Siemens Santis ADSL 50 User Manual

Page of 6
Step 11:
Install LLine FFilter
Devices such as fax machines or phones that share the same phone line as your ADSL
account require a line filter, which protects your phone or fax from ADSL frequencies.
Filters can be in the form of a Y-Line Filter or a Belgium-Line Filter. Both can be used if your
ADSL modem will share the same phone jack with another device.
If your ADSL modem and another device will share the same 5-pole phone jack, install a
Belgium-Line Filter.
If your wall socket is a RJ11 and your modem shares the line with another device, install a
Y-Line Filter.
3
Y-LLine FFilters
1. Unplug the device’s cord from 
the phone jack.
2. Plug the Y-Line Filter into the 
phone jack.
3. Plug the phone cord (or other 
device cord) into the ”PHONE” 
jack of your Y-Line Filter.
4. Plug the ADSL cord into the 
”ADSL” jack of your Y-Line Filter.
2.
3.
4.
Belgium LLine FFilter
1.  Unplug the device’s cord 
from the phone jack.
2. Plug the Belgium-Line Filter 
into the phone jack.
3. Plug the phone cord (or other 
device cord) into the ”PHONE” jack
of your Belgium-Line Filter.
4. Plug the ADSL cord into the 
”ADSL” jack of your Belgium-Line 
Filter.
2.
3.
4.
10
IMPORTANT: SSecuring yyour w
wireless eenvironment
Using radio waves, a wireless network introduces some security risks which are not present
in a wired network; an unauthorized third party can intercept transmitted data, gain access
to your wireless network, …  In order to make your wireless network as secure as a wired
network you should apply, at least, the following guidelines :
1 - CChange tthe SSSID
Your wireless network is identified on the basis of an SSID (Service Set Identifier). This 
parameter, which can be considered as the network name, is broadcasted periodically
through a beacon. Also the SSID is, in most cases, set default to a well known value. To
improve the security you can :
1. disable the SSID broadcast. Users who want to connect to your wireless network must 
know this value to become connected. Also, your wireless network becomes invisible 
to a third party.
2. change the default value of the SSID. The SSID can contain maximal 32 characters 
and it's best to choose a value which is not too obvious.
2 - A
Activate W
WEP
To guarantee that your data is transmitted in a private manner, you should activate WEP
(Wired Equivalent Privacy). Use of this protocol will result in your data being encrypted
while travelling through the air. Choose the largest encryption key possible (in most cases
this is 128 bits) and make sure that each PC on your wireless network uses the same key as
the access point.
You can even improve the security by changing the WEP-key on a regular base.
3 - A
Activate M
MAC-aaddress ccontrol llist
By means of the MAC-address list, also known as the Association Control List, you can
determine which client adapters can access your wireless network. This is done by introdu-
cing the MAC-address of the client adapter in the concerned list of the access point. A MAC
address consists of 12 characters (0-9,A-F) and can be found on the back of the client
adapter. A client adapter whose MAC address is not included in the list will not be granted
access to your wireless network.
4 - CChange // aactivate ppasswords
Configuration of the access point is done through a web browser. Secure this access, and
any other access which may exist, by a carefully chosen password. If a default password,
set by the manufacturer, is used, you should replace this by your own password.
See tthe ddetailed uuser m
manual oon CCD-RROM tto ffind m
more iinformation
on hhow tto cconfigure tthese ssecurity rrecommendations.