Status information

Device

uSystem time

Your device's system time.

uFirmware version

The version of the firmware currently installed in your device.

ìClick Refresh to refresh this screen and update the displayed data.

Security

You will find information about possible security risks for your device and your network in the Status menu on the Security screen.

uSystem password not changed

Your device's configuration program is not effectively protected against unauthor- ised access as you have not changed the password since setup. The section entitled "System Password" on page 79 describes how to avoid this security risk.

uIdentification of your wireless network visible or not changed

Unauthorised users can also find your wireless network easily as you have not changed the ID for your wireless network (SSID) since setup and have not deacti- vated SSID broadcast. The section entitled "Configuration for wireless connections" on page 65 describes how to avoid this security risk.

uEncryption for your wireless network not activated

None of the data in your wireless network is encrypted when transmitted and can therefore easily be intercepted. Unauthorised users can also easily access your net- work, your PCs and your Internet connection by this means. The section entitled "Setting encryption" on page 69 describes how to avoid this security risk.

uFirewall for your Internet connection turned off

Your network is not protected against hackers who gain unauthorised access via the Internet. The section entitled "Firewall" on page 50 describes how to avoid this security risk.

uAddress translation for your Internet connection turned off

The clients in your network are not protected against unauthorised access via the Internet. The section entitled "Setting up the NAT function" on page 56 describes how to avoid this security risk.

uOne or more of your local clients directly exposed to the Internet

One or more clients in your network are directly visible to the Internet as exposed hosts and therefore particularly exposed to risk (e.g. hacker attacks). You should only activate this function where it is absolutely necessary (e.g. to operate a Web server) and where other functions (e.g. port forwarding) are not adequate. In this case you should take appropriate measures on the clients concerned. The section entitled "Opening the firewall for selected PCs (Exposed Host)" on page 60 describes how to avoid this security risk.

88