Setting system security compatibility levels
119
Programming Operations Guide
Setting system security compatibility levels
Use the Security screen to set authentication, signing, encryption, and other security-related
settings. Some of these settings depend on the Windows operating system used by client
workstations.
1
Click the keys beside
BCM
and
System
.
2
Click on
Security
.
The Security screen appears in the right frame.
Figure 25
System security level settings
3
The following table describes the fields. Set the fields to the values that best fit your system
requirements and that accommodate compatibility issues with interconnecting users or
services.
!
Security note:
The default se
t
tings define a mid-level of security which
accommodates Windows 95/98/Me operating systems. If you would like to set a higher
level of security, ensure that all the computers that will be used for client access have
upgraded to at least Windows NT4, 2000 or XP.
Table 4
Security settings
Attribute
Value
Description
Authentication
Compatibility
LM&NTLM response -
refuse NTLMv2 session
security
LM & NTLM response
NTLM response only
NTLMv2 response only
NTLMv2 response only -
refuse LM
Default: LM & NTLM response
This setting determines the type of authentication protocol required by
your system during interactions with client applications.
The default, LM & NTLM response, maintains compatibility with all
Windows OS versions.
Any of the other settings enforce a more secure authentication protocol,
and will prevent access from computers running Windows 95/98/Me,
unless you install the directory services client on the client computer.
Summary of Contents for BCM 3.7
Page 4: ...4 Software licensing N0008589 3 3...
Page 32: ...32 Contents N0008589 3 3 W 937 Index 939...
Page 46: ...46 Tables N0008589 3 3...
Page 64: ...64 How to get help N0008589 3 3...
Page 90: ...90 Manually activating Telnet N0008589 3 3...
Page 116: ...116 Delayed system restart N0008589 3 3...
Page 194: ...194 Configuring a data module N0008589 3 3...
Page 276: ...276 Setting line telco features N0008589 3 3...
Page 310: ...310 Using COS passwords N0008589 3 3...
Page 364: ...364 Enhanced 911 E911 configuration N0008589 3 3...
Page 380: ...380 Renumbering DNs N0008589 3 3...
Page 398: ...398 Saving wizard pages on your computer N0008589 3 3...
Page 458: ...458 Voice Mail settings N0008589 3 3...
Page 488: ...488 Setting system telco features N0008589 3 3...
Page 508: ...508 Other programming that affects public networking N0008589 3 3...
Page 522: ...522 PRI networking using Call by Call services N0008589 3 3...
Page 592: ...592 Monitoring Hunt groups N0008589 3 3...
Page 636: ...636 Configuring Double Density N0008589 3 3...
Page 640: ...640 Using the Network Update Wizard N0008589 3 3...
Page 666: ...666 Importing and Exporting DHCP data N0008589 3 3...
Page 722: ...722 Restarting the router N0008589 3 3...
Page 726: ...726 Important Web Cache considerations N0008589 3 3...
Page 748: ...748 Configuring an Interface with NAT N0008589 3 3...
Page 794: ...794 IPSec N0008589 3 3...
Page 818: ...818 Configuring the Policy Agent characteristics N0008589 3 3...
Page 832: ...832 Firewall rules for Business Communications Manager with Dialup interfaces N0008589 3 3...
Page 876: ...876 ISDN Programming N0008589 3 3...
Page 1004: ...1004 Index N0008589 3 3...