1.5 Cyber Security
Today the operation and management of an enterprise is becoming increasing dependent on electronic infor-
mation flow. An accompanying concern becomes the cyber security of the communication infrastructure
and the security of the data itself.
The transceiver is capable of dealing with many common security issues. Table 1-3 profiles security risks
and how the transceiver provides a solution for minimizing vulnerability.
Security Vulnerability
Unauthorized access to the backbone
network through a foreign remote radio
"Rogue" AP, where a foreign AP takes
control of some or all remote radios and
thus remote devices
Dictionary attacks, where a hacker runs a
program that sequentially tries to break a
password.
Denial of service, where Remote radios
could be reconfigured with bad
parameters bringing the network down.
Airsnort and other war-driving hackers in
parking lots, etc.
Eavesdropping, intercepting messages
Key cracking software
Replaying messages
05-2806A01, Rev. L
Table 1-3. Security Risk Management
MDS iNET Series Reference Manual
GE MDS Cyber Security Solution
• 802.1X authentication
• Approved Remotes List (local)
Only those remotes included in the
AP list will associate
• 802.1X authentication
• Approved AP List
A remote will only associate to those
APs included in its local authorized
list of APs
• Failed-login lockdown
After 3 tries, the transceiver ignores
login requests for 5 minutes. Critical
event reports (traps) are generated
as well.
• Remote login with SSH or HTTPS
• Local console login
• Disabled HTTP & Telnet to allow
only local management services
• 900 MHz operation is not
interoperable with standard 802.11b
wireless cards
• The transceiver cannot be put in a
promiscuous mode
• Proprietary data framing
• AES-128 encryption (iNET-II)
• RC4-128 encryption (iNET)
• Automatic Rotating Key algorithm
• Automatic Rotating Key algorithm
11