3 Introduction to configuration and
commissioning
3.1 Security and write protection
The transmitter has several features that can help to protect it against intentional or unintentional access and
configuration changes.
•
When locked, the mechanical lock switch on the front of the display prevents any configuration changes
to the transmitter from any local or remote configuration tool. A transmitter without a display does not
have a lock switch.
•
When enabled, the software setting
Write Protection
prevents any configuration changes. The setting
can only be enabled if the transmitter does not have a display.
•
If the Universal Service Port (USP) is disabled, the port cannot be used by any service tool to communicate
with or make changes to the transmitter.
•
When used, the
HART Lock
prevents any changes by any other HART master.
•
When enabled,
Security
prevents any configuration changes being made from the display unless the
appropriate password is entered.
3.1.1 USP security
This transmitter is equipped with a Universal Service Port (USP) that works with USB type A connections,
including compatible flash drives. There are multiple levels of security built into the transmitter's service port
that you can configure according to your needs and security standards.
The service port offers the following features that enhance interface security:
•
The service port is inaccessible without physical access to the transmitter and requires removal of the
terminal cover
•
The service port can be disabled from the transmitter through software
•
The transmitter has a non-traditional operating system that is not designed to execute programs or run
scripts
•
The display can be password protected to limit access to the USB file menu
•
Overall transmitter security switches such as the lock switch or write-protection disallows configuration
changes from all interfaces including the USP
This transmitter:
•
Was designed to be implemented in an industrial automation control system (Level 1 and Level 2 of the
Purdue Reference Architecture Model), with defense in depth security controls
•
Is not intended to be directly connected to an enterprise or to an internet-facing network without a
compensating control in place
Configuration and Use Manual
Introduction to configuration and commissioning
MMI-20025166
March 2019
Configuration and Use Manual
19