayed by the command “show vpn long”. The
information displayed here covers network relationships and also the
parameters that are relevant to security, such as IKE and IPSec
proposals.
14.5.4 Manually setting up VPN connections
Manually setting up VPN connections involves the tasks described previously:
309
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
̈ Definition of the tunnel endpoints
̈ Definition of the security-related parameters (IKE and IPSec)
̈ Definition of the VPN network relationships, i.e. the IP address ranges to
be connected. Should the IP ranges overlap at both ends of the
connection, please refer to the section ’N:N mapping’ auf Seite 80.
̈ When coupling Windows networks (NetBIOS/IP): Without WINS servers at
both ends of the VPN connection (such as when linking a home office),
the LANCOM can take over the necessary NetBIOS proxy functions. To this
end, the NetBIOS module in the LANCOM must be activated, and the
corresponding VPN remote site must be entered into the NetBIOS module
as the remote site. Should WINS servers be present in both of the coupled
networks, then the NetBIOS module should be deactivated so that the
LANCOM does not perform NetBIOS proxy functions.
̈ When using LANCOM Dynamic VPN: Entry for the corresponding remote
site in the PPP list with a suitable password for the Dynamic VPN
handshake. The username entered here must correspond with the name
entered in the remote device that describes the VPN connection to this
local device. Activate "IP routing". If Windows networks are also to be
coupled, then the NetBIOS entry should be activated here.
The tunnel endpoints, i.e. the local VPN gateway and each of the VPN remote
stations, are entered into the VPN connection list.
Manually configuring the VPN connection involves the following steps:
ቢ Create an entry for the remote VPN gateway in the connection list and
enter its public IP address.
ባ The security parameters for the VPN connection are normally taken from
the prepared list, and all that is required here is to define an IKE key.
ቤ For a Dynamic VPN connection, create a new entry in the PPP list with the
name of the remote VPN gateway as the remote station, with the name of
the local VPN gateway as the User Name, and set a suitable password. Be
sure to activate the IP routing for this PPP connection and, if required, the
routing of “NetBIOS over IP” as well. The remaining PPP parameters, such
as the procedure for checking the remote station, can be defined in the
same way as for other PPP connections.
ብ The main task in setting up VPN connections is in defining the network
relationships. Which IP address ranges at each end of the VPN tunnel
should be included in the secured connection?
310
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
14.5.5 Prepare VPN network relationships
The firewall integrated into LANCOM routers is a powerful instrument for
defining source and target address ranges between which data transfer (and
limitations to it) can be enabled or prohibited. These functions are also used
for setting up the network relationships for the VPN rules.
In the simplest case, the firewall can generate the VPN rules automatically.
̈ The local intranet serves as the source network, i.e. the same private IP
address range that the local VPN gateway itself belongs to.
̈ For automatically generated VPN rules, the target networks are those
network ranges that have a remote VPN gateway set as their router.
To activate the automated rule generation, simply switch on the
1
corresponding option in the firewall . When coupling two simple local
networks, the automatic VPN can interpret the necessary network
relationships from the IP address range in its own LAN and from the entry for
the remote LAN in the IP routing table.
IP network: 10.1.0.0
IP network: 10.2.0.0
Net mask: 255.255.0.0
Net mask: 255.255.0.0
VPN-GW 1
VPN-GW 2
80.146.81.251
217.213.77.120
IP routing table:
IP routing table:
10.2.0.0/16 > VPN-GW-2
10.1.0.0/16 > VPN-GW-1
The description of the network relationships is more complicated if the source
and target networks are not only represented by the intranet address ranges
of the connected LANs:
1. automatic when using the VPN installation Wizard under LANconfig
311
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
̈ When only a portion of the local intranet is to be available to the remote
network, then the automatic method is unsuited as the IP address range
that is open to the VPN connection is too large.
IP: 10.1.0.1 to 10.1.0.50
Net mask: 255.255.0.0
IP: 10.2.0.2 to 10.2.0.99
Net mask: 255.255.0.0
̈ In many network structures, the local network is connected by further
routers to sections of other networks with their own IP address ranges.
Additional settings are required to include these address ranges in the
network relationship.
IP network: 10.2.0.0
Net mask: 255.255.0.0
IP network:
10.1.0.0
Net mask:
255.255.0.0
IP network: 10.1.0.0
Net mask: 255.255.0.0
In these cases, the network relationships that describe the source and target
networks must be entered manually. Depending on the situation, the scope of
the automatically generated VPN rules may be extended, although sometimes
it is better to deactivate the automatic VPN system to prevent unwanted
network relationships.
The necessary network relationships are defined by the appropriate firewall
rules under the following circumstances:
̈ In the firewall rules, the option “Consider this rule when generating VPN
rules” must be activated.
312
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
The firewall rules for generating VPN rules are active even when the
actual firewall function in the LANCOM device is not required and is
switched off!
̈ Make sure that the firewall action is set to “Transfer”.
̈ Sources and targets for the connection can be entered as individual
stations, certain IP address ranges, or whole IP networks.
It is vital that target networks are defined in the IP routing table so
that the router in the LANCOM devices can forward the appropriate
data packets to the other network. You can make use of the entries
that already exist there and simply enter a higher-level network as the
target. The intersecting portion of the target network defined by the
firewall and the subordinate entries in the IP routing table is
integrated into the network relationships for the VPN rules.
Example: The target networks 10.2.1.0/24, 10.2.2.0/24 and
10.2.3.0/24 are entered into the IP routing table and can be accessed
via the router VPN-GW 2. An entry for the target network 10.2.0.0/16
is sufficient for these three subnets to be included in the VPN rules.
The definition of source and target networks must agree at both ends
of the VPN connection. It is not possible, for example, to map a larger
target address range to a smaller source address range at the opposite
end. Decisive here are the IP address ranges allowed by the VPN rules
and not the networks defined in the firewall rules. These can be very
different from the network relationships in the VPN rules because of
the intersecting ranges.
̈ VPN connections can also be limited to certain services or protocols
according to your requirements. This means that the VPN connection can
be limited to use only with a Windows network, for example.
These limitation should be defined by a separate set of rules that
applies only to the firewall and that will not be used in generating
VPN rules. Combined firewall/VPN rules can very quickly become
highly complex and difficult to comprehend.
313
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
14.5.6 Configuration with LANconfig
The section demonstrates how LANconfig can be used to configure a LAN-
LAN coupling with additional subnets. In this section, VPN gateway 1 will be
configured and then the configuration of gateway 2 with the help of
WEBconfig will be demonstrated.
