6HFXULQJ$FFHVVWR:LUHOHVV'DWD
Industrial Ethernet Wireless LAN RLM Manager, CP 1515 Manager
C79000-G8976-C171-01 155
 6HFXULQJ$FFHVVWR:LUHOHVV'DWD
To prevent unauthorized stations from accessing data that is transmitted
over the network, the products support the following levels of security:
“Restrict Wireless Access to the Network���
Data encryption to encrypt all data transmitted via the wireless medium
(see Wireless Data Encryption (page 167)).
These security measures that apply to communications at the “physical
layer” complement the “user name/password” validation at the “network
layer” as implemented by standard network operating systems.

 5HVWULFW:LUHOHVV$FFHVVWRWKH1HWZRUN

To exclude unknown and unauthorized computing devices from establishing
a wireless connection to the network, you can use the following options:
Closing your network to all stations that have not been programmed
with the correct network name (see Closing the Wireless Network (page
156)).
Use access control tables to build a list of authorized stations allowed to
establish a wireless connection with the network (see Access Control
(page 159)).