Recommended Security Settings For Ipcs in Industrial Environments
Recommended Security Settings For Ipcs in Industrial Environments
Legal information
Use of application examples
Application examples illustrate the solution of automation tasks through an interaction of several
components in the form of text, graphics and/or software modules. The application examples are
a free service by Siemens AG and/or a subsidiary of Siemens AG (“Siemens”). They are non-
binding and make no claim to completeness or functionality regarding configuration and
equipment. The application examples merely offer help with typical tasks; they do not constitute
customer-specific solutions. You yourself are responsible for the proper and safe operation of
the products in accordance with applicable regulations and must also check the function of the
respective application example and customize it for your system.
Siemens grants you the non-exclusive, non-sublicensable and non-transferable right to have the
application examples used by technically trained personnel. Any change to the application
examples is your responsibility. Sharing the application examples with third parties or copying the
application examples or excerpts thereof is permitted only in combination with your own products.
The application examples are not required to undergo the customary tests and quality
inspections of a chargeable product; they may have functional and performance defects as well
as errors. It is your responsibility to use them in such a manner that any malfunctions that may
occur do not result in property damage or injury to persons.
Disclaimer of liability
Siemens shall not assume any liability, for any legal reason whatsoever, including, without
limitation, liability for the usability, availability, completeness and freedom from defects of the
application examples as well as for related information, configuration and performance data and
any damage caused thereby. This shall not apply in cases of mandatory liability, for example
under the German Product Liability Act, or in cases of intent, gross negligence, or culpable loss
of life, bodily injury or damage to health, non-compliance with a guarantee, fraudulent non-
disclosure of a defect, or culpable breach of material contractual obligations. Claims for damages
arising from a breach of material contractual obligations shall however be limited to the
Siemens AG 2019 All rights reserved
foreseeable damage typical of the type of agreement, unless liability arises from intent or gross
negligence or is based on loss of life, bodily injury or damage to health. The foregoing provisions
do not imply any change in the burden of proof to your detriment. You shall indemnify Siemens
against existing or future claims of third parties in this connection except where Siemens is
mandatorily liable.
By using the application examples you acknowledge that Siemens cannot be held liable for
any damage beyond the liability provisions described.
Other information
Siemens reserves the right to make changes to the application examples at any time without
notice. In case of discrepancies between the suggestions in the application examples and
other Siemens publications such as catalogs, the content of the other documentation shall
have precedence.
The Siemens terms of use (https://support.industry.siemens.com) shall also apply.
Security information
Siemens provides products and solutions with industrial security functions that support the
secure operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is necessary
to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept.
Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems,
machines and networks. Such systems, machines and components should only be connected to
an enterprise network or the Internet if and to the extent such a connection is necessary and only
when appropriate security measures (e.g. firewalls and/or network segmentation) are in place.
For additional information on industrial security measures that may be implemented, please visit
https://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more
secure. Siemens strongly recommends that product updates are applied as soon as they are
available and that the latest product versions are used. Use of product versions that are no
longer supported, and failure to apply the latest updates may increase customer’s exposure to
cyber threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS
Feed at: https://www.siemens.com/industrialsecurity.
Table of contents
Legal information ......................................................................................................... 2
1 The task .............................................................................................................. 4
2 Solution............................................................................................................... 5
2.1 Security Checklist ................................................................................. 5
2.2 Hardware and software components ................................................... 7
3 Basics ................................................................................................................. 8
3.1 Basics about the editors ....................................................................... 8
3.1.1 Editor for Local Group Policy Editor ..................................................... 8
3.1.2 Microsoft Management Console .......................................................... 9
4 Security settings for IPCs without network connection .............................. 11
4.1 User accounts and their rights ........................................................... 11
4.1.1 Differentiation between administrator and user account .................... 11
4.1.2 Operation of the SIMATIC software as a user with restricted
rights ................................................................................................... 12
Software Controller ............................................................................. 12
4.1.3 Create user account ........................................................................... 12
4.2 Detect application installation and request elevated rights with
User Account Control (UAC) .............................................................. 14
4.3 Unified Write Filters (UWF) ................................................................ 17
Siemens AG 2019 All rights reserved
4.4 Do not allow the system to shut down without logging in ................... 20
4.5 Software Restriction Guidelines - AppLocker..................................... 21
4.6 Configuring Desktop Policies and Restrictions .................................. 23
4.7 Start Menu and Taskbar - Configuring Policies ................................. 26
4.8 Strg+Alt+Del configuring .................................................................... 28
4.9 Prevent access to Control Panel ........................................................ 30
4.10 Configure removable disk access ...................................................... 31
4.11 Disable Autoplay function ................................................................... 33
4.12 Prevent removable disk access for all installations ............................ 34
4.13 Deny access to Microsoft Management Console ............................... 35
4.14 Deny access to recovery options ....................................................... 37
4.15 Deny access to paths when searching ............................................... 38
4.16 Deny access to certain or all drives ................................................... 40
5 Security settings for IPCs with networkconnection .................................... 42
5.1 Enable and configure Windows Firewall ............................................ 42
5.2 Configure password policies correctly ................................................ 44
5.3 Deny access to network connections ................................................. 45
5.4 Restricting Internet Access................................................................. 47
5.5 Preventing access to Windows Update .............................................. 50
5.6 Tunneling connection with IPSec (VPN IPSec) ................................. 52
5.7 Useful Configuration for Remote Desktop .......................................... 58
6 Appendix .......................................................................................................... 64
6.1 Service and Support ........................................................................... 64
6.2 Links and Literature ............................................................................ 65
6.3 Version history .................................................................................... 65
1 The task
Introduction
SIMATIC IPCs must meet the highest safety and reliability requirements for
the control of machines and plants in industry.
The Windows operating system offers extensive options for configuring an IPC.
The measures proposed in this contribution increase the availability and IT
security of the operating system. Important settings for this are contained in the
Group Policy. There are two ways to change the Group Policy:
• Editor for Local Group Policy Editor
• Microsoft Management Console
Note When discussing security on IPCs, also refer to the Security Guide in the article
55390879.
Siemens AG 2019 All rights reserved
2 Solution
2.1 Security Checklist
The following checklist lists a number of risks and their solutions.
These notes are divided into recommendations for IPCs without a network
connection ("stand-alone operation") and for IPCs with a network connection
for which additional settings are required.
possible in RAM.
Process stop possible Shutdown option freely Section 4.4: Allow shutdown
accessible only after user login
Unauthorized execution of Running any malicious software Section 4.5: Access control to
software software through AppLocker
Modification of system data, Desktop - Access to applications Section 4.6: Prevent Windows
access to Internet Explorer, applications and their properties
workstation, network connection from being accessed from the
desktop.
Change of system data/network Start menu and taskbar - access Section 4.7: Preventing access
environment, IPC lock/shutdown to applications to Windows applications from
the Start menu
Processes and services can be Change password, Lock IPC, Section 4.8: Restriction of
stopped, incorrect configuration of Access Task Manager functions according to
the IPCs <Ctrl+Alt+Del>
Processes and services can be Changing the System Section 4.9: Prevent access to
stopped, incorrect configuration of Parameters in the Control Panel Control Panel
the IPCs
Infect IPC with malware, Access to removable media Section 4.10: Preventing access
unwanted installation of programs (e.g. USB sticks) to removable media
Infect IPC with malware, Automatic execution of software Section 4.11: Deactivating
unwanted installation of programs (Autoplay function) Autoplay or Autorun
Infect IPC with malware, Installations of removable media Section 4.12: Disable removable
unwanted installation of programs disk installation
Free access to the Internet Free access to Internet Section 5.4: Restricting Internet
communication management Access
Process stop possible Access to Anytime Upgrade and Section 5.5: Deny access to
Update Anytime Upgrade and Windows
Update
Unsafe connection - sensitive Remote maintenance via VPN is Section 5.6: Using a Virtual
process data can be viewed configured insecurely Private Network (VPN) and its
Configuration
Invalid access rights Unsecure remote desktop Section 5.7: Safe configuration of
connection the remote desktop
Note The security check list shows only the recommended settings, but without
any guarantee of completeness. Consult your security expert for final
assessment and configuration.
Required knowledge
Basic knowledge of installation, configuration, networking and operation of IPCs
in industrial environments is required.
The application example can also be used for other Windows 10 operating systems, but
Note
the menus may differ depending on the version.