10.2.0.0/16
10.5.0.0/16
LAN router 5: 10.4.0.5
LAN router 2: 10.1.0.2
10.1.0.0/16
10.4.0.0/16
Gateway 1:
Gateway 2:
gw1.dyndns.org
gw2.dyndns.org
LAN router 3: 10.1.0.3
10.3.0.0/16
ቢ When configuring VPN, access the “IKE param.” tab and create a new IKE
key for the connection:
ባ Under the “General” tab, create a new entry in the list of Connection
parameters. Select the IKE key created earlier for this. PFS and IKE groups
can also be selected in the same way as IKE and IPSec proposals from the
options prepared earlier.
ቤ You should then generate a new entry in the Connection list with the name
of the remote gateway as “name for the connection”. For the “Remote
314
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
gateway”, enter the public address of the remote station: either the fixed
IP address or the name for translation by DNS.
ብ When using LANCOM Dynamic VPN: Change to the “Communication”
configuration area. Using the “Protocols” tab, make a new entry in the
PPP list. Select the remote VPN gateway as the remote site, enter the User
Name as the name of the VPN connection that the remote VPN gateway
uses to address the local device, and enter a suitable password that is
identical at both locations.
Be sure to activate "IP routing" and, if required, "NetBIOS over IP"
(→page 310).
ቦ Change to the “IP Router” configuration area. On the “Routing” tab, make
a new entry in the routing table for those parts of networks that are to be
315
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
accessible in the remote and in the local LAN. In each case, define the
router as the remote VPN gateway and switch the IP masquerading off.
For the “VPN gateway 1”, the following entries are necessary so that the
remote network sections can be reached.
IP address Net mask
Router
IP masquerading
10.4.0.0
10.5.0.0
255.255.0.0
255.255.0.0
VPN gateway 2
VPN gateway 2
No
No
For those subnetworks connected to your own LAN, define the router as
the IP address for the appropriate LAN router.
IP address Net mask
Router
10.1.0.2
10.1.0.3
IP masquerading
10.2.0.0
10.3.0.0
255.255.0.0
255.255.0.0
No
No
These entries enable VPN gateway 1 to forward packets arriving from the
remote network to the correct sections of the local network.
ቧ Change to the “Firewall/QoS” configuration area. On the “Rules” tab, add
a new firewall rule with the name “VPN GATEWAY 1 OUT” and activate the
option “This rule is used to create VPN rules”. This ensures that IP
networks described in this rule will be used in establishing VPN network
relationships.
316
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
As a rule, it is recommended that you keep the rules used for making
network relationships separate from those firewall rules that affect
the services used in communications, for example.
ቨ On the “Actions” tab for these firewall rules, set the “Packet Action” to
“Transmit”.
ቩ On the “Stations” tab for these firewall rules, define the source of the data
transfers as the subnets at the local site, and set the destination as all of
the subnets at the remote site.
ቪ Now for the incoming data transmissions, generate a firewall rule named
“VPN GATEWAY 1 IN” with the same parameters as the rule just described.
317
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
The only difference is that the source and the destination networks are
swapped.
14.5.7 Configuration with WEBconfig
ቢ Under Configuration ̈ VPN ̈ IKE-Param. ̈ IKE key set a new IKE
key for the connection:
ባ Under Configuration ̈ VPN ̈ General ̈ Connection parameters
define a new “VPN layer” for the connection parameters. Select the IKE
key created earlier for this.
318
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
ቤ Under Configuration ̈ VPN ̈ Connection list generate a new entry
with the name of the remote gateway set to “Name”. For the “Remote
gateway”, enter the public address of the remote station: either the fixed
IP address or the name for translation by DNS.
ብ When using LANCOM Dynamic VPN: Under Configuration ̈ Setup ̈
WAN module ̈ PPP list make a new entry.
Select the remote VPN gateway as the remote site, enter the User Name
as the name of the VPN connection that the remote VPN gateway uses to
address the local device, and enter a suitable password that is identical at
both locations.
Be sure to activate "IP routing" and, if required, "NetBIOS over IP"
(→page 310).
ቦ Under Configuration ̈ Setup ̈ IP router module ̈ IP routing
table generate a new entry for each network portion that should be
319
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
accessible in the remote and in the local LAN. In each case, define the
router as the remote VPN gateway and switch the IP masquerading off.
For the “VPN gateway 2”, the following entries are necessary so that the
remote network sections can be reached.
IP address Net mask
Router
IP masquerading
10.1.0.0
10.2.0.0
10.3.0.0
255.255.0.0
255.255.0.0
255.255.0.0
VPN gateway 1
VPN gateway 1
VPN gateway 1
No
No
No
For those subnetworks connected to your own LAN, define the router as
the IP address for the appropriate LAN router.
IP address Net mask
Router
IP masquerading
10.5.0.0
255.255.0.0
10.4.0.5
No
These entries enable VPN gateway 2 to forward packets arriving from the
remote network to the correct sections of the local network.
ቧ Under Configuration ̈ Firewall/QoS ̈ Object table make an entry
for each part of the network that should be used as a source or destination
for the VPN connection via “VPN GATEWAY 1” (“VPN-GW1-LOCAL” and
320
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
“VPN-GW1-REMOTE”). Enter each subnet in the form “%A10.1.0.0
%M255.255.0.0”.
ቨ Under Configuration ̈ Firewall/QoS ̈ Rules table define a new
firewall rule named “VPN-GW1-OUT”. Set the objects to “CPN-GW1-
LOCAL” and “VPN-GW1-REMOTE”, the protocol to “ANY” and the action
to “ACCEPT”. Activate the option “VPN rule” so that the IP networks
described in this rule will be used in establishing VPN network
relationships.
As a rule, it is recommended that you keep the rules used for making
network relationships separate from those firewall rules that affect
the services used in communications, for example.
ቩ Now for the incoming data transmissions, generate a firewall rule named
“VPN-GWY1-IN” with the same parameters as the rule just described. The
321
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
only difference is that the source and the destination networks are
swapped.
14.5.8 Diagnosis of VPN connections
If the VPN connections fail to work after the configuration of the parameters,
the following diagnostic methods can be applied:
̈ The command show vpn spd on the Telnet console calls the “Security
Policy Definitions”.
̈ Use the command show vpn sadb to access information about the
negotiated “Security Associations” (SAs).
̈ The command trace + vpn [status, packet] calls up the status and error
messages for the current VPN negotiations.
୴ The error message “No proposal chosen” indicates a fault in the
configuration at the remote site.
୴ The error message “No rule matched”, on the other hand, indicates a
fault in the configuration of the local gateway.
14.6 Specific examples of connections
This section covers the 4 possible types of VPN connections with concrete
examples. These 4 different connection types are categorized by the type of IP
address of the two VPN gateways:
̈ static/dynamic
̈ dynamic/static (the dynamic peer initiates the connection)
̈ static/dynamic (the static peer initiates the connection)
̈ dynamic/dynamic
There is a section for each of these types, together with a description of all
required configuration information in the familiar table form.
322
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
14.6.1 Static/static
Headquarters
Branch_office
Internet
VPN tunnel
Static IP address
193.10.10.2
Static IP address
ISDN
Public IP
Private IP
Public IP
193.10.10.1
10.10.2.1
Private IP
10.10.1.1
A VPN tunnel via the Internet serves as the connection between the LANCOM
Headquarters and branch office. Both gateways have static IP addresses.
Thus, both can initiate the connection.
Entry
Headquarters
Branch_office
Type of local IP address
Type of remote IP address
static
static
static
static
Name of the local device
Name of the remote device
Headquarters
Branch_office
Branch_office
Headquarters
Shared Secret for encryption
secret
193.10.10.2
10.10.2.0
secret
IP address of the remote device
193.10.10.1
10.10.1.0
IP-network address of the remote
network
Netmask of the remote network
255.255.255.0
255.255.255.0
14.6.2 Dynamic/static
Headquarters
Branch_office
Internet
VPN tunnel
Dynamic IP address
10.10.2.1
Static IP address
ISDN
Private IP
Public IP
193.10.10.1
Private IP
10.10.1.1
The VPN gateway Branch office initiates a VPN connection to the gateway
Headquarters. Branch office has a dynamic IP address that was chosen and
assigned by the Internet service provider upon dialling in, whereas
323
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
Headquarters has a fixed, static address. When the connection is set up,
Branch office transmits its actual IP address to Headquarters. This is
accomplished by a special ICMP packet (alternatively UDP, port 87).
Entry
Branch_office
Headquarters
Type of local IP address
static
dynamic
static
Type of remote IP address
dynamic
Name of the local device
Name of the remote device
Headquarters
Branch_office
Branch_office
Headquarters
Password for the secure
transmission of the IP address
confidential
confidential
Shared Secret for encryption
secret
–
secret
IP address of the remote device
193.10.10.1
10.10.1.0
IP-network address of the remote
network
10.10.2.0
Netmask of the remote network
255.255.255.0
255.255.255.0
14.6.3 Static/dynamic (with LANCOM Dynamic VPN)
In this case (other than the example above), the peer with the static IP address
initiates the VPN connection.
Headquarters
Branch_office
Internet
VPN tunnel
Dynamic IP address
Static IP address
ISDN
Private IP
ISDN no.
10.10.2.1
Private IP
Public IP
ISDN no.
10.10.1.1
(069) 54321
193.10.10.1
(030) 12345
ISDN identifier 06954321
ISDN identifier 03012345
The VPN gateway Headquarters initiates a VPN connection to Branch
office. Headquarters has a static IP address, Branch office a dynamic one.
The entries for the ISDN connection are needed for the transmission
of the actual dynamic IP address solely. The Internet access wizard
configures the connection to the Internet.
324
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
Alternatively, this application can be solved with the help of dynamic
DNS. In this constellation, the headquarters with its static IP address
connects to the branch office with the help of a dynamic DNS name
which is assigned to the current dynamic IP address. More
information is available under ’Dynamic IP addresses and DynDNS’
→page 305.
Entry
Branch_office
Headquarters
Type of local IP address
static
dynamic
static
Type of remote IP address
dynamic
Name of the local device
Name of the remote device
Headquarters
Branch_office
Branch_office
Headquarters
ISDN-calling number of the remote
device
06954321
03012345
ISDN-caller ID of the remote device
06954321
03012345
Password for the secure
transmission of the IP address
confidential
confidential
Shared Secret for encryption
secret
secret
IP address of the remote device
193.10.10.1
10.10.1.0
IP-network address of the remote
network
10.10.2.0
Netmask of the remote network
255.255.255.0
255.255.255.0
14.6.4 Dynamic/dynamic (with LANCOM Dynamic VPN)
Headquarters
Branch_office
Internet
VPN tunnel
Dynamic IP address
Dynamic IP address
ISDN
Private IP
ISDN no.
10.10.2.1
Private IP
10.10.1.1
(069) 54321
ISDN no.
(030) 12345
ISDN identifier 06954321
ISDN identifier 03012345
A VPN tunnel via the Internet serves as the connection between the LANCOM
Headquarters and branch office. Both sites have dynamic IP addresses.
Thus, both can initiate the connection.
325
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
The entries for the ISDN connection are needed for the transmission
of the actual dynamic IP address solely. The Internet access wizard
configures the connection to the Internet.
Alternatively, this application can be solved with the help of dynamic
DNS. Instead of a static IP address, a dynamic DNS name helps to find
the dynamic IP address that is currently in use. More information is
available under ’Dynamic IP addresses and DynDNS’ →page 305.
Entry
Branch_office
Headquarters
Type of local IP address
Type of remote IP address
dynamic
dynamic
dynamic
dynamic
Name of the local device
Name of the remote device
Headquarters
Branch_office
Branch_office
Headquarters
ISDN-calling number of the remote
device
06954321
03012345
ISDN-caller ID of the remote device
06954321
03012345
Password for the secure
transmission of the IP address
confidential
confidential
Shared Secret for encryption
secret
secret
IP-network address of the remote
network
10.10.2.0
10.10.1.0
Netmask of the remote network
255.255.255.0
255.255.255.0
14.7 How does VPN work?
In practice, a VPN must fulfill a number of requirements:
̈ Unauthorized third parties must not be able to read the data (encryption)
̈ It should not be possible to manipulate the data (data integrity)
̈ Unambiguous identification of the sender of data (authentication)
̈ Simple key management
̈ Compatibility to VPN devices from a variety of manufacturers
LANCOM VPN achieves these five major goals by applying the widely used
IPSec standard.
