905U-G Wireless Gateway
User Manual
Page 47
©September 2004
The archived configuration files cannot be changed, downloaded or uploaded without the
password.
Warning!!
These security options provide a high level of security, but no data-security system can
provide “100% protection”. But it does make it very difficult for someone to interfere
with the 905U system - difficult to the point where there would be many easier
alternate ways to cause malicious damage.
The password must be kept in a secure place. Security procedures need to be adopted.
If staff with access to the password leave your organization, we recommend that the
password be changed.
We recommend that you use a random 8-character string for the security key and that
you do not record the key. It is not necessary to know what the security key is. The key
will be recorded in the archived configuration files, and therefore the configuration files
should be held in a secure place and backed up.
The security key does not prevent a hacker uploading a configuration from a module
and downloading with a new security key. This module will no longer operate with
other modules in the system. To prevent this, unauthorized access to modules must be
prevented.
If you lose the configuration files, you can regenerate these by uploading the configuration
from every module in the system into a new project with a new security key. After uploading
each module, download the configuration with the new security key.
If you wish to change the security key, simply enter a new key in the configuration program,
and download the new configuration to all modules in the system.
Note on Ethernet 905U-G
. You are able to access the module configuration of an Ethernet
905G via the Ethernet port. To prevent this access, do not select “Enable Ethernet Debug” on
the Ethernet configuration display - see section 4.8.