beautypg.com

Appendix 2 security – Toshiba Magnia Z500 User Manual

Page 99

background image

Appendix 2 Security

Because it is difficult to define the communication area of a wireless LAN network because of the wireless

(radio) characteristic, the definition is likely to be vague. Depending on where the equipment is installed or

how the office is constructed, the network area may extend over to the outside of the site. This means that

communication data leaks to the outside of the site, and illegal access from outside the site is allowed. Even

if the network area remains in the site, if visitors come into the site, illegal access from the parking lot,

information office, and toilet room may be allowed.

Therefore, it becomes important to enhance security to operate the wireless LAN network.

The following explains the points that are important for enhancing security.

·

Network name (ESSID)

The network name (ESSID) is a group name that logically identifies the wireless LAN network. Because it is

not a password but an identifier, its security is not enhanced. The default is MAGNIA. If it is still default, a third

person may connect to the access point carelessly. Please change it. For the configuration, see the following

chapter.

[3 Utilities]

·

Don't accept station with network name "ANY"

In this product, there is a function that the station which is setting blank or "ANY" as Network name (ESSID)

can connect to the access point. Although this function aims at being easily connectable to the access point

even if the station doesn't set up the ESSID, it also becomes the cause which a third person can connect to

the access point carelessly. In default, the station which is setting blank or “ANY” as the ESSID can connect to

the access point. Please change it.

For the configuration, see the following chapter.

[3 Utilities]

·

Filtering by MAC address

Only the station which registered their MAC address can connect to the network. Although this function

prevents a third person connecting to the network carelessly, the station imitating the MAC address is

unrefusable. For the configuration, see the following chapter.

[3 Utilities]

·

WEP

An encrypted network packet makes it difficult to illegally access the network and to decrypt communication

contents. Key length must be 5 or 13 bytes. (The max key length depends on the card.) The longer key

becomes more secure. All keys are set to “WEP00” by default. Please change it. Network throughput is

deteriorated by encryption processing. For the configuration, see the following chapter.

[3 Utilities]

·

802.1X Function

Authenticating each station can prevent illegal access of the station. Also, changing and distributing the WEP

key at regular intervals makes interception difficult.

This function provides the highest security facility in this product.