326
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
14.7.1 IPSec—The basis for LANCOM VPN
The original IP protocol does not contain any provisions for security. Security
problems are compounded by the fact that IP packets do not go directly to a
specific recipient, but are sent scattershot to all computers on a given network
segment. Anyone can help themselves and read the packets. This leaves the
door open to the misuse of data.
IP has been developed further for this reason. A secure version is now
available: IPSec. LANCOM VPN is based on IPSec.
IPSec stands for “IP Security Protocol” and was originally the name used by a
working group of the IETF, the Internet Engineering Task Force. Over the
years, this group has developed a framework for a secure IP protocol that is
generally referred to as IPSec today.
It is important to note that IPSec itself is not a protocol, but merely the stan-
dard for a protocol framework. IPSec actually consists of a variety of protocols
and algorithms for encryption, authentication and key management. These
standards will be introduced in the following sections.
Security in an IP environment
IPSec has been implemented almost completely within level 3 of the OSI
model, i.e. in the network layer. The transfer of data packets using the IP
protocol is realized on level 3 of IP networks.
IPSec thus replaces the IP protocol. Under IPSec, the packets have a different
internal structure than IP packets. Their external structure remains fully
compatible to IP, however. IPSec packets can therefore be transported without
problems by existing IP networks. The devices in the network responsible for
the transport of the packets cannot distinguish IPSec packets from IP packets
on the basis of their exterior structure.
The exceptions in this case are certain firewalls and proxy servers that access
the contents of the packets. Problems can arise from the (often function
dependent) incompatibilities of these devices to the existing IP standard.
These devices must therefore be adapted to IPSec.
IPSec will be firmly implemented in the next generation of the IP standard
(IPv6). For this reason, we can assume that IPSec will remain the most
important standard for virtual private networks in the future.
327
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
14.7.2 Alternatives to IPSec
IPSec is an open standard. It is not dependent on individual manufacturers
and is being developed by the IETF with input from the interested public. The
IETF is a nonprofit organization that is open to everyone. The broad
acceptance of IPSec is the result of this open structure which unites a variety
of technical approaches.
Nevertheless, there are other approaches for the realization of VPNs. We will
only mention the two most important of these here. They are not realized at
the network level like IPSec, but at the connection and application levels.
Security at the connection level – PPTP, L2F, L2TP
Tunnels can already be set up at the connection level (level 2 of the OSI
model). Microsoft and Ascend developed the Point-to-Point Tunneling
Protocol (PPTP) early on. Cisco presented a similar protocol with Layer 2
Forwarding (L2F). Both manufacturers agreed on a joint effort and the IETF
produced the Layer 2 Tunnel Protocol (L2TP).
Their main advantage over IPSec is that any network protocol can be used
with such a network connection, especially NetBEUI and IPX.
A major disadvantage of the described protocols is the lack of security at the
packet level. What's more, these protocols were designed specifically for dial-
up connections.
Security at higher levels – SSL, S/MIME, PGP
Communications can also be secured with encryption at higher levels of the
OSI model. Well known examples of this type of protocol are SSL (Secure
Socket Layer) mainly used for web browser connections, S/MIME (Secure
Multipurpose Internet Mail Extensions) for e-mails and PGP (Pretty Good
Privacy) for e-mails and files.
In all of the above protocols, an application handles the encryption of the
data, for example the Web browser on one end and the HTTP server on the
other.
A disadvantage of these protocols in the limitation to specific applications. In
addition, a variety of keys is generally required for the different applications.
The configuration must be managed on the individual computers and can not
be administered conveniently on the gateways only, as is the case with IPSec.
Security protocols at the application level tend to be more intelligent as they
know the significance of the data being transferred. They are usually much
more complex, however.
328
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
All of these layer-2 protocols only support end-to-end connections; they are
therefore not suitable for coupling entire networks.
On the other hand, these mechanisms do not require the slightest changes to
the network devices or access software. And unlike protocols in lower network
levels, they are still effective when the data content is already in the computer.
Combinations are possible
All of the alternatives listed above are compatible to IPSec and can therefore
be used parallel to it. This permits a further increase of the security level. It
would be possible, for example, to dial into the Internet using an L2TP
connection, set up an IPSec tunnel to a Web server and exchange HTTP data
between the Web server and the browser in secure SSL mode.
Each additional encryption would reduce the data throughput, however. Users
can decide on a case-by-case basis whether the security offered by IPSec
alone is sufficient. Only in rare cases is a higher level of security really
necessary. Particularly as the degree of security can be adjusted within IPSec.
14.8 The standards behind IPSec
IPSec is based on a variety of protocols for the individual functions. These
protocols are based on, and complement one another. The modularity
achieved with this concept is an important advantage of IPSec over other
standards. IPSec is not restricted to specific protocols but can be
supplemented at any time by future developments. The protocols integrated
to date also offer such a high degree of flexibility that IPSec can be perfectly
adapted to virtually any requirements.
14.8.1 IPSec modules and their tasks
IPSec has to perform a number of tasks. One or more protocols have been
defined for each of these tasks.
̈ Authentication of packets
̈ Encryption of packets
̈ Transfer and management of keys
14.8.2 Security Associations – numbered tunnels
A logical connection (tunnel) between two IPSec devices is known as an SA
(Security Association). SAs are managed independently by the IPSec device.
An SA consists of three values:
329
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
̈ Security Parameter Index (SPI)
ID to distinguish multiple logical connections to the same target device
with the same protocols
̈ Target IP address
̈ Security protocol used
Designates the security protocol used for the connection: AH or ESP
(further information will be provided on these protocols in the following
sections).
An SA applies only to one communication direction of the connection
(simplex). A complete send and receive connection requires two SAs. In
addition, an SA only applies for one used protocol. Two separate SAs are also
required if AH and ESP are used, i.e. two for each communication direction.
The SAs are managed in an internal database of the IPSec device that also
contains the advanced connection parameters. These parameters include the
algorithms and keys used, for example.
14.8.3 Encryption of the packets – the ESP protocol
The ESP protocol (Encapsulating Security Payload) encrypts the packets as
protection against unauthorized access. This was once the only function of
ESP, but in the course of the further development of the protocol it was
expanded with options for the protection of integrity and verification of
authenticity. In addition, ESP also features effective protection against
replayed packets. ESP thus offers all of the functions of AH – in some cases,
however, the use of AH parallel to ESP is advisable.
How ESP works
The structure of ESP is more complex than that of AH. ESP also inserts a
header behind the IP header as well its own trailer and a block of ESP
authentication data.