Table 2-3
Components Note
109475014_Securityeinstellungen_IPCs_Win10_de.pdf This document.
Siemens AG 2019 All rights reserved
3 Basics
3.1 Basics about the editors
3.1.1 Editor for Local Group Policy Editor
Call
1. Open the "Local Group Policy Editor". Enter "gpedit.msc" in the
Windows search and confirm with "Enter" ("Return").
Figure 3-1
Siemens AG 2019 All rights reserved
Properties
Changing the computer configuration
Changing the user configuration for all users
Call:
1. Open the "Microsoft Management Console". Enter "MMC.exe" in the
Windows search and confirm with "Enter" ("Return").
2. Open the "Add or Remove Snap-Ins" dialog via the "File > Add/Remove
Snap-Ins" menu item ("File > Add/Remove Snap-ins").
Figure 3-2:
3. In the following dialog select the entry "Group Policy Objects" and click the
button "Add >".
Siemens AG 2019 All rights reserved
Figure 3-3
4. Confirm the following dialog with "Finish" and the "Add or Remove Snap-ins"
window with the "OK" button.
5. The Microsoft Management Console now contains the "Local Group Policy".
Security settings
Entry ID: 9
3 Basics
3.1 Basics about the editors
Figure 3-4
Properties
Changing computer and user configuration for all users
Changing the user configuration for selected users
Note In the following screenshots all changes are made for all users. These
changes can also only be applied to selected users.
Siemens AG 2019 All rights reserved
Note The following screenshots are created with Windows 10 in the design
"Windows - classic". These may differ for other operating system variants.
The basic prerequisite for a secure system is the distribution of access rights according
to requirements, i.e. the user should only have the most necessary rights. If more
rights are granted than are necessary for the task of the corresponding user, the
operational safety of the IPC is unnecessarily endangered.
The correct setting of user accounts is crucial for the security of the system.
Normal user and administrator should be used separately. This is necessary
to prevent the unwanted execution of software.
Administrator account
The administrator account can be used to change security settings and
Siemens AG 2019 All rights reserved
Software Controller
The SIMATIC software controller can be used without restriction under
the restricted user account.
To create a Windows user account with limited access rights, you must log on
as an administrator.
There are several ways to create a new user account under Windows. The
recommended way to create a new account using Computer Management is
described in the following instructions. This sets up a default user, i.e. a user
with restricted privileges.
3. Right-click on the entry "Users" (1) and in the context menu on the entry
"New User...". (2)
Figure 4-2
Security settings
Entry ID: 12
4 Security settings for IPCs without network connection
4.1 User accounts and their rights
4. Fill in the window for the new user as shown in the following figure.
Fig. 4-3
••••••••
••••••••
5. Click "Create".
Note For the account, you can define whether the user can change the password and
whether or when it expires.
Siemens AG 2019 All rights reserved
Function explanation
When administrators perform actions that require higher rights, the following
dialog will notify them.
Figure 4-4:
Siemens AG 2019 All rights reserved
For users with restricted rights, the following dialog appears prompting you to log
in as an administrator.
Figure 4-5
This function can be deactivated via the User Account Control (UAC). This
means that a user with restricted rights no longer has the option of obtaining
increased rights.
Note Basically, you should only give your administrator passwords to authorized
employees and otherwise keep them secret.
This way you do not have to make this setting. This has the advantage that the
admin can also make changes to the system without logging off the active user.
3. Change the "User Account Control policy setting: Behavior of the Increased
rights prompt for standard users" ("User Account Control: Behavior of
the elevation prompt for standard users").
Figure 4-8:
Function explanation
The Unified Write Filter is available in the Windows 10 Enterprise operating
system version of the SIMATIC IPCs.
The UWF secures the file system against modification of files. The function
redirects all write accesses to the RAM. After a restart, the file system is
unchanged. There are no visible restrictions for the user. Malicious programs that
have gained access during operation are no longer available after a restart. More
information about the Unified Write Filter can be found under the following link:
https://docs.microsoft.com/en-us/windows-hardware/customize/enterprise/unified-
write-filter.
The advantages of the UWF come to bear when the system is restarted. If an
IPC runs continuously, an active UWF brings no benefits.
