User Manual
2 | 27
A6V11917731_en_b_41
Table of Contents
About This Document ................................................................................. 3
Applicable Documents ...........................................................................................4
Download Center ...................................................................................................4
Technical Terms and Abbreviations .......................................................................5
Acknowledgements ...............................................................................................8
Document Revision History ....................................................................................9
1 Cybersecurity Guidelines Reference ................................................... 10
2 System Security .............................................................................. 11
2.1 Protected System Configuration .................................................................12
2.1.1 Zone Boundary Protection...........................................................12
2.1.2 Access Through Untrusted Networks ..........................................14
2.2 Installation/Commissioning ........................................................................15
2.2.1 Security Measures ......................................................................15
2.2.2 Port Settings ...............................................................................16
2.3 Operation/Maintenance..............................................................................17
2.3.1 Maintenance of IT Components...................................................17
2.3.2 Phase out/End of Life ..................................................................17
3 Intended Operation Environment (Including Deployment Options)............ 18
3.1 Definition of Intended Operational Environment..........................................18
3.2 Isolated Network Deployment ....................................................................19
3.3 Tunneled Network Deployment ..................................................................21