ESP
Trailer
ESP-Auth.
Data
ESP header
Data
IP header
Transport and tunnel mode
Like AH, ESP can be used in two modes: transport and tunnel mode.
330
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
In transport mode, the IP header of the original packet is left unchanged and
the ESP header, encrypted data and both trailers are inserted.
The IP header contains the unchanged IP address. Transport mode can
therefore only be used between two end points, for the remote configuration
of a router, for example. It cannot be used for the coupling of networks via the
Internet – this would require a new IP header with the public IP address of the
recipient. In such cases, ESP can be used in tunnel mode.
In tunnel mode, the entire packet including the original IP header is encrypted
and authenticated and the ESP header and trailers are added at the entrance
of the tunnel. A new IP header is added to this new packet, this time with the
public IP address of the recipient at the end of the tunnel.
Encryption algorithms
As a higher-level protocol, IPSec does not require specific encryption
algorithms. The manufacturers of IPSec products are thus free in their choice
of the processes used. The following standards are common:
̈ AES – Advanced Encryption Standard
AES is the official encryption standard for use by US authorities, and
therefore one of the most important standards worldwide. Following a
worldwide competition in the year 2000 to find the best of the numerous
encryption algorithms, the National Institute of Standards and
Technology (NIST) selected the Rijndael algorithm (pronounced:
“Rinedoll”) and declared it as the AES in 2001.
AES is a symmetric key algorithm with variable block and encryption
lengths. It has been developed by the Belgian scientists Joan Daemen and
Vincent Rijmen, and features outstanding security, flexibility and
efficiency.
̈ DES – Data Encryption Standard
DES was developed by IBM for the NSA (National Security Agency) in the
early 1970s and was the worldwide security standard for years. The key
length of this symmetrical process is 56 bits. Today, it is considered to be
insecure due to its short key length and in the year 2000 the NIST replaced
it with the AES (Rijndael algorithm). It is no longer suitable for use.
̈ Triple DES (a.k.a. 3-DES)
A further development of DES. The conventional DES algorithm is applied
three times consecutively. Two or three different keys, each with a length
of 56 bits are used. The key for the first run is reused for the third DES run.
331
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
The result is a nominal key length of 168 bit, with an effective key length
of 112 bits.
Triple-DES combines the sophisticated DES technology with a suffi-
ciently long key and is therefore considered to be highly secure. Triple-DES
is slower than other processes, however.
̈ Blowfish
This development by the renowned cryptographer Bruce Schneier is a
symmetrical encryption process. Blowfish achieves outstanding data
throughput on multifunction processors. The process is reputed to be
extremely efficient and secure.
̈ CAST (from the authors Carlisle Adams und Stafford Tavares)
is a symmetrical process with a key length of 128 bits. CAST permits the
modification of parts of the algorithm at runtime.
The encryption settings can be modified in the expert configuration
within LANconfig. Modifications of this sort are generally only
required when setting up VPN connections between devices from
different manufacturers. LANCOM gateways offer the encryption as
standard either after AES (128 bit), Blowfish (128 bit) or Triple-DES
(168 bit).
14.8.4 Authentication – the AH protocol
The AH protocol (Authentification Header) guarantees the integrity and
authenticity of the data. Integrity is frequently regarded as a component of
authenticity. In the following, we will consider integrity to be a separate
problem that is resolved by AH. In addition to integrity and authenticity, AH
also provides effective protection against the replay of received packets
(Replay Protection).
AH adds its own header to IP packets immediately after the original IP header.
The most important part of this AH header is a field containing authentication
data, often referred to as the Integrity Check Value (ICV).
AH header
Data
IP header
Authentication data,
ICV
332
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
The AH process in the sender
In the sender, the authentication data is generated in 3 steps.
ቢ A checksum is calculated for the complete package using a hash
algorithm.
ባ This checksum is once again sent through a hash algorithm together with
a key known to both the sender and the recipient.
ቤ This results in the required authentication data which is inserted in the AH
header.
ቤ
IP header
AH header
Data
ቢ
Checksum
(hash code)
ባ
Authentication data,
ICV
ቤ
Checking of integrity and authenticity by the recipient
The AH protocol works in a very similar manner at the recipient's end. The
recipient also uses his key to calculate the authentication data for the received
333
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
packet. The comparison with the sent ICV of the packet determines the
integrity and authenticity of the packet.
ቤ
AH header
Data
IP header
ቢ
Checksum
(hash code)
ባ
ቤ
Authentication data,
ICV
Authentication data,
ICV
ብ
Identical?
Determining the checksum for the integrity check
AH adds a checksum to each packet before it is sent to guarantee the integrity
of the transferred packets. At the recipients end, AH checks whether the
checksum and the contents of the package match. If this is not the case, the
packet was either incorrectly transferred or deliberately manipulated. Such
packets are discarded immediately and are not forwarded to higher protocol
levels.
A variety of so-called hash algorithms are available to determine the
checksum. Hash algorithms are distinguished by the fact that their results (the
hash code) are a unique fingerprint of the original data. Conversely, the
original data cannot be determined on the basis of the hash code. In addition,
minimum changes of the input value entail a completely different hash code
with a high-grade hash algorithm. Systematic analyses of several hash codes
thus are made more difficult.
LANCOM VPN supports the two most common hash algorithms: MD5 and
SHA-1. Both methods work without keys, i.e. on the basis of fixed algorithms.
Keys do not play a role until a later step of AH: the final generation of the
authentication data. The integrity checksum is only a necessary intermediate
result on the way there.
334
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 14: Virtual Private Networks—VPN
LANCOM Reference Manual LCOS 3.50
Generation of the authentication data
In the second step, AH generates a new hash code using the checksum and a
key, the final authentication data. A variety of standards are available under
IPSec for this process as well. LANCOM VPN supports HMAC (Hash-based
Message Authentication Code). The hash functions MD5 and SHA-1 are
available as hash algorithms. The HMAC versions are accordingly known as
HMAC-MD5-96 and HMAC-SHA-1-96.
This clarifies why AH leaves the packet itself unencrypted. Only the checksum
of the packet and the local key are added to the packet together with the ICV,
the authentication data, in encrypted form as a verification criterion.
Replay protection – protection against replayed packets
In addition to the ICV, AH assigns a unique sequence number to each packet.
The recipient can thus recognize which packets were intercepted by a third
party and resent. Attacks of this type are known as “packet replay“.
