Table of contents
4.5
4.5.1
Intended use ..................................................................................................................... 40
4.5.2
4.6
4.7
4.7.1
Hardening measures .......................................................................................................... 42
4.7.2
Secure configuration ......................................................................................................... 43
4.7.3
Access control ................................................................................................................... 43
4.7.4
4.7.5
Regular firmware updates .................................................................................................. 44
4.7.6
4.7.7
Data backup ...................................................................................................................... 45
4.7.8
Security checks .................................................................................................................. 45
4.7.9
Secure decommissioning ................................................................................................... 45
4.7.9.1
Securely removing data ..................................................................................................... 46
4.7.9.2
Recycling and disposal ....................................................................................................... 47
4.8
4.9
Secure operation of CPUs ................................................................................................... 48
4.9.1
Secure configuration ......................................................................................................... 48
4.9.2
4.9.2.1
4.9.2.2
4.9.2.3
Password management ...................................................................................................... 49
4.9.2.4
Setting protection levels .................................................................................................... 50
4.9.2.5
Certificate management .................................................................................................... 50
4.9.3
Protection functions .......................................................................................................... 50
4.9.4
Web API of the Web server ................................................................................................. 50
4.9.5
4.9.6
Sensitive data .................................................................................................................... 51
4.9.7
Backups and data backups ................................................................................................. 51
4.9.8
4.9.9
Remote access to CPU ........................................................................................................ 52
4.9.9.1
Using a Web server ............................................................................................................ 52
4.9.10
Recording Security events .................................................................................................. 52
4.9.11
Syslog messages ................................................................................................................ 53
4.9.11.1
4.9.11.2
4.10
4.11
5
System overview ................................................................................................................................. 63
5.1
5.1.1
Areas of application ........................................................................................................... 64
5.1.2
5.1.3
5.1.4
Scalability .......................................................................................................................... 80
5.1.5
Overview of features ......................................................................................................... 84
5.2
Configuration .................................................................................................................... 85
5.2.1
4
S7-1500R/H redundant system
System Manual, 01/2024, A5E41814787-AF