This is my archive

Security measures – an overview

Security measures – an overview To achieve security in an automation system, a holistic approach is necessary. An adequate security concept must be drawn up that covers technologies used, the defined processes, and the people involved. Both technological and organizational measures must be taken into account. Many… Read More

Secure disposal 

Secure disposal  You must safely decommission the controller so that no sensitive, confidential and/or manufacturer-specific data and software remain on the device. Check the national GDPR (General Data Protection Regulations) to comply with and make sure that attackers can’t access confidential security information’s from the deinstalled or disposed… Read More

Configuring basic firewall settings 

Configuring basic firewall settings   For basic firewall configuration information, refer to the Firewall WBM topic in the main PLCnext Technology ‑ Info Center. Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based… Read More

Security logging 

Security logging  Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In the address field, enter the URL… Read More

Checking SD card settings 

Checking SD card settings  Note: Make sure that the Security Profile is activated before you start encrypting the SD card.  For BPC 9102S and RFC 4072S  When using a BPC 9102S or RFC 4072S, the use of an external SD card is mandatory. In a security context, you must use encrypted SD cards.  Make… Read More

Configuring TLS

Configuring TLS Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In the address field, enter the URL… Read More

Handling the Security Profile 

Handling the Security Profile  Activating the Security Profile Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In… Read More

Generating self-signed HTTPS certificates in the WBM 

Generating self-signed HTTPS certificates in the WBM  Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In the address… Read More

PLCnext environmental requirements

PLCnext environmental requirements Operating a PLCnext Control in a security context includes the following steps regarding environmental requirements:  Configuring PLCnext Engineer Checking project data integrity Configuring extended firewall settings Configuring the system time Configuring central logging Activating OPC UA Server Activating OPC UA Client Activating HMI… Read More

Assigning IP addresses 

Assigning IP addresses  Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In the address field, enter the… Read More