SIMATIC NET IKPI Chap08 Industrial Security English 2015
SIMATIC NET IKPI Chap08 Industrial Security English 2015
© Siemens AG 2014
Industrial Security
Siemens IK PI · 2015
© Siemens AG 2014
Industrial Security
Security Integrated
Introduction
■ Overview
Industrial security
That is why industrial security is so important
As the use of Ethernet connections all the way down to the field industrial plant with comprehensive security protection against
level increases, the associated security issues are becoming attacks, the appropriate measures must be taken.
a more urgent topic for industry. After all, open communication Siemens can support you here in selectively implementing these
and increased networking of production systems involve not measures – within the scope of an integrated range for Industrial
only huge opportunities, but also high risks. To provide an Security.
Threat overview
8
defects – the risk and the potential for damage can only be minimized here.
1) Industrial Control Systems (ICS)
Source: BSI-A-CS 004 | Version 1.00 dated April 12, 2012; page 2 of 2
Note:
The list of threats came about as a result of close cooperation
between BSI and business representatives.
With its BSI analyses, the Federal Office for Information Security
(BSI) publishes statistics and reports on current topics in
cyber security.
Please send comments and notes to: [email protected]
Industrial Security
Security Integrated
Introduction
■ Overview (continued)
Authentication/user administration
System integrity
Patch management
Detection of attacks
G_IK10_XX_10336
Security guidelines
Industrial Security
Security Integrated
Introduction
■ Overview (continued)
Plant Security
Physical protection
Security management
Internet
SSC
Router
SCALANCE Central
S623 WEB Archiving
Server SIMATIC Field PG
Server
Internet with SOFTNET
Security Client
SCALANCE
M812-1
SCALANCE SCALANCE
S627-2M S627-2M SCALANCE
pGl
S623
Sync connection
Production n
Industrial Ethernet
(Fiber optic) SCALANCE
MRP ring X308-2M
SIMATIC SIMATIC
S7-400 with SIMATIC S7-300 with
CP 443-1 S7-1200 with CP 343-1
SCALANCE Ring redundancy SCALANCE Advanced CP 1243-1 Advanced
X204-2 manager X204-2
8 SCALANCE
X308-2M
System Integrity
SIMATIC
TP700
SIMATIC S7-400
with CP 443-1 SIMATIC
Advanced SIMATIC S7-1200
ET ET 200 SIMATIC
200SP TP1200
vzGwith lzGwith Comfort
G_IK10_XX_10370
jwGX]Y_ jwGX]Y_
Secure communication, network access protection and network segmentation with Security Integrated products
Industrial Security
Security Integrated
Introduction
■ Overview (continued)
Security Integrated SCALANCE S security modules
Cell protection concept SCALANCE S modules protect industrial networks and automa-
tion systems by means of security-related segmentation (cell
Industrial communication is a key factor for corporate success – protection) with a firewall against authorized access and protect
as long as the network is protected. As your partner, Siemens data transmission with VPN against manipulation and espio-
provides its customers with Security Integrated components, nage.
which not only have communication functions but also include
special security functions such as firewall and VPN functionality, SCALANCE M router
in order to implement the cell protection concept. With the cell
protection concept, a plant network is subdivided into protected Mobile radio router
automation cells within which all devices are able to communi- SCALANCE M industrial router for secure access to plants via
cate with each other securely. The individual cells are connected mobile radio, e.g. GPRS or UMTS, with integral security func-
to the plant network protected by a VPN and firewall. Cell protec- tions – firewall for protection against unauthorized access and
tion reduces the susceptibility to failure of the entire production VPN for protection of the data transmission.
plant and thus increases its availability. Security Integrated prod-
ucts such as SCALANCE S, SCALANCE M and SIMATIC S7/PC DSL routers
communications processors can be used for implementation. The SCALANCE M DSL routers are ADSL routers (M812-1 and
The following Security Integrated products are available: M816-1) for the secure connection of Ethernet-based subnets
and automation devices to hard-wired DSL networks or SHDSL
SIMATIC S7-1200 / S7-1500: routers (M826) for connection via existing wire-pairs or multi-wire
• Protection of the controller by access protection (authenti- cables. They have integral security functions – firewall for pro-
cation) via the S7-1200/S7-1500 CPU: tection against unauthorized access and VPN for protection of
- Know-how protection the data transmission.
- Manipulation protection Industrial PCs
- Copy protection
- Graded security concept for HMI connection • Via the CP 1628 communications processor, the industrial
PCs are protected by firewall and VPN – for secure communi-
• Expandable access protection (firewall and VPN ) cation without special operating system settings. This means
for S7-1200/S7-1500 with Security CP 1243-1/CP 1543-1 that computers equipped with the module can be connected
by means of to protected cells.
- Integrated firewall (monitoring of the data flow)
- Protection against data manipulation and espionage by Software
means of a VPN • The SOFTNET Security Client software enables VPN access
SIMATIC S7-300 and S7-400 via the Internet or a company intranet to automation cells or
PCs protected by SCALANCE S or another security
• Protection of controllers by CP 343-1 Advanced and component with VPN functionality.
CP 443-1 Advanced communications processors, which
contain both firewall and VPN (virtual private network)
functionality.
8
S7-1200 CPU 1)
Security Client
SCALANCE S
CP 343-1 Adv
CP 443-1 Adv
S7-1500 CPU
SCALANCE M
CP 1243-1 1)
CP 1543-1
SOFTNET
CP 1628
family
family
Security Integrated products for industrial use with special security functions to improve the standard of security
Industrial Security
Security Integrated
Introduction
8
Windows 7 Professional, Ultimate,
Windows XP Professional (32-bit) DSL router for wired
+ SP3 IP communication from Industrial
Ethernet-based subnets and
programmable controllers
via telephone or DSL networks;
with integrated firewall and
VPN with IPsec;
1 x or 4 x RJ45 ports for Industrial
Ethernet;
1 x RJ45 port for DSL
• SCALANCE M826-2 (Annex A) 6GK5826-2AB00-2AB2
Industrial Security
Security Integrated
Introduction
Industrial Security
Security Integrated
SCALANCE S
■ Overview
Product versions:
SCALANCE S602;
• Uses the stateful inspection firewall to protect network
segments against unauthorized access.
• "Ghost mode" for protection of individual, even alternating,
devices by dynamically taking over the IP address.
• Connection via 10/100/1 000 Mbit/s ports.
SCALANCE S612;
• Uses the stateful inspection firewall to protect network
segments against unauthorized access.
• Up to 128 VPN tunnels can be operated simultaneously.
• Connection via 10/100/1 000 Mbit/s ports.
SCALANCE S623;
• Uses the stateful inspection firewall to protect network
segments against unauthorized access.
• Up to 128 VPN tunnels can be operated simultaneously.
• Security modules for the protection of automation networks
and security during data exchange between automation • Connection via 10/100/1 000 Mbit/s ports.
systems. • Additional RJ45 DMZ port (DMZ: "demilitarized zone") for
• Checking and filtering of data traffic by integrated firewall and secure connection from, for example, remote maintenance
thus: modems, laptops, or an additional network. This yellow port
- Protection against operator mistakes protected by firewalls from the red and green ports and can
- Prevention of unauthorized access also terminate VPNs.
- Prevention of faults and communications overload • Redundant protection of automation cells by means of router
• Authentication of the communication partners and encryption and firewall redundancy and stand-by linking of the redundant
of the transmitted data with VPN and thus protection of device via the yellow port.
communication against espionage and manipulation. SCALANCE S627-2M;
• Rugged, industry-compatible design of the devices • Uses the stateful inspection firewall to protect network
• Easy and clear configuration: segments against unauthorized access.
Using the Security Configuration Tool (SCT), all SIMATIC NET • Up to 128 VPN tunnels can be operated simultaneously.
security products can be configured and diagnosed from a
central position. • Connection via 10/100/1 000 Mbit/s ports.
• No changes or adaptations necessary in the existing network • Additional RJ45 DMZ port (DMZ: "demilitarized zone") for
topology, applications or network stations since SCALANCE S secure connection from, for example, remote maintenance
can also be used as a bridge and not just as a router. modems, laptops, or an additional network. This yellow port
protected by firewalls from the red and green ports and can
• Securing of communication is independent of the protocol also terminate VPNs.
