
9 Further Notes on Operation
B−70
CP 343-1 Advancedfor Industrial Ethernet / Manual Part B
Release 06/2008
C79000-G8976-C202-04
9.10 Possible security gaps on standard IT interfaces:
preventing illegal access
With various SIMATIC NET components, such as switches, a wide range of
parameter assignment and diagnostic functions (for example, Web servers,
network management) are available over open protocols and interfaces. The
possibility of unauthorized misuse of these open protocols and interfaces by third
parties, for example to manipulate data, cannot be entirely excluded.
When using the functions listed above and these open interfaces and protocols (for
example, SNMP, HTTP), you should take suitable security measures to prevent
unauthorized access to the components and the network particularly from within
the WAN/Internet.
Notice
We expressly point out that automation networks must be isolated from the rest of
the company network by suitable gateways (for example using tried and tested
firewall systems). We do not accept any liability whatsoever, whatever the legal
justification, for damage resulting from non-adherence to this notice.
If you have questions on the use of firewall systems and IT security, please contact
your local Siemens office or representative. You will find the address in the
SIMATIC catalog IK PI or on the Internet at
http://www.automation.siemens.com/net > Contact & Partners > Local
Partners.
9.11 Interface in the user program
9.11.1 Programmed communication connections with FB55
IP_CONFIG (PROFINET interface)
Downloading the configuration using FB55
FB55 allows program-controlled transfer of the configuration data.
Note
If the CP is in PG STOP mode, the configuration is downloaded using FB55; the
CP then changes automatically to RUN.
Komentáře k této Příručce