User Guide
Table Of Contents
2 | 26
A6V11979532_en_b
Table of Contents
About This Document .........................................................................................3
Applicable Documents ...........................................................................................4
Download Center ...................................................................................................4
Technical Terms and Abbreviations .......................................................................5
Document Revision History ....................................................................................8
1 IT Security Notices ....................................................................................9
2 Cybersecurity Guidelines Reference ......................................................10
3 System Security Guidelines ....................................................................11
3.1 Current Software and Firmware Version Status ..........................................12
3.2 Protected System Configuration .................................................................12
3.2.1 Zone Boundary Protection...........................................................13
3.2.2 Access Through Untrusted Networks ..........................................14
3.3 Installation/Commissioning ........................................................................15
3.3.1 Security Measures ......................................................................15
3.3.2 Port Settings ...............................................................................16
3.4 Operation/Maintenance..............................................................................16
3.4.1 Maintenance of IT Components...................................................16
3.4.2 Phase out/End of Life ..................................................................16
4 Intended Operation Environment ............................................................17
4.1 Definition of Intended Operational Environment..........................................17
4.2 Isolated Network Deployment ....................................................................19
4.3 Tunneled Network Deployment ..................................................................21