SI-Ethernet User Guide 201Issue: 3Safetyinformation Introduction MechanicalinstallationElectricalinstallation Getting started Parameters Key featuresand ProtocolsPC ToolsApplications Security Diagnostics Glossary ofterms Index9 Security9.1 IntroductionOn open networked systems it is important that security is considered. Security covers aspectssuch as access to devices using passwords, network infrastructure, company procedures andbackup procedures.The physical system security should be enforced with acceptable user policies and appropriateemployee guidelines.9.2 General site security issues9.2.1 Connecting your computerIt is important to remember that when connecting your computer to an existing network you willhave an impact on the data and services on that network. Particular care should be taken not tointerrupt the flow of data by disconnecting cables, powering down switches/routers, or interruptingdata flow by sending large amounts of data over the network.9.2.2 Virus considerationsConnecting your computer to a network carries the risk of transferring computer viruses to othercomputers on that network. It is vital that when connecting to a network you ensure that your anti-virus software is up to date and activated. Many operating system vendors offer regular productupdates to increase stability and reduce the risk of malicious programs causing damage to yourcorporate infrastructure.9.2.3 Firewall issuesWhen a high level of security is required between the automation network and the businessnetwork a firewall should be used. This helps prevent unwanted traffic passing between thenetworks and can be used to restrict access to certain machines or users.9.3 Default restrictionsBy default, all supported protocols are available. This can be changed using the relevant protocolmenu.The use of a quality anti-virus solution on any networked system is recommended. Theoverall network security policy resides with the network administrators and any connec-tions to a network should be approved by the network administrators.Some managed switches provide control methods for network traffic, however a firewalloffers significantly more features. Configuration of a switch or firewall is beyond thescope of this document.NOTENOTE