8 (e.g. PROFINET or other Ethernet-based fieldbus solutions)
• Secure remote access via the Internet possible without restric-
• Redundant protection of automation cells by means of router
and firewall redundancy and stand-by mode of the redundant
tions and with any providers device; status matching of the firewall by means of a synchro-
• Increased availability is possible by means of redundant nization cable between the yellow ports.
protection of automation cells or ring topologies • Two additional slots for one 2-port media module each
(see SCALANCE X-300) for direct integration in ring structures
and FO networks with two additional switched red or green
ports per module.
• Bridging of longer cable runs or use of existing 2-wire cables
(e.g. PROFIBUS) by deploying MM992-2VD media modules
(variable distance).
Industrial Security
Security Integrated
SCALANCE S
■ Benefits ■ Application
The security modules of the SCALANCE S range can be used
to protect all devices of an Ethernet network against unauthor-
ized access. In addition, SCALANCE S612 or SCALANCE S623
also protect the data transmission between devices or network
• Protection of industrial automation networks against segments (e.g. automation cells) against data manipulation and
unauthorized access and setup of a DMZ (protected zone) espionage; they can also be used for secure remote access
possible for data exchange with other networks without having over the Internet.
to grant direct access to the production network.
The security modules can be operated not only in bridge mode
• Through implementation of the cell protection concept: but also in router mode, and can thus also be used direct at
- Protection of any Ethernet-based programmable controllers IP subnetwork borders.
and automation systems which do not have their own
security functions Secure remote access over the Internet or GPRS/UMTS is
- Protecting several devices simultaneously possible with the SCALANCE M875 GPRS/UMTS router.
- Reduction in risk by means of network segmenting SCALANCE S is optimized for use in automation and industrial
(by generating secure communication islands) environments, and meets the specific requirements of auto-
- Securing of communication to and from the automation cells mation systems, such as easy upgrades of existing systems,
is possible simple installation and minimal downtimes in the event of a fault.
• User-specific firewall rules can be used to assign specific
access privileges to users and not just to devices.
• System-wide network diagnostics thanks to integration into
IT infrastructures and network management systems by
means of SNMP
• Securing of remote access via the Internet. Using PPPoE and
DynDNS, dynamic IP addresses can also be applied.
• Problem-free integration into existing networks without
reconfiguring terminal nodes or setting up new IP subnet-
works
• Module replacement without the need for a programming
device, using the C-PLUG swap media for backing up the
configuration data
• Direct integration in ring structures and FO networks is
possible (SCALANCE S627-2M)
Company network
Local
service PC Remote
service PC
with SOFTNET
SCALANCE Internet Security Client
S623
8
Industrial Ethernet
Service access
Internet Internet
Router Router
G_IK10_XX_10303
Plant network/
secure automation cell
Connection of a local or remote service PC (by means of Internet access) via the DMZ port of the SCALANCE S623
Industrial Security
Security Integrated
SCALANCE S
■ Design ■ Function
SCALANCE S602 Security functions
• Checking of data traffic and protection against unauthorized VPN (Virtual Private Network)
access by means of stateful inspection firewall. (only for SCALANCE S612, S623 and SCALANCE S627-2M);
• Simple and fast configuration of the firewall through global for reliable authentication (identification) of the network stations,
firewall rules and symbolic names for IP addresses. for encrypting data and checking data integrity.
• Specific access privileges for users in accordance with user- • Authentication;
specific firewall rules. All incoming data traffic is monitored and checked. As IP
• 10/100/1 000 Mbit/s ports for the connection and operation of addresses can be falsified (IP spoofing), checking the IP
SCALANCE S in Gigabit networks as well address (of the client access) is not sufficient. In addition,
Client PCs may have changing IP addresses. For this reason
• In addition to bridge mode, can also be operated in router the authentication is performed by means of tried and tested
mode and can therefore also be used directly at IP subnet VPN mechanisms.
limits
• Data encryption;
• Address translation Secure encryption is necessary in order to protect data
- NAT (Network Address Translation) permits the use of private communication from espionage and unauthorized manipu-
IP addresses in the internal network in that public IP lation. This means that the data traffic remains incomprehen-
addresses are converted to private ones sible to any eavesdropper in the network. The SCALANCE
- NAPT (Network Address and Port Translation) permits the Security Module establishes VPN tunnels to other Security
use of private IP addresses in the internal network in that Modules for this purpose.
frames are converted to private IP addresses depending on
the communications port used The firewall
• Internal network nodes can receive their IP addresses from can be used as an alternative or to supplement VPN with flexible
the integral DHCP server access control.
The firewall filters data packets and disables or enables
• Log files can also be evaluated by the Syslog server communication links in accordance with the filter list and stateful
• Enhanced integration in IT infrastructures and network inspection. Both incoming and outgoing communication can be
management systems by means of SNMP filtered, either according to IP and MAC addresses as well as
• Protection of individual, even alternating, devices by dynami- communication protocols (ports) or user-specific.
cally taking over the IP address (ghost mode) • Logging;
access data are saved by the Security Module in a log file.
SCALANCE S612 Detection of how, when and by whom it has been accessed is
As SCALANCE S602; additionally: as important as detecting access attempts, to ensure that
appropriate preventative measures can be taken.
• Encryption of data transmission with VPN (IPSec)
- Protection against espionage Configuration
- Protection against unauthorized manipulation
Configuration is carried out using the Security Configuration Tool
• Secure remote access over the Internet, e.g. in conjunction (SCT). Therefore all SIMATIC NET security products can be
with the SOFTNET Security Client and the SCALANCE M configured and diagnosed from a central position. All the config-
UMTS router (with IPSec VPN function) uration data can be saved on the optional C-PLUG swap media
SCALANCE S623 (not included in scope of supply) so that the Security Module
can be replaced quickly in the event of a fault and without the
8 As SCALANCE S612; additionally:
• DMZ port with which a protected zone (DMZ = demilitarized)
need of a programming device.
Industrial Security
Security Integrated
SCALANCE S
■ Function (continued)
Configuration
Automation plant
SCALANCE
M874-3
SIMATIC
Plant network VPN S7-1200
tunnel
Industrial Ethernet
GPRS/UMTS
SCALANCE Internet
M812-1 Router SSC
Security Security
Module Module SCALANCE
SCALANCE S SCALANCE S S623 VPN SIMATIC
tunnel Internet Field PG with
PROFINET PROFINET ... PROFINET
SOFTNET
Security
Client
G_IK10_XX_10339
Automation Cell n Automation Cell n-1 Automation Cell 1
Secure remote access without direct connection to the automation network with SCALANCE S623
8
Domain
Controller
SCALANCE
S623
Data base
server
Demilitarized zone (DMZ) for remote maintenance or access to data server with SCALANCE S623
Industrial Security
Security Integrated
SCALANCE S
■ Function (continued)
SCALANCE SCALANCE
S612 M812-1
VPN tunnel 2
S7-300 with
CPU 315-2 DP
VPN and CP 343-1
tunnel 1 Lean
Service Center
SCALANCE
M874-2 PROFIBUS
Internet
Industrial Ethernet
Mobile radio Remote Station 2
S7-1500 with
IP camera CP 1543-1 Service PC with
Software SOFTNET
Security Client
SCALANCE
G_IK10_XX_30188
M874-3
Smartphone or
tablet
Industrial Ethernet
Remote Station 1
Ring redundancy
manager
8
MRP ring A
Sync connection
MRP ring B
G_IK10_XX_10366
Industrial Ethernet
Industrial Ethernet
Ring redundancy
(Fiber optic)
manager
Secure, redundant connection between two MRP rings with SCALANCE S627-2M
Industrial Security
Security Integrated
SCALANCE S
■ Function (continued)
Ring redundancy manager
MRP ring
CU or fiber optic
SCALANCE S627-2M SCALANCE S627-2M
Industrial Ethernet
Automation Cell Sync connection Industrial Ethernet
(Fiber optic)
