FuB LineIntegration PDINetwork V2.2 en
FuB LineIntegration PDINetwork V2.2 en
Communication in
Food & Beverage
Siemens
Plant Network Structure Industry
Online
https://support.industry.siemens.com/cs/ww/en/view/109476976 Support
Legal information
Legal information
Use of application examples
Application examples illustrate the solution of automation tasks through an interaction of several
components in the form of text, graphics and/or software modules. The application examples are
a free service by Siemens AG and/or a subsidiary of Siemens AG ("Siemens"). They are
non-binding and make no claim to completeness or functionality regarding configuration and
equipment. The application examples merely offer help with typical tasks; they do not constitute
customer-specific solutions. You yourself are responsible for the proper and safe operation of the
products in accordance with applicable regulations and must also check the function of the
respective application example and customize it for your system.
Siemens grants you the non-exclusive, non-sublicensable and non-transferable right to have the
application examples used by technically trained personnel. Any change to the application
examples is your responsibility. Sharing the application examples with third parties or copying the
application examples or excerpts thereof is permitted only in combination with your own products.
The application examples are not required to undergo the customary tests and quality inspections
of a chargeable product; they may have functional and performance defects as well as errors. It is
your responsibility to use them in such a manner that any malfunctions that may occur do not
result in property damage or injury to persons.
Disclaimer of liability
Siemens shall not assume any liability, for any legal reason whatsoever, including, without
limitation, liability for the usability, availability, completeness and freedom from defects of the
application examples as well as for related information, configuration and performance data and
any damage caused thereby. This shall not apply in cases of mandatory liability, for example
under the German Product Liability Act, or in cases of intent, gross negligence, or culpable loss of
life, bodily injury or damage to health, non-compliance with a guarantee, fraudulent
non-disclosure of a defect, or culpable breach of material contractual obligations. Claims for
damages arising from a breach of material contractual obligations shall however be limited to the
© Siemens AG 2019 All rights reserved
foreseeable damage typical of the type of agreement, unless liability arises from intent or gross
negligence or is based on loss of life, bodily injury or damage to health. The foregoing provisions
do not imply any change in the burden of proof to your detriment. You shall indemnify Siemens
against existing or future claims of third parties in this connection except where Siemens is
mandatorily liable.
By using the application examples you acknowledge that Siemens cannot be held liable for any
damage beyond the liability provisions described.
Other information
Siemens reserves the right to make changes to the application examples at any time without
notice. In case of discrepancies between the suggestions in the application examples and other
Siemens publications such as catalogs, the content of the other documentation shall have
precedence.
The Siemens terms of use (https://support.industry.siemens.com) shall also apply.
Security information
Siemens provides products and solutions with Industrial Security functions that support the secure
operation of plants, systems, machines and networks.
In order to protect plants, systems, machines and networks against cyber threats, it is necessary
to implement – and continuously maintain – a holistic, state-of-the-art industrial security concept.
Siemens’ products and solutions constitute one element of such a concept.
Customers are responsible for preventing unauthorized access to their plants, systems, machines
and networks. Such systems, machines and components should only be connected to an
enterprise network or the Internet if and to the extent such a connection is necessary and only
when appropriate security measures (e.g. firewalls and/or network segmentation) are in place.
For additional information on industrial security measures that may be implemented, please visit
https://www.siemens.com/industrialsecurity.
Siemens’ products and solutions undergo continuous development to make them more secure.
Siemens strongly recommends that product updates are applied as soon as they are available
and that the latest product versions are used. Use of product versions that are no longer
supported, and failure to apply the latest updates may increase customer’s exposure to cyber
threats.
To stay informed about product updates, subscribe to the Siemens Industrial Security RSS Feed
at: https://www.siemens.com/industrialsecurity.
Table of contents
Legal information ......................................................................................................... 2
1 Industrial Communication in Food and Beverage Industry .......................... 5
2 Driver for an industrial network concept ........................................................ 8
2.1.1 High availability .................................................................................... 9
2.1.2 Robustness ........................................................................................ 10
2.1.3 Flexibility ............................................................................................. 10
2.1.4 Security – network security and access control ................................. 10
2.1.5 Moving units ....................................................................................... 11
2.1.6 Safety – plant and operational safety ................................................. 11
2.1.7 Determinism ....................................................................................... 12
3 General industrial network standards ........................................................... 13
3.1 Industrial Ethernet .............................................................................. 16
3.2 PROFINET ......................................................................................... 18
3.3 Field Device Bus Systems.................................................................. 22
3.4 Industrial Wireless Communication .................................................... 23
4 Standards for specific requirements ............................................................. 24
4.1 Siemens redundancy technology ....................................................... 24
4.1.1 High Speed Redundancy Protocol (HRP) .......................................... 24
4.1.2 Standby-Connection ........................................................................... 25
© Siemens AG 2019 All rights reserved
Office Network
Core Layer
WAN External
WAN Core Internet
Router Firewall
Firewall / IDS Firewall / IDS
L3 Connection
Backbone 1 Backbone n
Industrial Datacenter
Backbone Layer
L3 Connection L3 Connection
Server
Distribution Layer
L3 Connection
Aggregation 1-n Aggregation 1-n
Aggregation Layer
Aggregation 1-1 Aggregation 1-2
Industrial Network
Standby Feature L3 Connection
Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-2-n Cell 1-2-n
Cell 1-1-1 Cell 1-1-2 Cell 1-1-3 Cell 1-1-4 Cell 1-2-1 Cell 1-2-2
Sync
Access Layer
Cell Layer
Line
Ring
Tree/Star
Figure 1: Production network as basis for reliable automation and digitalization systems
© Siemens AG 2019 All rights reserved
Having been a trusted partner by electrifying and automating several industrial plants worldwide,
Siemens is now a trusted partner for Digitialization, striving to be the pioneer within this new age
of production, whether in the discrete or process industries.
