Configuration
4.1 Security recommendations
CP 1243-8 IRC
56
Operating Instructions, 02/2018, C79000-G8976-C385-03
Security functions of the product
Use the options for security settings in the configuration of the product. These includes
among others:
●
Protection levels
Configure a protection level of the CPU.
You will find information on this in the information system of STEP 7.
●
Security function of the communication
–
Using the security functions of the telecontrol protocols.
–
Use the secure protocol variants for example NTP (secure) or SNMPv3.
–
Leave access to the Web server deactivated.
Passwords
●
Define rules for the use of devices and assignment of passwords.
●
Regularly update the passwords to increase security.
●
Only use passwords with a high password strength. Avoid weak passwords for example
"password1", "123456789" or similar.
●
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
See also the preceding section for information on this.
●
Do not use one password for different users and systems.
Protocols
Secure and non-secure protocols
●
Only activate protocols that you require to use the system.
●
Use secure protocols when access to the device is not prevented by physical protection
measures.
The NTP protocol provides a secure alternative with NTP (secure).
The HTTP protocol provides a secure alternative with HTTPS when accessing the Web
server.
Table: Meaning of the column titles and entries
The following table provides you with an overview of the open ports on this device.
●
Protocol / function
Protocols that the device supports.
●
Port number (protocol)
Port number assigned to the protocol.