Security Recommendations - Siemens SCALANCE X320-3LD FE Operating Instructions Manual

Industrial ethernet switches
Hide thumbs Also See for SCALANCE X320-3LD FE:
Table of Contents

Advertisement

Safety requirements for installation
According to the IEC 61131-2 standard and therefore in accordance with the EU directive
2006/95/EC (Low Voltage Directive), the devices are "open equipment" and in accordance
with UL/CSA certification, they are an "open type".
To fulfill requirements for safe operation with regard to mechanical stability, flame
retardation, stability, and shock-hazard protection, the following alternative types of
installation are specified:
● Installation in a suitable cabinet.
● Installation in a suitable enclosure.
● Installation in a suitably equipped, enclosed control room.
1.4

Security recommendations

To prevent unauthorized access, note the following security recommendations.
General
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
● When confidential zones are used, the internal and external network are disconnected, an
attacker cannot access the data from the outside.
● Operate the device only within a protected network area.
● Use VPN to encrypt and authenticate communication from and to the devices.
● For data transmission via a non-secure network use an encrypted VPN tunnel (IPsec).
● For operation of the device in a non-secure infrastructure no product liability will be
accepted.
● Separate connections correctly (WBM. Telnet, SSH etc.).
Physical access
● Limit physical access to the device to qualified personnel.
The memory card or the C-PLUG contains sensitive data such as certificates, keys etc.
that can be read out and modified.
● Lock unused physical ports on the device. Unused ports can be used to gain forbidden
access to the plant.
SCALANCE X-300
Operating Instructions, 05/2016, A5E01113043-20
Safety instructions
1.4 Security recommendations
19

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents