Security - Siemens Gigaset SX761 dsl Manual

Hide thumbs Also See for Gigaset SX761 dsl:
Table of Contents

Advertisement

Status information
Device
u
System time
The system time of the device.
u
Firmware version
The firmware version currently installed on the device.
ì
Click Refresh to refresh this screen and update the displayed data.

Security

You will find information about possible security risks for the device and the network on
the Security screen in the Status menu.
In the Status menu, select Security:
u
System password not changed
The configuration program of the device is not sufficiently protected against unau-
thorised access because you have not changed the system password since setting up
the device. Information on how to avoid this security risk is given in the section "Sys-
tem Password" on page 78.
u
Firewall for your Internet connection turned off
The network is not protected against hackers who gain unauthorised access via the
Internet. Information on how to avoid this security risk is given in the section "Fire-
wall" on page 46.
u
Address translation for your Internet connection turned off
The clients in the network are not protected against unauthorised access via the
Internet. Information on how to avoid this security risk is given in the section "Set-
ting up the NAT function" on page 50.
u
One or more of your local clients directly exposed to the Internet
At least one client in the network is directly visible on the Internet as an exposed host
and is therefore particularly exposed to the risk (e.g. through hacker attacks). Only
activate this function if it is absolutely necessary (e.g. to operate a Web server) and
other functions (e.g. Port forwarding) are not suitable. In this case, you should take
the appropriate measures on the clients concerned. Information on how to avoid
this security risk is given in the section "Opening the firewall for a selected PC
(Exposed Host)" on page 54.
ì
Click Refresh to refresh the screen and the displayed data.
90

Advertisement

Table of Contents
loading

Table of Contents