![ABB MTQ22-FBP.0 Скачать руководство пользователя страница 4](http://html.mh-extra.com/html/abb/mtq22-fbp-0/mtq22-fbp-0_manual_2750004.webp)
—
Cyber security
Disclaimer
This product is designed to be connected and to communicate information and data via a network interface.
It is your sole responsibility to provide and continuously ensure a secure connection between the product and your network
or any other network (as the case may be) and to establish and maintain appropriate measures (including, but not limited to,
the installation of firewalls, application of authentication measures, encryption of data, installation of anti virus programs,
etc) to protect the product, the network, its system and interfaces against any kind of security breaches, unauthorized
access, interference, intrusion, leakage and/or theft of data or information.
ABB Ltd and its affiliates are not liable for damages and/or losses related to such security breaches, unauthorized access,
interference, intrusion, leakage and/or theft of data or information.
Although ABB provides functionality testing on the products and updates that we release, you should institute your own
testing program for any product updates or other major system updates (to include but not limited to code changes,
configuration file changes, third party software updates or patches, hardware change out, etc) to ensure that the security
measures that you have implemented have not been compromised and system functionality in your environment is as
expected.
For more information or contact details regarding ABB cyber security, go to http://www.abb.com/cybersecurity
Deployment guideline
This device must be connected only to
a private/restricted network and not to any public networks
.
When connecting MTQ22-FBP.0 to public networks, security measures must be taken to reduce the cyber security risks. Such
measures are not provided by the MTQ22-FBP.0 device: "external equipment“ is needed.
This private/restricted network can be connected for access via Internet or other network when using
“external equipment”
which can be separated devices or devices that combine
firewall, router and secure VPN functionality
. The cyber security
standard of these external equipment depends on the customer and the targeted security level.
This “Cyber Security Deployment” guideline cannot suggest concrete products for
“external equipment”
to make a secure system setup. This must be decided in the context of the specific project, requirements and
existing infrastructure.
4
U N I V ER S A L M OTO R CO N T R O L L ER U M C 10 0. 3 |
MTQ2 2- FB P.0 MODBUS TCP M A N UA L