Log Settings - Filtering Of The System Events; Vpn; Vpn (Virtual Private Network) - Siemens CP 1243-7 LTE Operating Instructions Manual

Simatic net
Table of Contents

Advertisement

4.11.5

Log settings - Filtering of the system events

Communications problems if the value for system events is set too high
If the value for filtering the system events is set too high, you may not be able to achieve the
maximum performance for the communication. The high number of output error messages
can delay or prevent the processing of the communications connections.
In "Security > Log settings > Configure system events", set the "Level:" parameter to the
value "3 (Error)" to ensure the reliable establishment of the communications connections.
4.11.6

VPN

4.11.6.1

VPN (Virtual Private Network)

VPN tunnel
Virtual Private Network (VPN) is a technology for secure transportation of confidential data in
public IP networks, for example the Internet. With VPN, a secure connection (tunnel) is set
up and operated between two secure IT systems or networks via a non-secure network.
One of the main features of the VPN tunnel is that it forwards all frames even from protocols
of higher layers (HTTP, FTP telecontrol protocols of the application layer etc.).
The data traffic between two network components is handled unrestricted through a physical
network. This allows networks to be connected together via an intermediate network.
VPN ensures information security in networked automation systems
Properties
● VPN forms a logical network that is embedded in a physical network. VPN uses the usual
addressing mechanisms of the physical network, however it transports only the frames of
the VPN subscribers and therefore operates independent of the rest of the physical
network.
● VPN allows communication of the subscribers in the VPN network with the physical
network.
● VPN is based on tunnel technology and can be configured for individual subscribers.
● Communication between the VPN partners is protected from eavesdropping or
manipulation by using passwords, public keys or a digital certificate (authentication).
Areas of application
● Local area networks can be connected together securely via the Internet ("site-to-site"
connection).
● Secure access to a company network ("end-to-site" connection)
CP 1243-7 LTE
Operating Instructions, 04/2017, C79000-G8976-C381-03
Configuration
4.11 Security
69

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

S7-1200 telecontrolCp 1243-7 lte-euCp 1243-7 lte-us

Table of Contents