beautypg.com

2 securing access to wireless data, 1 restrict wireless access to the network, Securing access to wireless data – Siemens CP 1515 User Manual

Page 155: Restrict wireless access to the network, 6hfxulqj $ffhvv wr :luhohvv 'dwd, 5hvwulfw :luhohvv $ffhvv wr wkh 1hwzrun

background image

6HFXULQJ $FFHVV WR :LUHOHVV 'DWD

Industrial Ethernet Wireless LAN RLM Manager, CP 1515 Manager
C79000-G8976-C171-01

155

6HFXULQJ $FFHVV WR :LUHOHVV 'DWD

To prevent unauthorized stations from accessing data that is transmitted
over the network, the products support the following levels of security:

“Restrict Wireless Access to the Network”

Data encryption to encrypt all data transmitted via the wireless medium
(see

Wireless Data Encryption (page 167)

).

These security measures that apply to communications at the “physical
layer” complement the “user name/password” validation at the “network
layer” as implemented by standard network operating systems.

5HVWULFW :LUHOHVV $FFHVV WR WKH 1HWZRUN

To exclude unknown and unauthorized computing devices from establishing
a wireless connection to the network, you can use the following options:

Closing your network to all stations that have not been programmed
with the correct network name (see

Closing the Wireless Network (page

156)

).

Use access control tables to build a list of authorized stations allowed to
establish a wireless connection with the network (see

Access Control

(page 159)

).