You probably would not be happy about strangers viewing or modifying the data on your computers. Furthermore, the configuration settings of your devices need to be protected against unauthorized changes. This chapter is therefore dedicated to a very important topic: Security. The security settings are described in the following sections:
- Protecting the configuration
- Password protection
- Login barring
- Access control
- Securing the ISDN dial-in access
The most important security settings are summarized in a checklist at the end of the chapter. This list will help you to secure your device properly.
Note: Further functions of the LCOS contribute to the security of your data, and some of these are described in separate chapters: