Security; Ip Filter - Mitsubishi Electric MELSEC iQ-R Series User Manual

Hide thumbs Also See for MELSEC iQ-R Series:
Table of Contents

Advertisement

1.4

Security

Security for the network environment is structured by restricting access by each communication path to the CPU module. The
following two access restriction methods can be used.
Page 66 IP filter
Page 68 Remote password

IP filter

Identifies the IP address of the access source, and prevents unauthorized access.
By setting the IP address of the access source using the engineering tool, IP packets are allowed or blocked. (Allows or
blocks the IP packets received from the access source. IP packets sent from the own station are ignored.)
Use of this function is recommended when using in an environment connected to a LAN line.
No.0
When the "Allow" IP addresses are set to 192.168.1.1 and 192.168.1.2 using the IP filter of the master station No.0:
Only the Ethernet device (1) and device station No.1 can access the master station, and the Ethernet device (2) and device station No.2 cannot access the
master station.
This function cannot be used when accessing via a network other than Ethernet or CC-Link IE TSN.
The IP filter is one method of preventing unauthorized access (such as a program or data destruction) from an
external device. It does not completely prevent unauthorized access. To maintain the security (confidentiality,
integrity, and availability) of the programmable controller and the system against unauthorized access, denial-
of-service (DoS) attacks, computer viruses, and other cyberattacks from external devices, take appropriate
measures such as firewalls, virtual private networks (VPNs), and antivirus solutions.
Our company is not responsible for any problems that occur in the programmable controller and system due to
a DoS attack, unauthorized access, computer virus, or other cyberattacks.
Examples of measures for unauthorized access are given below.
• Install a firewall or VPN.
• Install a personal computer as a relay station, and control the relay of send/receive data with an application
program
• Install an external device for which the access rights can be controlled as a relay station (Contact the
network service provider or equipment dealer for details on the external devices for which access rights can
be controlled.)
1 FUNCTIONS
66
1.4 Security
(1) 192.168.1.1
Switching hub
No.1
192.168.1.2
(2) 192.168.1.5
No.2
192.168.1.3

Advertisement

Table of Contents
loading

This manual is also suitable for:

Rd78g4Rd78g8Rd78g16Rd78g32Rd78g64Rd78ghv ... Show all

Table of Contents