7-12
Security
key, or will know where to find it, even the strongest lock can be opened by an
intruder.
That's why, for example you wouldn't “hide” the key to your house underneath
the doormat. Similar good practice should be applied to the keys you will use to
encrypt wireless communications.
To minimize the risk that intruders might be able to retrieve the WEP key values
you are advised to:
■
Lock away any paper registration sheet that you use to define/remember the
defined WEP key values.
■
Change the WEP encryption key values at regular intervals on both stations
and Access Points.
The option to enter up to 4 different keys to decrypt data received via the
wireless interface, enables you to define a WEP key roll-over scheme.
For example you could choose to select another transmit key every x weeks,
until you reach the fourth key. At that point in time you could enter 3 new WEP
key values for the first three WEP key entries, prior to the expiration period of
the fourth key value. Once all stations and Access Points have been set to use the
first new key again, you can replace the fourth key value with a new WEP key
value.
Securing Access Point Setup
Security measures, such as access control, become ineffective when
unauthorized persons can view and modify the configuration of your Access
Points.
To protect your network configuration from undesired modifications, you are
advised to implement the following measures:
■
Read and read/write passwords
■
SNMP IP address access list
■
Trap host alert mechanisms (optional)
Read and Read/Write passwords
To restrict access to the Access Point configuration information, you can create
two authority levels for passwords:
■
Read password
■
Read/write password
Read password
A read password will only provide access to the Access Point to monitor
diagnostic information found under
Monitor
button in the main AP Manager
window.
Содержание WL110
Страница 6: ...vivi 11Mbps Wireless LAN User s Guide...
Страница 12: ...1 6 Introduction...
Страница 34: ...4 8 Basic Network Configuration...
Страница 81: ...Optimizing Performance 6 21 Figure 6 9 Medium Distance between APs Figure 6 10 Small Distance between APs...
Страница 82: ...6 22 Optimizing Performance...
Страница 122: ...8 22 Advanced Network Configurations...
Страница 126: ...A 4 Start up Configuration...
Страница 132: ...B 6 Troubleshooting...
Страница 140: ...C 8 Forced Reload Procedure...
Страница 144: ...D 4 Upgrading Access Point Software...