Digitalization is already changing every aspect of our customers' business in the near future and
the right communication networks are the basis for this. Enterprise and production networks
look completely different, but are still connected with a defined interface. We want to connect
these two “worlds” while making sure that the requirements of each are met.
Looking at the picture above, the suggested way is to establish a production network to create a
structured and reliable platform to support different communication needs. The production cell
level is already responsible for production. The industrial backbone level is also an integral part
of the production network and in collaboration and alignment with IT, as an interface to
interconnect production with the enterprise network.
IT and production have to agree about the need to fulfill the automation requirements in order to
ensure that the production runs 24/7. The suggested way us to have a defined backbone for the
industrial side. The production cells are often managed by automation experts who are
familiarized with the requirements in the OT space. But now, with the need for more and more
communication based on Ethernet and for access to this data from anywhere in the world and to
connect different production lines, the need for full IT involvement is growing.
We need to make sure that this whole network and the horizontal M2M communication that is
required, is fully managed and still all the requirements in the automation/OT space.
In this way, even if there is a failure in the evening, someone capable of solving this issue, for
example, is needed 11.00 pm, without having to wait for several hours until IT with an SLA
Agreement arrives on site.
Co-operation on an equal footing, a clear communication channel and a defined interface are
necessary. “We invite you to a dialogue with IT”
© Siemens AG 2019 All rights reserved
Figure 3: Not all things are alike – There are differences between both worlds
Against this backdrop, there are many stringent customer requirements for an
industrial network. In particular, the safety of a plant and its particular requirements
relating to functionality and flexibility must be taken into account. With the
increasing communication between office and production networks, additional
security measures are unavoidable to achieve a suitable security level for the plant
components. A consensus must be found between user-friendliness, flexibility, and
compatibility of a production network on the one hand and the security and
protection on the other hand. This consensus can be achieved with network
components specially developed for the industrial environment. They must provide
functionality that ensures smooth operation of a production plant and nevertheless
allows reliable and secure network communication.
The following subchapters deal with typical customer requirements to give a clear
picture of the production-related requirements; a brief overview is given here:
High availability is an absolute necessity for a production plant and if this is not the case,
economic and other damage can result for a company. For this reason, when operating a
production plant, availability must be ensured. This can be achieved, for example, by setting up
the components redundantly. In particular for a production network, this means that network
connections must be designed redundantly and be operable and activated in case of
errors/faults. In addition to having redundant devices, there are special network protocols which
allow redundancy in a network.
2.1.2 Robustness
There are individual environmental conditions in the plants of diverse companies around the
globe. The devices used must be capable of withstanding these particular conditions. This also
applies to network products. They must, for example, be able to resist high temperatures or
dusty and corrosive climatic conditions of an industrial factory building or similar locations and
nevertheless perform their functions reliably and without errors. These requirements apply not
only to the devices but to all accessories such as cabling or antennas.
Figure 6: Robustness
2.1.3 Flexibility
Figure 7: Flexibility
Every production area must be protected against unauthorized access. Here, security measures
must be considered in order to implement them, for example with firewall systems and a
suitable cell protection concept. Secure remote access also needs to be taken into account, e.g.
for third-party manufacturers, to allow maintenance work on defined plant sections.
Figure 8: Security
Parts of production or a warehouse can include moving systems such as forklift trucks, rail
vehicles, or portable mobile devices. These usually also require a connection to IT systems.
Especially for rail vehicles or AGVs,1 Siemens provides a solution with the IWLAN RCoax cable
to allow uninterrupted IWLAN communication along a preset path.
Safety functions serve to protect people and machines. This includes the option of an immediate
emergency stop of a machine and direct forwarding to the suitable controller. This is possible,
for example, not only with cabled solutions, but also via industrial WLAN (IWLAN). The safety
signals need to be transferred reliably and with the highest priority, regardless of the media.
