Man-in-the-middle attack - Johnson Controls - LIT-12013942 - CEGPNL100x-0 - JC-TMR2400-x - SE-CEG1001-x - Network gateway - Connected Equipment Gateway CEG1001

CEG Network and IT Guidance Technical Bulletin

Johnson Controls
Product name
Connected Equipment Gateway CEG1001
Document type
Technical Bulletin
Document number
Revision date
Product status

A man-in-the-middle attack is a type of security breach where an attacker positions themselves between the user and the entity the user is trying to communicate with on the network. The attacker can then intercept and read traffic or send false information to the destination. To guard against this type of attack, use an Ethernet cable to directly connect the CEG to your computer when you transfer keys to the CEG. This configuration creates a network of two devices and makes a man-in-the-middle attack improbable.