Man-in-the-middle attack - Johnson Controls - LIT-12013942 - CEGPNL100x-0 - JC-TMR2400-x - SE-CEG1001-x - Network gateway - CEG1001 Connected Equipment Gateway

CEG Network and IT Guidance Technical Bulletin

Product
Document type
Technical Bulletin
Document number
LIT-12013942
Revision date
2022-02-21
Product status
Active

A man-in-the-middle attack is a type of security breach where an attacker positions themselves between the user and the entity the user is trying to communicate with on the network. The attacker can then intercept and read traffic or send false information to the destination. To guard against this type of attack, use an Ethernet cable to directly connect the CEG to your computer when you transfer keys to the CEG. This configuration creates a network of two devices and makes a man-in-the-middle attack improbable.