Note: These open interfaces provide access to those components, which can also be used for illicit activities. When using the above-mentioned functions and these open interfaces and protocols (such as SNMP, HTTP and Telnet), suitable security measures must be implemented that block unauthorized access to the components or the network especially from the WAN/Internet. Advice on the use of firewall systems and on IT security can be obtained from: Pre Sales Support CI & IID It is important to note the boundary conditions for use of the specified SIMATIC Net products (order numbers 6GK..., 6XV1) which you can view in the Internet: http://www.siemens.com/simatic-net/ik-info |
| Каталог 2018 | Каталог 2017 | Каталог 2016 | Каталог 2015 | Каталог 2014 | Каталог 2013 | Каталог 2012 | Сертификат | Контакты | Карта сайта | Поиск |