© Siemens AG 2019 All rights reserved
2.1.7 Determinism
Industrial networks are used for the most part for control processes with processing taking place
cyclically. Determinism is a basic requirement such kind of processes. The cyclical processing is
the basic difference of the communication in the industry in comparison with client server
applications in IT. Some applications require short, fast deterministic cycle times to quickly bring
machines into a safe state. Examples of this are PROFIsafe applications in which people and
machines work with each other in coexistence.
With regard to the safety requirement, the following must apply: The signal transmission must
be performed and completed within a defined response time. If network devices cannot
implement this requirement, for example, an emergency stop cannot be performed although an
emergency stop switch has already been activated. At the heart of this problem is the aspect of
synchronous operation. Only if the sensors, controllers, and actuators work synchronously, are
operation and the expected work result ensured. There must be determinism for a machine to
machine (M2M) architecture, regardless of whether communication takes place via a cable or
wireless.
• High-speed data exchange between the different plant sections and machines
Our range
Communication networks are of utmost importance for automation solutions.
Networking for Industry stands for a diverse range of modular blocks – designed for
different industries – which contribute to efficiently solving communications tasks:
• In the different production areas
Industrial Networking offers solutions which both maximize the benefits of Ethernet
and simplifies integration into fieldbus systems. Noticeable examples are:
• The development of the field level for the use of Industrial Ethernet
• Complete integration from the field level to the corporate management level
Worldwide trends
Decentralization has been taking on increasing importance worldwide for a number
of years now. A distributed plant structure can reduce installation, maintenance and
diagnostics costs. This involves intelligent devices working locally and being
connected together across networks. Openness and flexibility are important in
order to expand existing setups and to connect up different systems. For this
reason, international committees define and standardize the standards for bus
systems.
Industrial Networking offers all the components needed for an integrated overall
solution and supports the following communication systems:
• Industrial Ethernet and Industrial Wireless LAN (based on the Ethernet
standard IEEE 802.3 and 802.11 a/b/g/h/n/ac wireless LAN standards). The
international standard for robust networks is the number one in industrial LAN
environments. Industrial Ethernet enables powerful communication networks to
be constructed over widely distributed areas.
The following communication functions and services are offered by Industrial Ethernet.
• PG/OP communication
Comprises integrated communication functions which allow data
communication via SIMATIC, SIMOTION automation systems with every HMI
device and SIMATIC PG (STEP 7). PG/OP communication is supported by
PROFINET/Industrial Ethernet and PROFIBUS.
• Open communication
The open communication allows controllers to communicate with other
controllers, PC/IPC and third-party systems using libraries.
3.2 PROFINET
PROFINET innovations
PROFINET has been expanded with several innovative features. These simplify
the system configuration, in safety-critical applications for example, and support a
leaner and more flexible topology in many different scenarios.
The I-Device (Intelligent Device) function enables simple and fast controller-
controller communication through direct access to the IO address image with the
PROFINET -protocol. Local controllers such as the SIMATIC ET 200S/SP CPU can
be integrated into modular machines more easily, for example.
The Shared Device function allows two controllers to access the same PROFINET
Device, such as a distributed SIMATIC ET 200 or a drive in a safety application.
Because fewer devices need to be installed in the field, the engineering, cabling,
energy and installation costs are reduced.
Plant availability can be increased using a ring topology and the Media
Redundancy Protocol (MRP). This runs directly by way of the integrated RJ45 ports
on PROFINET devices and can be combined in any way with the relevant
managed Industrial Ethernet switches from Siemens (for example
SCALANCE X series).
• Flexible topologies. PROFINET also enables the use of star, tree and ring
topologies in addition to the linear topology.
• Open standard
• Web tools
• PROFINET is 100 percent Ethernet and supports TCP/IP. Among other things,
this enables the use of Web technologies, such as access to the integrated
Web server of the field devices.
• Expandability
• Easy cabling
Fault-free establishment of industrial networks in a short time and without
specialist knowledge: PROFINET makes this possible with the FastConnect
system.
• Precision
Communication by way of PROFINET is deterministic. A jitter of < 1 µs results
in maximum precision cycles and thus guarantees high product quality.
• Media redundancy
Higher plant availability can be achieved by means of a redundant installation –
even bumpless (zero delay). This can be implemented both with the help of
external switches and direct via integral PROFINET interfaces.
© Siemens AG 2019 All rights reserved
• Fast start-up
In modular plants, Controllers must detect new machines or plant sections
quickly. With Fast Startup, PROFINET can detect devices in up to < 500 ms
and connect them with the Controller.
PROFIBUS
PROFIBUS can be used to connect field devices, e.g. distributed I/O devices or
drives, to automation systems such as SIMATIC S7, SIMOTION, or PCs.
PROFIBUS is standardized in accordance with IEC 61158/61784 and is a powerful,
open and rugged fieldbus system with short response times. PROFIBUS is
available in different forms for various applications.
AS-Interface
AS-Interface (Actuator Sensor Interface, AS-i) is an industrial networking solution
(physical layer, data access method and protocol) used in PLC, DCS and PC-
based automation systems. It is designed for connecting simple field I/O devices
(e.g. binary ON/OFF devices such as actuators, sensors, rotary encoders, analog
inputs and outputs, push buttons, and valve position sensors) in discrete
manufacturing and process applications using a single 2-conductor cable.
© Siemens AG 2019 All rights reserved
IO LINK
IO-Link is the first standardized IO technology worldwide (IEC 61131-9) for
communication with sensors and also actuators. The powerful point-to-point
communication is based on the long-established 3-wire sensor and actuator
connection without additional requirements regarding the cable material. So, IO-
Link is not a fieldbus but the further development of the existing, tried-and-tested
connection technology for sensors and actuators.
Overview
Within the scope of industrial communication, wireless communication opens up
new perspectives – from partial modernization of a plant right up to optimizing
complex logistics or production processes.
We are offering SCALANCE W products for applications with wireless LAN and
SCALANCE M products for mobile wireless. There is a wide variety of different
country variants and approvals.
The use of wireless LAN in the industrial environment can present several
challenges. For some industrial applications it might be an advantage to bring
determinism in the air. This is possible with the iPCF (industrial point coordinated
function) method. With the standard wireless method DCF (distributed coordinated
function) more or less, every participating device is responsible for the
communication by itself, with iPCF is the Access Point responsible for the
coordination of sending and receiving frames.
Applications such as cranes, overhead monorails or AGVs depend on industrial
functions in the WLAN and can only be designed and conceived as "fat access
points". The reason is the absence of “iFeatures" in controller-based systems.
These applications must be considered as separate machines. These systems
require deterministic communication that can only be ensured by the “iFeatures".
Protection against unauthorized access via the wireless interface is ensured on the
© Siemens AG 2019 All rights reserved
• Maintenance work is simplified, service costs and downtimes are reduced and
personnel are used optimally
• Integrated wireless network for voice and data across the divisions of the
company
• Remote diagnostics for different production machines from a central service
location reduces service costs
• Moving installations can be accessed easily; there is no need for complex
wiring
A managed switch has parameter settings for a redundancy manager that opens
the ring to prevent circulating frames (loops). In terms of data transmission, the ring
topology becomes a linear bus. The redundancy manager (RM) monitors the ring
topology by sending test frames via both ring ports and checks that they arrive at
the other ring port. The other switches function as redundancy clients. There ring
ports forward the test frames within the ring.
If the test frames of the redundancy manager no longer reach the other ring port
due to an interruption in the ring (broken cable; device etc.), the redundancy
manager switches its two ring ports through and informs the redundancy clients of
the change immediately. In terms of data transmission, the ring topology becomes
a linear bus again. Even if the redundancy manager fails, the ring becomes a
functioning linear bus.
PROFINET IE PROFINET IE
4.1.2 Standby-Connection
RM RM
RM RM
Ethernet with
Spanning Tree
Industrial
Ethernet
© Siemens AG 2019 All rights reserved
The passive listening function of the industrial switch supports the forwarding of
STP/RSTP/MSTP etc. frames through the network without participating actively in
this mechanism. This gives the STP/RSTP/MSTP network components the
possibility of solving a loop at the coupling point between the different topologies.
PROFINET IE PROFINET IE
Ethernet with
BPDU
Spanning Tree
RM
Industrial
Ethernet
RM RM
network on one side. This will solve a potential loop with the connection between
the networks active.
If the active connection between the network parts is disturbed due to malfunction
or a broken link, the STP/RSTP/MSTP network components will recognize the
absence of BPDU frames on the blocked port. This leads to the switchover from
blocking to forwarding at the now single connection between the parts. The
connection between the networks is reestablished.
PROFINET IE PROFINET IE
4.1.4 RSTP+
MRP Interconnect is used to couple two redundant MRP rings. The requirement for
MRP Interconnection is that MRP is used in all rings involved. Four devices are
involved in the redundant coupling of two rings with MRP-Interconnection. One
media redundancy interconnection manager (MIM) and three media
interconnection clients (MIC).
© Siemens AG 2019 All rights reserved
Depending on the connection status, the Interconnection ports send the MIC
(media redundancy interconnection client) status messages (link-up or link-down)
to the MIM. Interconnection ports are ports between which the primary or
secondary connection is established. The MIM is thus always informed about the
connection status between the Primary MIC and the Primary Coupled MIC
(“primary connection") as well as its own connection to the Secondary Coupled
MIC (“secondary connection"). In regular operation, data exchange between the
two rings takes place via the primary connection and the MIM blocks its
Interconnection port. If a link-down of the primary connection is signaled to the
MIM, it switches its Interconnection port to the status "Forwarding" and data
exchange between the two rings takes place via the secondary connection
between MIM and Secondary Coupled MIC. It has a convergence time of 200 ms.
