WAGO-I/O-SYSTEM 758
Appendix
71
758-916 WLAN ETHERNET Gateway 2.4 GHz
Manual
Version 1.0.1, applicable from HW/SW Version 01/01
8.6
Data Security for Radio Transmission
It is often assumed that wireless communication systems are less secure than line-
connected systems. When used and operated correctly, wireless systems offer at
least an equivalent level of security.
The following conditions must apply before an unauthorized user can obtain
access to data exchanged via wireless communication:
1.
The attacker must be familiar with the communication system in use and be
within the operating range of the system.
2.
Radio transmission must take place without the use of any security
mechanisms offered by this technology or the attacker must have adequate
means to determine the security code.
To minimize security risks, choose the best security mechanisms available in the
respective configuration such as:
•
In an ad-hoc network, use “WEP128” encryption and choose the strongest
passkey possible.
•
In an infrastructure network in which various WLAN devices are used, use
the “WPA2-PSK (AES)” security setting and choose the strongest passkey
possible.