
LANCOM WLC series
Chapter 5: Security settings
119
EN
LEPS can be used locally in the device and can also be centrally managed with
the help of a RADIUS server, and it works with all WLAN client adapters cur-
rently available on the market without modification. Full compatibility to
third-party products is assured as LEPS only involves configuration in the
access point.
5.1.4
Access control by MAC address
Every network device has a unique identification number. This identification
number is known as the MAC address (
M
edia
A
ccess
C
ontrol) and it is unique
worldwide.
The MAC address is programmed into the hardware. Wireless LAN devices
from LANCOM Systems display their MAC number on the housing.
Access to an infrastructure network can be limited to certain wireless LAN
devices by defining MAC addresses. The WLAN controllers have a filter list
(ACL – access control list) for storing authorized MAC addresses.
5.1.5
IPSec over WLAN
With the help of the IPSec-over-WLAN technology in addition to the security
measures described already, a wireless network for the exchange of especially
sensitive data can be optimally secured. Generally speaking this requires an
external VPN gateway and the LANCOM Advanced VPN Client (for Windows
2000, XP and Vista™). The LANCOM WLAN Controller itself provides only a
small number of VPN tunnels, such as those used for site-to-site connectivity.
Client software from third parties is available for other operating systems.
5.2
Tips for the proper treatment of keys and pass-
phrases
By observing a few vital rules on the treatment of keys you can significantly
increase the security of encryption techniques.
Keep your keys as secret as possible.
Never write down a key. Popular but completely unsuitable are, for exam-
ple: Notebooks, wallets and text files on the computer. Do not pass on a
key unless it is absolutely necessary.
Choose a random key.
Use long random strings that combine letters and numbers (at least 32 to
a maximum of 63 characters). Keys that are normal words are not secure.