LANCOM 1811n Wireless – LANCOM 1821n Wireless
Chapter 8: Security settings
84
EN
Have you activated the protection of your WAN access in case the
device is stolen?
After being stolen, the device can theoretically be operated at another
location by unauthorized persons. Password-protected device configura-
tions do not stop third parties from operating RAS access, LAN connecti-
vity or VPN connections that are set up in the device: A thief could gain
access to a protected network.
The device’s operation can be protected by various means; for example, it
will cease to function if there is an interruption to the power supply, or if
the device is switched on in another location.
With the ISDN location verification, the device can only be operated at
one particular ISDN connection. After being switched on, the device calls
itself at the corresponding telephone number to check that it is still con-
nected to the “correct” ISDN connection (for further information see the
reference manual).
The scripting function can store the entire configuration in RAM only so
that restarting the device will cause the configuration to be deleted. The
configuration is not written to the non-volatile flash memory. A loss of
power because the device has been relocated will cause the entire confi-
guration to be deleted (for further information see the reference manual).
Have you ensured that the reset button is safe from accidental
configuration resets?
Some devices simply cannot be installed under lock and key. There is con-
sequently a risk that the configuration will be deleted by mistake if a co-
worker presses the reset button too long. The behavior of the reset button
can be set so that a press is either ignored or it causes a re-start, depen-
ding on the time for which it is held pressed.