CAUTION If the UWF is active, the paths for configuration and program of the SIMATIC S7-
Siemens AG 2019 All rights reserved
1500 software controller must be set to a partition not protected by the UWF.
When the UWF is active, loading the software controller or other configurations
(e.g. WinCC ) on the device. (Figure 4-10:)
Figure 4-10:
You can use the "UWFMGR.EXE" program to set and switch on/off the UWF.
The program is called via the command prompt. An excerpt of the most important
functions can be found in Table 4-1.
Note To enable the UWF, you must run the CMD console as an administrator.
Enter "cmd" into the Windows search. Right-click the CMD application.
Select the entry "Run as administrator".
Table 4-1
Function Command
Note The UWF commands regarding write protection are only effective after a restart
of the IPC.
Note Further functions or special features for the use of the UWF can be found in the
manual of the IPC used or at https://docs.microsoft.com/en-us/windows-
hardware/customize/enterprise/uwfmgrexe.
Function explanation
With some operator stations it may be necessary to prevent the station
from shutting down or to enable this option only for certain operators.
Function explanation
Access to software should only be granted to the extent required and desired. This
prevents the misuse and in particular the installation of malware. The AppLocker
application responsible for this is not available on all Windows variants. (Table 4-2).
This software may restrict access to software packages. AppLocker
allows/prevents the execution of the following application types:
Executable files ("*.exe" and "*.com")
Scripts ("*.js", "*.ps1", "*.vbs", "*.cmd" and "*.bat")
Windows Installer files ("*.msi" and "*.msp")
DLL files ("*.dll" and "*.ocx")
Table 4-2
Windows version AppLocker active
Siemens AG 2019 All rights reserved
Windows 10 Enterprise ✓
Windows 10 Enterprise ✓
Windows 10 Home X
Windows 10 Professional X
CAUTION An AppLocker configuration can be made with all Windows versions, but the
configuration is only considered for the versions listed in Table 4-2
2. Now define your corresponding rules. More information about the AppLocker
Siemens AG 2019 All rights reserved
Function explanation
To avoid access to operating system functions or the Internet by the operator, it
is necessary to change the default setting of the desktop policies.
Figure 4-17
Figure 4-19
Function explanation
Menu entries such as "Search", "Games" or "Music" are normally not required
and should be deactivated.
For security reasons, "Printers" and "Network Connections" should also not
be offered ("Disable Programs in Settings Menu" policy).
Please note that some policies only deny access to the menu items. Some of
the functions can be reached in other ways (e.g. under C:\Windows\system32).
Function explanation
You can use the computer configuration to switch off the key
combination <Ctrl+Alt+Del> for user logon.
(Computer Configuration > Windows Settings > Security Settings > Local Policies
> Security Options > Interactive Login: No STRG + ALT + ENTF required).
Alternatively, you can use the user configuration to set which actions are
possible when pressing <Ctrl+Alt+Del> (e.g. no access to Task Manager).
If the "Microsoft Management Console" has not been locked, you can also
disable this option again to gain access to the task manager.
Function explanation
The Control Panel can be used to make unwanted changes to the system, such
as network connections, uninstalling programs, etc. Access to the Control Panel
should therefore be prevented.
Function explanation
By inserting a USB stick, the IPC can be infected with a malicious program.
Therefore, it is recommended to deny access to various removable disks in the
Group Policy settings. It is possible to either deny read and/or write access or
to deny "any access".
Figure 4-29
Siemens AG 2019 All rights reserved
Function explanation
USB sticks and external hard drives may contain an autoplay file ("autorun.inf").
In this way, viruses, for example, could infect the system. The following table
shows how to disable the Autoplay feature and AutoRun ("AutoRun Default
Behavior" policy).
Function explanation
If it is not possible for you to prohibit access to USB media in general (see
section 4.10), you should prevent software from being installed from removable
media. This allows you to prevent malware or other unwanted programs from
removable media from being installed on your IPC.
Function explanation
The graphical user interface "Microsoft Management Console" (MMC) is used
to manage computers and users. You can configure if and how the MMC can
be used.
CAUTION With this setting you deny any IPC user access to the Microsoft
Management Console!
You may need to restart your computer if you want to make changes to
Local Computer Policies or other settings in options that are already
disabled (e.g. Control Center).
