PW7K Security Manual @Honeywell Inc i
TABLE OF CONTENTS
Chapter 1 - INTRODUCTION ...........................................................................1
Overview ...................................................................................................................................... 1
Intended Audience .................................................................................................................. 1
Related Documents ................................................................................................................ 1
Chapter 2 - Installation.................................................................................... 1
Unpacking .................................................................................................................................. 1
Installation ................................................................................................................................. 1
Securing Network Wiring ............................................................................................................ 1
Security Ethernet Network................................................................................................... 1
Securing Fieldbus Wiring ..................................................................................................... 2
Securing The Enclosure........................................................................................................ 2
Ensuring The Latest Firmware........................................................................................... 2
Normal Operations.................................................................................................................. 2
Configuration ............................................................................................................................ 3
Web Interface ............................................................................................................................ 3
Session Timer ............................................................................................................................ 3
Account and permission Management................................................................................. 3
Default User Account ............................................................................................................. 4
Unique User Account ............................................................................................................. 4
Use a unique account for each project ........................................................................... 5
Minimum Required Permissions....................................................................................... 5
Password policies........................................................................................................................... 5
Authorized IP Addresses.............................................................................................................. 6
Information Services .............................................................................................................. 6
Operations ........................................................................................................................................ 7