The following prerequisites must be met for the use of the media redundancy with
MRPD:
• All participating devices must support MRPD, including the terminals at the
switch, which through a ring component cyclically exchanges IRT data.
• MRP is configured for all participants in the ring. The MRP role “Not device
in the ring” is assigned to all devices that are not in the ring
© Siemens AG 2019 All rights reserved
• NAPT, ...
simple and protect their network from SINEC NMS that support the NAT MIB tables
external access. enable the monitoring of the complete
solution
o It is more complex to operate, maintain and
troubleshot a network with multiple NAT
subnetworks.
NOTE NAT may be an advantage for OEM machine builders in keeping the IP
configuration simple and protecting their network from external access.
5 Network topologies
There are multiple desirable network topologies for each part of the plant network.
Hundreds of approaches to design a convenient are available in the industry. We
think most of them use office grade components, but due to the harsh conditions
and performance requirements, these networks require industrial grade solutions to
handle the needs of industry. Your network should provide the reliable backing a
production needs. This goal is reachable due to one point we keep in mind when
we are designing solutions.
Typically networks within production facilities can be split into three areas.
Office Network
Core Layer
A
WAN External
WAN Core Internet
Router Firewall
Firewall / IDS Firewall / IDS
L3 Connection
Backbone 1 Backbone n
Industrial Datacenter
Backbone Layer
L3 Connection L3 Connection
Server
Distribution Layer
B
L3 Connection
Aggregation 1-n Aggregation 1-n
Aggregation Layer
Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-2-n Cell 1-2-n
Cell 1-1-1 Cell 1-1-2 Cell 1-1-3 Cell 1-1-4 Cell 1-2-1 Cell 1-2-2
Sync
Access Layer
Cell Layer
Line
Ring
C
Tree/Star
A Enterprise Network
C Production Cell:
Production cells are separate network zones for different assembly lines,
production cells or machines. Within this area, workplaces are grouped by security
standards, communication relationships, production specific layouts or delivery
scopes of different OEMs within the plant. Production cells can be small tree, star
© Siemens AG 2019 All rights reserved
or line networks or can also contain redundant ring structures if the production
process demands such solutions.
5.2 Segmentation
A functional segmentation of the production network into IP subnets provides is
one of the core tasks of planning a reliable automation network. Segmentation
brings several benefits:
• Security protection against unauthorized access (deliberate or accidental)
• Stability “Not to sink the entire ship” in case of failures (reduce the size of the
broadcast domain)
• Performance guarantee for the different segments
Typical criteria for choosing the borders between different segments are:
• Amount of notes within a cell
• Product specific areas (Production area, Packaging area, Utility area)
• Machine builder or system integrator specific areas
Practice has shown that production networks require stronger protection against
unauthorized access due to longer machine runtimes compared to normal PCs.
Office networks, whose computers are continuously maintained and secured by
patch management, antivirus programs and software distribution systems, are less
vulnerable. In contrast, in production it is rather careless to patch machine
computers or provide them with antivirus programs without consulting the
manufacturer of the machine. Updates can, for example, lead to unforeseen
problems due to incompatibility of the software or hardware. In addition to this,
antivirus programs may have unwanted effects on communication and cause a
plant standstill or similar. For this reason, in production particular caution is
necessary and the use of antivirus programs and the fast import of updates or
patches must be planned with farsightedness and be well thought out.
© Siemens AG 2019 All rights reserved
Office Network
Core Layer
WAN External
WAN Core Internet
Router Firewall
Firewall / IDS Firewall / IDS
L3 Connection
Backbone 1 Backbone n
Industrial Datacenter
Backbone Layer
L3 Connection L3 Connection
Server
Distribution Layer
L3 Connection
Aggregation 1-n Aggregation 1-n
Aggregation Layer
Aggregation 1-1 Aggregation 1-2
Industrial Network
Standby Feature L3 Connection
Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-2-n Cell 1-2-n
Cell 1-1-1 Cell 1-1-2 Cell 1-1-3 Cell 1-1-4 Cell 1-2-1 Cell 1-2-2
Sync
Access Layer
Cell Layer
Line
Ring
Tree/Star
© Siemens AG 2019 All rights reserved
Connection types:
1. Layer 2 connection
Switches from the enterprise network usually use RSTP5 and/or MSTP6. They can
be connected to the production backbone with device or path redundancy. Some
devices from enterprise switch manufacturers do not support RSTP, these should
be set to MSTP. The switches in the production backbone must have "passive
listening" activated to allow the device-redundant link. With path-redundant
connections, RSTP should be activated on the according ports of the production
switch.
RSTP and MSTP are point-to-point protocols; the information is only exchanged
between neighboring devices with so-called BPDUs7. The "passive listening"
function, however, allows transparent forwarding of the entire information, i.e. the
BPDU frame. If this frame arrives at a device with RSTP capability, the information
can be evaluated normally. With this function it is possible to ensure that no loops
result even in this constellation.
