2 securing access to wireless data, 1 restrict wireless access to the network, Securing access to wireless data – Siemens CP 1515 User Manual
Page 155: Restrict wireless access to the network, 6hfxulqj $ffhvv wr :luhohvv 'dwd, 5hvwulfw :luhohvv $ffhvv wr wkh 1hwzrun
6HFXULQJ $FFHVV WR :LUHOHVV 'DWD
Industrial Ethernet Wireless LAN RLM Manager, CP 1515 Manager
C79000-G8976-C171-01
155
6HFXULQJ $FFHVV WR :LUHOHVV 'DWD
To prevent unauthorized stations from accessing data that is transmitted
over the network, the products support the following levels of security:
•
“Restrict Wireless Access to the Network”
•
Data encryption to encrypt all data transmitted via the wireless medium
(see
Wireless Data Encryption (page 167)
).
These security measures that apply to communications at the “physical
layer” complement the “user name/password” validation at the “network
layer” as implemented by standard network operating systems.
5HVWULFW :LUHOHVV $FFHVV WR WKH 1HWZRUN
To exclude unknown and unauthorized computing devices from establishing
a wireless connection to the network, you can use the following options:
•
Closing your network to all stations that have not been programmed
with the correct network name (see
Closing the Wireless Network (page
).
•
Use access control tables to build a list of authorized stations allowed to
establish a wireless connection with the network (see
).