Security
BAT54-Rail/F..
Release
7.54
06/08
7.1
Protection for the configuration
237
7 Security
You certainly would not like any outsider to have easy access to or to be able
to modify the data on your computer. Therefore this chapter covers an impor-
tant topic: safety. The description of the security settings is divided into the
following sections:
D Protection for the configuration
D Password protection
D Login barring
D Access verification
D Securing ISDN access
At the end of the chapter you will find the most important security settings as
a checklist. It ensures that your BAT is excellently protected.
Note: Some further LCOS features to enhance the data security are de-
scribed in separate chapters:
D ’Firewall’ → page 249
D ’IP masquerading’ → page 369
D ’Virtual LANs (VLANs)’ → page 335
7.1 Protection for the
configuration
A number of important parameters for the exchange of data are established
in the configuration of the device. These include the security of your network,
monitoring of costs and the authorizations for the individual network users.
Needless to say, the parameters that you have set should not be modified by
unauthorized persons. The BAT thus offers a variety of options to protect the
configuration.
7.1.1 Password protection
The simplest option for the protection of the configuration is the establish-
ment of a password.