Unit installation
LON – Network 3065
Page 26
11.0 Security
Because the Network 3065 records and logs critical data, it must be reliably protected
from unauthorised accesses. This demands a great deal from the system as far as
information and manipulation security.
11.1 Secure Communication Between the Network Nodes
Network communication is protected against data tapping in the following ways:
- In order to prevent the data stream from being monitored, the data is encoded
for transmission.
- The encoding also provides sufficient protection during professional attacks
using cryptoanalysis.
11.2 Automatic Tests of Separate System Components
Because separate components can be distributed widely across parts of a building, a
malfunction, manipulation and forcing of a door must be detected and reported to the
central PC automatically.
Important: If a door is equipped with a forced opening alarm function, it must have a
lockcontact.
All nodes report to the central PC at time intervals that can be configured. These time
frames can also be selected to be variable for certain time frames, so that, for
example, critical doors report more often at night than during the day.
11.3 Alarms
Alarms are messages that require a prompt response (such as in case of a burglar or
fire). If the same alarm occurs repeatedly, it is only reported once, in order to keep a
better overview and to reduce the load on the alarm control centers.