
In the case of a company, it is however necessary to see to it that the firewalls for
access to the Internet are correctly configured and that the various logical corporate
networks are correctly separated in order to protect its data. The following sections
introduce the main lines to be complied with for this purpose.
Security Topologies
There are radical methods to make a PLC corporate network secure, like the instal-
lation of the network fully outside of the corporate network or the access protection
between the PLC part and the remainder of the network.
Figure 11.7 illustrates the first solution. It is generally expensive to install a PLC
network outside of the corporate network in terms of time or equipment purchase.
In addition, the company finds itself with two networks to manage and therefore
two Internet connections, two DHCP servers, and so forth, the administration of
which obviously requires more time.
In the second solution, illustrated in Figure 11.8, the connection between the
PLC network and the corporate network is made secure in the same manner as an
Internet connection by means of a firewall.
The AsokaUSA company proposes a PLC switch used for managing several
HomePlug 1.0 and Turbo PLC networks. Since all the HomePlug 1.0 and Turbo
devices support only one network key at a time, they cannot belong to several PLC
networks at the same time.
Moreover, several HomePlug 1.0 and Turbo PLC devices cannot be separated in
the same electrical network if they have the same network key. The only method to
separate them is to enter a different network key on each of them and a PLC device
258 PLC for Businesses
Figure 11.7 Architecture example for a PLC network not connected to the corporate network
Comentarios a estos manuales