HSDPA
User’s Manual
WMOCEAN +420 225 371 777
http://www.wmocean.com
p. 81
SPI - Acronym for Stateful packet inspection. The embedded firewall also
performs stateful packet inspection. This approach examines the contents of packets rather
than just filtering them. It takes into account not only the addresses of the data packets but
also the contents and the state of the connection. Stateful means they take into account the
state of the connections they handle so that, for example, a legitimate incoming packet can
be matched with the outbound request for that packet and allowed in. In addition, an
incoming packet masquerading as a response can be blocked if the firewall knows that the
outbound request is in fact nonexistent. Rather than controlling the individual data packets.
SPI uses smart rules, thus enhancing the filtering process and controlling the network
session. Static packet filtering cannot stop DOS attacks But SPI closes ports until legitimate
users request them opened so it prevents certain kinds of Denial of Service attacks. Since
SPI firewalls compare packets to previous packets, the packets that violate the rules can be
dropped.
SSID - Service set identifier, the name of a wireless local area network (WLAN). A code
attached to all data packets on a wireless network for identification purposes. Besides
identifying each packet, SSID serves also to identify a group of wireless network devices
used in a given "Service Set". This ID allows multiple wireless Ethernet networks to be active
at the same time in the same location. You may allow or disable the “public SSID”, which is
set on the access point and broadcast to all wireless devices in range. If you disable the
automatic broadcasting of SSID feature the security of the network is increased, people who
don’t know this ID cannot connect to the WiFi LAN.
WEP - Acronym for Wired Equivalent Privacy, encryption protocol for WiFi networks. As its
name says, WEP was designed to provide for WLAN a level of privacy equivalent to that of
an unsecured wired LAN. WEP is used at the two lowest layers, the data link and physical
layer. To read a WEP encryption on file you need a secret key or password to decrypt it.
There are two main types of WEP encryption, symmetric and respectively asymmetric WEP
(public key WEP encryption). and WEP encryption. WEP encryption standard employs 40-bit
encryption and a 128-bit WEP encryption option. Remember that only when using the 128-bit
keys WEP encryption it ensures the same level of security as the unencrypted wired
Ethernet. WEP is NOT an industrial strength security algorithm. It is vulnerable because of
relatively short IVs and keys that remain static.