ABB 800xa 5.0 Automation System Network Design and Configuration
ABB 800xa 5.0 Automation System Network Design and Configuration
800xA - System
System Version 5.0
The information in this document is subject to change without notice and should not be
construed as a commitment by ABB. ABB assumes no responsibility for any errors that
may appear in this document.
In no event shall ABB be liable for direct, indirect, special, incidental or consequential
damages of any nature or kind arising from the use of this document, nor shall ABB be
liable for incidental or consequential damages arising from use of any software or hard-
ware described in this document.
This document and parts thereof must not be reproduced or copied without written per-
mission from ABB, and the contents thereof must not be imparted to a third party nor used
for any unauthorized purpose.
The software or hardware described in this document is furnished under a license and
may be used, copied, or disclosed only in accordance with the terms of such license.
This product meets the requirements specified in EMC Directive 89/336/EEC and in Low
Voltage Directive 72/23/EEC.
TRADEMARKS
All rights to copyrights, registered trademarks, and trademarks reside with their respec-
tive owners.
Section 1 - Introduction
Network Topologies ........................................................................................................20
Plant Network.......................................................................................................21
Client/Server Network .........................................................................................21
Control Network...................................................................................................21
Network Areas .....................................................................................................22
Combined Client/Server and Control Network....................................................22
Client/Server Network and Control Network on Separate Network Areas .........23
Large Configuration with Control Network on Two Network Areas ..................24
Controller Communication via PPP .....................................................................25
Introduction of Network Redundancy .............................................................................26
Selection of IP Addresses ................................................................................................27
Recommended IP Address Plan ...........................................................................28
Recommended IP Address Plan for Non-RNRP Networks .................................32
Introduction of Domain Controllers ................................................................................33
Introduction of DNS ........................................................................................................34
3BSE034463R5001 5
Table of Contents
6 3BSE034463R5001
Table of Contents
3BSE034463R5001 7
Table of Contents
8 3BSE034463R5001
Table of Contents
3BSE034463R5001 9
Table of Contents
10 3BSE034463R5001
Table of Contents
INDEX ........................................................................................................................223
3BSE034463R5001 11
Table of Contents
12 3BSE034463R5001
About This Book
General
This instruction describes how to configure the IndustrialIT 800xA Automation
System Network, including the Client Server Network, the Control Network, and
how to connect to a Plant Network. It generally does not cover fieldbuses.
The section about Network equipment however applies to Ethernet communication
in general, which means that it also applies to Fieldbuses using Ethernet.
For the 800xA Automation System network the following main topics are covered:
• System Network topologies
• Network Redundancy
• Domain and DNS configuration
• Clock Synchronization
• Network installation and maintenance
• Network Security
Section 1, Introduction introduces the topics and the following sections describe
them in more details.
For configuration of users, user groups, security settings, and group policies,
please refer to IndustrialIT 800xA, System, Administration and Security
(3BSE037410Rxxxx).
This instruction does not describe configuration of general purpose networks, such
as an office or plant network, neither does it cover the situation where IndustrialIT
800xA products are connected to a general purpose network.
3BSE034463R5001 13
Document Conventions About This Book
Document Conventions
Microsoft Windows conventions are normally used for the standard presentation of
material when entering text, key sequences, prompts, messages, menu items, screen
elements, etc.
Electrical warning icon indicates the presence of a hazard which could result in
electrical shock.
Warning icon indicates the presence of a hazard which could result in personal
injury.
Tip icon indicates advice on, for example, how to design your project or how to
use a certain function
Although Warning hazards are related to personal injury, and Caution hazards are
associated with equipment or property damage, it should be understood that
operation of damaged equipment could, under certain operational conditions, result
in degraded process performance leading to personal injury or death. Therefore,
fully comply with all Warning and Caution notices.
14 3BSE034463R5001
About This Book Terminology
Terminology
A complete and comprehensive list of Terms is included in the IndustrialIT
Extended Automation System 800xA, Engineering Concepts instruction
(3BDS100972Rxxxx). The listing included in Engineering Concepts includes terms
and definitions as they that apply to the 800xA system where the usage is different
from commonly accepted industry standard definitions and definitions given in
standard dictionaries such as Webster’s Dictionary of Computer Terms.
Term/Acronym Description
Client Client is a part of a software that subscribes data from a
server.
Client/Server Network A client/server network is used for communication
between servers, and between workplaces and servers.
CNCP Control Network Clock Protocol. A protocol for
synchronization of clocks in Controllers on the Control
Network.
Connectivity Server A server that provides access to controllers and other
sources for real-time data, historical data, and alarm and
event data. A Connectivity Server runs services related
to OPC/DA, OPC/AE, OPC/HDA.
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
Hop count A measure of distance in a network. The hop count is
equal to the number of routers that must passed to reach
a destination.
IP Internet Protocol. A layer 3 protocol in the OSI model.
IP address A 32-bit address assigned to each host/node connected
on the network.
IP address mask A 32-bit address mask used on an IP address to
separate network from host identifier.
IPsec Internet Protocol Security
3BSE034463R5001 15
Terminology About This Book
Term/Acronym Description
LAN Local Area Network
MMS Manufacturing Message Specification. ISO standard for
communication between controllers.
MPLS Multi Protocol Label Switching
Node A computer communicating on a network e.g. the
Internet, Plant, Control or I/O network. Each node
typically has a unique node address with a format
depending on the network it is connected to.
PC Computer running the Windows operating system
Private IP addresses Blocks of IP address space that are reserved by the
Internet Assigned Numbers Authority (IANA) for free use
in private networks.
RMON Remote Monitoring. A standard for performing traffic
analysis
RNRP Redundant Network Routing Protocol
Router A computer/device that forwards IP data grams among
the networks to which it is connected
Server A node that runs one or several Afw Services.
It is the part of the software that supply data to a
subscriber.
SNMP Simple Network Management Protocol
SNTP Simple Network Time Protocol
STP Shielded Twisted Pair cable
TCP Transmission Control Protocol. A layer 4 protocol in the
OSI model.
UTC Coordinated Universal Time
UTP Un-shielded Twisted Pair cable
16 3BSE034463R5001
About This Book Related Documentation
Term/Acronym Description
WAN Wide Area Network
VPN Virtual Private Network
Related Documentation
A complete list of all documents applicable to the 800xA IndustrialIT Extended
Automation System is provided in Released User Documents, 3BUA000263Rxxxx.
This document lists applicable Release Notes and User Instructions. It is provided in
PDF format and is included on the Release Notes/Documentation media provided
with your system. Released User Documents are updated with each release and a
new file is provided that contains all user documents applicable for that release with
their applicable document number. Whenever a reference to a specific instruction is
made, the instruction number is included in the reference.
3BSE034463R5001 17
Related Documentation About This Book
18 3BSE034463R5001
Section 1 Introduction
3BSE034463R5001 19
Network Topologies Section 1 Introduction
Network Topologies
System communication in the IndustrialIT System is based on Ethernet and TCP/IP
networks, which are functionally and, in most cases, also physically built in levels.
The following figure shows the different levels in the network. Later sections will
describe more about why the system should be separated into different network
areas on different levels.
Internet
Thin Clients
Firewall
Plant Network
Workplaces
Isolation Device (clients)
Client/Server
Network
Servers
Control network
Controllers
Fieldbus
Field devices
20 3BSE034463R5001
Section 1 Introduction Plant Network
Plant Network
The Plant Network can be dedicated for process automation purposes or be a part of
the plant intranet already available on a site.
Client/Server Network
The Client/Server network is used for communication between servers, and between
client Workplaces and servers.
The Client/Server Network is a trusted network zone that should be protected by
firewalls. It is a private IP network that uses static addresses, see the
recommendations on page 27.
The Client/Server Network can optionally be made redundant.
Control Network
The Control Network is a local area network (LAN) optimized for high performance
and reliable communication, with predictable response times in real time.
Controllers and Connectivity Servers are connected to the control network.
The Control Network is based on Ethernet using the MMS protocol on top of a
TCP/IP protocol stack, plus additional services for time distribution, redundancy
features, etc. The control network can optionally be made redundant using the
RNRP redundancy protocol. Controllers connect to the control network via dual
built-in network ports. Server and client PCs need additional network cards to adapt
to redundant networks.
The Control Network should be kept as isolated as possible from all traffic that
does not belong to controller products. Other traffic may jeopardize
performance.
Only Industrial IT Certified products should be connected on the Control
Network.
It is recommended that separate networks be built for Ethernet based fieldbuses for
example FOUNDATION Fieldbuses HSE or TCP/IP based communication with the
INSUM System.
3BSE034463R5001 21
Network Areas Section 1 Introduction
Network Areas
The terms Client/Server Network and Control Network are used to describe the
system functions performed by these networks. From an IP routing point of view the
concept of Network Areas is used. A Network Area is a logically flat network that
does not contain IP routers. In Figure 1, the Client/Server Network and the Control
Network are different Network Areas with the Connectivity Servers potentially
being used as IP routers. A Network Area may be redundant or non-redundant. A
non-redundant Network Area maps to one IP subnet. A redundant Network Area
maps to two IP subnets.
Network Area 1
22 3BSE034463R5001
Section 1 Introduction Client/Server Network and Control Network on Separate Network Areas
Network Area 1
Client/Server
Network
Connectivity
Servers
Network Area 20
Control Network
3BSE034463R5001 23
Large Configuration with Control Network on Two Network Areas Section 1 Introduction
Network Area 1
Client/Server
Network
Fieldbus
24 3BSE034463R5001
Section 1 Introduction Controller Communication via PPP
Control Network,
Network Area X
PPP link
Each PPP link is a non-redundant Network Area. It is also possible to use a PPP link
between a PC and a Controller.
