Operating Instructions, 11/2018, C79000-G8976-C290 - Siemens CM 1542-5 Operating Instructions Manual

Simatic net, profibus
Hide thumbs Also See for CM 1542-5:
Table of Contents

Advertisement

Preface
License conditions
Note
Open source software
The product contains open source software. Read the license conditions for open source
software carefully before using the product.
You will find license conditions in the following document on the supplied data medium:
● OSS_CM15425_86.pdf
Firmware
The firmware is signed and encrypted. This ensures that only firmware created by Siemens
can be downloaded to the device.
Security information
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is
necessary to implement – and continuously maintain – a holistic, state-of-the-art industrial
security concept. Siemens' products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be
connected to an enterprise network or the internet if and to the extent such a connection is
necessary and only when appropriate security measures (e.g. firewalls and/or network
segmentation) are in place.
For additional information on industrial security measures that may be implemented, please
visit
Link: (http://www.siemens.com/industrialsecurity)
Siemens' products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customers' exposure
to cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed under
Link: (http://www.siemens.com/industrialsecurity)
Observe the following security recommendations to prevent unauthorized access to the
system.
● Evaluate your plant as a whole in terms of security. Use a cell protection concept with
suitable products.
● Keep the firmware up to date. Check regularly for security updates of the firmware and
use them.
4

Operating Instructions, 11/2018, C79000-G8976-C290-04

CM 1542-5

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

S7-1500

Table of Contents