Intelilite 4 Cyber Security Guide 22-01
Intelilite 4 Cyber Security Guide 22-01
Table of contents 2
1 Document information 3
2 Overview of Cyber Security features in InteliLite 4 6
3 Getting started with the controller 13
IMPORTANT: This type of paragraph highlights a procedure, adjustment etc., which can cause a
damage or improper function of the equipment if not performed correctly and may not be clear at
first sight.
Example: This type of paragraph contains information that is used to illustrate how a specific function
works.
Note: The differences in Cyber Security rules that apply for trusted and untrusted interfaces will be
mentioned in further parts of the document.
Account attributes
Each user account has following attributes:
User login
When a connection with the controller is established an user must authenticate (log-in) into the controller.
The user may log in into the controller using one of following methods:
Entering valid combination of username and password
Entering valid combination of user ID and PIN (only Trusted interfaces (page 6))
IMPORTANT: It is not possible to manage users while administrator is logged in with UID/PIN
only. Managing users requires the administrator to log-in with username/password.
username password
"administrator" <controller s.n.>
The alarm “Wrn Default Password” is displayed while the factory default account is present in the controller.
Lost password
If administrator password is lost and it is no more possible to manage the controller the user accounts can be
reset back to factory default state.
IMPORTANT: In controller the backup e-mail address must be correctly filled-in to perform the
reset operation!
1. Request code must be read from controller using InteliConfig via some trusted interface (e.g. USB) and
sent to technical support or put into ComAp "InteliBot" service.
2. Action code is then returned to the adjusted backup e-mail address.
3. Action code must be then written into the controller using InteliConfig via some trusted interface (e.g.
USB). After that user accounts are reset to factory default state.
Production mode
The Production mode is intended to simplify manufacturing process for OEMs.
While production mode is active the implicit user has administrator level and alarm "Wrn Production
Mode" is displayed
Practically it means that while production mode is active it is possible to perform any operation with the
controller without any user needed to login.
IMPORTANT: Production mode must be disabled before the controller is put into regular
operation.
Interface protection
The protection takes place if a person attempting to login into the controller repeatedly provides incorrect user
identification, i.e. the identifier is neither a valid username nor user ID.
After 20 consequent attempts as described above the respective interface is blocked for 2 minutes.
While the interface is blocked it is not possible to log-in, even with correct credentials.
Note: The principle of levels is known from previous controllers and basically remains without changes.
Note: As the AirGate is Untrusted interfaces (page 6) it is also required that a user will login into the
controller immediately after connection has been created.
2.5 Firewall
Firewall function allows to restrict computers which can connect to the communication services in the
controller based on computer IP address. E.g. it is possible to restrict that in the local network only one
specific computer (let's say SCADA computer in the control room..) can access controller's MODBUS/TCP
server.
Firewall function is enabled/disabled by setpoint IP Firewall. Location of the setpoint depends on
controller and interface type (e.g. in setpoint group "CM-4G-GPS" or "CM-Ethernet").
Firewall function affects only incoming traffic for application services (i.e. application services that "listen"
for connection), thus AirGate is not influenced as it is not a "listening" service but it actively creates
outgoing traffic.
IMPORTANT: Improper adjustment of the firewall can cause the current connection would be
interrupted and the controller would remain inaccessible remotely!
2.5.2 Examples
Rule: IP=192.168.1.0, MASK=255.255.255.0, PORT=23
Note: Some communication services (protocols) have their IP ports adjustable by setpoints. E.g.
ComAp/TCP protocol is listening by default at port 23, but can be changed to any other port number by
setpoint. The firewall rules must be adjusted to match the port to which the service is adjusted.
E.g. if ComAp/TCP protocol port was changed from default 23 to, let's say, 9923 the firewall rules for this
protocol must be created for port 9923 as well.
Note: Valid for InteliLite 4 controller equipped with plug-in Ethernet module.
2. Use buttons "Add","Remove","Edit" to create accounts according to your needs. See the chapter Account
attributes (page 7) about details related to attributes of the accounts.
5. Adjusting correct backup e-mail address is an essential step for resetting user accounts to default state (if
administrator password is lost). The action code for resetting is automatically sent to this e-mail address
and thus if incorrect address is provided it will not be possible to receive the code.
6. Go again to the "User Management" window and remove the default administrator account or at least
change his password. The alarm "Wrn Default Password" will disappear.
7. In the "User Management" window disable the "Production mode". The alarm "Wrn Production Mode" will
disappear.
6. After a while you will receive e-mail with "PRAC code". Select carefully the code a copy it to clipboard.
7. Paste the PRAC code into the InteliConfig "Password Reset" window into the "PRAC code" field.
Note: You may close the "Password Reset" window or even temporarily disconnect InteliConfig
between steps 3 and 7.
Examples of rules
Rule Allowed IP address
0.0.0.0/0.0.0.0 any
10.10.1.0/255.255.255.0 range 10.10.1.1 to 10.10.1.255
10.10.1.100/255.255.255.255 single address 10.10.1.100
3. Think out some string consisting of digits and letters with length 6-15 chars and put it into the dialog.
Note: AirGate Key can not be displayed. If the key is forgotten new one must be defined.
Firewall requirements
IMPORTANT: This is related to firewall located in the network infrastructure (LAN), not to the
controller firewall function.
There is not any requirement for inbound traffic. All traffic related to AirGate is outbound (i.e.
from controller to Internet)
Outbound TCP traffic from Controller IP address to any IP address in Internet to port 54440 must
be allowed.