MRP ring
MRP-Switch
CU
G_IK10_XX_10367
SCALANCE S627-2M SCALANCE S627-2M
Secure, redundant connection of an automation cell to a redundant ring with SCALANCE S627-2M
Sync connection
MRP ring 8
Industrial Ethernet
MRP-Switch Industrial Ethernet
(Fiber optic)
CU
Sync connection
MRP ring
G_IK10_XX_10368
Secure, redundant connection of a redundant ring to a plant network with SCALANCE S627-2M
Industrial Security
Security Integrated
SCALANCE S
■ Technical specifications
Article No. 6GK5602-0BA10-2AA3 6GK5612-0BA10-2AA3 6GK5623-0BA10-2AA3
Product-type designation SCALANCE S602 SCALANCE S612 SCALANCE S623
Transmission rate
Transfer rate 1 10 Mbit/s 10 Mbit/s 10 Mbit/s
Transfer rate 2 100 Mbit/s 100 Mbit/s 100 Mbit/s
Transfer rate 3 1 000 Mbit/s 1 000 Mbit/s 1 000 Mbit/s
Interfaces
Number of electrical/optical 2 2 3
connections for network components
or terminal equipment maximum
Number of electrical connections
• for internal network 1 1 1
• for external network 1 1 1
• for DMZ 0 0 1
• for signaling contact 1 1 1
• for power supply 1 1 1
• for redundant power supply 1 1 1
Design of the electrical connection
• for internal network RJ45 port RJ45 port RJ45 port
• for external network RJ45 port RJ45 port RJ45 port
• for DMZ - - RJ45 port
• for signaling contact 2-pole terminal block 2-pole terminal block 2-pole terminal block
• for power supply 4-pole terminal block 4-pole terminal block 4-pole terminal block
Design of the removable storage Yes Yes Yes
C-PLUG
Signal-Inputs/outputs
Operating voltage of signaling 24 V 24 V 24 V
contacts at DC rated value
Operating current of signaling 0.1 A 0.1 A 0.1 A
contacts at DC maximum
Supply voltage,
current consumption, power loss
Type of supply voltage DC DC DC
Supply voltage external 24 V 24 V 24 V
• minimum 19.2 V 19.2 V 19.2 V
• maximum 28.8 V 28.8 V 28.8 V
Consumed current maximum 0.5 A 0.5 A 0.6 A
Type of fusing at input Non-replaceable melting fuse Non-replaceable melting fuse Non-replaceable melting fuse
for supply voltage (F 3 A / 32 V) (F 3 A / 32 V) (F 3 A / 32 V)
Active power loss at 24V 6.72 W 6.72 W 6.96 W
for DC typical
Permitted ambient conditions
Ambient temperature
• during operating -40 … +60 °C -40 … +60 °C -40 … +60 °C
• during storage -40 … +80 °C -40 … +80 °C -40 … +80 °C
• during transport -40 … +80 °C -40 … +80 °C -40 … +80 °C
Relative humidity at 25 °C without 95 % 95 % 95 %
condensation during operating
maximum
Protection class IP IP20 IP20 IP20
Industrial Security
Security Integrated
SCALANCE S
8
Product functions Routing
Product function static IP routing Yes Yes Yes
Product functions Security
Design of the firewall Stateful inspection Stateful inspection Stateful inspection
Product function with VPN connection - IPSec IPSec
Type of encryption algorithms - AES-256, AES-192, AES-128, AES-256, AES-192, AES-128,
with VPN connection 3DES-168, DES-56 3DES-168, DES-56
Type of authentication procedure - Preshared key (PSK), Preshared key (PSK),
with VPN connection X.509v3 certificates X.509v3 certificates
Type of hashing algorithms - MD5, SHA-1 MD5, SHA-1
with VPN connection
Number of possible connections 0 128 128
for VPN connection
Number of network stations
• maximum 0 128 128
• note - Limitation only applies in bridge mode. Limitation only applies in bridge mode.
No limitation in routing mode No limitation in routing mode
Product function
• Password protection Yes Yes Yes
• bandwidth limiting Yes Yes Yes
• NAT/NAPT Yes Yes Yes
Industrial Security
Security Integrated
SCALANCE S
Industrial Security
Security Integrated
SCALANCE S
8
Product functions Diagnosis ATEX 0145 X
Product function • for security of CSA and UL UL 60950 / CSA C22.2 No. 60950-00,
UL 508 / CSA C22.2 No. 142
• SysLog Yes
• for emitted interference EN 61000-6-4 : 2007
• Packet Filter Log Yes
• for interference immunity EN 61000-6-2 : 2005
• Audit Log Yes
• System Log Yes Verification of suitability AS/NZS 2064 (Class A),
EN 61000-6-2,
Product functions DHCP EN 61000-6-4, marine classification
Product function DHCP server - Yes pending
internal network • CE mark Yes
• C-Tick Yes
Product functions Routing
Marine classification association
Product function static IP routing Yes
• American Bureau No
of Shipping Europe Ltd. (ABS)
• Bureau Veritas (BV) No
• Det Norske Veritas (DNV) No
• Germanische Lloyd (GL) No
• Lloyds Register of Shipping (LRS) No
• Nippon Kaiji Kyokai (NK) No
• Polski Rejestr Statkow (PRS) No
Accessories
Product expansion optional C-PLUG Yes
Industrial Security
Security Integrated
SCALANCE S
■ More information
You will find more information on the topic of Industrial Security
on the Internet at:
http://www.siemens.com/industrialsecurity
Industrial Security
Security Integrated
SCALANCE M
■ Overview
The SCALANCE M874-3 is a mobile wireless router for cost-
effectively and securely connecting Ethernet-based subnets
and programmable controllers via the 3rd generation mobile
wireless network (UMTS) and it supports HSPA+ (High Speed
Packet Access). Thus, it allows high transfer rates of up to
14.4 Mbit/s in the downlink and up to 5.76 Mbit/s in the uplink
(depending on the infrastructure of the mobile wireless
provider).
The SCALANCE M874-2 is a mobile wireless router for cost-
effectively and securely connecting Ethernet-based subnets
and programmable controllers via the 2nd generation mobile
wireless network (GSM) and it supports GPRS (General Packet
Radio Service) and EDGE (Enhanced Data Rates for GSM
Evolution).
The security of access and communication is ensured by the
security functions of the integrated firewall and by VPN tunnels
(end-to-end connection encryption through IPsec tunneling).
SCALANCE M875 is a UMTS router for wireless IP communi-
cation between Industrial Ethernet-based programmable
controllers via mobile radio networks of the 3rd generation
(UMTS) and the 2nd generation (GSM)
• High data transfer rate thanks to HSDPA
• Integrated security functions with firewall
• Use as VPN end point (IPsec)
• Approved for railway applications
SCALANCE M812-1 and SCALANCEM816-1 are DSL routers
for the low-cost and secure connection of Ethernet-based
subnets and automation devices to wired telephone or DSL
networks that support ASDL2+ (Asynchronous Digital Sub-
scriber Line). This allows the devices to have high downlink data
rates of up to 25 Mbit/s and uplink data rates of up to 3.5 Mbit/s.
The security of access and communication is ensured by the
security functions of the integrated firewall and by VPN tunnels
(end-to-end connection encryption through IPsec tunneling).
The SCALANCE M826-2 is an SHDSL modem for low-cost, se-
cure connection of Ethernet-based subnets and programmable
controllers via existing two-wire or stranded cables and supports
the ITU-T standard G.991.2 as well as SHDSL.biz (single-pair
high-speed digital subscriber line). This gives the device high
symmetrical data rates of up to 15.3 Mbit/s per wire pair. 8
The security of access and communication is ensured by the se-
curity functions of the integrated firewall and by VPN tunnels
(end-to-end connection encryption through IPsec tunneling).
Note:
Further information on SCALANCE M can be found in Chapter 7,
Industrial Remote Communication, under "Remote networks/
IP-based modems and routers".
Industrial Security
Security Integrated
CP 1243-1 and CP 1543-1
■ Overview
CP 1243-1
The CP 1243-1 communication processor securely connects
the SIMATIC S7-1200 controller to Ethernet networks. With its
integrated security functions of firewall (Stateful Inspection) and
VPN protocol (IPSec), the communications processor protects
S7-1200 stations and lower-level networks against unauthorized
access, and protects the data transmission against manipulation
and espionage by means of encryption. Furthermore, the CP
can also be used for integrating the S7-1200 station into the
TeleControl Server Basic control center software via IP-based
remote networks.
CP 1543-1
The SIMATIC CP 1543-1 communications processor securely
connects the new SIMATIC S7-1500 controller to Industrial
Ethernet networks. With its integrated security functions of fire-
wall (Stateful Inspection), VPN protocol (IPSec) and protocols for
data encryption such as FTPS and SNMPv3, the communica-
tions processor protects S7-1500 stations and lower-level net-
works against unauthorized access, as well as protecting data
transmission against manipulation and espionage by means of
encryption.
