Device security
2.4
Choice of a secure installation location
26
UM Security BRS-2A
Release
8.7
05/2022
2.4
Choice of a secure installation location
Refer to the user manual "Installation" for a suitable physical installation location. Select an
installation location that in addition offers appropriate device security by restricting physical access.
Check that the following device security requirements are fulfilled if needed:
Install the device in a room that can be locked and where only authorized personnel have
access.
Install the device in a cabinet to which only authorized personnel have access.
Install the device in a cabinet with an opaque door
(see on page 38 “Restrict physical (visual)
access to the device and port LEDs”)
.
2.4.1
Device availability requirements
Device availability can be an important base for the security of the superordinate system.
Therefore, also consider implementing measures that increase device availability.
Check that the following device availability requirements are fulfilled if needed:
Provide redundant power supply
(see on page 26 “Power supply redundancy requirements”)
Provide an adequate power budget
(see on page 26 “Power supply power budget
Provide data link redundancy
(see on page 26 “Data link redundancy requirements”)
Power supply redundancy requirements
Check that the power supply redundancy requirements are fulfilled if needed:
The device is powered by 2 redundant power sources.
The power supply cables to the device run along different paths as far as possible.
The power supplies themselves are powered in a redundant way, for example, by 2 separate
mains cables.
The mains cables to the redundant power supplies run along different paths.
Power supply power budget requirements
Refer to the user manual "Installation" for the power requirements of the device. Check that the
power requirements are fulfilled if needed:
One single power supply is able to deliver power for all the connected devices.
One single power supply is also able to deliver the configured PoE or PoE+ power.
Data link redundancy requirements
Check that the data link redundancy requirements are fulfilled if needed:
The device has redundant data links where needed (typically for uplinks).
The cabinet or room has redundant data links when needed.
The redundant data links of the cabinet or the room run along different paths.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......