EasyManua.ls Logo

Belden HIRSCHMANN HiOS-2A - Impact of Device Requirements on System Planning; Secure Installation Location

Belden HIRSCHMANN HiOS-2A
66 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Security planning
1.4
Impact of device requirements on system planning
18
UM Security BRS-2A
Release
8.7
05/2022
1.4 Impact of device requirements on system planning
Some requirements of the device have an impact on the system lifecycle phases, in particular on
system planning.
Topics of this interdependence include:
A secure installation location, including the aspects:
Device availability: Power supply, power budget, and data link redundancy
Properties of the USB port
Properties of the Signal Contact
Properties of the Digital Input
Device and port LEDs
The detailed physical device security requirements
The user account policy parameters the device offers:
For the login policy
For the password policy
For the user name and access role policy
For the SNMPv3 authentication and encryption type, and password policy
VLAN ID restrictions arising from certain redundancy protocols: VLAN IDs ≥2 for payload traffic
and device management
Note: These topics are covered in more detail (see on page 23 “Device security”).
1.4.1 Secure installation location
Refer to the user manual "Installation" for a suitable physical installation location.
Select a location that in addition offers appropriate device security by restricting physical access:
Install the device in a room that can be locked and where only authorized personnel have
access.
Install the device in a cabinet to which only authorized personnel have access.
Install the device in a cabinet with an opaque door (see on page 19 “Device and port LEDs”).
Device availability
Device availability can be an important base for the security of the superordinate system.
Therefore, check that the following device availability requirements are met as needed:
Provide redundant power supply
Provide an adequate power budget (device and PoE)
Provide data link redundancy
Signal Contact
If you plan to use the Signal Contact, consider the following security aspects:
To help protect the device, connect the Signal Contact only to a circuit that meets the device
requirements.
To help protect your system, connect the Signal Contact only to circuits that do not have explicit
security or safety requirements.

Table of Contents

Related product manuals