Requirement
NOTICE
Data manipulation due to inadequate protection
An inadequately protected drive makes it easier for potential attackers to access the drive data.
Data manipulation can cause the drive to malfunction or damage it.
• Only use the low security settings in exceptional cases, and only if this can be justied after
an information security risk analysis.
• Congure the security settings for the converter for full protection.
Procedure
One of the following options can be selected:
• "Congure security settings"
Comprehensive protection against data manipulation requires that security settings are
congured.
• "Continue with low security settings"
If you continue with low security settings, then UMAC is initially deactivated. We recommend
that you congure the security settings before the converter goes into operation. You can
also access the security settings via menu "Protection & Security (Page268)".
Select "Congure security settings"
Dene the settings for UMAC:
• "Activate User Management & Access Control"
If UMAC is activated, UMAC can only be deactivated by completely restoring the converter
factory settings.
You can nd more information about the full reset to factory settings in section "Full reset of
all device settings (Page777)".
• "Administrator setup"
Specify the user name and password of the administrator.
Runtime role "Drive Administrator" is assigned to the administrator.
• "Guest access conguration"
Specify the following:
– Without logging in, the user is allocated read rights.
– Without logging in, the user may acknowledge messages.
• "Web server activation"
Dene the interface to the web server:
– The factory setting to access the web server is service interface X127 with HTTPS protocol.
– It is also possible to activate PROFINET interface X150 with HTTPS protocol.
If both these interfaces are deactivated, it will not be possible to access the web server.
Commissioning (web server)
10.4Getting Started
SINAMICS G220 converter
Operating Instructions, 04/2024, FW V6.2, A5E51781573B AB 215