Configuration
4.1 Security recommendations
CP 1243-1
38
Operating Instructions, 04/2017, C79000-G8976-C365-03
Security functions of the product
Use the options for security settings in the configuration of the product. These includes
among others:
●
Protection levels
Configure a protection level of the CPU.
You will find information on this in the information system of STEP 7.
●
Security function of the communication
–
Enable the security functions of the CP and set up the firewall.
If you connect to public networks, you should use the firewall. Think about the services
you want to allow access to the station via public networks. By using the "bandwidth
limitation" of the firewall, you can restrict the possibility of flooding and DoS attacks.
–
Use the secure protocol variants NTP (secure) and SNMPv3.
–
Using the security functions of the telecontrol protocols.
–
Leave access to the Web server of the CPU (CPU configuration) and to the Web
server of the CP disabled.
●
Logging function
Enable the function in the security configuration and check the logged events regularly for
unauthorized access.
Passwords
●
Define rules for the use of devices and assignment of passwords.
●
Regularly update the passwords to increase security.
●
Only use passwords with a high password strength. Avoid weak passwords for example
"password1", "123456789" or similar.
●
Make sure that all passwords are protected and inaccessible to unauthorized personnel.
See also the preceding section for information on this.
●
Do not use one password for different users and systems.
Protocols
Secure and non-secure protocols
●
Only activate protocols that you require to use the system.
●
Use secure protocols when access to the device is not prevented by physical protection
measures.
–
The NTP protocol provides a secure alternative with NTP (secure) if you do not use
telecontrol communication.
–
The HTTP protocol provides a secure alternative with HTTPS when accessing the
Web server (configuration of the CPU).