Chapter 1 Introducing the NWA

1.6.1 Control Access to Your Device

Ensure only people with permission can access your NWA.

Control physical access by locating devices in secure areas, such as locked rooms. Most NWAs have a reset button. If an unauthorized person has access to the reset button, they can then reset the device’s password to its default password, log in and reconfigure its settings.

Change any default passwords on the NWA, such as the password used for accessing the NWA’s web configurator (if it has a web configurator). Use a password with a combination of letters and numbers and change your password regularly. Write down the password and put it in a safe place.

Avoid setting a long timeout period before the NWA’s web configurator automatically times out. A short timeout reduces the risk of unauthorized person accessing the web configurator while it is left idle.

See Chapter 7 on page 109 for instructions on changing your password and setting the timeout period.

Configure remote management to control who can manage your NWA. See Chapter 16 on page 195 for more information. If you enable remote management, ensure you have enabled remote management only on the IP addresses, services or interfaces you intended and that other remote management settings are disabled.

1.6.2Wireless Security

Wireless devices are especially vulnerable to attack. If your NWA has a wireless function, take the following measures to improve wireless security.

Enable wireless security on your NWA. Choose the most secure encryption method that all devices on your network support. See Section 10.2 on page 157 for directions on configuring encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on your network so users must log in. This method is more common in business environments.

Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized users may use this information to access your network. See Section 8.2.1 on page 120 for directions on using the web configurator to hide the SSID.

Enable the MAC filter to allow only trusted users to access your wireless network or deny unwanted users access based on their MAC address. See Section 13.2 on page 180 for directions on configuring the MAC filter.

 

33

NWA-3500/NWA-3550 User’s Guide