Instructions For Secure Network Design - Siemens SCALANCE W780 Configuration Manual

Simatic net industrial wireless lan to ieee 802.11n web based management
Hide thumbs Also See for SCALANCE W780:
Table of Contents

Advertisement

7.4

Instructions for secure network design

Note the following information about protecting your network from attacks:
● Use a secure connection with HTTPS
In contrast to HTTP, HTTPS allows you secure access for configuring the WLAN clients
and the access points using Web Based Management. For more detailed information,
refer to the section "Load&Save (Page 151)".
● Use WPA2/ WPA2-PSK with AES
Use only WPA2/AES to prevent password misuse. WPA2/ WPA2-PSK with AES provides
the greatest security. For more detailed information, refer to the section "Basic
(Page 271)".
● Protect your network from man-in-the-middle attacks
To protect your network from man-in-the-middle attacks, a network setup is
recommended that makes it more difficult for the attacker to access the communications
path between two end devices.
– You can, for example, protect WLAN devices by arranging so that the Agent IP is only
– A further option is to install a separate HTTPS certificate on the WLAN client / access
● Use SNMPv3
SNMPv3 provides you with highest possible security when accessing the WLAN devices
via SNMP. For more detailed information, refer to the section "SNMP (Page 173)".
NOTICE
Changing the default password after configuring with STEP 7
If a device in the default status is configured only with STEP 7, it is not possible to change
the default password. This change must be made directly on the device using WBM or CLI.
Otherwise the default password is retained and any user could log in using the default
password.
SCALANCE W780/W740 to IEEE 802.11n Web Based Management
Configuration Manual, 03/2015, C79000-G8976-C267-08
accessible via a single management VLAN. For more detailed information, refer to the
section "Agent IP (Page 144)".
point. The HTTPS certificate checks the identity of the device and controls the
encrypted data exchange. You can install the HTTPS certificate, for example using
HTTP. For more detailed information, refer to the section "HTTP (Page 153)".
Troubleshooting/FAQ
7.4 Instructions for secure network design
301

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents