Protection
8.1
Overview of the protective functions of the CPU
Introduction
This chapter describes the following functions for protecting the ET 200SP against
unauthorized access:
● Access protection
● Know-how protection
● Copy protection
Further measures for protecting the CPU
The following measures additionally increase the protection against unauthorized access to
functions and data of the CPU from external sources and via the network:
● Deactivation of the Web server
● Deactivation of time synchronization via an NTP server
● Deactivation of PUT/GET communication
If you use the Web server, protect your ET 200SP distributed I/O system against
unauthorized access by setting password-protected access rights for specific users in the
user management.
8.2
Configuring access protection for the CPU
Introduction
The CPU offers four access levels, in order to limit access to specific functions.
By setting up the access levels and the passwords for a CPU, you limit the functions and
memory areas that are accessible without entering a password. You specify the individual
access levels as well as the entry of their associated passwords in the object properties of
the CPU.
Distributed I/O system
System Manual, 12/2015, A5E03576849-AF
8
133