User Manual
2 | 28
A6V11917735_en_b_41
Table of Contents
About This Document ................................................................................. 3
Applicable Documents ...........................................................................................4
Download Center ...................................................................................................4
Technical Terms and Abbreviations .......................................................................6
Acknowledgements ...............................................................................................9
Document Revision History ..................................................................................10
1 Cybersecurity Guidelines Reference ................................................... 11
2 System Security .............................................................................. 12
2.1 Protected System Configuration .................................................................13
2.1.1 Zone Boundary Protection...........................................................13
2.1.2 Access Through Untrusted Networks ..........................................15
2.2 Installation/Commissioning ........................................................................16
2.2.1 Security Measures ......................................................................16
2.2.2 Port Settings ...............................................................................17
2.3 Operation/Maintenance..............................................................................18
2.3.1 Maintenance of IT Components...................................................18
2.3.2 Phase out/End of Life ..................................................................18
3 Intended Operation Environment (Including Deployment Options)............ 19
3.1 Definition of Intended Operational Environment..........................................19
3.2 Isolated Network Deployment ....................................................................20
3.3 Tunneled Network Deployment ..................................................................22