Manage Logging; Set Operating Modes; Save And Secure The Configuration - Pilz PCOM sec br2 Operating Manual

Table of Contents

Advertisement

Configuration
8.6

Manage logging

All the events are logged and displayed on the user interface. The event log is a ring
memory, i.e. when the maximum number of entries has been reached, the most recent
event overwrites the oldest event. The maximum number of events in the ring memory is
4096 entries.
The event log is saved in the Flash memory every 15 minutes. If the supply voltage is inter-
rupted, any messages that have not been saved may be lost.
After the restart, the number of lost messages will be displayed in an event log entry.
External logging
The following options exist for forwarding the events to an external system:
}
You can send the events in a configurable interval via SMTP as an E-Mail.
}
You can send the events to an external Syslog server.
To configure the external logging, please read the online help of the user interface.
8.7

Set operating modes

Bypass mode
Bypass mode can be used for diagnostic purposes. In bypass mode, all the network data
transferred between the unprotected and protected network is unfiltered.
The status is displayed on the user interface and on the device via a configurable LED.
Setup mode
Setup mode can be used for maintenance and commissioning purposes. It is activated for
certain users, who are to have temporary, limited access permissions for maintenance work
only. This option is defined when a user is created. These users can only log in to the Se-
curityBridge when SecurityBridge is in setup mode.
Setup mode for the SecurityBridge is activated via the user interface or via the digital input.
If setup mode is activated via the digital input, then it can no longer be modified via the user
interface. The status is displayed via the user interface and an LED.
8.8

Save and secure the configuration

All the settings that you make on the user interface are initially saved only temporarily in the
active configuration and are lost if the SecurityBridge is restarted.
If the active configuration is to be saved on the SecurityBridge and is to be available again
on restart, it must be applied as the start configuration.
Operating Manual PCOM sec br2
1004534-EN-04
CAUTION!
Loss of security when bypass mode is activated
The security functions are deactivated in bypass mode. Make sure that by-
pass mode is only active temporarily and that a network attack cannot occur
while the system is in an unsafe state.
| 31

Advertisement

Table of Contents
loading

This manual is also suitable for:

311502

Table of Contents