Our Brands

Welcome to the Schneider Electric Website

Welcome to our website.
		
How can we help you today?
You are currently viewing the content available in Vietnam. If you are looking for information for another region, please select the correct country from the top-left dropdown in the page and 'Navigate to Browse FAQs' in the Support menu.
General Security Recommandations - Easergy Sepam series
We strongly recommend the following industry cybersecurity best practices such as:
  • Configure IP Access Control List and restrict connection to the devices *
  • Locate control and remote devices behind firewalls, and isolate them from the business network.
  • Physical controls should be in place so that no unauthorized person would have access to the ICS, peripheral equipment or the ICS
  • All Settings software should be kept in locked cabinets and should have restricted connection to network for the devices that it is intended.
  • Laptops that have connected to any other network besides the intended network should never be allowed to connect to the  control networks without proper sanitation.
  • Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the any untrusted network.
To minimize network exposure, it is recommended to define strong hardening rules in Network Devices like Disable Unused Services and port, use Least privilege principal, configure Access control list and port filtering, enable log and monitoring functionalities

*To configure Access control List at Device level use the IP filtering features in the SEPAM, ACE850 Advanced Parameters.

Schneider Electric Vietnam

You are currently viewing the content available in Vietnam. If you are looking for information for another region, please select the correct country from the top-left dropdown in the page and 'Navigate to Browse FAQs' in the Support menu.
General Security Recommandations - Easergy Sepam series
We strongly recommend the following industry cybersecurity best practices such as:
 
  • Configure IP Access Control List and restrict connection to the devices *
  • Locate control and remote devices behind firewalls, and isolate them from the business network.
  • Physical controls should be in place so that no unauthorized person would have access to the ICS, peripheral equipment or the ICS
  • All Settings software should be kept in locked cabinets and should have restricted connection to network for the devices that it is intended.
  • Laptops that have connected to any other network besides the intended network should never be allowed to connect to the  control networks without proper sanitation.
  • Minimize network exposure for all control system devices and/or systems, and ensure that they are not accessible from the any untrusted network.
To minimize network exposure, it is recommended to define strong hardening rules in Network Devices like Disable Unused Services and port, use Least privilege principal, configure Access control list and port filtering, enable log and monitoring functionalities

*To configure Access control List at Device level use the IP filtering features in the SEPAM, ACE850 Advanced Parameters.

Schneider Electric Vietnam

Explore more
Range:
Explore more
Range:
Users group

Discuss this topic with experts

Visit our community and get advice from experts and peers on this topic and more
Users group

Discuss this topic with experts

Visit our Community for first-hand insights from experts and peers on this topic and more.
Explore more
Range:
Explore more
Range:

Need help?

  • Start here!

    Find answers now. Search for a solution on your own, or connect with one of our experts.

  • Contact Support

    Reach out to our customer care team to receive more information, technical support, assistance with complaints and more.

  • Where to buy?

    Easily find the nearest Schneider Electric distributor in your location.

  • Search FAQs

    Search topic-related frequently asked questions to find answers you need.

  • Contact Sales

    Start your sales inquiry online and an expert will connect with you.

I'd like to receive news and commercial info from Schneider Electric and its affiliates via electronic communication means such as email, and I agree to the collection of information on the opening and clicks on these emails (using invisible pixels in the images), to measure performance of our communications and improve them. For more details, please read our Privacy Policy.

  • Products Documentation
  • Software Downloads
  • Product Selector
  • Product Substitution and Replacement
  • Help and Contact Center
  • Find our Offices
  • Get a Quote
  • Where to buy
  • Company Profile
  • Report a misconduct
  • Accessibility
  • Investors
  • EcoStruxure
  • Job Search
  • Blog
  • Privacy Policy
  • Cookie Notice
  • Terms of use
  • Change your cookie settings
Your browser is out of date and has known security issues.

It also may not display all features of this website or other websites.

Please upgrade your browser to access all of the features of this website.

Latest version for Google Chrome, Mozilla Firefox or Microsoft Edgeis recommended for optimal functionality.