SANTIS ADSL 50/500 User Manual
Securing your wireless network
Using radio waves, a wireless network introduces some security risks which are not present in a wired network; an
unauthorized third party can intercept transmitted data, gain access to your wireless network, … In order to make
your wireless network as secure as a wired network you should apply, at least, the following guidelines:
C
C
h
h
a
a
n
n
g
g
e
e
t
t
h
h
e
e
S
S
S
S
I
I
D
D
Your wireless network is identified on the basis of an SSID (Service Set Identifier). This parameter, which can be
considered as the network name, is broadcasted periodically through a beacon. Also the SSID is, in most cases, set
default to a well-known value. To improve the security you can:
1.
Disable the SSID broadcast. Users who want to connect to your wireless network must know this value to
become connected. Also, your wireless network becomes invisible to a third party.
2.
Change the default value of the SSID. The SSID can contain maximal 32 characters and it’s best to choose a
value, which is not too obvious.
A
A
c
c
t
t
i
i
v
v
a
a
t
t
e
e
W
W
E
E
P
P
To guarantee that your data is transmitted in a private manner, you should activate WEP (Wired Equivalent Privacy).
Use of this protocol will result in your data being encrypted while traveling through the air. Choose the largest
encryption key possible (in most cases this is 128 bits) and make sure that each PC on your wireless network uses the
same key as the access point.
You can even improve the security by changing the WEP-key on a regular base.
A
A
c
c
t
t
i
i
v
v
a
a
t
t
e
e
M
M
A
A
C
C
-
-
a
a
d
d
d
d
r
r
e
e
s
s
s
s
c
c
o
o
n
n
t
t
r
r
o
o
l
l
l
l
i
i
s
s
t
t
By means of the MAC-address list, also known as the Association Control List, you can determine which client
adapters can access your wireless network. This is done by introducing the MAC-address of the client adapter in the
concerned list of the access point. A MAC address consists of 12 characters (0-9,A-F) and can be found on the back
of the client adapter. A client adapter whose MAC address is not included in the list will not be granted access to your
wireless network.
C
C
h
h
a
a
n
n
g
g
e
e
/
/
a
a
c
c
t
t
i
i
v
v
a
a
t
t
e
e
p
p
a
a
s
s
s
s
w
w
o
o
r
r
d
d
s
s
Configuration of the access point is done through a web browser. Secure this access, and any other access, which may
exist, by a carefully chosen password. If a default password, set by the manufacturer, is used, you should replace this
by your own password.
28