Siemens SX763 Manual De Usuario

Descargar
Página de 156
112
Status information
 Gigaset SX763 WLAN dsl/ en / A31008-M707-R131-2-7619 / admin_router.fm / 08.12.2006
Sc
hablone 2
005_0
5_02
Telephony 
u
VoIP accounts
Shows the status and the data of the VoIP accounts.
Device
u
System time 
The system time of the device.
u
Firmware version 
The firmware version currently installed on the device.
ì
Click Refresh to refresh this screen and update the displayed data.
Security
You will find information about possible security risks for the device and the network on 
the Security screen in the Status menu.
u
System password not changed 
The configuration program of the device is not sufficiently protected against unau-
thorised access either because you have not changed the system password since set-
ting up the device or you have not assigned any system password at all. Information 
on how to avoid this security risk is given in Section "System Password" on page 105.
u
Identification of your wireless network visible or not changed 
Unauthorised users can also find the wireless network easily as you have not 
changed the ID of the wireless network (SSID) since setup and have not deactivated 
SSID broadcasting. Information on how to avoid this security risk is given in Section 
"Configuring wireless connections" on page 76.
u
Encryption for your wireless network not activated 
None of the data in the wireless network is encrypted during transfer and can there-
fore easily be intercepted. Unauthorised users will also have easy access to your net-
work, your PCs and your Internet connection. Information on how to avoid this secu-
rity risk is given in Section "Security settings in the wireless network" on page 79.
u
Access to your wireless network not restricted to allowed clients 
Users can access the wireless network from any PC. Information on how to avoid this 
security risk is given in Section "Permitted clients" on page 85.
u
Firewall for your Internet connection turned off 
The network is not protected against hackers who gain unauthorised access via the 
Internet. Information on how to avoid this security risk is given in Section "Firewall" 
on page 62
.