TIM 1531 IRC
Operating Instructions, 02/2018, C79000-G8976-C468-02
51
Configuration
4
4.1
Security recommendations
Keep to the following security recommendations to prevent unauthorized access to the
system.
General
●
You should make regular checks to make sure that the device meets these
recommendations and other internal security guidelines if applicable.
●
Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
●
Do not connect the device directly to the Internet. Operate the device within a protected
network area.
●
Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
●
Check regularly for new features on the Siemens Internet pages.
–
You can find information on Industrial Security here:
Link: (
http://www.siemens.com/industrialsecurity
–
You can find information on security in industrial communication here:
Link: (
http://w3.siemens.com/mcms/industrial-communication/en/ie/industrial-ethernet-
security/Seiten/industrial-security.aspx
–
You can find a publication on the topic of network security (6ZB5530-1AP02-0BA5)
here:
Link:
http://w3app.siemens.com/mcms/infocenter/content/en/Pages/order_form.aspx?node
Key=key_518693&infotype=brochures
Enter the following filter: 6ZB5530
Physical access
Restrict physical access to the device to qualified personnel.
Network attachment
Do not connect the TIM directly to the Internet. If a connection of the TIM to the Internet is
required, use the security variants of the telecontol protocols or use protection mechanisms
in front of the TIM. Protection mechanisms are for example a SCALANCE M router or a
SCALANCE S security module with firewall.