PPP is more described in the manual IndustrialIT 800xA, Control and I/O,
Communication, Protocols and Design (3BSE035982Rxxxx) and in the On-line
Help for the Control Builder.
3BSE034463R5001 25
Introduction of Network Redundancy Section 1 Introduction
Primary Network
Secondary Network
As long as the primary network paths are working, all process data is sent on that
network. The secondary network normally carries no user traffic. This guarantees
that network performance is not affected after a network fail over.
Both supervision of network paths and fail-over between Primary and Secondary
networks are performed by RNRP.
26 3BSE034463R5001
Section 1 Introduction Selection of IP Addresses
Selection of IP Addresses
When planning a system the user must decide what IP addresses to use for all nodes
in the system.
It is recommended that addresses be selected from a private address space.
This has the following advantages:
• There is no requirement to apply to the licensing authorities for an IP address,
i.e. it is easy to allocate a large IP address space especially in redundant
network configurations.
• Some protection is gained against illegal access because private addresses are
not permitted on the public Internet.
It is strongly recommended that addresses shown in the next chapter are used.
This greatly simplifies the network configuration and reduces the probability for
configuration errors.
If it is not possible to use the recommended IP addresses, then read about RNRP
addresses in RNRP Address Configuration: Implicit or Explicit on page 52 and in
Appendix A How to Choose IP Addresses on page 218.
3BSE034463R5001 27
Recommended IP Address Plan Section 1 Introduction
See also Recommended IP Address Plan for Non-RNRP Networks on page 32.
1. NetID is the left most part of the IP address. See Appendix A, Reference Details
28 3BSE034463R5001
Section 1 Introduction Recommended IP Address Plan
3BSE034463R5001 29
Recommended IP Address Plan Section 1 Introduction
The following addresses are recommended on the Control Network Area 20.
30 3BSE034463R5001
Section 1 Introduction Recommended IP Address Plan
The above tables but generic for any Network Area with the area number as
parameter ‘a’ is shown below (a = [0..31]).
3BSE034463R5001 31
Recommended IP Address Plan for Non-RNRP Networks Section 1 Introduction
Table 5. Suggested NetIDs and Subnet Masks for Networks that do not run RNRP
Do not use NetIDs that correspond to the RNRP Base Address for Non-RNRP
networks, i.e. with the default base address = 172.16; do not use the NetID
172.16.x for Non-RNRP networks. Otherwise an RNRP network area will be
implicitly defined and all nodes will get information about it for no use.
Table 6 gives a recommendation for usage of node numbers on the HSE Subnet.
Let the Connectivity Servers that connect to both the Client/Server Network and the
HSE Subnet use the same node number on both Network Areas
32 3BSE034463R5001
Section 1 Introduction Introduction of Domain Controllers
3BSE034463R5001 33
Introduction of DNS Section 1 Introduction
Introduction of DNS
DNS is a hierarchical name service for domains and IP addresses. The DNS service
enables client nodes on your network to register and resolve DNS domain names.
All Industrial IT applications that identify other nodes by name, i.e. not only by IP
Address, use DNS to find the corresponding IP address.
The names and IP Addresses are stored in a DNS database. A DNS Server is a
server containing information about a portion of the DNS database. The DNS server
handles queries from DNS resolvers in the clients.
There are two types of DNS queries:
• I know the name of a node. What is its IP address?
This is called Forward Lookup.
• I know the IP Address of a node. What is its name?
This is called Reverse Lookup.
To serve these queries the information in a DNS database is organized in Forward
Lookup Zones and Reverse Lookup Zones.
The client resolvers typically cache DNS information so that they do not need to
send all the queries to the DNS server.
Normally the primary Domain Name System (DNS) server is also run on the same
node as the Domain controller. With multiple domain controllers in a system the
DNS server functions are also distributed. This also improves the availability of the
DNS system.
Configuring the DNS functions in a system requires:
• Configuring the DNS server on the Domain Controller (s).
• Configuring names and IP addresses, for nodes that will be possible to identify
by name (see below), in the DNS database.
• Configuring knowledge of the domain and the DNS server(s) in each node that
uses DNS.
Further information about DNS can be found in the On-line help for DNS in
Windows Server, the help file dnsconcepts.chm and in the resource kits in
MSDN.
Section 4, Domain and DNS Configuration describes how to configure DNS.
34 3BSE034463R5001
Section 2 Distributed System Topologies
This section describes examples of how to build 800xA systems where different
parts of the system are located more or less far away from each other.
The standard system, where all nodes are located at more or less the same place,
is described in Figure 7 below..
For the discussion in this section there is no principle difference between the left
system with combined client server and control network and the right system with
separated networks.
The following sections describe different system configurations using remote
connections.
The focus here is where to place different node types. Section 8, Network Security
describes how to make sure that the remote connections are secure.
3BSE034463R5001 35
Extend the 800xA Automation System Network Section 2 Distributed System Topologies
If a client or a server is located far away, extend the Client Server Network to reach
to that place, see Figure 9.
36 3BSE034463R5001
Section 2 Distributed System Topologies Extend the 800xA Automation System Network
The traffic on the client server network normally is heavier than the traffic on the
Control Network. This means that if all controllers are located far away, it is still
recommended to locate the connectivity servers centrally and to extend the Control
Network over the remote connection. See Figure 10and Figure 11.
Figure 10. Locate Connectivity Servers centrally, extend the Control Network
Figure 11. Avoid locating the Connectivity Servers together with the Controllers
3BSE034463R5001 37
Extend the 800xA Automation System Network Section 2 Distributed System Topologies
If both the Client Server Network and the Control Network need to be extended the
straight forward solution would be to build two remote connections (4 in case of
redundancy). If the remote connection has sufficient bandwidth it is possible to run
both networks on the same link. To separate the networks VLANs can be used as
shown in figure Figure 14. Section Reducing HW using Virtual LANs on page 179
describes more about how to do this.
38 3BSE034463R5001
Section 2 Distributed System Topologies Equal System Sections on Different Locations
3BSE034463R5001 39
Security Considerations Section 2 Distributed System Topologies
Figure 15. One 800xA System with two connected equal parts
For a distributed 800xA system to work with full functionality the remote
connection needs to be reliable. If it is broken some functions may be lost.
For example: In a system with 2oo3 redundancy for the Aspect Servers with two
Aspect Servers on one side of the connection and one on the other, the side with
only one Aspect Server can not be engineered if the remote connection is broken.
Security Considerations
If a part of the system network is extended via a remote connection the whole
connection and both sides of it need to be treated the same way regarding network
security, e.g. having the same security level. The protocols used between the nodes
on the control network and on the client server network are not designed to be used
through a firewall. Section 8, Network Security describes different alternatives for
how to extend the Automation System Network through firewalls.
40 3BSE034463R5001
Section 3 RNRP and Network Configurations
This section describes the Network Redundancy based on the Redundant Network
Routing Protocol (RNRP). The main areas covered are:
• the concepts of the RNRP protocol
• how to build different network structures
• how to choose addresses
• how to configure nodes; PCs and Controllers
3BSE034463R5001 41
Redundant Network Routing Protocol (RNRP) Section 3 RNRP and Network Configurations
The RNRP redundancy concept works with standard network devices (hubs,
switches or bridges) and no special functionality is required from the network
interface cards (NICs).
The protocol gives high flexibility to integrate networks with different types of data
links like PPP and Ethernet. The routing update period can be configured to fit on
very slow serial links as well as on high speed networks mixed in the same Control
Network.
IP routing works for Unicast communication (node to node), not for Multicast or
Broadcast. This means that RNRP does NOT provide redundancy or routing for
Multicast or Broadcast communication.
Applications that use Multicast or Broadcast must take care of the network
redundancy themselves, if desired communication between different network
areas.
All RNRP versions used in previous system versions of the 800xA System are
compatible with each other.
42 3BSE034463R5001
Section 3 RNRP and Network Configurations Network Areas
Network Areas
A network that uses RNRP is built up by one or more Network Areas.
A Network Area is a logically flat network structure without routers.
Routers are not allowed within a Network Area.
A Network Area with redundancy contains two independent IP networks with equal
capacity. The individual networks within a Network Area are assigned
Path Numbers.
The primary network has Path Number = 0 and the secondary network has
Path Number = 1.
Primary Network
Path Number = 0 Node Numbers
11 21
Secondary Network
151 152 153
Path Number = 1
3BSE034463R5001 43
Fault Handling within a Network Area Section 3 RNRP and Network Configurations
The path number is a parameter on each network interface (see RNRP Address
Configuration: Implicit or Explicit on page 52).
Each path on a Network Area corresponds to one IP subnet. The NetID is the
same for all interfaces on the same Path. (see IP Addresses on page 217)
Applications communicating with nodes that run RNRP shall always address the
nodes on the primary network (path 0).
In case of error on the primary network, the Redundant Network Routing Protocol
(RNRP) redirects traffic over to the secondary network (the backup network)
without involving any application program.
Nodes with redundant interfaces and nodes with a single interface can be mixed on
the same Network Area. A node with only one interface must only be connected to
the primary network.
A B
Network
X X Errors
C D E
44 3BSE034463R5001
Section 3 RNRP and Network Configurations Fault Handling within a Network Area
In this example communication between node A and node B is not possible but all
other peer communication will work.
Node A can communicate over secondary network with nodes C, D and E.
Node B can communicate over primary network with nodes C, D and E.
Nodes C, D and E are fully redundant to each other.
