
Security
Operating Manual PCOM sec br2
1004534-EN-04
| 9
3
Security
3.1
General guidelines
}
Please refer to the chapter
. The product is not designed
for connecting a network to the internet.
}
Perform a risk analysis and plan the security measures carefully. If necessary, seek ad-
vice from Pilz Customer Support.
}
Please note that the product forwards ICMP Echo Request and Response packages
(ping) and ARP requests and responses between the unprotected and the protected net-
work, independent of the configuration. However, the device limits the number of pack-
ages to make flooding attacks more difficult.
}
Please report any security problems of the SecurityBridge to the following E-mail ad-
dress: [email protected]
3.2
Defense in depth
Defense in depth is a security design concept. Several different security measures to pro-
tect from attacks are arranged in series and/or in layers. An attack is made difficult because
the attacker has to circumvent different security measures one after the other. This concept
can be illustrated as follows:
Company Firewall
Production Network Firewall
SecurityBridge
PNOZmulti
PSS 4000
Fig.: DefenseInDepth
The product PCOM sec br2 secures the devices in the protected network from network-
based attacks and/or unauthorised access via the network. The product is the last layer in
the Defense in depth concept. To efficiently implement the concept, the measures de-
must be noted.