Security - Siemens Gigaset SE361 WLAN User Manual

Hide thumbs Also See for Gigaset SE361 WLAN:
Table of Contents

Advertisement

Status information
Device
u
System time
Your device's system time.
u
Firmware version
The version of the firmware currently installed in your device.
ì
Click on Refresh to refresh this screen and update the displayed data.

Security

On the Security screen in the Status menu you will see information about possible
security risks for your device and your network.
u
System password not changed
Your device's configuration program is not effectively protected against unauthor-
ised access as you have not changed the password since setup. The section entitled
"System Password" on page 66 describes how to avoid this security risk.
u
Identification of your wireless network visible or not changed
Unauthorised users can also find your wireless network easily as you have not
changed the ID for your wireless network (SSID) since setup and have not deacti-
vated SSID broadcast. The section entitled "Configuration for wireless connections"
on page 56 describes how to avoid this security risk.
u
Encryption for your wireless network not activated
None of the data in your wireless network is encrypted when transmitted and can
therefore easily be intercepted. Unauthorised users can also easily access your net-
work, your PCs and your Internet connection by this means. The section entitled
"Setting wireless security" on page 58 describes how to avoid this security risk.
u
Firewall for your Internet connection turned off
Your network is not protected against hackers who gain unauthorised access via the
Internet. The section entitled "Firewall" on page 45 describes how to avoid this secu-
rity risk.
u
Address translation for your Internet connection turned off
The clients in your network are not protected against unauthorised access via the
Internet. The section entitled "Setting up the NAT function" on page 47 describes
how to avoid this security risk.
u
One or more of your local clients directly exposed to the Internet
One or more clients in your network are directly visible to the Internet as exposed
hosts and therefore particularly exposed to risk (e.g. hacker attacks). You should
only activate this function where it is absolutely necessary (e.g. to operate a Web
server) and where other functions (e.g. port forwarding) are not adequate. In this
case you should take appropriate measures on the clients concerned. The section
entitled "Opening the firewall for a selected PC (Exposed Host)" on page 51
describes how to avoid this security risk.
72

Advertisement

Table of Contents
loading

Table of Contents