Chapter 5 Wireless
LTE-5121 User’s Guide
60
A good way to come up with effective security keys, passwords and so on is to use obscure
information that you personally will easily remember, and to enter it in a way that appears random
and does not include real words. For example, if your mother owns a 1970 Dodge Challenger and
her favorite movie is Vanishing Point (which you know was made in 1971) you could use
“70dodchal71vanpoi” as your security key.
The following sections introduce different types of wireless security you can set up in the wireless
network.
5.8.2.1 SSID
Normally, the LTE Device acts like a beacon and regularly broadcasts the SSID in the area. You can
hide the SSID instead, in which case the LTE Device does not broadcast the SSID. In addition, you
should change the default SSID to something that is difficult to guess.
This type of security is fairly weak, however, because there are ways for unauthorized wireless
devices to get the SSID. In addition, unauthorized wireless devices can still see the information that
is sent in the wireless network.
5.8.2.2 User Authentication
Authentication is the process of verifying whether a wireless device is allowed to use the wireless
network. You can make every user log in to the wireless network before using it. However, every
device in the wireless network has to support IEEE 802.1x to do this.
For wireless networks, you can store the user names and passwords for each user in a RADIUS
server. This is a server used in businesses more than in homes. If you do not have a RADIUS server,
you cannot set up user names and passwords for your users.
Unauthorized wireless devices can still see the information that is sent in the wireless network,
even if they cannot use the wireless network. Furthermore, there are ways for unauthorized
wireless users to get a valid user name and password. Then, they can use that user name and
password to use the wireless network.
5.8.2.3 Encryption
Wireless networks can use encryption to protect the information that is sent in the wireless
network. Encryption is like a secret code. If you do not know the secret code, you cannot
understand the message.
The types of encryption you can choose depend on the type of authentication. (See
for information about this.)
Table 19
Types of Encryption for Each Type of Authentication
NO AUTHENTICATION
RADIUS SERVER
Weakest
No Security
WPA
Static WEP
WPA-PSK
Strongest
WPA2-PSK
WPA2
Содержание LTE5121
Страница 4: ...Contents Overview LTE 5121 User s Guide 4...
Страница 12: ...Table of Contents LTE 5121 User s Guide 12...
Страница 13: ...13 PART I User s Guide...
Страница 14: ...14...
Страница 22: ...Chapter 1 Introduction LTE 5121 User s Guide 22...
Страница 28: ...28...
Страница 42: ...Chapter 4 Broadband LTE 5121 User s Guide 42...
Страница 70: ...Chapter 5 Wireless LTE 5121 User s Guide 70...
Страница 98: ...Chapter 7 Static Route LTE 5121 User s Guide 98...
Страница 102: ...Chapter 8 DNS Route LTE 5121 User s Guide 102...
Страница 114: ...Chapter 9 Quality of Service QoS LTE 5121 User s Guide 114...
Страница 138: ...Chapter 14 Parental Control LTE 5121 User s Guide 138...
Страница 148: ...Chapter 15 Certificates LTE 5121 User s Guide 148...
Страница 151: ...Chapter 16 VPN LTE 5121 User s Guide 151 Figure 104 IPSec VPN Add...
Страница 162: ...Chapter 16 VPN LTE 5121 User s Guide 162...
Страница 198: ...Chapter 19 User Account LTE 5121 User s Guide 198...
Страница 214: ...Chapter 26 Backup Restore LTE 5121 User s Guide 214...
Страница 224: ...Chapter 28 Troubleshooting LTE 5121 User s Guide 224...
Страница 234: ...Index LTE 5121 User s Guide 234...