Eaton LoadStar-S JSB Mounting And Operating Instruction page 24

Table of Contents

Advertisement

16 Device Configuration
Important Notes on Cyber Security When
Using the LoadStar-S HMI in Ethernet
Networks
If the HMI of the LoadStar-S is operated in an Ethernet-
based communication network, particular importance
should be attached to preventing unauthorized access, e.g.
through hacker attacks. Ultimately, however, security is
strongly dependent on the operator's equipment, e.g. high
password quality, and the network environment in which
the HMI is operated. An insecure network environment
facilitates unwanted access by unauthorized persons. In
order to provide assistance, we would like to point out
important points to protect the HMI as securely as possible
against unauthorized access.
Settings in the LoadStar-S HMI
Password input:
The password input is very important against unauthorized
or unwanted access by strangers! Therefore some rules
should be observed when assigning a password:
• It should be at least six characters long
• The password should consist of upper and lower case
letters / numbers.
• Avoid names of family members, pets, best friends, favo-
rite stars or their dates of birth or similar constellations.
• If possible, passwords should not appear in dictionaries.
• It should not consist of common variants and repetition or
keyboard patterns, so not qwertz or abcd1234 and so on.
• Add simple numbers to the end of the password or one
of the usual special characters $ ! ? #, at the beginning or
end of an otherwise simple password is also not recom-
mended.
Use in a network, e.g. Intranet
General information about managed network hardware,
e.g. routers, switches, etc.
• Keep the firmware up to date!
• Change the default password of the devices!
• Set up a firewall with MAC address filter!
• Enable DDoS defense (Distributed Denial of Service)
• Block unneeded ports and protocols
• Deactivate unneeded functions of your router!
• Deactivate the remote access of your router!
Further recommendations on practices are described in
an EATON white paper „Cybersecurity considerations for
electrical distribution systems" , which can be downloaded
as a PDF file with a search engine under the search term
„WP152002EN" .
24
Mounting- and Operating Instruction Eaton LoadStar-S JSB 40071860396 March 2021 www.ceag.de

Advertisement

Table of Contents
loading

Table of Contents