Huawei B2368 Series User Manual page 49

Lte cpe
Hide thumbs Also See for B2368 Series:
Table of Contents

Advertisement

LTE CPE B2368 User's
Guide
The effectiveness of the safety standards vary. Some safety standards are very robust, but the threat is a
misuse. For example, a security standard WPA-PSK itself is very safe, if a user uses a long enough password
that can not be easily guessed, such dvacetiznakový string of random numbers and letters. Safety of this
standard is declining in case you choose a short password that can be easily guessed - need the three-word from
standard is declining in case you choose a short password that can be easily guessed - need the three-word from
standard is declining in case you choose a short password that can be easily guessed - need the three-word from
the dictionary.
Because of the potential damage that an attacker can inflict are high, should not the safety standards are
only interested in people working with sensitive information. Effective security should be a priority of all those
who are with your device connected to a wireless network.
A good way to think of an effective security password, is take some very important personal information we
have but easy to remember, and write it in a way that acts randomly and beyond the normal syntax rules. For
example, say your father owns the Dodge Challenger in 1970 and his favorite movie is Vanishing Point
(which you know from the year 1971). Then, your password may be, for example,
" 70dodchal71vanpoi ".
" 70dodchal71vanpoi ".
" 70dodchal71vanpoi ".
The following chapters deal with the different types of security you can into your wireless network to
implement.
SSID
In normal operation, the LTE modem acts as a beacon, which regularly broadcasts the SSID in your neighborhood.
Broadcast SSID can not suppress a presence of an access point in the form of an LTE modem to hide. We recommend
that you also change the default SSID to a name that is not easy to guess.
This security method is relatively weak, because there are ways in which they can gain unauthorized devices
SSID. In addition, unauthorized devices can still see the data that is sent over a wireless network.
The MAC address filter
Any device that can connect to a wireless network has its own unique identification number called a MAC address. It is
usually written in the form of 12 hexadecimal characters, for example. 00A0C5000002 or 00: A0: C5: 00: 00: 02. MAC
address can be found in the operating instructions or other documentation included with the device.
The MAC address filter can then be used to determine the devices that will access the wireless network. Each device,
including those permitted, but will still have the right to know the access data to the network (SSID, channel and security
password). If the MAC address of the device is not on the whitelist, it does not matter whether you know the access data
or not.
This method of security does not protect information that is sent over a wireless network. Moreover, there are
ways in which unauthorized wireless device can get some of allowed MAC addresses. The device was
subsequently may be one of the authorized MAC addresses to hide.
First Some wireless devices, such as scanners, wireless networks can be connected,
First Some wireless devices, such as scanners, wireless networks can be connected,
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Second Hexadecimal characters refers to the number 0 - 9, the letters A - F aa - F.
Issue 01
but they can not communicate through them. Such devices may be provided with a MAC
address.
Copyright © Huawei Technologies Co., Ltd.
5 Wireless WiFi 2.4 / 5 GHz
46

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

B2368-22B2368-66B2368-57

Table of Contents