7 Chapter 2
2.1.3 Data Integrity
All records are protected using the symmetry encryption and checksum
algorithms. Symmetry encryption protects the data privacy. With check-
sum, which is protected by encryption, we could guarantee the integrity
of data. Transmissions also include a sequence number, which is pro-
tected by encryption, so that missing, altered or extra messages are
detectable.
2.1.4 Access Control and Local Password Configuration
IP access control can block users from unauthorized hosts; it only allows
32 users to access at one time. In addition, the ADAM-4570S/4571S pro-
tects all configuration settings from being changed inadvertently. When
this option is enabled, only the corresponding PC can configure the mod-
ule. The multiple security mechanisms work to prevent unauthorized
access to your RS-422/485 networks.
Komentarze do niniejszej Instrukcji