Siemens OSM User Manual Page 8

  • Download
  • Add to my manuals
  • Print
  • Page
    / 158
  • Table of contents
  • TROUBLESHOOTING
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 7
Preface
iv
Industrial Ethernet OSM/ESM Network Management
C79000-G8976-C137-08
Audience
This manual is intended for persons with the qualifications required for installation,
operation, and programming of the described product.
If you want to control the OSM/ESM using Web-Based Management, you must be
familiar with the basic functions of an Internet browser and be capable of making
changes to the browser settings. You will find information on the settings required
in Web browsers in the appendix to this manual. It is also assumed that you are
already familiar with the functions of the OSM/ESM as described in the OSM/ESM
manual /1/.
If you want to access the OSM/ESM from a management station using SNMP or
want to use remote monitoring (RMON), it is assumed that you are familiar with
operating the management station (for example, HP Open View or SNMPc from
Castle Rock) and that you know the basic mechanisms of SNMP and Ethernet
switching.
Personnel Qualification Requirements
Only qualified personnel should be allowed to install and work on this equipment .
Qualified personnel as referred to in the operating instructions or in the warning
notes are defined as persons who are familiar with the installation, assembly,
startup and operation of this product and who possess the relevant qualifications
for their work, e.g.:
S Training in or authorization for connecting up, grounding or labeling circuits and
devices or systems in accordance with current standards in safety technology;
S Training in or authorization for the maintenance and use of suitable safety
equipment in accordance with current standards in safety technology;
S First Aid qualification.
Possible Security Risks on Standard IT Interfaces
In various SIMATIC NET components such as OSM/ESM, a wide range of
parameter assignment and diagnostic functions (for example Web Server, Network
Management) are available over open protocols and interfaces. The possibility of
unauthorized misuse of these open protocols and interfaces by third parties, for
example to manipulate data, cannot be entirely excluded.
When using the functions listed above and these open interfaces and protocols (for
example, SNMP, HTTP, Telnet), you should take suitable security measures to
prevent unauthorized access to the components and the network particularly from
within the WAN/Internet.
Page view 7
1 2 3 4 5 6 7 8 9 10 11 12 13 ... 157 158

Comments to this Manuals

No comments