3BSE034463R5001 45
Multiple Network Areas and RNRP Routers Section 3 RNRP and Network Configurations
46 3BSE034463R5001
Section 3 RNRP and Network Configurations Multiple Network Areas and RNRP Routers
Network Area 1
Connectivity
Servers as
RNRP
Network Area 20 Network Area 21
Routers
Figure 19. Network with Three Network Areas and Connectivity Servers as Routers
3BSE034463R5001 47
Multiple Network Areas and RNRP Routers Section 3 RNRP and Network Configurations
Controllers as Routers
The AC 800M controller can be used as router between non-redundant networks.
There is no parameter to enable the routing capability. It is always enabled when
RNRP is used and the controller is connected to two different network areas.
It is not possible to use two AC 800M Controllers to achieve a redundant
connection between two redundant networks. For this 4 network interfaces per
router is needed. This is described below.
Network Area 1
Connectivity
Node 21 Servers as
Primary router Node 22
redundant
RNRP Routers
Network Area 20
Figure 20. Two Network Areas with Redundant Connectivity Servers as Routers
48 3BSE034463R5001
Section 3 RNRP and Network Configurations Multiple Network Areas and RNRP Routers
In cases where multiple routes exist to a remote Network Area, the router that has
the highest number of reachable nodes is selected as primary. If all routers have
an equal number of reachable nodes then the router with the shortest distance
(hop count) is selected as primary. If routers have equal distance then the
intermediate network with lowest Network Area number is selected as the
primary.
The network engineer should recognize that if serial links area used within the
Control Network, throughput will be very low as compared to Ethernet alone.
In mixed configurations, it is recommended to put low Network Area numbers on
the high capacity networks and high numbers on slow networks.
A good rule to follow during network configuration is to make sure that all
alternative routes to destination nodes have equal distance (hop count).
A network error should not cause redirection to a route with a greater distance.
By following this rule, a network error will not change the node-to-node response
time and no node will receive unpredictable loads from transit traffic.
An RNRP router has several advantages compared to a standard IP router:
• No manual routing configuration is needed.
The routing information about all nodes and networks is spread
automatically.
• The routers can be redundant.
It is not possible to avoid a single point of failure when connecting two
redundant RNRP network areas with a pair of standard IP routers.
To do this two RNRP routers with 4 network ports each are needed, see
Figure 20 on page 48 and Figure 21 on page 50.
Such a router can only be built using a PC with 4 network interfaces.
It is not possible to achieve the same functionality with two routers with two
ports each.
3BSE034463R5001 49
Multiple Network Areas and RNRP Routers Section 3 RNRP and Network Configurations
50 3BSE034463R5001
Section 3 RNRP and Network Configurations Local Network Areas
fault) on Network Area 1, then the application will lose the current connection even
if it in theory it is possible to route via Node 21 to Node 22 on Area 20.
Application
connected to node 22
in Network Area 1
Node 71
Network Area 1
Both paths to
X
Network Area 1
are broken
Node 21 Node 22
Network Area 20
Figure 22. A Network Connection is lost if all Paths to a Node in the Destination
Network Area are Down
3BSE034463R5001 51
RNRP Address Configuration: Implicit or Explicit Section 3 RNRP and Network Configurations
1. IP addresses are described in more detail in the Appendix, section IP Addresses on page 217.
52 3BSE034463R5001
Section 3 RNRP and Network Configurations Using Explicit RNRP Configuration
3BSE034463R5001 53
Address Rules for Implicit RNRP Configuration Section 3 RNRP and Network Configurations
54 3BSE034463R5001
Section 3 RNRP and Network Configurations Address Rules for Implicit RNRP Configuration
XXXXXXXX.XXXXXX XXXXXXXX.XXXXXX00.00000000.00000000 is
equal to the Base Address
The 14 first bits is the Network Identity
PP Path Number
L Local Flag
AAAAA Network Area Number
NN.NNNNNNNN Node Number
3BSE034463R5001 55
RNRP Configuration Parameters Section 3 RNRP and Network Configurations
If the Local flag is 0 and the node number is less than 256 the formula is a bit
simpler:
A = N1
B = N2 + Path
C = Area*4
D = Node
Example:
Base Address = 172.16.0.0, Network Area = 2, Node number = 201
(Local = 0, Node number < 256) =>
Primary Network Interface (Path = 0): 172.(16+0).(2*4).201 = 172.16.8.201
Secondary Network Interface (Path = 1)172.(16+1).(2*4).201 = 172.17.8.201
56 3BSE034463R5001
Section 3 RNRP and Network Configurations RNRP Configuration Parameters
In a PC the RNRP parameters are set with the RNRP configuration wizard,
see Configuring RNRP in a PC on page 68. The base parameters and the explicit
parameters are located under different tabs.
3BSE034463R5001 57
RNRP Configuration Parameters Section 3 RNRP and Network Configurations
System type (PC) 1..127 System type that will be displayed by e.g. the
(fixed set in a RNRP Network Monitor.
controller) Note that bit zero is reserved and is not a part
of the System Type.
1-70: Controllers
71-127: Workplaces
Number of explicit 0..8 Number of explicit specified network interface
addresses (PC) addresses with RNRP parameters.
(not configured in a Default: 0.
controller) For a controller this is decided by the values
of the RNRP address parameters for the
Ethernet ports
Enable ICMP 0..1 Internet Control Message Protocol. This
Redirects(PC) parameter can cause the stack to plumb route
(not configured in a host.
controller) Default: 0, do never change
To make a change of this parameter effective
the node needs to be restarted.
58 3BSE034463R5001
Section 3 RNRP and Network Configurations RNRP Configuration Parameters
3BSE034463R5001 59
RNRP Configuration Parameters Section 3 RNRP and Network Configurations
If the parameters, Network Identity, Send Period, and Max number of lost
messages, are valid for all the network interfaces used in this node, no explicit
interface parameters have to be defined and the value of parameter numExplicit
must be zero.
If the base parameters are not acceptable to all Network Areas or if the implicit
addressing scheme does not fit the installed network (true for all point-to-point
links), then the RNRP parameters have to be specified explicitly for every
individual network interface. Please see Table 8.
For many parameters in the explicit tabs in the RNRP Wizard (see Configuring
RNRP in a PC on page 68) and on the individual Ethernet interface for a
controller setting the value 0 means that the corresponding base parameter will be
used.
Table 8. RNRP Explicit Parameters
60 3BSE034463R5001
Section 3 RNRP and Network Configurations RNRP Configuration Parameters
3BSE034463R5001 61
Mixing Explicit and Implicit RNRP Configuration Section 3 RNRP and Network Configurations
A user that configures with explicit parameters must follow these rules:
• The Node number must be the same as the HostID (the least significant bits in
the IP address). An exception to this rule is when the IP address mask is equal
to 255.255.255.255 in which case RNRP will use the IP class C address
internally, i.e. the Node Number must be equal to the least significant byte in
the IP address, i.e. D if the IP address is A.B.C.D.
• Parameters nodeNo, sendPeriod, and maxLostMessages, must have the same
values on both redundant paths within one Network Area.
62 3BSE034463R5001
Section 3 RNRP and Network Configurations Use of Standard IP Routers between RNRP Network
172.16.8.0
172.17.8.0 Network Area 2
3BSE034463R5001 63
Use of Standard IP Routers between RNRP Network Areas Section 3 RNRP and Network
The network IP addresses inside a Network Tunnel Area can be freely selected, the
RNRP protocol does not restrict IP address selection.
A Tunnel Area border node collects network information about all known Network
Areas on its side of the tunnel and send the collected information to the Tunnel Area
border node on opposite side of the tunnel.
An RNRP Tunnel Area only has one network path. There is no support of redundant
paths within a Tunnel Area. If redundant connections are required then two parallel
Network Tunnel Areas can be configured. This is shown in Figure 24 on page 65.
64 3BSE034463R5001
Section 3 RNRP and Network Configurations Use of Standard IP Routers between RNRP Network
Network nextHop
.1 .1 172.16.4.0 138.204.0.1
172.17.4.0 138.204.0.1
138.201.0.0 138.204.0.0
172.16.8.0 138.205.0.2
.2 .2
172.17.8.0 138.205.0.2
138.206.0.1 138.205.0.2
.1 .1
Tunnel Area 32 Tunnel Area 33
138.202.0.0 WAN1 138.205.0.0 WAN2 Network nextHop
172.16.4.0 138.205.0.1
.2 .2 172.17.4.0 138.205.0.1
172.16.8.0 138.206.0.1
172.17.8.0 138.206.0.1
.2 .2 138.204.0.1 138.205.0.1
The routing 138.203.0.0 138.206.0.0
configurations for .1 .1
area = 33
Tunnel area 32 are router = 138.206.0.2
the same as in target = 138.204.0.1
Figure 23
172.16.8.0
172.17.8.0 Network Area 2
Figure 24. Redundant RNRP Tunnel Areas between Network Area 1 and 2
Applications inside the Tunnel Area border node itself do not get redundancy
between the two Tunnel Areas.This means that the Tunnel Area border nodes should
not be nodes that run applications that need to use the tunnel.
3BSE034463R5001 65
Use of Layer 2 VPN Solutions Section 3 RNRP and Network Configurations
The Tunnel is not recommended to make direct use of public networks since the
private Network Areas are exposed by the routers. If a link over Internet is
requested than a secure tunnel using Layer 3 VPN technique is recommended. See
Use of Layer 3 VPN Solutions on page 67 and Virtual Private Networks (VPN) for
Secure Connections on page 203.
Network Area N
(untagged traffic)
Network Area N
(untagged traffic)
66 3BSE034463R5001
Section 3 RNRP and Network Configurations Use of Layer 3 VPN Solutions
RNRP in a PC
This section describes how to install and configure RNRP in a PC.