AH does not cater for the masking of IPSec tunnels unless additional
measures, such as NAT-Traversal or an outer Layer-2-Tunneling (e.g.
PPPT/L2TP), are used that offer “changeable” IP headers.
14.8.5 Key management – IKE
The Internet Key Exchange Protocol (IKE) permits the integration of
subprotocols for managing the SAs and for key administration.
Within IKE, two subprotocols are used in LANCOM VPN: Oakley for the
authentication of partners and key administration, and ISAKMP for managing
the SAs.
Setting up the SAs with ISAKMP/Oakley
Establishing an SA involves a sequence of steps (with dynamic Internet
connections, these steps follow the exchange of the public IP addresses):
ቢ The initiator sends a plain-text message to the remote station via ISAKMP
with the request to set up an SA and with proposals for the security
parameters of the SA.
ባ The remote station replies with the acceptance of a proposal.
ቤ Both devices now generate key pairs, each consisting of a public and
private key, for Diffie-Hellman encryption.
335
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.50
̈ Chapter 14: Virtual Private Networks—VPN
ብ In two further messages, the devices exchange their public keys for Diffie-
Hellman. The further communication is encrypted with Diffie-Hellman.
ቦ Both ends use numbers that have been transferred (with the Diffie-
Hellman method) and the Shared Secret to generate a common secret key
that is used to encrypt the subsequent communication. Both sides
additionally authenticate their Shared Secrets by using hash codes. Phase
1 of the SA setup is thus completed.
ቧ Phase 2 is based on the encrypted and authenticated connection
established in Phase 1. In Phase 2, the session keys for the authentication
and symmetrical encryption of the actual data transfer are generated at
random and transferred.
Symmetrical processes are used for the encryption of the actual data
transfer. Asymmetrical processes (also known as public-key
encryption) are more secure as they do not require the exchange of
secret keys. However, they require considerable processing resources
and are thus significantly slower than symmetrical processes. In
practice, public-key encryption is generally only used for the exchange
of key material. The actual data encryption is then performed using
the fast symmetrical process.
The regular exchange of new keys
ISAKMP ensures that new key material is regularly exchanged between the
two devices during the SA. This takes place automatically and can be checked
using the 'Lifetime' setting in the advanced configuration of LANconfig.
336
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 15: Appendix
LANCOM Reference Manual LCOS 3.50
15 Appendix: Overview of functions for LANCOM models and LCOS versions
800
1000
1100
I-10
821
1511
1521
1611
1621
1711
1811
1821
3050
3550
4000
4100
6000
6001
6021
7011
8011
L-2
IL-2
L-11
IL-11 L-54g L-54ag
Stateful Inspection
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
2.80
Intrusion Detection, DoS
Protection
2.80
2.80
Extended IP QoS
N:N-Mapping
VLAN
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
3.30
1)
1)
1)
1)
1)
1)
1)
1)
DMZ-Port
2)
2)
AES, 3-DES, DES, Blow-
fish, CAST
3.32
3.32
3.32
VPN-5 Option
integr.
3.32
integr.
3.32
integrated
integr. 3.32
integrated
VPN Hardware
Acceleration
in combinatin in combinatin
with VPN-25 with VPN-25
in combinatin
with VPN-25
VPN 25 Option
VPN 100
VPN 200
4)
ADSL Modem
4 Port Switch
ISDN Leased Line Option
Faxmodem Option
Dynamic DNS
DSLoL
5)
5)
integrated integrated
integrated
integrated
integrated
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
CRON
3.10
3.10
3.10
3.10
3.10
3.10
3.10
3.10
802.11b
802.11g
802.11a (incl. 108 Mbps
Turbo Mode)
3.42 3)
3.42
Multi SSID
IP Redirect
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.423)
Super A/G (108 Mbps
802.11a/g Turbo Mode &
Bursting)
DHCP Auto Client Mode
3.42
3.42
3.42
3.42
3.50
3.42
3.50
3.42
3.42
3.42
3.42
3.50
3.42
3.50
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.42
3.50
3.42
3.50
802.11i with Hardware
AES
- / 3.50
1) Port Separation (Private Mode)
2) only if VPN option activated
3) not with in conjunction with 802.11b WLAN cards
4) optional VPN 500 and VPN 1000
5) compatible to ADSL and ADSL2
337
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.42
̈ Chapter 16: Index
16 Index
Numerics
1
auto reconnect
Availability
98
268
1 mapping
3 DES
3-DES
41, 84
297, 331
337
B
B-channel
protocol
Blowfish
Bonk
Brute force
Bruttodatenrate
60
4-Port Switch
802.11i
PMK caching
VoIP
802.11x
337
213, 230
231
214, 297, 332
164
54
175
231
Rekeying
222
C
Call charge
information
limit
management
Callback
according to RFC 1570
Fast callback
for Microsoft CBCP
Callback procedure
fast callback
Caller ID
Calling Line Identifier Protocol
Capab.
CAPI Faxmodem
CAPI interface
CAST
Channel bundling
dynamic
static
Charge limiting
Charges
information
units
Client mode
CLIP
Collision domain
Command line interface
A
AAL-5
286
285
265, 285
58, 60
100
91
235
58
58
59
Access Control List
Access protection
for the configuration
by name or number
by number
61
98
59
55
via TCP/IP
Address administration
IP address administration
Address pool
ADSL
ADSL-Modem
AES
AES-CCM
Aggressive mode
AH
Antenna gain
AOCD
ATM
ATM adaptation layer
Auth.
