Security Recommendations - Siemens SCALANCE X-200 Operating Instructions Manual

Simatic net industrial ethernet switches
Hide thumbs Also See for SCALANCE X-200:
Table of Contents

Advertisement

Safety notices

3.3 Security recommendations

3.3
Security recommendations
NOTICE
Information security
Connect to the device and change the standard passwords for the users "admin" and "user"
before you operate the device. To be able to change passwords you need to be logged in
with write access to the configuration data.
To prevent unauthorized access, note the following security recommendations.
General
● You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products
security/Seiten/default.aspx).
● When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore operate the device only within a protected
network area.
● For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
● Terminate management connections correctly (WBM. Telnet, SSH etc.).
Physical access
● Restrict physical access to the device to qualified personnel because the plug-in data
medium can contain sensitive data.
● Lock unused physical interfaces on the device. Unused interfaces can be used to gain
access to the plant without permission.
38
(https://www.industry.siemens.com/topics/global/en/industrial-
Operating Instructions, 02/2018, C79000-G8976-C284-12
SCALANCE X-200

Advertisement

Table of Contents
loading

Table of Contents