Configuration, programming
4.1 Security recommendations
CP 1543-1
Operating Instructions, 12/2019, C79000-G8976-C289-08
33
Protocols
Secure and non-secure protocols
●
Only activate protocols that you require to use the system.
●
Use secure protocols when access to the device is not prevented by physical protection
measures.
●
Deactivate DHCP at interfaces to public networks such as the Internet, for example, to
prevent IP spoofing.
Table: Meaning of the column titles and entries
The following table provides you with an overview of the open ports on this device.
●
Protocol / function
Protocols that the device supports.
●
Port number (protocol)
Port number assigned to the protocol.
●
Default of the port
–
Open
The port is open at the start of the configuration.
–
Closed
The port is closed at the start of the configuration.
●
Port status
–
Open
The port is always open and cannot be closed.
–
Open after configuration
The port is open if it has been configured.
–
Open (login, when configured)
As default the port is open. After configuring the port, the communications partner
needs to log in.
–
Open with block call
The port is only opened when a suitable program block is called.
●
Authentication
Specifies whether or not the protocol authenticates the communications partner during
access.
Protocol /
function
Port number (pro-
tocol)
Default of the port Port status
Authentication
DCP
93 (UDP)
Open
Open
No
S7 and online
connections
102 (TCP)
Open
Open *
No