With a layer 2 connection, network errors from the enterprise can affect
production and in the other direction network errors in production can affect the
enterprise network. This makes troubleshooting much more difficult since the
CAUTION sources of the errors cannot be clearly assigned to a segment. In addition to this,
the consequences of such errors can affect all areas of the network.
The advantage of dynamic routing protocols is the automatic learning of the paths
between the individual networks. This is the reason why dynamic routing protocols
are better suited for larger or complex networks. If individual connections fail,
alternative paths are automatically searched, or known paths are enabled for
communication. The SCALANCE X 400/500 families support the protocols RIP and
OSPF for the dynamic creation of the routing table.
RIP
RIP is a "distance vector" protocol. It is based on the Bellmann-Ford algorithm and
is available as version 2. RIP aligns its routing tables to the neighboring routers.
This is achieved with "advertisements" which are sent every 30 seconds. The
extent of the network may only be a maximum of 15 hops. Changes to the routing
are only disseminated slowly in the network, due to the time-controlled updates of
OSPF
OSPF is a "link state" protocol. It is based on the Dijkstra algorithm. OSPF sends
incremental updates if changes have occurred in the network. In addition to this,
"summary information" messages are sent every 30 minutes. All routers in the
same "area" have the same network topology databases. Fast convergence times
are achieved due to event-based updates. Another advantage of OSPF is the
option of using several routes with the same metric at the same time, known as
"ECMP13". This allows load balancing over multiple paths, which in turn means an
increase in availability.
The OSPF routers use the multicast addresses 224.0.0.5 and 224.0.0.6 for
communication within broadcast domains. Multicast 224.0.0.5 is used for
communication between all "Shortest Path First" routers. Multicast 224.0.0.6 is
used for the communication between the DR14 and the BDR15 and for all routers
that send "link state update" and "link state acknowledgement" packets to the DR.
© Siemens AG 2019 All rights reserved
NOTE The routes are learned automatically and if the network grows, routing adjusts
without big effort. Changes to the routing both within the production network as
well as in the enterprise network require less effort than with static routing.
Therefore we recommend using a dynamic routing protocol like OSPF for
connecting to the office IT environment.
• Antivirus servers
• Windows patch & update servers
• Webservers & Fileservers
• Secure remote access servers (VPN) and Jumphosts
• Network monitoring and maintenance tools
A DMZ can be build up in two ways:
Enterprise Network
Core
WAN External
WAN Core Internet
Router Firewall
Firewall / Firewall /
DMZ DMZ
L3 Connection
Backbone 1 Backbone n
Production Datacenter
Production Backbone
Distribution
L3 Connection L3 Connection
Server
Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-1-n Cell 1-2-n Cell 1-2-n
Cell 1-1-1 Cell 1-1-2 Cell 1-1-3 Cell 1-1-4 Cell 1-2-1 Cell 1-2-2
Sync
Production Cell
Access
Line
Ring
Tree/Star
The production lines are connected to the central plant backbone topology. These
switches are capable of handling the traffic from the lines to the upper network.
These switches support Gigabit Ethernet up to 10Gbps Ethernet and can interface
the industrial Datacenter and the office network with Layer 2 or Layer 3 protocols.
The connectivity of the cells/production lines may use variable single or redundant
connection and protocols. Regarding the cell protection, a common practice is the
connectivity via firewall with or without NAT functionality
Layer 2 protocols:
• Rapid Spanning Tree Protocol (RSTP - IEEE 802.1d-2004)
• RSTP + (Siemens)
Layer 3 protocols:
• Static Routing
The devices inside machines are connected with a simple line topology. This is the
easiest way to connect all devices. It gives the machine builder the possibility of
scaling the network by simply upscaling the chain.
PROFINET
HMI
Energy
PLC
© Siemens AG 2019 All rights reserved
I/O
Drives
Motion
All diagnostic functions described in the suggested Industrial Ethernet switches are
available for the customer. Additional feature like Loop Detection secure the health
of the network due to wrong plugged connections. With SCALANCE XC-200 as the
central switch, another option is available. The switch has the capability to perform
1:1 NAT. This gives the machine builder the possibility to reuse his
SIMATIC/SIMOTION projects including the IP addresses of all devices within the
machine, thereby minimizing efforts to use multiple of a specific machine in the
same production line or network.
• For modular concepts, it is possible to use the same engineering projects for
identical machines in the same production line, so the machine network can
have identical addresses
PROFINET
HMI
Energy
PROFINET IRT
PROFINET PROFINET
Controller
© Siemens AG 2019 All rights reserved
Devices
HMI
Energy
Motion Drives
© Siemens AG 2019 All rights reserved
Devices
Use of CPs
With the use of CPs, a network separation can be easily archived. But for
diagnosis, an IP routing is necessary. This is just available for the latest Advanced
CP for S7-300/S7-400 and S7-1200/S7-1500 on the CP ports. For all other
devices, no IP routing is available.
