49
Chapter 5
Configuration
Security
This section discusses configuration options
that restrict configuration .
Overview
The EtherPoll uses the industry standard UDP/IP protocol.
Since this is a well known standard, its security vulnerabilities
are also well known and may be exploited. Several EtherPoll
options are available to enhance the inherent security of your
EtherPoll network. However, since network security is a
moving target and absolute security is never achievable, every
network installation should be designed and implemented with
care to minimize security risks in a way that is appropriate for
the application and perceived risks.
The EtherPoll may be configured with several levels of security
configuration and authentication. These restrict the ability of
an unwanted user from changing the configuration of the
EtherPoll. They do
not
restrict the ability of a remote device to
deliver packets to the EtherPoll's data port.
Summary of Contents for EtherPoll
Page 1: ...Revised October 7 2002 Firmware Version 4 1 EtherPoll User s Guide...
Page 2: ......
Page 4: ......
Page 8: ......
Page 56: ...48...