3BSE034463R5001 67
Installing RNRP Section 3 RNRP and Network Configurations
Installing RNRP
RNRP is installed together with other products.
It is always included in the AC 800M controller firmware.
For PCs it is automatically installed when the Process Portal is installed.
RNRP can also be used in PCs that do not use any other 800xA software.
On the 800xA System DVD RNRP is available as a component that can be installed
without the rest of the 800xA System.
Configuring RNRP in a PC
Normally the only item to configure is the IP address for each Network Adapter and
this will be handled during the installation of Windows.
If the implicit RNRP configuration is used normally RNRP does not need to be
configured after being installed.
68 3BSE034463R5001
Section 3 RNRP and Network Configurations Configuring RNRP in a PC
Figure 26. RNRP Setup Wizard Mainly for Explicit Configuration of RNRP,
the Tabs “Parameters” and “Explicit address 0”
3BSE034463R5001 69
Verify RNRP Connectivity Section 3 RNRP and Network Configurations
Figure 27. Dialog to Configure Network Areas where PPA Nodes Communicate
70 3BSE034463R5001
Section 4 Domain and DNS Configuration
DNS Strategies
Configuring DNS for an 800xA system is much the same as for any system using
Windows, but there are also some specific things to consider:
• The administration of the DNS configuration shall be as simple as possible;
let the nodes register their addresses and names in the DNS Server
automatically.
• Reverse lookup queries on any address for a node shall give the correct name.
This means that there must be a reverse lookup zone for both the primary and
the secondary network.
• All forward lookup queries shall give a unique IP Address in all situations.
This must work also during cable breaks or if only one of the DNS Servers is
working. This is discussed more in Assuring that Forward Lookup Queries
give a Unique IP Address on page 81.
• DNS queries shall be as quick as possible in all situations, including when only
one of the DNS Servers is working. This is described more in DNS
Configuration in Each Node on page 83.
3BSE034463R5001 71
Allocating 800xA Systems to Domains Section 4 Domain and DNS Configuration
72 3BSE034463R5001
Section 4 Domain and DNS Configuration Configuring DNS Functionality
NetBIOS Considerations
NetBIOS is an old Microsoft protocol for network communication between nodes
with Microsoft Windows operating systems. With Windows 2000 and beyond, the
importance of NetBIOS has been reduced. For example, for name resolution DNS is
used instead of NetBIOS. There are however still some functions that need
NetBIOS. One example is the ability to use the Windows Explorer to browse
neighbor nodes under “My Network Places\Entire Network\Microsoft Windows
Network”. The same Windows functionality is used to locate possible nodes for
connection of Clients and Servers when running the Configuration Wizard.
This means that NetBIOS is needed on the Client Server network, but it is not
needed on the Control Network. NetBIOS and the browsing functions do however
not work well if the Domain Controller is “Multi Homed”, i.e. is connected to more
than one network. Therefore using redundant networks, NetBIOS should be
disabled on the secondary network.
3BSE034463R5001 73
Which Nodes use DNS Section 4 Domain and DNS Configuration
74 3BSE034463R5001
Section 4 Domain and DNS Configuration Operating System for Domain Controllers
3BSE034463R5001 75
Recovering after a Crash of the First Installed Domain Controller Section 4 Domain and DNS
76 3BSE034463R5001
Section 4 Domain and DNS Configuration Recovering after a Crash of the First Installed Domain
3BSE034463R5001 77
Time Synchronization in a Domain Section 4 Domain and DNS Configuration
78 3BSE034463R5001
Section 4 Domain and DNS Configuration DNS Server Configuration
• The DNS Lookup Zones are Active Directory integrated and allow dynamic
update of records from nodes that enter the network, see Figure 31.
Make sure that the parameter Dynamic updates is set to Secure Only or Non
secure and secure.
Figure 28. System Properties for a Domain Controller with Computer Name
3BSE034463R5001 79
DNS Server Configuration Section 4 Domain and DNS Configuration
Figure 29. DNS Database with one Forward Lookup Zone and two Reverse Lookup
Zones. The Data base is shared between DNS Servers.
80 3BSE034463R5001
Section 4 Domain and DNS Configuration Assuring that Forward Lookup Queries give a Unique IP
3BSE034463R5001 81
Assuring that Forward Lookup Queries give a Unique IP Address Section 4 Domain and DNS
This scheme is preferred, but realized that the Forward lookup zones will contain
two addresses for nodes when using a redundant network. Forward lookup queries
of the DNS server will return both these addresses.
The order of the addresses typically depends from which network the query is
received. This is not acceptable. To prevent this make sure that only the primary
network addresses are available in the Forward Lookup Zones. This can be achieved
in the following way:
• Set the parameter Register this connection’s addresses in DNS to false for
the Secondary Network Interfaces. (See Figure 33 on page 85)
• Add the Secondary address in the reverse lookup zone for the secondary
network manually.
An alternative method is to:
1. Set the parameter Register this connection’s addresses in DNS to true for
both the Primary and the secondary Network Interface.
2. Let the PC register both addresses in DNS.
3. Set the parameter Register this connection’s addresses in DNS to false for the
Secondary Network Interface.
4. Delete the Secondary address from the Forward Lookup Zone.
It is not recommended to disable the Dynamic update for a Forward Lookup Zone.
The Forward Lookup Zones contain more information about the domain controllers
than just node names. This information must be allowed to update dynamically.
82 3BSE034463R5001
Section 4 Domain and DNS Configuration DNS Configuration in Each Node
3BSE034463R5001 83
DNS Configuration in Each Node Section 4 Domain and DNS Configuration
Figure 32. Network Identification with full Computer Name and Primary DNS
Suffix for Domain Member Computers
84 3BSE034463R5001
Section 4 Domain and DNS Configuration DNS Configuration in Each Node
Figure 33. DNS Configuration for Primary and Secondary Network Interface
3BSE034463R5001 85
Configuring the Order of the Network Interfaces Section 4 Domain and DNS Configuration
Figure 34. NetBIOS shall only be enabled on the Primary Client Server Network
86 3BSE034463R5001
Section 4 Domain and DNS Configuration Windows Workgroups Instead of Windows Domain
3. Set the order of the Network Interfaces in the Adapters and Bindings tab,
according to Figure 35.
3BSE034463R5001 87
Managing PC Names with Host Files Section 4 Domain and DNS Configuration
88 3BSE034463R5001
Section 4 Domain and DNS Configuration Example of IP Addresses and DNS Configuration
Domain Aspect
Domain Client 71
Controller 1 Server 11
Controller 2
Client/Server
Network Area 1 Network
Connectivity
Connectivity Connectivity
Server 21
Server 22 Server 23
This is not a recommended way to connect a system with only so few nodes. It is an
example to show concepts. A system with more servers, clients and controllers
would be configured in a similar way.
3BSE034463R5001 89
Example of IP Addresses and DNS Configuration Section 4 Domain and DNS Configuration
Forward Reverse
Preferred Alternate Auto register
Node name Node Area Path IP Address NetBIOS lookup lookup
DNS server DNS server in DNS
zone zone
Domain 1 1 0 172.16.4.1 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
Controller 1
1 172.17.4.1 172.16.4.2 172.16.4.1 No No No Yes manual
Domain 2 1 0 172.16.4.2 172.16.4.2 172.16.4.1 Yes Yes Yes auto Yes auto
Controller 2
1 172.17.4.2 172.16.4.1 172.16.4.2 No No No Yes manual
Aspect 11 1 0 172.16.4.11 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
Server 11
1 172.17.4.11 172.16.4.2 172.16.4.1 No No No Yes manual
Connectivity 21 1 0 172.16.4.21 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
Server
AC 800M 21 1 172.17.4.21 172.16.4.2 172.16.4.1 No No No Yes manual
Connectivity 22 1 0 172.16.4.22 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
Server
AC 800M 22 1 172.17.4.22 172.16.4.2 172.16.4.1 No No No Yes manual
Connectivity 23 1 0 172.16.4.23 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
Server
AC 800M 23 1 172.17.4.23 172.16.4.2 172.16.4.1 No No No Yes manual
Client 71 71 1 0 172.16.4.71 172.16.4.1 172.16.4.2 Yes Yes Yes auto Yes auto
90 3BSE034463R5001
Section 4 Domain and DNS Configuration Verifying DNS and NetBIOS Configuration
Forward Reverse
Preferred Alternate Auto register
Node name Node Area Path IP Address NetBIOS lookup lookup
DNS server DNS server in DNS
zone zone
Table 9 shows how to set the DNS parameters for the Network Adapters in the PCs
and what IP addresses to enter in the DNS Lookup Zones.
Each row in Table 9 represents a network interface in a PC or a Controller.
Node, Area and Path are the RNRP address parameters for the Network Interface.
[n.a.] means “not applicable”, e.g. the parameter Preferred DNS server does not
exist for the network interfaces in the controllers.
[empty] means that nothing is to be entered on this parameter.
“Auto register in DNS” Yes/No tells if the check box “Register this connections
addresses in DNS” is to be marked or not.
The two last columns tell if the corresponding IP address should be entered in the
respective Lookup Zones in the DNS server. “Yes auto” means that it will be entered
automatically. “Yes manual” means that it must be entered manually. “No” means
that it should not be entered.
3BSE034463R5001 91
nslookup Section 4 Domain and DNS Configuration
C:\>nslookup sevst-w-0001815
Server: ahc-domainctrl1.lab.ahc
Address: 172.16.4.1
Name: sevst-w-0001815.lab.ahc
Address: 172.16.4.91
The query is sent to the DNS server ahc-domainctrl1.lab.ahc at address 172.16.4.1.
