Security Recommendations - Siemens SIMATIC NET SCALANCE W786 Series Operating Instructions Manual

Industrial wireless lan
Hide thumbs Also See for SIMATIC NET SCALANCE W786 Series:
Table of Contents

Advertisement

Security recommendations

To prevent unauthorized access to the device and/or network, observe the following security
recommendations.
General
• Check the device regularly to ensure that these recommendations and/or other internal
security policies are complied with.
• Evaluate your plant as a whole in terms of security. Use a cell protection concept with suitable
products
default.aspx).
• When the internal and external network are disconnected, an attacker cannot access internal
data from the outside. Therefore operate the device only within a protected network area.
• No product liability will be accepted for operation in a non-secure infrastructure.
• Use VPN to encrypt and authenticate communication from and to the devices.
• For data transmission via a non-secure network, use an encrypted VPN tunnel (IPsec,
OpenVPN).
• Separate connections correctly (WBM, Telnet, SSH etc.).
• Check the user documentation of other Siemens products that are used together with the
device for additional security recommendations.
• Using remote logging, ensure that the system protocols are forwarded to a central logging
server. Make sure that the server is within the protected network and check the protocols
regularly for potential security violations or vulnerabilities.
WLAN
• We recommend that you ensure redundant coverage for WLAN clients.
SCALANCE W: Setup of a Wireless LAN in the Industrial Environment
support.industry.siemens.com/cs/ww/en/view/22681042)
Authentication
Note
Accessibility risk - Risk of data loss
Do not lose the passwords for the device. Access to the device can only be restored by resetting
the device to factory settings which completely removes all configuration data.
SCALANCE W786-x
Operating Instructions, 12/2021, A5E03678337-14
(https://www.industry.siemens.com/topics/global/en/industrial-security/pages/
More information on data security and data encryption for SCALANCE W is available in
3
(https://
11

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents