LANCOM OAP
-
54
-
1 Wireless – LANCOM OAC
-
54
-
1 Wireless
Chapter 4: Security settings
42
EN
햹
The wizard will inform you when entries are complete. Complete the con-
figuration with
Finish
.
4.3.2
Wizard for WEBconfig
Under WEBconfig you have the possibility to run the wizard
Security settings
to control and change the settings. The following values are handled:
password for the device
allowed protocols for the configuration access of local and remote net-
works
parameters of configuration lock (number of failed log-in attempts and
duration of the lock)
security parameters as WLAN name, closed network function, WEP key,
ACL list and protocol filters
4.4
The security checklist
The following checklists provide an overview of all security settings that are
important to professionals. Most of the points in this checklist are uncritical
for simple configurations. In these cases, the security settings in the basic
configuration or that were set with the Security Wizard are sufficient.
Detailed information about the security settings mentioned here are
to be found in the reference manual.
Have you protected the configuration with a password?
The simplest way of protecting the configuration is to agree upon a pass-
word. If no password has been agreed for the device, the configuration is
open to be changed by anybody. The field for entering the password is to
be found in LANconfig in the 'Management' configuration area on the
'Security' tab. It is absolutely imperative to assign a password to the con-
figuration if you want to enable remote configuration!
Have you permitted remote configuration?
If you do not require remote configuration, please ensure to switch it off.
If you need to make use of remote configuration, ensure that you do not
fail to password-protect the configuration (see the section above). The
field for disenabling remote configuration is to be found in LANconfig in
the 'Management' configuration area on the 'Security' tab. Under ‘Access
rights – From remote networks’ select the option ‘denied’ for all methods
of configuration.