Note:
Further information on CP 1243-1 and CP 1543-1 can be
found Chapter 2, PROFINET/Industrial Ethernet, under
"System connection for SIMATIC S7/communication for
SIMATIC S7-1500".
Industrial Ethernet
Segmentation of networks and protection of the S7-1500 with CP 1543-1 or S7-1200 with CP 1243-1
Industrial Security
Security Integrated
CP 343-1 Advanced and CP 443-1 Advanced
■ Overview
CP 343-1 Advanced
Communications processor for connecting the SIMATIC S7-300/
SINUMERIK 840D powerline to Industrial Ethernet networks,
also as PROFINET IO controller and IO device.
The CP supports:
• PG/OP communication
• S7 communication
• Open communication (SEND/RECEIVE)
• PROFINET communication
• IT communication
• Security functionality, firewall and VPN
CP 443-1 Advanced
Communications processor for connecting a SIMATIC S7-400 to
Industrial Ethernet networks, also as PROFINET IO controller or
in SIMATIC H systems.
The CP supports:
• PG/OP communication
• S7 communication
• Open communication (SEND/RECEIVE)
• PROFINET communication
• IT communication
• Security functionality, firewall and VPN
Note:
Further information on the CP 343-1 Advanced and CP 443-1
Advanced can be found in Chapter 2, PROFINET/Industrial
Ethernet, under "System connection for SIMATIC S7 communica-
tion for SIMATIC S7-300 or S7-400".
Alongside the familiar communication functions (integrated
switch and Layer 3 routing functionality) the CP 343-1 Advanced
and CP 443-1 Advanced Industrial Ethernet communications 8
processors also contain the "Security Integrated" function
Stateful Inspection Firewall and a VPN gateway to protect the
controller and lower-level networks against security risks.
Industrial Security
Security Integrated
CP 343-1 Advanced and CP 443-1 Advanced
■ Overview (continued)
pGl
SIMATIC SIMATIC
S7-300 with S7-400 with
CP 343-1 CP 443-1
Advanced Advanced
ET ET
200S 200S
G_IK10_XX_10337
PROFINET PROFINET
Industrial Ethernet Industrial Ethernet
Segmentation of networks and protection of the S7-300 or S7-400 controllers with CP 343-1 Advanced or CP 443-1 Advanced
Industrial Security
Security Integrated
CP 1628
■ Overview
• PCI Express card (PCIe x1) with its own microprocessor
and integrated 2-port switch (2 x RJ45 connection,
10/100/1 000 Mbit/s) for the connection of a PG/PC to
Industrial Ethernet
• Integrated security mechanisms (e.g. Firewall, VPN)
• ISO and TCP/IP transport protocol on board
• Communications services via
- Open IE communication (TCP/IP and UDP)
- ISO transport protocol
- PG/OP communication
- S7 communication
- Open communication (SEND/RECEIVE)
• Integration into network management systems through the
support of SNMP (V1/V3)
Note:
Further information on the CP 1628 can be found in Chapter 2,
PROFINET/Industrial Ethernet, under "System connection for
PG/PC/IPC/communication for PC-based systems".
Industrial PCs are protected by firewall and VPN via the CP 1628
Industrial Ethernet communications processor – for secure
communication without special operating system settings.
This means that computers equipped with the module can be
connected to protected cells. The CP 1628 makes it possible to
connect SIMATIC PG/PC and PCs with PCI Express slots to
Industrial Ethernet (10/100/1 000 Mbit/s).
Additional field devices can be flexibly connected to Industrial
Ethernet via the integrated switch. Along with the automation
functions familiar from CP 1623, the communications processor
also contains "Security Integrated", i.e. a Stateful Inspection
Firewall and a VPN gateway to protect the PG/PC system against
security risks.
Control center
SIMATIC PCS 7 Client
Terminalbus (Ethernet)
8
PC with 4 x CP 1628 and
HARDNET-IE S7-REDCONNECT
(ISO on TCP)
Internet
Industrial Ethernet router Internet router
Industrial Ethernet
VPN tunnel
Internet
PROFINET PROFIBUS
Industrial Security
Security Integrated
SOFTNET Security Client
■ Overview
• The SOFTNET Security Client is a component of the Industrial • Data transmission is protected against operator error,
Security concept for protecting programmable controllers and eavesdropping/espionage and manipulation; communication
for security during data exchange between automation can only take place between authenticated and authorized
systems. devices
• It is a VPN client for programming devices, PCs and • Use of field-proven IPsec mechanisms for setting up and
notebooks in industrial environments and supports secure operating VPNs.
client access via LAN or even WAN (e.g. for remote mainte-
nance via the Internet) to automation systems protected by
Security Integrated devices with VPN functionality
Industrial Ethernet
Security Module
SCALANCE S
PROFINET PROFINET
G_IK10_XX_10254
ET 200S S7-300 with ET 200S ET 200M
CP 343-1 Lean
Secure access to automation cells protected by Security Integrated devices with VPN functionality with the SOFTNET Security Client
■ Benefits ■ Application
The security modules of the SCALANCE S family are provided
specially for use in automation, yet connect seamlessly with
the security structures of the office and IT world. They provide
security and meet the specific requirements of automation
• Avoidance of system disruptions through exclusive access to technology, such as simple upgrades of existing systems,
programmable controllers or complete automation cells using simple installation and minimum downtimes if a fault occurs.
approved programming devices or notebooks
Depending on the particular security needs, various
• High flexibility when used on mobile PCs as no hardware is different security measures can be combined. The SOFTNET
required for securing the communication Security Client allows programming devices, PCs, and note-
• Uniform configuration and integrated security concept for books access to devices with IPSec VPN functionality
automation engineering with SCALANCE S, the security (e.g. SCALANCE S, SCALANCE M, CP 1243-1, CP 1543-1,
S7-CPs (CP 1243-1, CP 1543-1, CP 343-1 Adv., CP 343-1/CP 443-1 Advanced, CP 1628), protected network
CP 443-1 Adv.), the PC-CP 1628, the CP 1543-1, stations or automation systems.
the CP 1243-1 and the SOFTNET Security Client without
special IT know-how
• Protection of data transmission against espionage and
manipulation based on certified standards
• Considerable savings when used as a remote maintenance
solution together with SCALANCE S and SCALANCE M
compared to expensive service callouts
Industrial Security
Security Integrated
SOFTNET Security Client
Industrial Security
Security Integrated
SOFTNET Security Client
Industrial Security
Security Integrated
Industrial Security Services
■ Overview
G_IK10_XX_10376
Threat assessment Development of security Incident detection and
Risk analysis policies and procedures remediation
Implementation of security Timely response to the
technology changing threat landscape
The merge of data systems in the production and office environ- In the second "implementation" stage - the measures defined in
ments has made many processes faster and easier, while the the assessment are implemented, i.e.:
use of the same data processing programs creates synergies. • Training:
These developments, however, have also increased the security Personnel are given specific training so that they understand
risk. what IT and infrastructure security means in the industrial
Today it is no longer just the office environment that is under environment.
threat from viruses, trojans and hackers - production plants are • Process improvement:
also at risk of malfunctions and data loss. Many weak spots in Security-relevant regulations and guidelines relating to the
security are not obvious at first glance. For this reason, it is existing plant requirements are drawn up and implemented.
advisable to check existing plants in regard to security and to • Security technologies:
optimize them in order to maintain a higher level of plant avail- Protective measures are implemented for hardware and
ability. To enhance the security of a plant against cyber attacks, software, as well as in the plant network; in addition, long-term
a multi-level service concept for Industrial Security is available protection through monitoring is available.
from Siemens Industry.
The first step involves "assessment" – the initial examination of
The measures defined and implemented in the first two phases
are continuously developed in the third phase of "operation and
8
the existing plant. This identifies weak spots or deviations from management", i.e. monitoring the security status of the plant,
standards. The result of this examination is a detailed report checking the security level, redefining and optimizing actions,
about the actual status of the plant with a description of the weak as well as regular reports and functions such as updates,
points and an assessment of the risks. The report also contains backup and restore. Even if changes are made to the plant net-
suggested actions for improving the level of security. work, the software environment or the administration of access
rights for users and administrators, services increase the secu-
rity level so that the corresponding data remains in the plant and
attackers are given minimal opportunities to compromise the
plant. The phases of implementation, operation and manage-
ment are tailored precisely to meet the existing needs.
Industrial Security
Security Integrated
Industrial Security Services