Disable access to this console only if you are absolutely sure that the
settings are complete and correct.
Later change requests cannot be carried out. For this a new installation
is necessary.
Siemens AG 2019 All rights reserved
Function explanation
By disabling the recovery options of the operating system, it is no longer
possible to return to previous states of the operating system. This prevents
users from undoing changes to the system.
Function explanation
To deny access to system paths (for example, "C:\Windows\system32"), you
can explicitly specify which paths are excluded from the search.
Note This setting is made in the user configuration. Thus, this policy applies to both
the administrator account and the restricted user accounts.
3. In the settings of this policy, specify which search paths you want to exclude.
Click on the "Show" button (1) and enter the desired paths in the window
that opens (2). Confirm the entries by clicking "OK"(3).
Figure 4-40
Siemens AG 2019 All rights reserved
Function explanation
You can restrict access to drives to prevent manipulation.
Figure 4-42
Function explanation
It is strongly recommended to leave the Windows Firewall enabled! The
standard configuration is configured in a meaningful way.
If Siemens software requires additional settings, these are configured during
the installation (for example during the installation of SIMATIC NET).
During commissioning, it may make sense to temporarily allow ping requirements.
Siemens AG 2019 All rights reserved
Security settings
Entry ID: 42
5 Security settings for IPCs with networkconnection
5.1 Enable and configure Windows Firewall
4. Select the list entry "File and printer sharing (echo request - ICMPv4
incoming)" -> Profile "Public" ("File and Printer Sharing (Echo Request -
ICMPv4-In)" -> Profile "Public") (1). Activate the rule using the action
("Enable Rule") (2).
Note: It is possible that these rules are already activated in your firewall.
You can recognize this by the green tick in front of the name of the
rules. In this case, you do not need to change the rule.
Figure 5-3
Siemens AG 2019 All rights reserved
Security settings
Entry ID: 43
5 Security settings for IPCs with networkconnection
5.2 Configure password policies correctly
Function explanation
By configuring the password policies, the user is "forced" to follow the
appropriate rules for assigning his password. These guidelines counter misuse.
Table 5-1
Guideline Safety setting
Siemens AG 2019 All rights reserved
Figure 5-5
Function explanation
Denying access to network connections limits the possibilities for
unwanted installation of malware on the IPC.
Figure 5-7
Siemens AG 2019 All rights reserved
Function explanation
The denial of Internet access limits the possibilities for unwanted installation
of malware on the IPC.
Figure 5-9
Note You can block other browsers and applications using the AppLocker. See section
4.5.
Function explanation
If system updates are performed automatically, an unwanted restart of the
system may occur.
You can prevent this by configuring Windows Updates not to run automatically.
Note If you want to have full control over Windows updates and only want to
selectively install certain updates, you can set up a WSUS server. The following
article explains how this works:
https://support.industry.siemens.com/cs/de/en/view/109754089
Figure 5-12
Security settings
Entry ID:
5 Security settings for IPCs with networkconnection
5.5 Preventing access to Windows Update
Figure 5-13
Siemens AG 2019 All rights reserved
Function explanation
With a Virtual Private Network (VPN), a public network (e.g. Internet) is used as
a transit network for the transmission of private data.
The IPSec protocol enables manufacturer-independent, secure and protected data
exchange via IP networks. IPSec uses the tunneling concept. The data
transmission between the tunnel endpoints (sender and receiver) cannot be
viewed by unauthorized persons due to the encryption.
IPSec is part of the Windows installation. To use VPN with IPSec, it is necessary
to adjust the IPSec tunnel authorization.
Security settings
Entry ID: 52
5 Security settings for IPCs with networkconnection
5.6 Tunneling connection with IPSec (VPN IPSec)
2. In the following dialog select the entry "Connect to a workplace" (1). Click
on the button "Next" (2).
Figure 5-15
Siemens AG 2019 All rights reserved
Security settings
Entry ID:
5 Security settings for IPCs with networkconnection
5.6 Tunneling connection with IPSec (VPN IPSec)
5. Open the "Network and Sharing Center" again as described at the beginning of
this section. Click the "Change adapter settings" entry.
