Configure Security (Recommended); Access Points; Communication Interfaces - ABB XIO-08 User Manual

Extendable io
Hide thumbs Also See for XIO-08:
Table of Contents

Advertisement

8

Configure security (recommended)

To secure access to the XIO, review the security features implemented.
8.1

Access points

Totalflow user interfaces and host products support connection with the XIO through several types of
communication ports, protocols, and services. These are points of entry that could be subject to
inexperienced, unauthorized or malicious access through a point-to-point connection or a network
connection. Physical access to the ports must be controlled to protect local and remote access. Enable on-
board security or enforce authentication before establishing a connection with any of the ports.
This section lists the communication ports, services, protocols, and the open Transmission Control Protocol
(TCP) ports that must be considered when securing devices.
8.2

Communication interfaces

The table below lists the default communication ports available in the XIO with standard configuration.
These ports are pre-configured from the factory. When enabled, these ports are ready for use, but are not
secured.
Unprotected ports make the full functionality of the device available to any user. Configure security
passcode or role-based authentication to prevent unauthorized access.
Table 8-1: Default communication ports on the XIO
Wired connections
communication
ports, default names
USB, port name:
Totalflow/USB
Ethernet, port name:
Totalflow/TCP
COM1-COM8, port name:
TF – Remote
IMPORTANT NOTE: The Totalflow protocol is an unsecured protocol. As such, the intended application
should be assessed to ensure that these protocols are suitable before implementation.
IMPORTANT NOTE: The Ethernet ports on the XIO might connect to a network and peripheral
devices. If the peripheral devices send real-time measurement data to the XIO, configure
connections correctly to prevent loss of this data due to network issues. See section
connectivity
scenarios.
The Table below lists the wireless interfaces available in XIO devices with standard configuration.
Default
Default
state
protocol
Enabled
Totalflow Local
(Read-only)
Enabled
Totalflow/TCP
(Read-only)
Disabled
Totalflow Remote
(Configurable)
Security feature available
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
Bi-Level Security code authentication or Role-base
Authentication (Role-base Authentication, RBAC)
XIO USER MANUAL | 2106424MNAA | 117
10 Ethernet

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents