Notes On Security - Siemens SIMATIC RF650R Configuration Manual

Simatic ident
Hide thumbs Also See for SIMATIC RF650R:
Table of Contents

Advertisement

Notes on security

Recommendations for secure handling of the WBM
Keep to the following security recommendations when working with the WBM (Web Based
Management) to prevent unauthorized access to the device:
● Enable user management and create new profiles.
● Before making the device available, change the default passwords for the standard
profiles "Administrator" and "User".
● Use strong passwords.
● You should not use the same passwords for different user names or systems.
● Enable only the services (communications protocols) that will actually be used on the
device and also the installed interfaces/ports. Unused ports could be used to access the
network downstream from the device.
● If a firewall is necessary, configure and start the firewall before you connect the device to
a public network. Make sure that the firewall is configured so that it accepts connections
from a specific domain.
● Check the device regularly to make sure that these recommendations and/or other
internal security guidelines are adhered to.
● The configuration files are available in XML format for simple use. Make sure that the
configuration files outside the device are suitably protected. You can, for example,
encrypt the files, store them at a safe location and transfer them only via secure
communications channels.
● Do not connect the device directly to the Internet. Operate the device within a protected
network area.
● The firmware itself is signed and encrypted. This ensures that only authentic firmware can
be downloaded to the device.
● Check for non-secure protocols activated on the device. While some protocols such as
HTTPS are secure, others such as HTTP were not developed for this purpose. With non-
secure protocols, suitable security measures must be taken to prevent unauthorized
access to the device/network.
● Check regularly that the device complies with these recommendations and /or other
internal security policies.
● Evaluate your plant as a whole in terms of security. Use the cell protection concept with
suitable products.
SIMATIC RF650R/RF680R/RF685R
Configuration Manual, 10/2015, C79000-G8976-C386-03
2
9

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Simatic rf680rSimatic rf685r

Table of Contents