background image

SMARTVFD SECURITY GUIDE

31-00140—01

2

strongly that you consider reliable power for the 
SmartVFD control system. System reliability is an 
important security issue and following these requirements 
and recommendations allows continuous monitoring and 
ensures HVAC control system reliability.

IT Network

Typically a static IP address is used for accessing the 
BACnet/IP to MS/TP router. Refer to your user manual to 
access the configuration menu in the MS/TP router.

See additional notes in “APPENDIX 1 - IT NETWORK 
NOTES” on page 3.

See additional notes in “APPENDIX 4 - SMARTVFD PC 
SECURITY INFORMATION” on page 4 for Installation 
Security Issues.

Lon/ BACnet/Modbus/N2 
Communications Bus 

It is required that physical security access to SMARTVFD 
communications bus wiring be accomplished by:

1.

Installing wiring in physically inaccessible locations 
that restricts physical access to the Lon or BACnet 
communications bus.

Or

2.

Installing wire in conduit.

This required physical security access protection is 
important to prevent security threats to the control 
system. Failure to protect the Communication bus can 
lead to critical security issues. For example, data loss or 
corruption could result due to not following the required 
protection for the Lon or BACnet communication bus.

See “APPENDIX 2 - INSTALLATION BEST PRACTICES” on 
page 3.

Secure and Unique Passwords 

User-level parameter access to the SmartVFD via the 
keypad can be restricted to monitoring only through the 
use of an access code settable on the keypad, parameter 
P8.1 and P8.2.

Access to the SmartVFD directly by PC via the Drive Care 
Tool software (and the HVFDCDMCA hardware kit) 
requires no password.

Any PC application accessing the SmartVFD via the BMS 
or router should be protected with a robust password. 

See “APPENDIX 3 - SECURITY MAINTENANCE TASKS” on 
page 3.

PCs used to access the SmartVFD

Each PC used for accessing the SmartVFD either via the 
HVFDCDMCA kit and Drive Care Tool or remotely via a 
communication bus or ethernet must be protected as a 
secure platform. Maintaining a secure client platform will 
involve OS updates, anti-virus software, and protection of 
local ports from attacks including spam, phishing, and 
physical compromise.

See “APPENDIX 4 - SMARTVFD PC SECURITY 
INFORMATION” on page 4 for Installation security issues. 

See “APPENDIX 5 - FIREWALL AND NETWORK 
INTRUSION ISSUES” on page 6 for PC security 
information.

See “APPENDIX 6 - HARDENING AND COMPUTER 
ISSUES” on page 7.

MAINTENANCE

This sections contains information for maintaining the 
SMARTVFD system.

Make sure SmartVFD clients (PCs) are running up to date 
virus software and comply with Corporate PC security 
standards.

The Gateway is associated with the building during 
commissioning and should be inspected periodically for 
connection. If there is no connection, the connection 
issues should be resolved in a timely manner.

DECOMMISSIONING

This section contains information for maintaining the 
SmartVFD system.

There is no specific process for decommissioning the 
SmartVFD. Simply shutting it off or physically removing 
the wiring to the device will remove the SmartVFD from the 
system.

Summary of Contents for SmartVFD

Page 1: ...scribed and used by the SmartVFD The SmartVFD has multiple communication protocol options Typically only one communication protocol is chosen to interface with the SmartVFD in any given installation SYSTEM DESIGN AND PLANNING This section contains information on activities that need to happen when the system is being planned by the contractor Physical Security of Components It is important to have...

Page 2: ...rough the use of an access code settable on the keypad parameter P8 1 and P8 2 Access to the SmartVFD directly by PC via the Drive Care Tool software and the HVFDCDMCA hardware kit requires no password Any PC application accessing the SmartVFD via the BMS or router should be protected with a robust password See APPENDIX 3 SECURITY MAINTENANCE TASKS on page 3 PCs used to access the SmartVFD Each PC...

Page 3: ...ion best practices for SmartVFD SMARTVFD Communication Bus Lon BACnet MS TP etc Security of the bus also means that the bus is electrically reliable for communications It is important the bus is installed with one wire type consistent throughout the whole gateway to controller connection as to eliminate reflections from bus wire impedance mismatches Shielded wire is not recommended for normal inst...

Page 4: ...est real time protection for your system Configure the virus scanner to run on demand scans during regular scheduled maintenance to catch any malicious files or programs which may be dormant on the computer Configure both on access and on demand scanning to Scan the boot sectors of all disks Move infected files to a quarantine directory and notify the user that an infected file was found Allow the...

Page 5: ...tronger password that is also easier for the user to remember For example My dog Fido has 50 fleas is a much stronger password and much easier to remember than X 9d8oc Ek Enforce password history set to 24 passwords remembered This prevents reuse of the same password too quickly Password must meet complexity requirements set to enabled improves encryption and makes guessing harder Suggest requirin...

Page 6: ...will reject any incoming connections by default Exceptions must be put into the firewall to allow incoming connections to succeed If not manually configured on first usage the Windows firewall will prompt the user to add a firewall exception Use the following configuration settings The firewall is on The firewall is on for all network locations Home or work Public or Domain The firewall is on for ...

Page 7: ...accessible fit locks or remove the DVD drives Disable unused USB ports to prevent USB drives or other uncontrolled devices from being connected to the system Such devices may be used to introduce a virus or other malware Also disable or physically protect the power button to prevent unauthorized use Set the BIOS to boot only from the operating system s root partition drive Set a BIOS password ensu...

Page 8: ... M S 01 18 Printed in United States By using this Honeywell literature you agree that Honeywell will have no liability for any damages arising out of your use or modification to the literature You will defend and indemnify Honeywell its affiliates and subsidiaries from and against any liability cost or damages including attorneys fees arising out of or resulting from any modification to the litera...

Reviews: