EasyManuals Logo

Siemens SCALANCE W760 Series User Manual

Siemens SCALANCE W760 Series
51 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #7 background imageLoading...
Page #7 background image
SCALANCE W760/W720
Operating Instructions, 07/2020, C79000-G8976-C322-12
7
Security recommendations
2
To prevent unauthorized access, note the following security recommendations.
General
You should make regular checks to make sure that the device meets these
recommendations and/or other security guidelines.
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products (https://www.industry.siemens.com/topics/global/en/industrial-
security/pages/default.aspx).
When the internal and external network are disconnected, an attacker cannot access
internal data from the outside. Therefore, operate the device only within a protected
network area.
For communication via non-secure networks use additional devices with VPN functionality
to encrypt and authenticate the communication.
Terminate management connections correctly (WBM. Telnet, SSH etc.).
Physical access
Restrict physical access to the device to qualified personnel.
The memory card or the PLUG (C-PLUG, KEY-PLUG, security PLUG) contains sensitive
data such as certificates, keys etc. that can be read out and modified.
Software (security functions)
Keep the firmware up to date. Check regularly for security updates of the product.
You will find information on this on the Internet pages "Industrial Security
(https://www.siemens.com/industrialsecurity)".
Inform yourself regularly about security advisories and bulletins published by Siemens
ProductCERT (https://www.siemens.com/cert/en/cert-security-advisories.htm).
Only activate protocols that you really require to use the device.
Use the security functions such as address translation with NAT (Network Address
Translation) or NAPT (Network Address Port Translation) to protect receiving ports from
access by third parties.
Restrict access to the device with a firewall or rules in an access control list (ACL -
Access Control List).
If RADIUS authentication is via remote access, make sure that the communication is
within the secured network area or is via a secure channel.
The option of VLAN structuring provides good protection against DoS attacks and
unauthorized access. Check whether this is practical or useful in your environment.

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Siemens SCALANCE W760 Series and is the answer not in the manual?

Siemens SCALANCE W760 Series Specifications

General IconGeneral
BrandSiemens
ModelSCALANCE W760 Series
CategoryWireless Access Point
LanguageEnglish

Related product manuals