User guide
40 MDX-ETHERNET User Guide
www.leroy-somer.com Issue : a
11 Security
11.1 Introduction
On open networked systems it is important that security is considered. Security covers
aspects such as access to devices using passwords, network infrastructure, company
procedures and backup procedures.
The physical system security should be enforced with acceptable user policies and
appropriate employee guidelines.
11.2 General site security issues
11.2.1 Connecting your computer
It is important to remember that when connecting your computer to an existing network
you will have an impact on the data and services on that network. Particular care should
be taken not to interrupt the flow of data by disconnecting cables, powering down
switches/routers, or interrupting data flow by sending large amounts of data over the
network.
11.2.2 Virus considerations
Connecting your computer to a network carries the risk of transferring computer viruses
to other computers on that network. It is vital that when connecting to a network you
ensure that your anti-virus software is up to date and activated. Many operating system
vendors offer regular product updates to increase stability and reduce the risk of
malicious programs causing damage to your corporate infrastructure.
11.2.3 Firewall issues
When a high level of security is required between the automation network and the
business network a firewall should be used. This helps prevent unwanted traffic passing
between the networks and can be used to restrict access to certain machines or users.
11.3 Default restrictions
By default, access to the drive over Ethernet is set to read/write access. By default, all
services are available. This can be changed using Pr 15.36 (please see section 13.4
Disable full write access with acyclic for more information).
11.3.1 Disable Full Access
The global write enable Pr 15.36 is set to 0 (disabled) by default. This will allow
parameters to be changed within the drive. To prevent changes to drive parameters over
Ethernet web pages or modbus acyclic, Pr 15.36 should be set to a 1 (Enabled).
LEROY-SOMER recommend the use of a quality anti-virus solution on any networked
system. The overall network security policy resides with the network administrators and
any connections to a network should be approved by the network administrators.
NOTE
Some managed switches provide control methods for network traffic, however a firewall
offers significantly more features. Configuration of a switch or firewall is beyond the
scope of this document.
NOTE