The response is that the address for sevst-w-0001815 is 172.16.4.91.
Note that a single address is given as a response. This is because there was only one
record for sevst-w-0001815 in the forward lookup zone.
Reverse Lookup Queries will work for both Primary and Secondary addresses:
C:\>nslookup 172.16.4.91
Server: ahc-domainctrl1.lab.ahc
Address: 172.16.4.1
Name: sevst-w-0001815.lab.ahc
Address: 172.16.4.91
C:\>nslookup 172.17.4.91
Server: ahc-domainctrl1.lab.ahc
Address: 172.16.4.1
Name: sevst-w-0001815.lab.ahc
Address: 172.17.4.91
Check that you always get the same response by repeating the queries.
Check that you get the same response if the Primary Network is disconnected.
Check that you get the same response if the Primary DNS Server is disconnected.
This response will however come some seconds later since the first query is sent
only to the Primary DNS Server.
Do not use ping to verify that the DNS configuration works properly.
If NetBIOS is enabled, which it is by default, ping may find the node even if
DNS is not correctly configured.
The On-line help for DNS in Windows Server 2003 include advice for trouble
shooting DNS problems.
If there are problems with the DNS configuration the Windows Event Viewer
may contain useful information.
92 3BSE034463R5001
Section 4 Domain and DNS Configuration Special Considerations when Changing DNS
3BSE034463R5001 93
Verifying NetBIOS Configuration Section 4 Domain and DNS Configuration
• There is a Windows setting that may hide a node for browsing. After a normal
Windows installation this setting allows browsing, but if a node is not shown,
it should be checked.
Use the command line utility net config server on a node that is not
shown in the browse list. The printout contains a line that may read:
Server hidden Yes
To change the setting write net config server /hidden:No
• Check that the Windows Event Viewer (Start > Settings > Administrative
Tools > Event Viewer) does not contain any errors with the source “browser”.
94 3BSE034463R5001
Section 5 Time Synchronization
This section describes how to synchronize real time clocks in an IndustrialIT 800xA
System.
The first part of the section describes recommended time synchronization schemes
for the most common configurations:
1. Local Time Source on page 96.
2. External Time Source on page 100.
3. Windows Time Instead of AfwTime on page 103.
4. Systems with More Than One Control Network on page 106.
5. Systems with MB 300 and 800xA for AC 800M on page 107
6. MB 300 as Time Source for AC 800M on page 111.
7. Synchronization from the Client Server Network on page 114.
This is followed by a section describing how to set different configuration
parameters in controllers:
• Configure Time Synchronization in Controllers on page 117.
The rest of this section describes the different protocols and time synchronization
components:
• CNCP - Control Network Clock Protocol on page 120.
• SNTP - Simple Network Time Protocol on page 122.
• MB 300 Time Synchronization on page 124.
• MMS Time Synchronization on page 126.
• AfwTime Service on page 126.
• Time Synchronization for Connectivity Servers, Time Adaptors on page 134.
• Windows Time Service (W32Time) on page 139.
3BSE034463R5001 95
Recommended Time Synchronization Schemes Section 5 Time Synchronization
96 3BSE034463R5001
Section 5 Time Synchronization Local Time Source
When using 800xA for Harmony, 800xA for Melody, or 800xA for Advant Master
the connectivity servers shall act as SNTP server for the Domain Controller, see for
example MB 300 as Time Source for AC 800M on page 111.
When using a local time source it is recommended to periodically check and
possibly adjust the system time manually, e.g. once or a few times per year. To be
able to do this the controllers must be set to accept manual time setting. This is done
by setting the parameter “CS Time Set Enable” = true. See also section Setting the
System Time on page 145.
Domain
Controller Client Client Client
Client/Server Network
AfwTime Service sync
Time Server
SNTP Connectivity Server
CNCP
Clock Slave
Control Network
3BSE034463R5001 97
Local Time Source Section 5 Time Synchronization
Controller Type
CNCP, Master
Time Sync Protocol, Role CNCP, Slave
SNTP Server
Parameters
Parameters Value
98 3BSE034463R5001
Section 5 Time Synchronization Local Time Source
Table 12. Time Sync Configuration in Clients and Servers: Local Time Source
Node Type
Time Service
Enabled True False
Provider Definition
Time
Synchronization True True
TimeServerHandler Running
NtpServer Enabled = 0
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
3BSE034463R5001 99
External Time Source Section 5 Time Synchronization
Domain
Client Client Client
Controller
Client/Server Network
AfwTime Service sync
AfwTime Server
AC 800 Connectivity Server
CNCP
Clock Slave SNTP Server
SNTP
Control Network GPS Receiver
CNCP CNCP
Clock Master Clock Slave
SNTP Clients
100 3BSE034463R5001
Section 5 Time Synchronization External Time Source
Controller Type
SNTP, Client
Time Sync Protocol, Role SNTP, Client CNCP, Slave
CNCP, Master
Parameters
A.B.C.D and A.E.F.G are the addresses of the SNTP servers. One on each network
path.
Parameters Value
3BSE034463R5001 101
External Time Source Section 5 Time Synchronization
Table 16. Time Sync Configuration in Clients and Servers: External Time Source
Node Type
Time Service
Enabled True False
Provider Definition
Time
Synchronization True True
TimeServerHandler Running
NtpServer Enabled = 0
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
102 3BSE034463R5001
Section 5 Time Synchronization Windows Time Instead of AfwTime
Domain
Client Client Client
Controller
SNTP
Connectivity Server
SNTP
SNTP Server
Control Network
CNCP CNCP
Clock Master Clock Slave
SNTP Clients
3BSE034463R5001 103
Windows Time Instead of AfwTime Section 5 Time Synchronization
Controller Type
SNTP, Client
Time Sync Protocol, Role SNTP, Client CNCP, Slave
CNCP, Master
Parameters
A.B.C.D and A.E.F.G are the addresses of the SNTP servers. One on each network
path.
Parameters Value
104 3BSE034463R5001
Section 5 Time Synchronization Windows Time Instead of AfwTime
Table 20. Time Sync Configuration in Clients and Servers: Windows Time Sync
Node Type
Time Service
Enabled False False
Provider Definition
Time
Synchronization False False
TimeServerHandler Running
NtpServer Enabled = 1
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
3BSE034463R5001 105
Systems with More Than One Control Network Section 5 Time Synchronization
Domain
Controller Client Client Client
Client Server
Network
Controller Controller
Figure 40. Time Synchronization with more than one Control Network
To reduce the number of time servers it is possible to let controllers in one Control
Network use time servers in another Control Network via routing through the
Connectivity Servers. This gives a lower synchronization accuracy than if only local
servers are used, but with AC 800M controllers synchronizing from good SNTP
servers it can still be better than 1 ms between all controllers in the system.
Time Synchronization configuration in the Connectivity Servers differ between the
different Connect Products:
For 800xA for AC 800M see AC 800M Time Adaptor on page 135.
For 800xA for Advant Master see Advant Master Time Adaptor on page 135.
For 800xA for Harmony see Time Sync with 800xA for Harmony on page 138.
For 800xA for Melody see Time Sync with 800xA for Melody on page 139.
106 3BSE034463R5001
Section 5 Time Synchronization Systems with MB 300 and 800xA for AC 800M
Time Synchronization in the Control Networks that are not acting as time sources
for the Client/Server network also differs between Controller families:
• 800xA for AC 800M, 800xA for Harmony and 800xA for Melody: Use a GPS
clock or similar.
• 800xA for Advant Master: Connect the MB 300 network with an AC 800M
controller with CI855, see Systems with MB 300 and 800xA for AC 800M on
page 107.
It is possible but not recommended to let the Advant Master Connectivity
server synchronize the MB 300 network, see Reverse Synchronization Mode
on page 136.
The Connectivity Servers for these Control Networks may be synchronized from
their own Control Networks or the same way as the rest of the nodes on the Client
Server Network.
3BSE034463R5001 107
Systems with MB 300 and 800xA for AC 800M Section 5 Time Synchronization
Domain
Controller Client Client Client
Client Server
Network
Time Server
AfwTime Service sync
Advant Master SNTP
Connectivity
Server Clock Slave
RTA CNCP
Control Network
CI855 AC 800M
MB 300 Clock Sync
MB 300
Advant
Master
Figure 41. Time Synchronization with Both MB 300 and the Control Network
Controller Type
CNCP, Master
Time Sync Protocol, Role CNCP, Slave
MB 300, Master
Parameters
108 3BSE034463R5001
Section 5 Time Synchronization Systems with MB 300 and 800xA for AC 800M
Controller Type
Parameters Value
CLK_MAST 0
LOC_TIME 2
CLK_SEND 0
3BSE034463R5001 109
Systems with MB 300 and 800xA for AC 800M Section 5 Time Synchronization
Table 25. Time Sync Configuration in Clients and Servers: AC 800M to MB 300
Node Type
Advant Master
Other 800xA System
AC800M Connectivity Servers Connectivity
Nodes
Servers
Time Service
Enabled True False False
Provider Definition
Time
Synchronization True True True
TimeServerHandler Running
NtpServer Enabled = 0
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
110 3BSE034463R5001
Section 5 Time Synchronization MB 300 as Time Source for AC 800M
Domain
Controller Client Client Client
Client Server
SNTP
Network
AfwTime Service sync
SNTP Server AfwTime Server AC 800M
Connectivity Server
Advant Master Connectivity Server
RTA
Control Network
CNCP
CI855 AC 800M
MB 300 Clock Sync
MB 300
Figure 42. Time Synchronization with Both MB 300 and the Control Network
3BSE034463R5001 111
MB 300 as Time Source for AC 800M Section 5 Time Synchronization
CLK_MAST 1
LOC_TIME 2
CLK_SEND 1
Controller Type
AC 800Ms connected
Other Controllers
to MB 300
CNCP, Master
Time Sync Protocol, Role CNCP, Slave
MB 300, slave
Parameters
Parameters Value
112 3BSE034463R5001
Section 5 Time Synchronization MB 300 as Time Source for AC 800M
Table 30. Time Sync Configuration in Clients and Servers: MB 300 to AC 800M
Node Type
Time Service
Enabled True False
Provider Definition
Time
Synchronization True True
TimeServerHandler Running
3BSE034463R5001 113
Synchronization from the Client Server Network Section 5 Time Synchronization
NtpServer Enabled = 0
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
RTA
114 3BSE034463R5001
Section 5 Time Synchronization Synchronization from the Client Server Network
Controller Type
SNTP, Client
Time Sync Protocol, Role CNCP, Slave
CNCP, Master
Parameters
CLK_MAST 0
LOC_TIME 2
CLK_SEND 0
A.B.C.D and A.E.F.G are the addresses of the external SNTP servers. One on each
network path.