Line 1 Line 2
PROFINET IE (MRP)
10.120.10.2
10.120.10.1
10.120.10.131
10.120.10.132
10.120.10.133
192.168.0.1
192.168.0.1
192.168.0.1
192.168.0.2 192.168.0.2 192.168.0.2
NOTE The use of CPs enables the implementation of network segmentation, but also
limits diagnostic features and access to all devices. Therefore we do not
recommend the use of CPs for network segmentation.
NAT translation
The NAT functionality converts a Line/Plant IP to a local machine ID. This is a 1:1
connection. That means that for each IP out of the machine (that is needed to
diagnose, show of Webserver, aso.) has to get an IP in the line IP area.
• Extra hardware is necessary to use the NAT feature
Line 1
© Siemens AG 2019 All rights reserved
10.120.10.1
PROFINET
192.168.0.5 192.168.0.4
10.120.10.131
192.168.0.2
192.168.0.1
192.168.0.3
192.168.0.2
192.168.0.4 192.168.0.3
SCALANCE SC
NOTE There is also a NAPT feature. This feature reduces the number of IPs by using
ports. But no diagnose is possible.
Based on our expertise, we recommend using hardware NAT solutions with the
SCALANCE S which also provide additional security features such as firewall or
VPN tunnels.
If one IP area is used plant / line / machine wide, diagnostic functionalities will work
for all components.
• No extra hardware is necessary
Line 1 Line 2
PROFINET IE (MRP)
10.120.10.2
10.120.10.1
© Siemens AG 2019 All rights reserved
10.120.10.141
10.120.10.151
10.120.10.132
10.120.10.142
10.120.10.152
This is the preferred solution if access from the top level to the sensors with full
functional scope is targeted.
6 Remote Access
Due to the ever-growing distances between support personnel and the systems
that have to be maintained (e.g. support personnel working in the field) support and
remote dial-ins are gaining in significance and place high demands on security
solutions because of the additional potential security risks. Firstly, additional
exceptions must be defined at the access point firewalls; secondly, this could mean
malicious code could be allowed to run in the plant with administrative rights from a
support PC, even if this is unintentional.
In order to guarantee the best-possible security for the plant to be maintained, all
access must be authenticated and authorized through a combination of several
technologies and security mechanisms. A "direct dial-in" into the device to be
serviced offers monitoring options that are too weak, and this is therefore not for
consideration.
In addition to the connection of machines, the segmentation of individual
manufacturing areas or individual cells and their protection, maintenance access is
an important topic for the people responsible for production. If errors occur, it is
important for production that the manufacturer of the production machines can
have remote access to the defective machine quickly and without complications. To
meet this requirement, several issues must first be clarified. How can we make
sure that no additional areas of production are disturbed as a result of the remote
access? Can it be ensured that this access cannot be used as a back door to the
overall production network or even the enterprise network? Does the company
© Siemens AG 2019 All rights reserved
have a security policy that must be taken into account? Is a different department
responsible for remote access?
The different options for implementing remote access are described in the following
chapters.
6.2 cRSP
To enable a secure and reliable connection to the plant, Siemens offers the use of
the Siemens Remote Service Platform. This offers the opportunity to access
industrial plants flexibly, securely, and comprehensibly.
Facts:
• More than 220,000 systems are connected to the Remote Service Platform
and obtain service from it.
• The Siemens Remote Service Platform can be used by both Siemens and by
external customers and partners.
• Safe
• Transparent
• Comprehensible
To use the Siemens Remote Service Platform, an access point is required in the
plant. There are multiple ways of doing this:
• IPsec Tunnel
• SSL
Using SSL
For access using SSL encryption, a Windows system on which the Siemens
Remote Service Platform SSL client can be installed is required. After installation
and registration, the device on which the SSL client has been installed can be
accessed. To enable communication with the Remote Service Platform,
communication from the device to the IP address 194.138.37.194 must be possible
via port 443.
For medium-sized and large companies it is normal to have central gateways to the
Internet to optimize the management effort for protection and monitoring. In this
case, the tunnel at the gateway from the Internet would be terminated in the
intranet. To arrive at the relevant machine, the IP packet would need to be
transported through the intranet all the way to the machine. IT managers will not
like the idea of third-party companies using the enterprise network as a transfer
network for remote access to the machine. As an alternative, a different setup as
shown on the following page can be implemented.
An IPsec VPN tunnel is set up via the Internet between the machine manufacturer
and the company network. This is terminated in the DMZ20 of the company and
routed via the company firewall. An additional VPN tunnel from the DMZ to the
machine network channels the traffic for the maintenance access. In addition, this
kind of maintenance access can be improved from a security perspective by using
a jump host in the DMZ. This jump host can act as a platform for maintenance
personnel (e.g. third parties) and provides them after successful authentication with
a desktop environment and the necessary tools to access the machine.
