Lancom Systems LCOS 3.50 User Manual
Page 6

LANCOM Reference Manual LCOS 3.50
̈
Contents
6
Contents
8.4 Protection against break-in attempts: Intrusion Detection
8.4.1 Examples for break-in attempts
8.4.2 Configuration of the IDS
8.5 Protection against “Denial of Service” attacks
8.5.1 Examples of Denial of Service attacks
8.5.2 Configuration of DoS blocking
8.5.3 Configuration of ping blocking and Stealth mode
9.2 Which data packets to prefer?
9.2.1 Guaranteed minimum bandwidths
9.2.2 Limited maximum bandwidths
9.3.1 Queues in transmission direction
9.3.2 Queues for receiving direction
9.4 Reducing the packet length
9.5 QoS parameters for Voice over IP applications
9.6 QoS in sending or receiving direction
9.7.1 Evaluating ToS and DiffServ fields
9.7.2 Defining minimum and maximum bandwidths
9.7.3 Adjusting transfer rates for interfaces
9.7.4 Sending and receiving direction
9.7.5 Reducing the packet length
10.2.2 Conversion within the LAN interconnection