Function Description; Operation - Pilz SDD ES ETH Operating Manual

Table of Contents

Advertisement

SDD ES ETH
}
Assign only safe passwords. When assigning passwords, please note:
– The password should have at least 8 characters.
– The password should contain upper and lower case characters, as well as special
– If possible, the password should not be available in dictionaries.
– The password should not be made up of standard variants and repetitions or key-
– Use a password manager for optimum management of complex passwords.
– Language-independent characters are not available in every keyboard language.
– Make sure you regularly change the passwords of the user accounts on the system
– Make the users aware of the responsible use of their access data.
}
Assign different permissions for the various user groups (e.g. diagnostics - configuration).
}
Modbus/TCP has no security mechanisms. Use a firewall to protect the product from un-
authorised access.
}
As soon as possible, install firmware updates that Pilz provides for the product.
}
Before disposal, the product must be safely decommissioned. To do this, all the data
must be deleted from the device.
– Set the configuration back to its default settings or delete the configuration.
– Switch off the product.
}
Note the network data for risk analysis and the security measures.

Function description

Operation

The SDD ES ETH is configured and started automatically after the supply voltage is
switched on.
LEDs indicate the status of the SDD ES ETH and communication between the safety
devices and Modbus/TCP Client.
The SDD ES ETH sends telegrams to the connected safety devices via a ring protocol.
The following types of data are transferred to the fieldbus and read in.
}
Process data
– Information and commands on safety functions (OSSD, guard locking, ...)
}
Device data
– Material number, serial number, product version, actuator ID, ...
Operating Manual SDD ES ETH
1003824-EN-06
characters and numbers.
board patterns (so not: 1234abcd).
and/or ask the users to change their passwords themselves.
| 11

Advertisement

Table of Contents
loading

Table of Contents