7.2 Protection against tampering
7.2.1 Cyber
security
In order to be able to operate devices of the SENTRON product group in a cybersecure manner,
it is necessary to combine the devices/applications into a cybersecure network.
The following link takes you to an application example illustrating the principles of the
network technology in which an exemplary cybersecurity conguration structure is shown.
Cybersecurity in low-voltage power distribution
Firmware update
Signed rmware is used to ensure that the PAC4220 complies with cybersecurity
requirements.
The ECC Brainpool method with a length of 256 bits is used for secure encryption.
Each rmware update is documented in a non-resettable logbook.
List of communication protocols for the PAC4220
Service Protocol Default port Direction Property
Web server HTTP 80 Both directions Can be changed/switched o wit
h
(0)
Modbus T
CP TCP 502 Both directions Can be changed/switched o with
(0)
Identication
Service
UDP
17008 Incoming Cannot be switched o
Identication
Service
UDP
17009 Outgoing Cannot be switched o
DHCP server UDP 68 Both directions Can be switched o
Time synchronization
NTP
UDP 123 Both directions Can be switched o
7.2.2 Introduction
The PA
C4220 is equipped with a range of mechanisms to protect against deliberate and
inadvertent device manipulation:
• Protection against unauthorized operation
• Hardware write protection
• Device access control (IP allowlist)
• Congurable Modbus TCP port
Parameterizing
7.2Protection against tampering
PAC4220
88 Equipment Manual, L1V30827278B-01