Siemens SIMATIC NET SCALANCE XM-400 Series Operating Instructions Manual page 14

Industrial ethernet switches
Table of Contents

Advertisement

Recommendations on network security
Software (security functions)
• Keep the firmware up to date. Check regularly for security updates for the device. You can
find information on this at the Industrial Security
industrialsecurity) website.
• Inform yourself regularly about security recommendations published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
• Only activate protocols that you require to use the device.
• Restrict access to the management of the device with rules in an access control list (ACL).
• The option of VLAN structuring provides protection against DoS attacks and unauthorized
access. Check whether this is practical or useful in your environment.
• Use a central logging server to log changes and accesses. Operate your logging server within
the protected network area and check the logging information regularly.
Passwords
• Define rules for the assignment of passwords.
• Regularly change your passwords to increase security.
• Use passwords with a high password strength.
• Make sure that all passwords are protected and inaccessible to unauthorized persons.
• A password must be changed if it is known or suspected to be known by unauthorized
persons.
• Do not use the same password for different users and systems.
Certificates and keys
• The device contains a pre-installed certificate with key. Replace this certificate with a self-
made certificate with key. We recommend that you use a certificate signed either by a reliable
external or by an internal certification authority. You can install the certificate via the WBM
(System > Load and Save).
• Use the certification authority including key revocation and management to sign the
certificates.
• Make sure that user-defined private keys are protected and inaccessible to unauthorized
persons.
• Verify certificates and fingerprints on the server and client to prevent "man in the middle"
attacks.
• It is recommended that you use password-protected certificates in the PKCS#12 format.
• It is recommended that you use certificates with a key length of at least 2048 bits.
• Change keys and certificates immediately if there is a suspicion of compromise.
14
(https://www.siemens.com/
Operating Instructions, 03/2021, C79000-G8976-C306-10
SCALANCE XM-400

Advertisement

Table of Contents
loading

Table of Contents