This is my archive
Checking SD card settings Note: Make sure that the Security Profile is activated before you start encrypting the SD card. For BPC 9102S and RFC 4072S When using a BPC 9102S or RFC 4072S, the use of an external SD card is mandatory. In a security context, you must use encrypted SD cards. Make… Read More
Configuring TLS Log in to the WBM. Return to topicHow do I get to the WBM again? Click here for more information… Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In the address field, enter the URL… Read More
Handling the Security Profile Activating the Security Profile Log in to the WBM. Return to topicHow do I get to the WBM again? Click here for more information… Establishing a connection to the Web-based Management (WBM): Open a web browser on your computer. In… Read More
PLCnext Technology security hardening To use PLCnext Technology as an IEC 62443-4-1/4-2 certified component, the activation of the Security Profile is mandatory. In addition, the automation system design must fit the security context and the generic use cases described in this PLCnext Technology ‑ Security Info Center. With activated Security Profile PLCnext Technology supports the following… Read More
PLCnext starting up The starting up of a PLCnext Control in a security context includes the following steps: Checking the device Deriving IP addresses Assigning IP addresses Configuring TLS Generating self-signed HTTPS certificates in the WBM Uploading the certificate in the browser Activating the Security… Read More
Periodic security maintenance activities You must check regularly: user roles and permissions password complexity rules and password changes firewall settings all security-related settings the product download area for firmware updates the PSIRT webpage for known security vulnerabilities Security functionality verification… Read More
Example: Secured OPC UA Communication On the ‘Security’ page of the ‘OPC UA’ PLANT tree node, you can specify settings regarding certificates and authentication which must be performed successfully in order to establish a secure connection between OPC UA clients and the OPC UA server. Furthermore, you can… Read More
Secure operation The secure operation of PLCnext Control in your specific application context requires a defined procedure. You will find all necessary steps in the following sections: PLCnext starting up: Everything you need to know when starting up your PLCnext Control in a security context. PLCnext environmental requirements: All environmental… Read More
Checking project data integrity Libraries and projects in PLCnext Engineer are hashed. The hashes assigned with PLCnext Engineer are checked by PLCnext Control. This way you can verify that data is not modified, tampered with, or corrupted. When creating the project in PLCnext Engineer, a manifest file with hashes is generated. Before the project is loaded… Read More
Configuring PLCnext Engineer For information on how to use PLCnext Engineer or how to create a project, refer to the Getting started with PLCnext Engineer topic in the main PLCnext Technology ‑ Info Center. Open PLCnext Engineer. Open the project that you want to transfer to the PLCnext Control. Note: You may need to assign the correct IP… Read More