3 introduction, 1 cut & stop, 2 alarming – ADS-TEC IF1000 User Manual
Page 8: 3 eventlog, 4 display / keypad
IF1000 series
7
© ads‐tec GmbH • Raiffeisenstr.14 • 70771 Leinfelden‐Echterdingen
3 Introduction
The Industrial Firewall constitutes a link between the IT world and automation, thereby meeting the
requirements of IT security as well as those by the production line maintenance personnel. It enables monitoring
and control of the plant setup network, and of the relative access points. Its essential security protection
mechanism is constituted by the event‐dependent and physical network separation. This Firewall furthermore
offers, amongst others, a secure access in the event of service operations; it enables traffic shaping and is
capable of implementing the available virus scanners.
Note:
For the efficient online configuration of your ads‐tec devices, it is possible to download
the current version of the free tool „IDA light" on the company`s homepage
http://www.ads‐tec.de. The tool offers you for example the possibility of defining
individual parameters or whole groups of parameters at a Server device and to transfer
your settings to a limited selection and/or to all ads‐tec devices of same design and
version, without having to make these configurations time‐consuming at each individual
device. You also have the possibility of assigning sequential IP addresses for your ads‐tec
devices.
With IDA light you can comfortably provide own groups of parameters according to
your specific requirements and modify them at any time.
3.1 Cut & Stop
During critical start‐up or production phases, the Ethernet uplink can be physically disconnected i.e. via
hardware, through a 24 V input. This will safely rule out both intentional and unintentional external
manipulation.
The uplink is reconnected through the same input. This function makes integration into an automation concept
very simple.
3.2 Alarming
In the event that a rule is violated, the alarm signal is reported to the control centre through an output.
Necessary measures can be automated directly. For example, acoustic indicator lights can signal the alarm
condition.
E‐mails can be sent out automatically to signal a rules violation event.
3.3 Eventlog
A zero‐voltage event logbook with retentive memory stores all events whenever the firewall is disconnected
from the power supply (NV‐RAM option).
The event logbook can be read out either locally or via a central Syslog server.
3.4 Display / Keypad
The built‐in display can be used to configure the essential unit functions.It is thus possible to obtain a quick
system analysis, e.g. of the network load, directly from the display.
The display and keys can be password‐protected against unauthorized manipulation