ZyXEL NWA1123-NI User Guide - Page 17

Configuring Your NWA’s Security Features, 1.4.1 Control Access to Your Device - default ip

Page 17 highlights

Chapter 1 Introducing the NWA 1.4 Configuring Your NWA's Security Features Your NWA comes with a variety of security features. This section summarizes these features and provides links to sections in the User's Guide to configure security settings on your NWA. Follow the suggestions below to improve security on your NWA and network. 1.4.1 Control Access to Your Device Ensure only people with permission can access your NWA. • Control physical access by locating devices in secure areas, such as locked rooms. Most NWAs have a reset button. If an unauthorized person has access to the reset button, they can then reset the device's password to its default password, log in and reconfigure its settings. • Change any default passwords on the NWA, such as the password used for accessing the NWA's web configurator (if it has a web configurator). Use a password with a combination of letters and numbers and change your password regularly. Write down the password and put it in a safe place. • See Section 11.5 on page 117 for instructions on changing your password. • Configure remote management to control who can manage your NWA. See Chapter 9 on page 97 for more information. If you enable remote management, ensure you have enabled remote management only on the IP addresses, services or interfaces you intended and that other remote management settings are disabled. 1.4.2 Wireless Security Wireless devices are especially vulnerable to attack. Take the following measures to improve wireless security. • Enable wireless security on your NWA. Choose the most secure encryption method that all devices on your network support. See Section 6.6 on page 76 for directions on configuring encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on your network so users must log in. This method is more common in business environments. • Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized users may use this information to access your network. See Section 6.5 on page 74 for directions on using the web configurator to hide the SSID. • Enable the MAC filter to allow only trusted users to access your wireless network or deny unwanted users access based on their MAC address. See Section 6.9 on page 86 for directions on configuring the MAC filter. 1.5 Good Habits for Managing the NWA Do the following things regularly to make the NWA more secure and to manage it more effectively. • Change the password. Use a password that's not easy to guess and that consists of different types of characters, such as numbers and letters. • Write down the password and put it in a safe place. NWA1120 Series User's Guide 17

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212

Chapter 1 Introducing the NWA
NWA1120 Series User’s Guide
17
1.4
Configuring Your NWA’s Security Features
Your NWA comes with a variety of security features. This section summarizes these features and
provides links to sections in the User’s Guide to configure security settings on your NWA. Follow the
suggestions below to improve security on your NWA and network.
1.4.1
Control Access to Your Device
Ensure only people with permission can access your NWA.
Control physical access by locating devices in secure areas, such as locked rooms. Most NWAs
have a reset button. If an unauthorized person has access to the reset button, they can then
reset the device’s password to its default password, log in and reconfigure its settings.
Change any default passwords on the NWA, such as the password used for accessing the NWA’s
web configurator (if it has a web configurator). Use a password with a combination of letters and
numbers and change your password regularly. Write down the password and put it in a safe
place.
• See
Section 11.5 on page 117
for instructions on changing your password.
Configure remote management to control who can manage your NWA. See
Chapter 9 on page 97
for more information. If you enable remote management, ensure you have enabled remote
management only on the IP addresses, services or interfaces you intended and that other remote
management settings are disabled.
1.4.2
Wireless Security
Wireless devices are especially vulnerable to attack. Take the following measures to improve
wireless security.
Enable wireless security on your NWA. Choose the most secure encryption method that all
devices on your network support. See
Section 6.6 on page 76
for directions on configuring
encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on
your network so users must log in. This method is more common in business environments.
Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized
users may use this information to access your network. See
Section 6.5 on page 74
for directions
on using the web configurator to hide the SSID.
Enable the MAC filter to allow only trusted users to access your wireless network or deny
unwanted users access based on their MAC address. See
Section 6.9 on page 86
for directions on
configuring the MAC filter.
1.5
Good Habits for Managing the NWA
Do the following things regularly to make the NWA more secure and to manage it more effectively.
Change the password. Use a password that’s not easy to guess and that consists of different
types of characters, such as numbers and letters.
Write down the password and put it in a safe place.