Chapter 1 Introducing the NWA
NWA-3500/NWA-3550 User’s Guide
33
1.6.1 Control Access to Your Device
Ensure only people with permission can access your NWA.
• Control physical access by locating devices in secure areas, such as locked
rooms. Most NWAs have a reset button. If an unauthorized person has access to
the reset button, they can then reset the device’s password to its default
password, log in and reconfigure its settings.
• Change any default passwords on the NWA, such as the password used for
accessing the NWA’s web configurator (if it has a web configurator). Use a
password with a combination of letters and numbers and change your password
regularly. Write down the password and put it in a safe place.
• Avoid setting a long timeout period before the NWA’s web configurator
automatically times out. A short timeout reduces the risk of unauthorized
person accessing the web configurator while it is left idle.
for instructions on changing your password and
setting the timeout period.
• Configure remote management to control who can manage your NWA. See
for more information. If you enable remote
management, ensure you have enabled remote management only on the IP
addresses, services or interfaces you intended and that other remote
management settings are disabled.
1.6.2 Wireless Security
Wireless devices are especially vulnerable to attack. If your NWA has a wireless
function, take the following measures to improve wireless security.
• Enable wireless security on your NWA. Choose the most secure encryption
method that all devices on your network support. See
for directions on configuring encryption. If you have a RADIUS server, enable
IEEE 802.1x or WPA(2) user identification on your network so users must log in.
This method is more common in business environments.
• Hide your wireless network name (SSID). The SSID can be regularly broadcast
and unauthorized users may use this information to access your network. See
for directions on using the web configurator to hide
the SSID.
• Enable the MAC filter to allow only trusted users to access your wireless network
or deny unwanted users access based on their MAC address. See
for directions on configuring the MAC filter.
Summary of Contents for NWA-3550
Page 2: ......
Page 8: ...Safety Warnings NWA 3500 NWA 3550 User s Guide 8...
Page 10: ...Contents Overview NWA 3500 NWA 3550 User s Guide 10...
Page 20: ...Table of Contents NWA 3500 NWA 3550 User s Guide 20...
Page 22: ...22...
Page 40: ...Chapter 2 The Web Configurator NWA 3500 NWA 3550 User s Guide 40...
Page 80: ...Chapter 3 Tutorial NWA 3500 NWA 3550 User s Guide 80...
Page 82: ...82...
Page 92: ...Chapter 5 Management Mode NWA 3500 NWA 3550 User s Guide 92...
Page 108: ...Chapter 6 AP Controller Mode NWA 3500 NWA 3550 User s Guide 108...
Page 144: ...Chapter 8 Wireless Configuration NWA 3500 NWA 3550 User s Guide 144...
Page 168: ...Chapter 10 Wireless Security Screen NWA 3500 NWA 3550 User s Guide 168...
Page 182: ...Chapter 13 MAC Filter Screen NWA 3500 NWA 3550 User s Guide 182...
Page 186: ...Chapter 14 IP Screen NWA 3500 NWA 3550 User s Guide 186...
Page 194: ...Chapter 15 Rogue AP Detection NWA 3500 NWA 3550 User s Guide 194...
Page 216: ...Chapter 17 Internal RADIUS Server NWA 3500 NWA 3550 User s Guide 216...
Page 244: ...Chapter 19 Log Screens NWA 3500 NWA 3550 User s Guide 244...
Page 270: ...Chapter 21 Load Balancing NWA 3160 Series User s Guide 270...
Page 274: ...Chapter 22 Dynamic Channel Selection NWA 3160 Series User s Guide 274...
Page 286: ...Chapter 23 Maintenance NWA 3500 NWA 3550 User s Guide 286...
Page 287: ...287 PART III Troubleshooting and Specifications Troubleshooting 289 Product Specifications 297...
Page 288: ...288...
Page 296: ...Chapter 24 Troubleshooting NWA 3500 NWA 3550 User s Guide 296...
Page 304: ...304...
Page 398: ...Appendix F Text File Based Auto Configuration NWA 3500 NWA 3550 User s Guide 398...