This is my archive

Configuring the system time 

Configuring the system time  Centralized security logging only makes sense if all devices have a synchronized time. NTP is already supported today. TimeServer provides all devices with the same time base. For each device you have to configure which time server it should use. Use the corresponding… Read More

Activating the App Manager

Activating the App Manager Installing apps can compromise security Before installing an app, you must perform a risk analysis of the app and its impact on the security of the device and the application, taking into account the overall security context. In particular, investigate the following effects… Read More

Activating HMI 

Activating HMI  Activating PLCnext Engineer HMI  For information on how to create a PLCnext Engineer HMI application, refer to the topic Creating a PLCnext Engineer HMI application in the PLCnext Info Center.   For information on user roles and permissions, refer to the User Authentication WBM topic in the main PLCnext Info Center.  Before you can use an… Read More

Activating PROFINET® 

Activating PROFINET®  After you have performed a threat analysis and implemented appropriate protective measures from the security context, you can activate PROFINET®. Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to… Read More

Configuring extended firewall settings 

Configuring extended firewall settings   See also the  Configuring basic firewall settings topic. For basic firewall configuration information, refer to the Firewall WBM topic in the main PLCnext Info Center. In the exemplary security context, access from the Engineering Station is only allowed via the extension module from the superordinate network. … Read More

Activating software updates 

Activating software updates  Central software updates will be possible via the Device and Update Management Service. You must first activate the service on the System Services page in the WBM. Log in to the WBM. Return to topicHow do I get to the WBM again? Click… Read More

Activating OPC UA Client

Activating OPC UA Client To activate OPC UA Client, proceed as follows:  Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser on your… Read More

Perform backup and restore

Perform backup and restore To perform a backup and restore in this security context, use the PLCnext Security Backup app. You can get the app via the PLCnext Store. Note: You need admin rights to install and use the app. Backup To perform a backup, proceed… Read More

Activating OPC UA Server 

Activating OPC UA Server  To activate OPC UA Server, proceed as follows:  Log in to the WBM.  Return to topicHow do I get to the WBM again? Click here for more information…  Establishing a connection to the Web-based Management (WBM): Open a web browser… Read More

Configuring central logging 

Configuring central logging  Logging in the security context only makes sense in a network. When configuring the SysLog, you set to which higher-level server the data is sent and which data it is.  For information on basic security logging, refer to the topic Security logging.  For further… Read More