Authentication
Authentication process
99
58
60
277
270
265
272
274
28, 50
337
214, 297, 331, 337
230
297
297, 332
101
297, 330, 332
102
102
285
247
286
28, 50
91
99
102
102, 286
211, 249
60
96, 214, 220
TLS
TTLS
222
222
192
32
338
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 16: Index
LANCOM Reference Manual LCOS 3.42
Command line reference
Common ISDN Application
Programming Interface (CAPI)
Computer names
Conf
33
Dial-Up Network
20
59
Dial-Up Networking
Differentiated Services –
siehe DiffServ
Differentiated Services Code Point –
siehe DSCP
265
277
97
Configuration
procedure
SNMP
Configuration files
Configuration interface
Connection limit
Cost reduction
15
20
29
Diffie-Hellman method
DiffServ
Assured Forwarding
336
169, 170
169, 170
170
15
Best Effort
Class Selector
Expedited Forwarding 169, 170, 172
IPSec
286
285
337
170
CRON
169
68
77, 79
274
Distance of a route
DMZ
IP address assignment
DMZ-Port
D
D channel
Data compression procedure
LZS
Data transfer
Denial of Service attacks
Bonk
Ping of Death
Teardrop
Denial-of-Service-Angriffe
Fragrouter
LAND
Smurf
SYN Flooding
DES
Device-name
DHCP
assignment
broadcast address
28, 50, 60
337
28, 50, 277
279
272, 275, 277
279
102
102
DNS
DNS forwarding
DNS server
available information
filter mechanism
DNS-table
164
163
164
162
164
163
162
162
278
282, 283
284
277, 283
284
Dynamic DNS
Domain
deny access
Domain name service (DNS)
DNS
277
337
175
170
337
214, 298, 331
96
27, 49, 91, 272
DoS
Downstream rate
DSCP
DSLoL
275
275
274
DSSS
204
102
DNS and NBNS server
network mask
standard gateway
Dynamic channel bundling
Dynamic DNS
Dynamic Host Configuration
Protocol (DHCP)
Dynamic routing
Dynamic VPN
dynamic – dynamic
284, 337
275
DHCP server
mode
for WINS resolution
period of validity
272, 278
273
272
66
276
275
304, 325
339
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.42
̈ Chapter 16: Index
Dynamic – static
Examples
How it works
ICMP
Introduction
PPP list
Static – dynamic
UDP
302, 323
Quell- und Zielobjekte
147
31
31
32
32
32
30
97
323
301
Firmware-upload
with LANconfig
with terminal program
with TFTP
with WEBconfig
Flash ROM memory
Flat rate
324
300
310
303, 324
324
Fragrouter
Frame tagging
FTP
active FTP
passive FTP
TCP-secured transfer
FTP data transfer
FTP download
164
193
E
EAP
220
Process of a session secured by EAP
182
182
177
176
168
221
RADIUS server
221
223
222
138
EAP/802.1x
Master Secret
E-mail virus
Encapsulation
Encryption
90
G
214, 294, 331, 336
Gateway
Gross data rate
74, 272
asymmetric
symmetric
215
214
175
H
Encryption methods
AES-CCM
End address
ESP
ETH-10
Exclusion routes
exposed host
Hash algorithms
HDLC
Hidden station
High telephone costs
Host
297
91
230
274
297, 330
91
253
285
277
281
19
67
79
220,
Host name table
HTTPS
Extensible Authentication Protocol
255
I
IBBS
ICMP
250
140, 324
58
F
Fail
Fast callback
Fax
Fax Class 1
Fax driver
Fax transmission
Faxmodem Option
Filter
97
61
Identification control
Identifying the caller
IEEE 802.11a
IEEE 802.11b
IEEE 802.11g
IEEE 802.1p/q
IEEE 802.1x/EAP
IEEE 802.3
59
204
204
205
192
255
91
270
270
270
271
337
74
Firewall
74, 209, 265
340
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 16: Index
LANCOM Reference Manual LCOS 3.42
IKE
Inband
inband
298, 335
ISDN Festverbindungs-Option
337
15
K
Keep-Alive
Key lengths
97
297
Configuration via Inband
with Telnet
15
19
Initial Vector
Install software
Internet
Internet access
Intranet
217
30
74
L
L2F
L2TP
LAN
328
328
95
Different organisations on one LAN 196
IP address assignment
Intranet address
Intrusion Detection
Intrusion-Detection
IP-Spoofing
Inverse masquerading
IP addresses
Dynamic
274
77
160
logisch
194
193
30
physikalisch
LANCOM FirmSafe
LANconfig
Management of multiple devices
LAND
LANmonitor
display options
monitor Internet connection
system information
Layer-2
16, 21, 31
160
37, 78, 81
18
163
23, 46
24, 46
24, 47
24, 46
91
301
301
72
Static
IP broadcast
IP header
169
IP masquerading 27, 37, 49, 74, 81, 209
Layer-2-switch
Layer-3
LCOS
LCP echo reply
LCP echo request
LCR
Least-cost routing
LLC-MUX
Logging table
Logical LAN
Logical sending direction
Logical wireless networks
Login
Login barring
Loopback address
LZS data compression
192
91
10, 337
94
simple masquerading
IP multicast
IP routing
standard router
IP telephony
IP4 address
IP-address
IP-routing-table
IPSec
78
72
68
176
37, 80
94
286
286
90
152
194
182
234
25, 47, 74, 94
66
213, 297, 327
256
IPSec over WLAN
IP-Spoofing
IPv6
160
327
31, 54
54
41, 84
102
ISAKMP
ISDN
298, 335
B channel
D channel
Euro-ISDN (DSS-1)
LLC
304, 305
60, 303, 305
304
M
MAC address filter
209
341
304
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.42
̈ Chapter 16: Index
MAC frame
Mail server
Main mode
194
282
297
Central mapping
DNS forwarding
No charge information
41, 84
43, 86
286
Maximum bandwidth
Microsoft Network
Minimum bandwidth
Reception
Sending
Modem
Monitoring
MS-CHAP
Multi SSID
170, 172
276
169, 171, 172
171
O
OFDM
204
265
285
15
15
168
Office communications
Online minutes
Outband
configuration via Outband
Overhead
171
91
23, 46
92, 93
250
P
Multilink PPP (MLPPP)
Multi-SSID
92, 101
212
Packet dump
passwd
28, 50
54
Password
PAT
Period
Period of validity
Physical LAN
Physical sending direction
Physical WLAN interface
Ping
23, 25, 47, 52, 58, 59, 96
N
N
74
285
N mapping
Configuration
37, 81
273, 275
193
42, 85
Decentralized mapping
Firewall
Loopback address
NAT table
Network coupling via VPN 39, 82
Routing table
VPN rule
41, 84
43, 86
43, 86
42, 85
182
233
140
123
163
123
177
78
267
Ping blocking
Ping of Death
Ping-Blocking
PMTU reduction
Port
IP port
Port Address Translation
Port-Separierung
43, 86
43, 86
337
N-Mapping
