Configuration and operation 
  4.1 Security recommendations 
CP 1542SP-1, CP 1542SP-1 IRC, CP 1543SP-1 
Operating Instructions, 01/2017, C79000-G8976-C426-03 
41 
●  Make sure that all passwords are protected and inaccessible to unauthorized personnel. 
See also the preceding section for information on this. 
●  Do not use one password for different users and systems. 
Protocols 
Secure and non-secure protocols 
●  Only activate protocols that you require to use the system. 
●  Use secure protocols when access to the device is not prevented by physical protection 
measures. 
The NTP protocol provides a secure alternative with NTP (secure). 
Table: Meaning of the column titles and entries 
The following table provides you with an overview of the open ports on this device. 
● 
 
Protocols that the device supports. 
● 
 
Port number assigned to the protocol. 
● 
 
–  Open 
The port is open at the start of the configuration. 
–  Closed 
The port is closed at the start of the configuration. 
●   
 
–  Open 
The port is always open and cannot be closed. 
–  Open according to configuration 
The port is open if it has been configured. 
–  Open (login, when configured) 
As default the port is open. After configuring the port, the communications partner 
needs to log in. 
–  Closed after configuration 
The port is closed because the CP is always client for this service. 
● 
 
Specifies whether or not the protocol authenticates the communications partner during 
access.