Parameters Value
3BSE034463R5001 115
Synchronization from the Client Server Network Section 5 Time Synchronization
Table 35. Time Sync Configuration in Clients and Servers: Reversed Sync
Node Type
Time Synchronization
False False False
Running
TimeServerHandler
Allowed to set time False False False
NtpServer Enabled = 1
Windows Registry
parameters for
NtpClient Enabled = 1
W32Time
Type NTP (this is set by net time /setsntp)
116 3BSE034463R5001
Section 5 Time Synchronization Configure Time Synchronization in Controllers
3BSE034463R5001 117
Time Synchronization Parameters for AC 800M Section 5 Time Synchronization
CS Time Set Enabled enum False:CNCP Time set from network disabled.
(recommended if an external time source is used)
True: CNCP Time set from network will be accepted.
(see Setting the System Time on page 145)
“Time Setting” is when the time is changed in a large step, typ-
ically manually. Small automatic changes are called “Time
Synchronization”.
118 3BSE034463R5001
Section 5 Time Synchronization Time Synchronization for MB 300 via CI855
AC 800M can distribute time via all its supported protocols simultaneously, but it
only receives time synchronization via the protocol defined by “CS Protocol Type”.
The sending is enabled per protocol:
• The parameter CS CNCP ClockMasterOrderNo controls sending with CNCP.
If the parameter is zero the node will not send time with CNCP.
• AC 800M can act as SNTP server. This function is always enabled. The
communication initiative lies on the clients so there is no parameter for this.
• The parameter “Time sync” on CI855 controls if CI855 will send time sync on
MB 300.
3BSE034463R5001 119
Time Synchronization in Advant Master Controllers Section 5 Time Synchronization
CI855 is the only node type on MB 300 that has both a high accuracy of its local
clock, good support for daylight saving time and a possibility to use an external
time source. Therefore, it is recommended that the CI855 is set up as “MB 300
Master” on the MB 300 network rather than being used as “MB 300 Slave”.
120 3BSE034463R5001
Section 5 Time Synchronization CNCP - Control Network Clock Protocol
One or several nodes can act as a backup Clock Master. This means that if the
current Clock Master is lost, one or several other nodes are prepared to take over as
Clock Synchronization Master. To become a backup Clock Master the nodes must
be configured for that role. While a node is Clock Master backup it acts as Clock
slave and receives time from the active Clock Master.
AC 800M can act as CNCP Clock Master (and as Clock Master backup).
AC 800M and Connectivity Servers with 800xA for AC 800M with the option
AC 800M Time Adaptor installed can act as CNCP Clock Slaves.
Figure 46 shows the node types that can be synchronized with CNCP and their
relative time accuracy.
800xA System
with ~200ms
AC 800M Time AC 800M
Control Network
<= 1ms
AC 800M
3BSE034463R5001 121
Forwarding of CNCP Between Network Areas Section 5 Time Synchronization
SNTP Implementations
There are special SNTP implementations that compensate for most known delays
(internal and on the network) in the transmission of the time messages from the
source to the destination. This can give an accuracy down to +/- 1 microseconds.
The SNTP client implementation in the AC 800M handles some of the known
delays. With good SNTP servers, AC 800M can be synchronized with an accuracy
better than +/-500 microseconds for nodes connected to the same switch.
The best accuracy is normally achieved with SNTP server usually receives globally
synchronized time via a GPS receiver.
The AC 800M controller includes an SNTP server which is always enabled. This
server does however not give a very high accuracy.
122 3BSE034463R5001
Section 5 Time Synchronization Stratum
The Windows Time Service (see Windows Time Service (W32Time) on page 139)
in Windows Server 2003 and Windows XP implements the complete NTP with
client and server functionality.
PC
~1000 ms ~1000 ms (routed)
Client Server Network
Stratum
Nodes using SNTP are classified with the term Stratum. Stratum is a value that tells
the number of intermediate time servers from an independent global reference time
source. An atomic clock is at stratum 0. A time server receiving its time from a
stratum 0 source gets stratum 1. An SNTP server with a GPS receiver normally has
stratum 1. When AC 800M fetches time with SNTP it informs in the controller log
about the stratum of its SNTP server. The stratum of the server does not necessarily
say how accurate the clock in the client will be. For example if the transportation
delay between the client and the server varies much the accuracy may be bad even if
the server has a low stratum and is very accurate. Fault Tracing Time
Synchronization Problems on page 151 describes more about how to check the
clock accuracy in different nodes.
3BSE034463R5001 123
Routing SNTP Traffic Section 5 Time Synchronization
Configuring SNTP
Time Synchronization Parameters for AC 800M on page 117 describes how to
configure SNTP in a controller.
Windows Time Service (W32Time) on page 139, Enable the SNTP Server, Disable
SNTP Client in a PC on page 142 and Configure Time Synchronization in a
Dedicated Domain Controller on page 143 describe how to configure SNTP in a PC.
See also Fault Tracing SNTP on page 153.
124 3BSE034463R5001
Section 5 Time Synchronization MB 300 Time Synchronization
Advant Master
Connectivity
Server
RTA CI855 CI855 AC 800M
3 ms 10 ms
MB 300
3BSE034463R5001 125
MMS Time Synchronization Section 5 Time Synchronization
AfwTime Service
The AfwTime Service can be used to synchronize the time on the server and client
nodes defined in a system. This service can also be used to change the current time
in the system.
The Time Service has two components, a Time Server and a Time Client.
• Time Server (Service Provider)
The Time Server component is the administrator of the time synchronization. It
receives and distributes the time synchronization telegrams to/from other
nodes, and it makes the final decision on which telegram to accept and
broadcast to the network.
The Time Server should be active in the Connectivity Servers. By default the
Time Server is installed on all System Product server nodes. There must be at
least one Time Server enabled in the network for the Time Service to be
operational. If more than one node is configured as a Time Server, only one of
the nodes will be active (in Service State), the other nodes will be passive
(in Standby State).
• Time Client (Service Handler)
A Time Client is responsible for keeping the date and time in its node updated
and synchronized with the global time broadcast from the Time Server.
It is also responsible for allowing or disallowing manual setting of date and
126 3BSE034463R5001
Section 5 Time Synchronization AfwTime Service
Client/Server
Time Set Network
Time Server Time Server
Time Sync (Service state) (Standby state)
The accuracy achieved is better than 1 second. The operation of the AfwTime
Service in a complete system is configured on four types of Aspect Objects:
• The Time Service
• The Time Service Providers
• The Time Server Group
• The Time Service Handlers
The configuration parameters on these different objects are described in the
following sections. See also Fault Tracing AfwTime on page 153.
3BSE034463R5001 127
Configuration of the AfwTime Service Section 5 Time Synchronization
128 3BSE034463R5001
Section 5 Time Synchronization Configuration of the AfwTime Service
Parameter Description
Server running Determines whether the Time Server service must run.
If FALSE, no AfwTime server will distribute time and no AfwTime
Adaptor will operate.
Default value: TRUE
Clients allowed Determines whether users at client nodes are allowed to set the
to set time system time, i.e. the clock on the Time Server node.
Default value: FALSE
If this parameter is TRUE and the corresponding parameter on the
Time Server Handler aspect on the Node object the Time Server will
change its time if the windows time is changed on a client node.
If FALSE, the engineer can only change the system time when working
on the Time Server node.
This parameter actually decides if the Time Server will accept a time
set message sent from a client. The corresponding parameter on the
Time Server Handler aspect on the node object prevents the client
node from sending the time set message.
Set this parameter to FALSE if the system uses an external time
source, e.g. a GPS receiver with an SNTP server on the Control
Network.
Section Setting the System Time on page 145 describes different
methods to set the system time. One way is to set this parameter to
TRUE and to use windows time to adjust the system time.
Sync Interval This value determines how often synchronization messages are sent to
(sec.) the Time Clients.
Default value: 10 sec.
There are additional parameters in the tab Special Configuration for the Time
Service Definition that can be used if the Time Server must fetch the time from an
external time master. This configures external time synchronization using
NetRemoteTOD, which is supported at least by Windows based nodes. Receiving
the time from a Time Adaptor however typically gives better accuracy.
3BSE034463R5001 129
Configuring the AfwTime Server and the Server Group Section 5 Time Synchronization
The Time Server can get the time from a Time Adaptor, see Time Synchronization
for Connectivity Servers, Time Adaptors on page 134. If you want to use a Time
Adaptor for receiving or sending time, the Time Server must be enabled.
If there is no time adaptor installed, the Time Server will take the time from the
local Windows Time.
