EasyManua.ls Logo

Siemens SENTRON PAC4220 - 7.2 Protection Against Tampering; 7.2.1 Cybersecurity; 7.2.2 Introduction

Siemens SENTRON PAC4220
138 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
7.2 Protection against tampering
7.2.1 Cyber
security
In order to be able to operate devices of the SENTRON product group in a cybersecure manner,
it is necessary to combine the devices/applications into a cybersecure network.
The following link takes you to an application example illustrating the principles of the
network technology in which an exemplary cybersecurity con󹪝guration structure is shown.
Cybersecurity in low-voltage power distribution
Firmware update
Signed 󹪝rmware is used to ensure that the PAC4220 complies with cybersecurity
requirements.
The ECC Brainpool method with a length of 256 bits is used for secure encryption.
Each 󹪝rmware update is documented in a non-resettable logbook.
List of communication protocols for the PAC4220
Service Protocol Default port Direction Property
Web server HTTP 80 Both directions Can be changed/switched o󹪜 wit
h
(0)
Modbus T
CP TCP 502 Both directions Can be changed/switched o󹪜 with
(0)
Identi󹪝cation
Service
UDP
17008 Incoming Cannot be switched o󹪜
Identi󹪝cation
Service
UDP
17009 Outgoing Cannot be switched o󹪜
DHCP server UDP 68 Both directions Can be switched o󹪜
Time synchronization
NTP
UDP 123 Both directions Can be switched o󹪜
7.2.2 Introduction
The PA
C4220 is equipped with a range of mechanisms to protect against deliberate and
inadvertent device manipulation:
Protection against unauthorized operation
Hardware write protection
Device access control (IP allowlist)
Con󹪝gurable Modbus TCP port
Parameterizing
7.2Protection against tampering
PAC4220
88 Equipment Manual, L1V30827278B-01

Table of Contents

Related product manuals