With SINEMA Remote Connect and a Jump Host application in a DMZ, a service
technician can be able to have remote access to the plant.
© Siemens AG 2019 All rights reserved
20 Demilitarized Zone
Characteristics
The solution described in this application has the following characteristics:
• User management and connection management via a central server
application.
• No direct access to the plant possible due to the implementation of a DMZ.
• Secured and remote access worldwide to the plant.
• Controlled, encrypted data traffic between users, widely distributed plants and
machines through a VPN tunnel.
• Verification of the SINEMA Remote Connect Server by fingerprints.
• Low investment and operating costs for monitoring and controlling remotely
connected substations.
• High degree of security for machines and plants through the implementation of
the cell protection concept.
• Protocol-independent, IP-based communication.
Easy connection of terminal units (e. g. SCALANCE S615) and SINEMA Remote
Connect Client using the auto configuration interface.
https://support.industry.siemens.com/cs/ww/en/view/109746841
© Siemens AG 2019 All rights reserved
The document “Security concept for process and discrete industries provides a
deep dive into this topic.
https://assets.new.siemens.com/siemens/assets/public.1503485245.618c6572c64
a2737e8ee59de5397110cab29e657.whitepaper-security-2016-v10-en.pdf
NOTE To ensure a maximum level of security, you should follow documentations and
recommendations from the vendor. Specific checklists for SCALANCE system
hardening are available:
https://support.industry.siemens.com/cs/ua/en/view/109745536
Identification of risks
• Examination and classification of vulnerabilities
• In accordance with IEC 62443 and ISO 27001 as well as the SIMATIC PCS 7,
WinCC and SINUMERIK security concept
• Recommendation of suitable security measures
– Integrated interfaces
Products Description
http://w3.siemens.com/mcms/industrial-
communication/en/ie/industrial-ethernet-switches-media-
converters/Pages/industrial-ethernet-switches-media-
converters.aspx
http://w3.siemens.com/mcms/industrial-
communication/en/industrial-wireless-communication/iwlan-
industrial-wireless-lan/Pages/iwlan.aspx
http://w3.siemens.com/mcms/industrial-
communication/en/industrial-remote-communication/remote-
networks/Pages/remote-networks.aspx
© Siemens AG 2019 All rights reserved
https://w3.siemens.com/mcms/industrial-
communication/en/ie/network-security/Pages/network-
security.aspx
availability
• Transparency of network load for IO data as well as NRT traffic down to the
port level
• Network optimization via calculation of the network load down to the port level
www.siemens.com/sinetplan
8.2.2 PRONETA
www.siemens.com/proneta
SINEC NMS is a new generation of the Network Management System (NMS) for
the Digital Enterprise, one that’s equipped to deal with more and more complex
network structures in an increasingly digital world. This system can be used to
centrally monitor, manage, and configure networks with 50 to 12,500 devices
around the clock. SINEC NMS is therefore the first choice for complex network
structures, and it is paving the way for the digital transformation of industry – in all
industries and regardless of network size. The scalability of SINEC NMS means it
can grow in parallel as the network becomes larger and more complex.
© Siemens AG 2019 All rights reserved
SINEC NMS is divided into two levels to efficiently manage large-scale networks:
As the central entity, the control level quickly displays a clear view of the network's
overall status. Operations are also managed here. These operation levels, in turn,
are distributed throughout the network and implement the configuration settings
from the control level on all devices.
SINEC NMS is the central element of our complete portfolio for all aspects of
industrial networks, which consists of components, software, trainings, services,
and support. Our portfolio covers all network elements and assists companies in
training their employees to maximize data security and availability.
Benefits
• Comprehensive monitoring for large and complex networks
More information:
https://new.siemens.com/global/en/company/topic-areas/industrial-communication-
networks/professional-services.html
9 References
To ensure the future security of this document and to enable the inclusion of third-
party manufacturers and their products in the security concept, the following
internationally recognized standards are observed: Further measures for future
security are:
Standard Description
Compliance Metrics
Security Program
Security Program
IACS Environment
Control Systems
Assurance Levels
Development
Components
Standard Description
(PCS)"
10 Glossary
This section defines names, terms, and abbreviations as they are used in this
collection of documents.
Due to normative activities and in order to present the current network concept to
SIMATIC customers in a uniform and internationally recognized vocabulary of
concepts and terminology, the updating of some terms from the documents used
has become necessary.
Most names, terms, and abbreviations have been taken from internationally
recognized standards (e.g. ISA-S95, ISA-S99) or the latest respective descriptions
from the manufacturer (see source information).
10.1 Abbreviations
Abbreviation Explanation
CP Communication Processor
© Siemens AG 2019 All rights reserved
IT Information Technology
OT Operational Technology