The operation of the Time Server depends on its state. In Service state the Time
Server distributes time to all AfwTime Clients.
When adding a Time Server to the system, the Time Service provider is
automatically added to a service group (the Time Server Group) in the service
structure.
130 3BSE034463R5001
Section 5 Time Synchronization Configuring the AfwTime Server and the Server Group
The order of the servers in the Server Group list decides the priority between the
servers. The server at the top of the list will become active and the others will be in
a standby state. If the first in the list does not work the next one will take over. The
system creates a default order in the list, but the order can be changed manually, see
Figure 52.
By default the Time Server is enabled in all Server nodes. Make sure it only runs in
the appropriate nodes. If for example a redundant connectivity server pair are the
only servers that can receive time from a control network the Time Server should be
disabled in all other nodes.
3BSE034463R5001 131
Configuring an AfwTime Client Section 5 Time Synchronization
132 3BSE034463R5001
Section 5 Time Synchronization Configuring an AfwTime Client
Parameter Description
Allowed to Set Time Determines whether a user on this node can set the
system time by adjusting the windows time. Section
Setting the Time for the AfwTime Service on page 148
describes this.
Default value: TRUE
If the parameter is FALSE, or if the corresponding
parameter for the Service Definition is FALSE, a time
adjustment in such a node is only executed in the PC
where it was done. If that PC is synchronized with some
other protocol the change will be over-written the next
time the PC is synchronized.
Time Synch Running Determines whether the node will react when the Server
sends time synchronization messages.
If FALSE, the Workplace’s clock will not be synchronized
with the Time Server’s clock.
Default value: TRUE
Deviation Limit This value sets the limit for how much the node’s time is
allowed to differ from the Time Server’s time before a
correction is made.
Default value: 1000 msec.
The default value may be used.
(Value 0 = No synchronization, the Time Synch is
disabled.)
3BSE034463R5001 133
Time Synchronization for Connectivity Servers, Time Adaptors Section 5 Time Synchronization
Client/Server
Time Server Network
Time Adaptor
Clock Slave
Control Network
Clock Master
A Time Adaptor only works if the Time Service is enabled in the node.
This is a requirement for both receiving and sending of time via a Time Adaptor.
134 3BSE034463R5001
Section 5 Time Synchronization AC 800M Time Adaptor
3BSE034463R5001 135
Time Synchronization on the RTA Board Section 5 Time Synchronization
136 3BSE034463R5001
Section 5 Time Synchronization Time Synchronization on the RTA Board
The exact definition of the CLOCK_SYNCH database element can be found in the
Master Net Manual. The most common combinations are the following:
TIME SOURCE CLK MAST LOC TIME CLK SEND AfwTime REVERSED
Service SYNC_MODE
3BSE034463R5001 137
Time Sync with 800xA for Harmony Section 5 Time Synchronization
138 3BSE034463R5001
Section 5 Time Synchronization Time Sync with 800xA for Melody
For more information about how to configure Time Sync with 800xA for Harmony
see IndustrialIT 800xA, System, 800xA for Harmony, Configuration
(3BUA000157Rxxxx).
3BSE034463R5001 139
Disable/Enable the Windows Time Service Section 5 Time Synchronization
Controller. This is described in Enable the SNTP Server, Disable SNTP Client in a
PC on page 142.
In Windows XP and Windows Server 2003 W32Time is a complete NTP
implementation. It is described in for example in the Microsoft Technet article
“Windows Time Service Technical Reference“. It can be found by searching for
the article name at http://technet.microsoft.com.
140 3BSE034463R5001
Section 5 Time Synchronization Configuring Time Zone and Daylight Saving Time Support
If the goal is to make it possible to synchronize a PC with some other method than
Windows Time, an alternative to disabling the Windows Time service is to let it run
but to disable the NtpClient function. This is done by setting the value of Enabled =
0 in the Windows Registry system key:
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\
W32Time\TimeProviders\NtpClient].
This has the advantage that the NtpServer function can still be used. The NtpServer
for example needs to run to make it possible to check time differences between
nodes with w32tm /monitor or other tools. See more in Fault Tracing SNTP on page
153.
This allows the correct presentation of all times stamps in local time.
3BSE034463R5001 141
Enable the SNTP Server, Disable SNTP Client in a PC Section 5 Time Synchronization
All historic data such as Alarms, Events and History data are stored according to
UTC time stamps, so their sorting will not be affected, just the presentation will be
shown in local time.
142 3BSE034463R5001
Section 5 Time Synchronization Configure Time Synchronization in a Dedicated Domain Controller
3BSE034463R5001 143
Comparison Between W32Time and the AfwTime Service Section 5 Time Synchronization
144 3BSE034463R5001
Section 5 Time Synchronization Tuning the Synchronization Rate for W32Time
3BSE034463R5001 145
Setting the System Time Section 5 Time Synchronization
Be careful when changing the system time. Try not to do it when the process is
running.
Different functions in the system may behave strangely. Listed below are some
examples. There may be others, which are difficult to predict, at least if the time
change is large:
• If the time is set backwards the Sequence of Events in Alarm and Event lists
may become corrupt. A new event may get an “older” time stamp than an
prior events.
You may get similar problems with trend logs. The logs will look strange
since there will be two sets of log points for the time that corresponds to the
time change.
• If the time is set forward, with a large difference, while the History server is
creating logs, the load on the server may increase drastically because it may
interpolate log points corresponding to the time jump.
What to regard as a large difference depends on the number of logs and their
max time, i.e. the time between interpolated points.
If you for example have 10000 logs with a max time of 10 minutes and
make a time change of 100 minutes the History Server needs to create
10000*100/10=100000 log points. In a normally loaded systems such a
burst with more than a couple thousand points may cause problems.
The recommended way to handle a big time change is to disable all active
logs first and erase the History files in the directory “Operate IT
Data/History”.
• Any substantial time change may cause strange behaviors in active batch
processes. What to regard as a big change depends on the timing in the
batch process. Stop all active batch processes first if you need to make a big
time change.
• If the time is changed in a PC and its domain controller at different times
there may be problems logging in. Changes of less than 5 minutes are
normally OK, see Time Synchronization in a Domain on page 78.
The following sections describe how to set the time for the AfwTime Service and
how to set the time with Control Builder M.
146 3BSE034463R5001
Section 5 Time Synchronization Setting the Time with the Control Builder M
3BSE034463R5001 147
Setting the Time for the AfwTime Service Section 5 Time Synchronization
148 3BSE034463R5001
Section 5 Time Synchronization Adjust the Time in AC 800M via the Function Block SetDT
3BSE034463R5001 149
Handling Time Changes when Using W32Time Section 5 Time Synchronization
4. Enter the desired clock adjustment in Time difference. The time is entered in
the format XdXhXmXsXms where X represents digits and d, h, m, s, ms
represent days, hours, minutes, seconds and milliseconds (see data type time in
the documentation for Control IT).
Example: Write 1m1s to adjust the clock 1 minute and 1 second forward.
5. Click Apply.
150 3BSE034463R5001
Section 5 Time Synchronization Adjusting Time with 800xA for Melody or 800xA for Harmony
Figure 60. The Clock Sync Status tool in the Control Builder
The Clock Sync Status tool can tell the following about the real time clock in a
controller:
• Protocol by which the controller receives its synchronization.
• If the controller currently is CNCP Master or not.
• Configured CNCP Master Order number.
• Time Quality, see Table 42.
• Last time source address.
3BSE034463R5001 151
Fault Tracing Time Sync in Controllers Section 5 Time Synchronization
The Clock Sync Status tool can only show the status for Controllers.
AC 800M may write clock sync status information in the Controller Log.
These are some examples of what this can say:
CNCP:
• Time Set message is received
SNTP:
• Synchronization interval
• The address of the used server
• The Stratum of the server (see Stratum on page 123)
• If there is no connection to any server
1. The evaluation of Time Quality uses a shorter filter that the mean time difference. This means that the mean
time difference may indicate a better time quality than the TQ value.
152 3BSE034463R5001
Section 5 Time Synchronization Fault Tracing SNTP
• If the found server (or servers) is not accepted for some reason, e.g. because it
is not synchronized.
MB 300/CI855:
• System messages with Message Type 17 and Code 11.
Data 1 may say:
– 3 = There might be more than one backup time master. Data 2 = Bup Node
– 4 = More than one Clock Master on the network
State must be “Service” for one service provider and “Standby” for all others.
The column “M” (=Master) contains an X for the same node. This is the current
time source.
3BSE034463R5001 153
Fault Tracing AfwTime Section 5 Time Synchronization
On the Time Service Definition there is a window that shows the time difference
between different 800xA nodes, see Figure 62.
154 3BSE034463R5001
Section 6 Network Monitoring and
Maintenance
Supervision and fault tracing in the networks can be done in many different ways
depending on what is required. The following sections describe some tools and
methods for:
• Supervising general network health.
• Checking that one node has contact with another node.
• Checking the network connections in a node.
3BSE034463R5001 155
System Status Viewer Section 6 Network Monitoring and Maintenance
Figure 63. The System Status Viewer with status for Servers and Controllers
The controllers are represented by one object in the node administration structure.
In the control structure also the subordinate objects are visible, see Figure 64. By
adding a System Status Viewer aspect for the Object representing a Control
Network it is possible to show the System Status for all the objects in the
Controllers on that Control Network.
156 3BSE034463R5001
Section 6 Network Monitoring and Maintenance System Status Viewer
Figure 64. The System Status Viewer with status for Controller Objects
The System Status viewer can show if a controller looses all communication on an
ethernet port. This is indicated as No Communication as in Figure 64.
