1 Introduction
Checklist
Article ID: 109745536, V2.0, 05/2022
5
©
S
iem
e
n
s A
G
2
0
2
2
A
ll r
igh
ts
re
se
rv
e
d
1
Introduction
1.1
Overview
Background
SCALANCE devices have a wide range of functions and specifications. These
devices are often integrated into IT infrastructure with default settings unchanged
or unused features left active.
There is a risk that unauthorized users could access the modules and cause
damage.
To prevent unauthorized access over the network and thereby improve the
operational security of SCALANCE devices, please note the following security-
related settings:
•
Disable unused protocols
•
Only allow write-protected access
•
Change the default password
•
Set up encryption
Motivation
The checklist in this overview document will support you when preparing
SCALANCE devices.
It guides you through the various functions of SCALANCE devices and gives you
some general recommendations for parameter assignment.
This checklist will help you prepare SCALANCE devices for operation without
omitting any important settings.
Document contents
Topics covered in the checklist include:
•
Latest firmware
•
Time synchronization
•
Unencrypted protocols
•
Secure FTP
•
Passwords
•
PROFINET
•
HTTPS certificates and SSH keys
•
Dynamic Configuration Protocol (DCP)
•
Quality of service
– Traffic-shaping
•
Redundancy
•
Wireless LAN
•
Configuration backup
•
Scheduled restart and Trial Mode
•
Additional settings