Security Configuration Recommendations
- Do not add more users than those who need access, and evaluate your system needs before granting users access to critical pages, for example, Firewall Management or Device Settings.
- Limit the number of IP addresses that have access to the Com’X.
- Do not use SHA1 certificates.
Recommended best practices for unsecure protocols
![]() |
---|
Potential compromise of system availability,
integrity, and confidentiality
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
|
Unsecure protocols | Risks | Best Practices |
SMTP |
|
For publication:
|
HTTP |
|
For network configuration:
For publication:
|
FTP |
|
For publication:
|
Modbus TCP/IP |
|
For Modbus device communications:
|