Security – Xblue Networks X-50 User Manual

Page 150

Advertising
background image

Wireless Programming

150

XBLUE Networks

8

Secu

rit

y

Security 

Device Info

Advanced

Wireless

- Basic

- Security

- MAC Filter

- Wireless Bridge

- Advanced

Station Info

A wireless access point can be very convenient but also very dangerous because it opens the network to

unauthorized user access. It cannot be stressed enough how important it is that every wireless access point must

have some type of security enabled, even if the system is not broadcasting its SSID.

At default, the

X-50

does not have any wireless security enabled.

Note:

If the location is not using the wireless interface, be sure to disable it!

The goal of any security is to deny access to unwanted intruders. The X-50 has several different security

protocols. Once the security protocol is selected it is very easy to connected authorized clients.

What does that say?

It is never a good idea to install a wireless device such as a router or gateway without

some sort of encryption and or security. Failure to properly secure a device on a

network may result in unauthorized entry into the wireless network. However, even

the best encryption does not guarantee unauthorized access, but some encryption is

better than no encryption.

Like any lock and key system, the key must match the lock in order to gain access.

Wireless security is no different. The selected encryption protocol will not allow wireless

devices to join the network unless it has the correct key.

Keys are generated several different ways, one simple but effictive way is using a shared

key which takes a phrase, such as “ItIsWindyInChicago” and put it through a complex

mathematical algorithm, which may vary in length from 64 to 128 bits and generates a key

that may resemble “Ea1e3683Cd”. Any device that broadcasts that key to the X-50 will be

granted access otherwise access is denied.

Advertising