182 SI-Ethernet User Guide
Issue: 1
9 Security
9.1 Introduction
On open networked systems it is important that security is considered. Security covers
aspects such as access to devices using passwords, network infrastructure, company
procedures and backup procedures.
The physical system security should be enforced with acceptable user policies and
appropriate employee guidelines.
9.2 General site security issues
9.2.1 Connecting your computer
It is important to remember that when connecting your computer to an existing network
you will have an impact on the data and services on that network. Particular care should
be taken not to interrupt the flow of data by disconnecting cables, powering down
switches/routers, or interrupting data flow by sending large amounts of data over the
network.
9.2.2 Virus considerations
Connecting your computer to a network carries the risk of transferring computer viruses
to other computers on that network. It is vital that when connecting to a network you
ensure that your anti-virus software is up to date and activated. Many operating system
vendors offer regular product updates to increase stability and reduce the risk of
malicious programs causing damage to your corporate infrastructure.
9.2.3 Firewall issues
When a high level of security is required between the automation network and the
business network a firewall should be used. This helps prevent unwanted traffic passing
between the networks and can be used to restrict access to certain machines or users.
9.3 Default restrictions
By default, all supported protocols are available. This can be changed using the
relevant protocol menu.
The use of a quality anti-virus solution on any networked system is recommended. The
overall network security policy resides with the network administrators and any connec-
tions to a network should be approved by the network administrators.
Some managed switches provide control methods for network traffic, however a firewall
offers significantly more features. Configuration of a switch or firewall is beyond the
scope of this document.