Figure 5-18
Security settings
Entry ID: 54
5 Security settings for IPCs with networkconnection
5.6 Tunneling connection with IPSec (VPN IPSec)
6. Open the context menu with a right click on the VPN connection (1). Then
click on the menu command "Properties" (2).
Figure 5-19
7. Switch to the Security tab and select the VPN type: "Layer 2 Tunneling
Protocol with IPsec (L2TP/IPSec)". Adjust the other settings in this window
to suit your requirements.
Siemens AG 2019 All rights reserved
Note More detailed information on VPN connections can be found under the link:
https://support.microsoft.com/de-de/help/20510/windows-10-connect-to-vpn.
Figure 5-20
Security settings
Entry ID: 55
5 Security settings for IPCs with networkconnection
5.6 Tunneling connection with IPSec (VPN IPSec)
9. Enter the name of your VPN connection (in the example "VPN Connection")
in the entry field "Key".
Figure 5-21
11. Open the VPN settings by entering the term "VPN" in the Windows search.
Click on the newly created connection (1) and then on the "Connect"
button that appears below (2).
Figure 5-23
Security settings
Entry ID:
5 Security settings for IPCs with networkconnection
5.6 Tunneling connection with IPSec (VPN IPSec)
12. Enter your credentials to connect to the VPN server in the dialog box (1) and
confirm with the OK button (2) to connect to the server.
Figure 5-24
Note Note that only the settings for the "VPN Client" are described here. On the "VPN
server", "Incoming connections" must be allowed for the user used here.
Siemens AG 2019 All rights reserved
Function explanation
To be able to use the remote desktop connection for a restricted user account
(without administrator rights), the corresponding user must be added under
"Select user...".
You can use Group Policy to extend the settings for Remote Desktop Services.
By default, the listed settings are not configured.
To ensure a higher security of the connection, it is recommended to use the
NTLM protocol and not to allow storing passwords.
How to enable these options is explained in the section "Advanced
Remote Desktop Settings".
Security settings
Entry ID: 58
5 Security settings for IPCs with networkconnection
5.7 Useful Configuration for Remote Desktop
2. Select here the option "Allow connections only from computers running
Remote Desktop with Network Level Authentication (recommended)"
Figure 5-26
Siemens AG 2019 All rights reserved
Security settings
Entry ID: 59
5 Security settings for IPCs with networkconnection
5.7 Useful Configuration for Remote Desktop
4. Open the "Select Users" dialog box by clicking the "Add..." button. ("Add...").
Figure 5-28
5. Via the "Paths..." button ("Locations...") you specify the computer from which
this PC can be accessed via remote connection. Enter the name of a user
existing on the target system in the input field (1) and confirm the selection
with the "OK" button (2).
Figure 5-29
Siemens AG 2019 All rights reserved
Security settings
Entry ID: 60
5 Security settings for IPCs with networkconnection
5.7 Useful Configuration for Remote Desktop
9. In the policy setting, change the "Ask for credentials, use NTLM protocol" drop-
down list entry.
Figure 5-33
Siemens AG 2019 All rights reserved
Security settings
Entry ID: 62
5 Security settings for IPCs with networkconnection
5.7 Useful Configuration for Remote Desktop
6 Appendix
6.1 Service and Support
Industry Online Support
Do you have any questions or need assistance?
Siemens Industry Online Support offers round the clock access to our
entire service and support know-how and portfolio.
The Industry Online Support is the central address for information about
our products, solutions and services.
Product information, manuals, downloads, FAQs, application examples and videos
– all information is accessible with just a few mouse
clicks: https://support.industry.siemens.com
Technical Support
The Technical Support of Siemens Industry provides you fast and competent
support regarding all technical queries with numerous tailor-made offers
– ranging from basic support to individual support contracts. Please send
Siemens AG 2019 All rights reserved
Service offer
Our range of services includes the following:
Plant data services
Spare parts services
Repair services
On-site and maintenance services
Retrofitting and modernization services
Service programs and contracts
You can find detailed information on our range of services in the service
catalog web page:
https://support.industry.siemens.com/cs/sc
e
d
s
v
r
l s
r
l t
i
AppLocker protection/windows-defender-application-control/applocker/applocker-
overview overview
2
0
A 1
G 9
e
n
s
i
to-vpn