SIMATIC RF185C, RF186C, RF188C, RF186CI, RF188CI
Operating Instructions, 04/2020, C79000-G8976-C512-03
9
Security recommendations
2
To prevent unauthorized access, observe the following security recommendations when
working with the communication module and WBM (Web Based Management).
General
●
Check regularly that the device complies with these recommendations and/or other
internal security policies.
●
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
●
Do not connect the device directly to the Internet. Operate the device within a protected
network area.
Physical access
●
Restrict physical access to the device to qualified personnel.
●
Lock unused physical ports (e.g. Ethernet ports) on the device. Unused ports can be used
to access the system without authorization.
Software (security functions)
●
Keep the software up to date. Keep yourself informed regularly about safety updates for
the product.
You can find information about this at Link: (
https://www.siemens.com/industrialsecurity
●
Activate only protocols that you actually need to use the device.
●
Limit access to the device using a firewall or rules in an access control list (ACL).
●
The configuration files are available in XML format for simple use. Make sure that the
configuration files outside the device are suitably protected. You can, for example,
encrypt the files, store them at a safe location and transfer them only via secure
communication channels.