Security - Xblue Networks X-50 Installation Manual

Voip telephone system for small business
Hide thumbs Also See for X-50:
Table of Contents

Advertisement

Wireless Programming

Security

Device Info
Advanced
Wireless
- Basic
- Security
- MAC Filter
- Wireless Bridge
- Advanced
Station Info
A wireless access point can be very convenient but also very dangerous because it opens the network to
unauthorized user access. It cannot be stressed enough how important it is that every wireless access point must
have some type of security enabled, even if the system is not broadcasting its SSID.
At default, the
does not have any wireless security enabled.
X-50
Note:
If the location is not using the wireless interface, be sure to disable it!
The goal of any security is to deny access to unwanted intruders. The X-50 has several different security
protocols. Once the security protocol is selected it is very easy to connected authorized clients.
What does that say?
Like any lock and key system, the key must match the lock in order to gain access.
Wireless security is no different. The selected encryption protocol will not allow wireless
devices to join the network unless it has the correct key.
Keys are generated several different ways, one simple but effictive way is using a shared
key which takes a phrase, such as "ItIsWindyInChicago" and put it through a complex
mathematical algorithm, which may vary in length from 64 to 128 bits and generates a key
that may resemble "Ea1e3683Cd". Any device that broadcasts that key to the X-50 will be
granted access otherwise access is denied.
150
It is never a good idea to install a wireless device such as a router or gateway without
some sort of encryption and or security. Failure to properly secure a device on a
network may result in unauthorized entry into the wireless network. However, even
the best encryption does not guarantee unauthorized access, but some encryption is
better than no encryption.
XBLUE Networks

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents