Chapter 5 Wireless
LTE-5121 User’s Guide
60
A good way to come up with effective security keys, passwords and so on is to use obscure
information that you personally will easily remember, and to enter it in a way that appears random
and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and
her favorite movie is Vanishing Point (which you know was made in 1971) you could use
“70dodchal71vanpoi” as your security key.
The following sections introduce different types of wireless security you can set up in the wireless
network.
5.8.2.1 SSID
Normally, the LTE Device acts like a beacon and regularly broadcasts the SSID in the area. You can
hide the SSID instead, in which case the LTE Device does not broadcast the SSID. In addition, you
should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
5.8.2.2 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every
device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
5.8.2.3 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend on the type of authentication. (See
for information about this.)
Table 19
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Summary of Contents for LTE5121
Page 4: ...Contents Overview LTE 5121 User s Guide 4...
Page 12: ...Table of Contents LTE 5121 User s Guide 12...
Page 13: ...13 PART I User s Guide...
Page 14: ...14...
Page 22: ...Chapter 1 Introduction LTE 5121 User s Guide 22...
Page 28: ...28...
Page 42: ...Chapter 4 Broadband LTE 5121 User s Guide 42...
Page 70: ...Chapter 5 Wireless LTE 5121 User s Guide 70...
Page 98: ...Chapter 7 Static Route LTE 5121 User s Guide 98...
Page 102: ...Chapter 8 DNS Route LTE 5121 User s Guide 102...
Page 114: ...Chapter 9 Quality of Service QoS LTE 5121 User s Guide 114...
Page 138: ...Chapter 14 Parental Control LTE 5121 User s Guide 138...
Page 148: ...Chapter 15 Certificates LTE 5121 User s Guide 148...
Page 151: ...Chapter 16 VPN LTE 5121 User s Guide 151 Figure 104 IPSec VPN Add...
Page 162: ...Chapter 16 VPN LTE 5121 User s Guide 162...
Page 198: ...Chapter 19 User Account LTE 5121 User s Guide 198...
Page 214: ...Chapter 26 Backup Restore LTE 5121 User s Guide 214...
Page 224: ...Chapter 28 Troubleshooting LTE 5121 User s Guide 224...
Page 234: ...Index LTE 5121 User s Guide 234...