NAT
NBNS server
Net data rate
Net data transfer rate
NetBIOS
NetBIOS networks
NetBIOS proxy
NetBIOS/IP
Nettodatenrate
Network Address Translation
Network coupling
Network names
N-N mapping
37, 74, 80
272, 276
175
205
28, 50, 278
278
37, 81
337
25, 47, 59, 91, 101
PPP
callback functions
checking the line with LCP
handshake
IP address assignment
LCP Extensions
98
94
22
94
100
21
22
91
137, 310
310
175
37, 80
38, 81
277
PPP client
PPP connection
PPPoE
PPTP
213, 328
342
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 16: Index
LANCOM Reference Manual LCOS 3.42
Precedence
170
214
298
268
337
239
with N
N mapping
Remote-ID
Repetitions
Rijndael
Pre-Shared Key
Preshared key
Priority control
Private Mode
Private WEP settings
Protection
39, 83
96
97
331
27, 49
209
103
67
RIP
Router
for the configuration
for the LAN
Protocol filter
PSK
52
74
237
214
336
Router-interface-list
Router-name
RSA
RTS threshold
RTS/CTS protocol
215
253
253
Public key
Q
S
QoS
176, 337
Security
52, 74
329
Direction of data transfer
QoS –
siehe Quality-of-Service
Quality of Service
Quality-of-Service
Queue
182
Security Association
Security checklist
Security Parameter Index
Security procedures
Security settings
Serial port
Single user access
Smurf
SNMP
61
330
59
11, 54
15
74
162
20
40, 83
102
168
168
172
172
173
173
172
172
Queues
Secured queue
Standard queue
Urgent queue I
Urgent queue II
SNMP trap
Stac data compression
Standard fax programs
Start address
Stateful Inspection
Static channel bundling
Static routing
SYN Flooding
270
274
209, 337
102
R
Radio cell
RADIUS
RADIUS server
Range
RAS
RC4
Advantages
Redirect
Remote access
Remote configuration
Remote connection
Remote control
Remote maintenance
208
221
255
66
162
73
287
205, 208
291, 293
214
SYN/ACK speedup
SYSLOG
216
236, 254
20, 95
15
21
38, 81
T
TCP
168
172
124
66
TCP- control packets
TCP Stealth mode
TCP/IP
TCP/IP networks
277
343
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.42
̈ Chapter 16: Index
TCP-Stealth-Modus
Teardrop
Telnet
Temporal Key Integrity Protocol
Term
Terminal program
TFTP
124
164
21
224
97
31
19
102
97
VC-MUX
Virtual LAN
Virtual Private Network
VLAN
90
192
291
192, 337
199
Allow all VLANs
Allow untagged frames
Connection of WLAN stations
Conversion in the interfaces
Default ID
199
196
194
199
Throughput
Time
Time budget
Time dependent connection-
limit
Time-out
ToS
286
Default-VLAN ID
ID
Konfiguration
Management of LAN traffic
Network table
Port
194
194
198
196
198
199
286
102, 103
169, 170
169
High Reliability
IPSec
169
Port list
198
Low Delay
Priority
169, 172
170
Port table
Priority
199
194
Trace
Shielding of SNMP traffic
Use of a central cabling
Use tagging
196
197
199
198
examples
keys and parameters
outputs
29, 51
26, 48
26, 48
26, 48
205
25, 48
297, 330
297, 331
138
VLAN D
starting
VLAN ID
Voice-over-IP
VoIP
VoIP –
siehe Voice-over-IP
VPN
194
Transfer rates
168, 171
79
Transmission rates
Transport mode
Triple DES
Trojans
291, 337
139
Troubleshooting
Tunnel mode
Type-of-Service –
siehe ToS
24, 46
297, 330
Client
Configuration
Configuration with LANconfig
Configuration with WEBconfig
dynamic – dynamic
Dynamic – static
Examples
Gateway
Network coupling with N
N mapping
306
314
318
325
323
322
139
U
UDP
Upload
Upstream rate
User name
168, 324
30
175
22, 59, 96
38, 82
V
V.110
Remote maintenance via N
N mapping
91
39, 83
344
Download from Www.Somanuals.com. All Manuals Search And Download.
̈ Chapter 16: Index
LANCOM Reference Manual LCOS 3.42
Static – dynamic
static - static
VPN client
VPN connections
Diagnosis
Manual set-up
Setup Wizard
VPN example application
VPN network relationships
VPN rules
324
323
299
Wireless LAN
Ad-hoc
operation modes
Wireless bridge
207
206
210
322
309
308
295
311
309
Wireless LANs
Infrastructure network
WLAN
207
Access point density
ACL
ad-hoc mode
ARP handling
bridge mode
Broken link detection
Channel number
Client mode
248
235
206
244
207
244
246
249
207
251
246
243
246
246
250
207
256
250
248
207
251
249
245
248
207
236
246
254
250
251
246
247
247
W
WAN-layer
WEBconfig
HTTPS
Well known groups
WEP
90
16, 18, 31
19
298
238, 241
client mode
Closed network mode
Compatibility mode
Country setting
DFS method
Frequency band
IBBS
infrastructure network
IPSec over WLAN
Keep client connection alive
Maximum distance
Multi-SSID
Network settings
Network types
Operation mode
Point-to-point connections
point-to-point mode
Protocol filter
Challenge-response procedure
CRC checksums
Explanation of the process
Initial Vector
Key length
Passphrase
Private WEP settings
Process of encryption
RC4
Sniffer tools
Weak points of the process
WEP group keys
218
217
215
217
217
217
238
215
215
219
218
242
WEP key
dynamic
WEPplus
Limits
WiFi Alliance
Wifi Protected Access
Wildcards
Windows networks
WINS Address
WINS server
220
220
220
223
223
283
310
276
310
215
Radio settings
Redirect
Scan bands
SSID
Subband
Transmission power reduction
Turbo mode
Wired Equivalent Privacy
345
Download from Www.Somanuals.com. All Manuals Search And Download.
LANCOM Reference Manual LCOS 3.42
̈ Chapter 16: Index
VPN pass-through
WEP group keys
WLAN interface
logical
physical
WLAN security
802.11i
207
241
250
244
214
230
220
230
220
219
223
215
219
223
802.1x
AES
EAP
Sniffer tools
TKIP
WEP
WEPplus
WPA
WPA
Group Key
213, 223
227
Handshake procedure
Key handshake
Key mixing phase
Master Secret
223
226
225
224, 227
223
Michael
Michael hash algorithm
Michael key
225
225
Pairwise Key
227
Passphrase
228
Procedure for key handshake
Procedure for TKIP/Michael
Rekeying
227
224
228
TKIP
TKIP session key
223, 224
227
Y
Y connection
103
346
Download from Www.Somanuals.com. All Manuals Search And Download.
|