WAGO 750 XTR Series System Manual page 41

Hide thumbs Also See for 750 XTR Series:
Table of Contents

Advertisement

750 XTR Series
Deliberate Influences
Use in ETHERNET Areas
ETHERNET products are designed for use in local networks. Please note the following
when using ETHERNET products in your system:
• Do not connect control components and control networks to an open network such as
the Internet or an office network.
WAGO recommends putting control components and control networks behind a fire-
wall.
• In the control components, close all ports and services (e.g., for WAGO-I/O-CHECK
and CODESYS) not required by your application to minimize the risk of cyber attacks
and to enhance cybersecurity.
Only open the ports and services for the duration of the commissioning/configuration.
• Limit physical and electronic access to all automation components to authorized per-
sonnel only.
• To reduce the risk of unauthorized access to your system, change the default pass-
words before initial commissioning.
• To reduce the risk of unauthorized access to your system, regularly change the pass-
words used.
• To verify that the measures taken meet your security requirements, regularly perform
threat analyses.
• To restrict access to and control of individual products and networks, employ a
"defense-in-depth" mechanism in your system's security configuration.
Additional documents
& Manual Cybersecurity for PFC100 / PFC200 Controllers
& White Paper Cybersecurity in Production Facilities
All the documentation and information is available at: ü www.wago.com.
Use of Cloud Services
Note
Please note the risks of using cloud services!
If you use third-party cloud services, sensitive data is transferred to the cloud service
provider on your own responsibility. External access may result in manipulated data and/
or unwanted control commands affecting the performance of your control system.
• Use encryption methods to protect your data.
• Observe the information provided by the Federal Office for Information Security –
"Cloud: Risks and Security Tips."
• Observe comparable publications of the responsible authorities of your country.
Additional information is available at: ü www.bsi.bund.de.
System manual | Version: 2.0.0
Planning
41

Advertisement

Table of Contents
loading

Table of Contents