6 Security
6.1 Overview
95SICAM Q100, 7KG95xx, Device Manual
E50417-H1040-C522-A6, Edition 06.2019
Deploy in a Secured Environment Only
Siemens recommends protecting network access to its energy automation products with appropriate mecha-
nisms (for example, firewalls, segmentation, VPN). It is advised to configure the environment according to the
operational guidelines in order to run the devices in a protected IT environment. You can find the recommended
security guidelines to Secure Substations in Cyber Security General Downloads -> Manuals in the following
website: http://www.siemens.com/gridsecurity.
Syslog The SICAM Q100 device supports transmitting the audit logs to a central log
server using Syslog. For more detailed information, refer to chapter 9.3.7.8.
Automatic logoutafter a
timeout of no action
If there are no actions for 20 min after the last parameter change, the paramter-
ization is released again for other users.
Modbus TCP read only When communicating via Modbus TCP, the read-only access is configurable.
For more detailed information, refer to chapter 9.3.7.2.1.
Table 6-1 Overview
Topic Description
MAN_SICAM_Q100_US.book Page 95 Wednesday, June 5, 2019 9:31 AM