EasyManuals Logo

Hirschmann BAT54-F Series User Manual

Hirschmann BAT54-F Series
548 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #247 background imageLoading...
Page #247 background image
Security
BAT54-Rail/F..
Release
7.54
06/08
7.2
The security checklist
247
U Have you encoded the radio network and secured it with
an ACL?
With 802.11i, WPA or WEP you can encode your data in the radio net-
work with different kinds of encoding methods as for AES, TKIP or WEP.
Hirschmann recommends the most secure encoding with 802.11i and
AES. If the used WLAN client adapter does not provide these, use the
TKIP or at least WEP. Make sure that your device when using the encod-
ing function has at least one passphrase or WEP key entered. To check
the WEP settings select in the LANconfig in the configuration area 'Man-
agement' on the tab 'Interfaces' under 'Wireless LAN' the wireless LAN
interface you would like to configure.
With the Access Control List (ACL) you allow or prohibit the access of
single radio LAN clients to your radio LAN. The access is regulated over
the static MAC address of the wireless client adapter. To check the
Access Control List select in LANconfig in the configuration area 'WLAN
Security' the tab 'Stations'.
U Have you configured 802.1x or IPsec over WLAN for
especially sensitive data transfer?
For more security when transmitting sensitive data over your wireless
LAN you can use the IEEE 802.1x technology. To check or activate the
IEEE 802.1x settings select in the LANconfig the configuration area
'WLAN Security' the tab 'IEEE 802.1x'.
If your base station provides VPN you can alternatively to IEEE 802.1x
select IPsec over WLAN to protect your data between radio networks
and local networks in a VPN tunnel.
U Have you activated the mechanism that protects your
configuration if the device is stolen?
That confidential information about RAS access, LAN coupling or VPN
connections could fall into the wrong hands if the device is stolen. The
device's configuration can be protected by various means; for example, it
will cease to function if there is an interruption to the power supply, or if
the device is switched on in another location.
D The scripting function can store the entire configuration in RAM only
so that restarting the device will cause the configuration to be deleted.
The configuration is not written to the non-volatile flash memory. A loss
of power because the device has been relocated will cause the entire
configuration to be deleted. (’Scripting’ → page 181).

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Hirschmann BAT54-F Series and is the answer not in the manual?

Hirschmann BAT54-F Series Specifications

General IconGeneral
BrandHirschmann
ModelBAT54-F Series
CategoryWireless Access Point
LanguageEnglish

Related product manuals