Recommendations On Network Security - Siemens SIMATIC NET SCALANCE XC-200 Series Operating Instructions Manual

Industrial ethernet switches
Table of Contents

Advertisement

Safety notices

2.1 Recommendations on network security

2.1
Recommendations on network security
NOTICE
Information security
Connect to the device and change the standard password for the user set in the factory
"admin" and "" before you operate the device.
To prevent unauthorized access, note the following security recommendations.
General
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products
pages/default.aspx).
● When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore operate the device only within a protected network
area.
● For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
● Terminate management connections correctly (WBM. Telnet, SSH etc.).
Physical access
● Restrict physical access to the device to qualified personnel because the plug-in data
medium can contain sensitive data.
● Lock unused physical interfaces on the device. Unused interfaces can be used to gain
access to the plant without permission.
Software (security functions)
● Keep the firmware up to date. Check regularly for security updates for the device. You can
find information on this at the Industrial Security
industrialsecurity) website.
● Inform yourself regularly about security recommendations published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
● Only activate protocols that you require to use the device.
● Restrict access to the management of the device with rules in an access control list (ACL).
● The option of VLAN structuring provides protection against DoS attacks and unauthorized
access. Check whether this is practical or useful in your environment.
● Use a central logging server to log changes and accesses. Operate your logging server
within the protected network area and check the logging information regularly.
12
(https://www.industry.siemens.com/topics/global/en/industrial-security/
(https://www.siemens.com/
Operating Instructions, 12/2017, C79000-G8976-C442-03
SCALANCE XC-200

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents