ZyXEL Communications 802.11b/g/n poe access point User Manual

Page of 240
 Chapter 1 Introducing the NWA
NWA1100-N User’s Guide
17
• Web Configurator. This is recommended for everyday management of the NWA using a 
(supported) web browser.
• Command Line Interface. Line commands are mostly used for troubleshooting by service 
engineers.
• FTP (File Transfer Protocol) for firmware upgrades.
• SNMP (Simple Network Management Protocol). The device can be monitored by an SNMP 
manager.
1.4  Configuring Your NWA’s Security Features
Your NWA comes with a variety of security features. This section summarizes these features and 
provides links to sections in the User’s Guide to configure security settings on your NWA. Follow the 
suggestions below to improve security on your NWA and network. 
1.4.1  Control Access to Your Device
Ensure only people with permission can access your NWA.
• Control physical access by locating devices in secure areas, such as locked rooms. Most NWAs 
have a reset button. If an unauthorized person has access to the reset button, they can then 
reset the device’s password to its default password, log in and reconfigure its settings.
• Change any default passwords on the NWA, such as the password used for accessing the NWA’s 
web configurator (if it has a web configurator). Use a password with a combination of letters and 
numbers and change your password regularly. Write down the password and put it in a safe 
place.
• See 
 for instructions on changing your password.
• Configure remote management to control who can manage your NWA. See 
 for more information. If you enable remote management, ensure you have enabled remote 
management only on the IP addresses, services or interfaces you intended and that other remote 
management settings are disabled.
1.4.2  Wireless Security 
Wireless devices are especially vulnerable to attack. If your NWA has a wireless function, take the 
following measures to improve wireless security.
• Enable wireless security on your NWA. Choose the most secure encryption method that all 
devices on your network support. See 
 for directions on configuring 
encryption. If you have a RADIUS server, enable IEEE 802.1x or WPA(2) user identification on 
your network so users must log in. This method is more common in business environments.   
• Hide your wireless network name (SSID). The SSID can be regularly broadcast and unauthorized 
users may use this information to access your network. See 
 for directions 
on using the web configurator to hide the SSID. 
• Enable the MAC filter to allow only trusted users to access your wireless network or deny 
unwanted users access based on their MAC address. See 
 for directions on 
configuring the MAC filter.