Overview; Network Fortification - Emerson 1420 Reference Manual

Wireless gateway
Hide thumbs Also See for 1420:
Table of Contents

Advertisement

Reference Manual
00809-0100-4420, Rev BA
August 2007
Section 5

OVERVIEW

NETWORK
FORTIFICATION
Wireless Network Operation
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page 5-1
Network Fortification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page 5-1
Security Features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page 5-4
Trends . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . page 5-5
This chapter will discuss ways to ensure good performance and security in
the wireless network. Once the network is up and running, two simple steps
will help ensure that the network is robust and reliable for the long term.
These two steps are fortifying the network and identifying "pinch points."
Network expansion is also an easy process that not only broadens the reach
of the network, but also increases robustness and reliability.
The second half of this chapter will lay out guidelines to increase and ensure
the security of the network.
Verify Connections
A fortified network allows the devices to communicate with the gateway in the
most optimal configuration. First, verify that each device has joined the
network and is communicating properly by checking the Explorer>Status
page. If a communication link can't be made, an additional device can be
added to bridge the connection to the network.
1420 Wireless Gateway
Primary
Network Devices
5-1

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents