
8 MDS entraNET 900 System Guide MDS 05-4055A01, Rev. A
for EIA-232 signaling. The COM2 port supports standard EIA-232 sig-
naling and acts as a data-communications equipment device (DCE).
NOTE: Several previous MDS-brand products contained signal lines
on their interface connectors that are not used or required on
entraNET units. Consult the legacy equipment manual(s) for
interface pinout information and connect only the required
pins.
Supplement legacy wireless network with IP services
MDS entraNET 900 serial Remotes support most polled protocols. The
serial interface (COM2) operates in two different modes: Connection-
less serial-to-serial (UDP) and connection-oriented IP-to-serial (TCP).
In the UDP (connectionless IP-to-serial) mode, the transceiver supports
point-to-multipoint IP-port to serial-port connectivity. In the TCP (con-
nection-oriented IP-to-serial) mode, the transceiver supports
point-to-point Ethernet/IP to serial port connectivity.
For more details on Serial Gateway interface modes see “CONFIG-
URING THE SERIAL INTERFACES” on Page 42.
1.3 SECURITY TECHNIQUES & TOOLS
Today the operation and management of an enterprise is becoming
increasing dependent on electronic information flow. An accompanying
concern becomes the security of the communication infrastructure and
the security of the data itself.
The MDS entraNET 900 is capable of dealing with many common secu-
rity issues. Table 1-2 profiles security risks and how the MDS entraNET
900 provides a solution for minimizing vulnerability.
Table 1-2. Security Risk Management
Security Risk The MDS entraNET 900 Solution
Unauthorized access to the backbone
network through a foreign remote radio
✓ Approved Remotes List
Only those units included in the
Approved Remotes list will connect
“Rogue” AP, where a foreign AP takes
control of some or all Remote radios and
thus remote devices
✓ Approved AP List
A Remote will only associate to
those APs included in its local
authorized list of APs
Dictionary attacks, where a hacker runs a
program that sequentially tries to break a
password.
✓ Failed-login lockdown
After 3 tries, a transceiver ignores
login requests for 5 minutes.
Critical event reports (traps) are
generated as well.
Kommentare zu diesen Handbüchern