Appendix 2 security – Toshiba Magnia Z500 User Manual
Page 99
Appendix 2 Security
Because it is difficult to define the communication area of a wireless LAN network because of the wireless
(radio) characteristic, the definition is likely to be vague. Depending on where the equipment is installed or
how the office is constructed, the network area may extend over to the outside of the site. This means that
communication data leaks to the outside of the site, and illegal access from outside the site is allowed. Even
if the network area remains in the site, if visitors come into the site, illegal access from the parking lot,
information office, and toilet room may be allowed.
Therefore, it becomes important to enhance security to operate the wireless LAN network.
The following explains the points that are important for enhancing security.
·
Network name (ESSID)
The network name (ESSID) is a group name that logically identifies the wireless LAN network. Because it is
not a password but an identifier, its security is not enhanced. The default is MAGNIA. If it is still default, a third
person may connect to the access point carelessly. Please change it. For the configuration, see the following
chapter.
·
Don't accept station with network name "ANY"
In this product, there is a function that the station which is setting blank or "ANY" as Network name (ESSID)
can connect to the access point. Although this function aims at being easily connectable to the access point
even if the station doesn't set up the ESSID, it also becomes the cause which a third person can connect to
the access point carelessly. In default, the station which is setting blank or “ANY” as the ESSID can connect to
the access point. Please change it.
For the configuration, see the following chapter.
·
Filtering by MAC address
Only the station which registered their MAC address can connect to the network. Although this function
prevents a third person connecting to the network carelessly, the station imitating the MAC address is
unrefusable. For the configuration, see the following chapter.
·
WEP
An encrypted network packet makes it difficult to illegally access the network and to decrypt communication
contents. Key length must be 5 or 13 bytes. (The max key length depends on the card.) The longer key
becomes more secure. All keys are set to “WEP00” by default. Please change it. Network throughput is
deteriorated by encryption processing. For the configuration, see the following chapter.
·
802.1X Function
Authenticating each station can prevent illegal access of the station. Also, changing and distributing the WEP
key at regular intervals makes interception difficult.
This function provides the highest security facility in this product.