Independent of which client is running the System Status viewer it shows the status
of all nodes as seen from the aspect servers. In a normal network this is sufficient
since all nodes normally see the same other nodes, but for fault tracing special
problems where it is interesting to check the connection between two particular
nodes the RNRP monitor can be used, see RNRP Network Monitor on page 161.
A particular nodes connections to different servers can be checked with the Afw
Service Connection Viewer, see Afw Service Connection Status Viewer on page
158.
3BSE034463R5001 157
Afw Service Connection Status Viewer Section 6 Network Monitoring and Maintenance
If node A is using a service in node B the Afw Service Connection Status viewer in
node A shows the status for the service in node B. If the network is redundant the
status of the network paths between node A and node B is also shown. A green flash
indicates that the path is working and a red flash indicates that the path is broken.
Figure 65 shows how it looks when the node running the Afw Service Connection
Status viewer has lost the secondary network path to node BCTID199. It also shows
that there is no working connection to the services in BCTID200. Either both
network paths are broken or the services are not running in BCTID200.
The Afw Service Connection Status viewer is started with a right click on the green
800xA System icon in the System Tray.
158 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Topology Designer / Topology Status Viewer
The Topology Designer and how to use it as Topology Status Viewer is described in
IndustrialIT 800xA, System, Configuration (3BDS011222Rxxxx) and in IndustrialIT
800xA, System, Topology Designer (3BDS011225Rxxxx).
3BSE034463R5001 159
Node Status Alarms Section 6 Network Monitoring and Maintenance
160 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Ping
Ping
Ping is a simple program for checking whether one node has contact with another
node. Ping is available on all PCs. It is used from the Command prompt and its
syntax is as follows: drive:>ping address
Example:
C:\>ping 172.16.0.201
3BSE034463R5001 161
RNRP Network Monitor Section 6 Network Monitoring and Maintenance
The RNRP Network Monitor is started with a left-click on the RNRP icon in the
Windows system tray.
The RNRP icon is normally listed at Start > Programs > Startup to be activated
automatically when a user logs in. It can also be started by Start > Programs >
ABB Industrial IT 800xA > System > Network > RNRP Create Icon.
The RNRP Network Monitor can also be started at Start > Programs > ABB
Industrial IT 800xA > System > Network > RNRP Monitor.
162 3BSE034463R5001
Section 6 Network Monitoring and Maintenance RNRP Events in Controllers
3BSE034463R5001 163
RNRP Fault Tracer/RNRP Utility Section 6 Network Monitoring and Maintenance
164 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Network Interface Supervision in a PC
3BSE034463R5001 165
Network Interface Supervision in a Controller Section 6 Network Monitoring and Maintenance
166 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Network Interface Supervision in a Controller
3BSE034463R5001 167
Monitoring MMS Communication Section 6 Network Monitoring and Maintenance
The node may be a controller, an OPC server or a PC running the Control Builder.
The OnLine help for the Control Builder describes more about what this viewer can
show.
168 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Using Network Management information
3BSE034463R5001 169
PC, Network and Software Monitoring Section 6 Network Monitoring and Maintenance
The package contains faceplates that visualize status information from different
device types.
Figure 76 shows the faceplate for a Hirschmann RS2 switch. In this example the
faceplate shows under the Operating Status column that there is no cable attached
for Interface Indexes 1,2,3,6,7.
170 3BSE034463R5001
Section 6 Network Monitoring and Maintenance Network Management Tools from Switch Vendors
When combined with the 800xA Asset Optimization functionality, the system can
automatically detect problems and generate alarms based on this information as
seen in Figure 77.
Figure 77. Asset Optimization Asset Reporter showing no Cable attached on some
Ports.
3BSE034463R5001 171
Network Management Tools from Switch Vendors Section 6 Network Monitoring and Maintenance
172 3BSE034463R5001
Section 7 Ethernet and Network Equipment
Ethernet is used for the Control Network, the Client Server Network and MB 300.
Some fieldbuses, e.g. FOUNDATION Fieldbus HSE, also use Ethernet. This section
describes how to plan and build these Ethernet networks and the equipment needed.
3BSE034463R5001 173
Hubs and Switches Section 7 Ethernet and Network Equipment
174 3BSE034463R5001
Section 7 Ethernet and Network Equipment Features in Switches
Features in Switches
A switch is not altogether an ideal device. The store-and-forward delay introduced
by a typical switch is about 25 us. If the switch output port is busy with an other
1518 byte packet, then an extra delay of 122 us may occur when the port speed is
100 Mbps, 1.22 ms when the port speed is 10 Mbps. These delays are no problem
for normal system applications, but they do affect the accuracy of the network clock
synchronization. In this sense, a few large switches in a star topology are better than
many switches in a tree structure. The minimum delay is the sum of the store-and-
forward delay in every switch passed.
Managed Switches
Switches that only store and forward ethernet packets without being accessible as
nodes on the network are called un-managed switches.
Switches that act as a node with an IP address on the network giving access to
network management information are called managed switches. The network
management information is for example configuration data for the different ports
regarding port speed and status information about number of bytes transferred,
check sum errors etc. The amount of management information may differ very
much between different switch types.
The actual ethernet packet switching function is often the same for managed and un-
managed switches. These are some pros and cons for managed and un-managed
switches:
• Un-managed switches are typically cheaper.
• Managed switches give the possibility to supervise the network better.
• Managed switches may give possibilities to control the traffic better by e.g.
address based traffic filtering.
• In a small network the additional features of a managed switch may be
unnecessary.
• In a large network the additional features of a managed switch may be very
useful.
3BSE034463R5001 175
Basic Requirements on Switches Section 7 Ethernet and Network Equipment
The user must decide what features he/she wants to use in the switches.
The following sections list some notable features in switches, some are only
available in managed switches.
176 3BSE034463R5001
Section 7 Ethernet and Network Equipment Recommended Features in Switches
Ethernet Speed
Different network equipment supports different communication speed.
It is recommended that all PCs used in an IndustrialIT 800xA System support at
least 100 Mbit full duplex.
AC 800M controllers support 10Mbit half duplex.
Nodes with different communication speeds can normally be connected to the same
switch. It is recommended to avoid this as much as possible since multicast traffic to
the slow devices may also slow down the performance of the nodes using higher
speed.
It is recommended to manually set the speed and duplex parameters for the ports on
both ends of the connection to maximize switch performance and ensure a stable
link. In most cases it works just fine to use auto negotiation, but it is a safer choice
to configure it manually. In systems where it normally works fine with auto
negotiation the performance may still be improved by manually configuring the
ports. Auto negotiation on one side and manual configuration on the other should be
avoided. This often leads to problems.
3BSE034463R5001 177
Physical Network Installation Section 7 Ethernet and Network Equipment
Ethernet Cables
• Normal copper cable installations use RJ-45 connectors and a category 5 or
higher Shielded Twisted Pair (STP) cable.
Use CAT5 or higher cables on 10MBit connections.
Use CAT 5E cables on 100MBit connections.
Use CAT 5E or 6 on 1000MBit connections.
• With the STP cable, you can obtain a 100 m maximum distance between the
end-nodes in the network segment.
• Separate the cables for the two redundant networks as much as possible to limit
the risk of simultaneous problems on both networks.
• Connect nodes with the same communication speed to the same switch.
178 3BSE034463R5001
Section 7 Ethernet and Network Equipment Coexistence of Network Types
Figure 81. Client/Server and Control network sharing a physical link using VLANs
1. All switches may not be able to configure untagged ports belonging to more than one VLAN.
3BSE034463R5001 179
Ring Redundancy Section 7 Ethernet and Network Equipment
Usage of VLANs can simplify physical installation because it may reduce the
amount of cables and switches but it may make the maintenance more complicated.
If a switch needs to be replaced the amount of configuration to do before the new
switch can be used increases if VLANs are used compared to if all logical networks
are built with physically separate switches.
Ring Redundancy
Some switch vendors support a ring redundancy concept.
This normally gives an improved system availability as it provides cable
redundancy. The switches themselves are still, however, single points of failure.
You have to consider what type of problems threaten the availability of the network;
is it more likely that a fiber optic cable will be destroyed or that a switch will fail.
180 3BSE034463R5001
Section 7 Ethernet and Network Equipment Using Rapid Spanning Tree
With separated network paths the availability of each path can of course be
additionally improved by using one redundancy ring for each path as in Figure 83.
3BSE034463R5001 181
Using Rapid Spanning Tree Section 7 Ethernet and Network Equipment
Figure 84. Rapid Spanning Tree creates Redundant Paths in the Network
Like in the case of the ring redundancy Rapid Spanning Tree is a good method to
improve the availability in a network with nodes that are connected with single
interfaces.
It is possible to combine Rapid Spanning Tree and RNRP redundancy, but as in the
standard case in Figure 79 on page 174 and in case of ring redundancy in Figure 83
on page 181 the two paths should be kept physically separate.
As for ring redundancy we do not recommended connecting the two interfaces of
each RNRP node to two switches that are on the same Rapid Spanning Tree
network. Doing this may lead to a network where both RNRP paths are using the
same Rapid Spanning Tree path. A break on that path will stop both RNRP paths.
The time it will take to heal such a network break depends on the speed of the
Rapid Spanning Tree network and this depends on the size of the network. The
RNRP switch over time is constant.
When building a redundant RNRP network the availability of each path may, as in
the case of ring redundancy, be improved with one separate Rapid Spanning Tree
network for each path as in Figure 85.
182 3BSE034463R5001
Section 7 Ethernet and Network Equipment Environmental Consideration
Environmental Consideration
The type of network components that you may use depend on the climatic and
electrical environment.
In a Non-industrial Application
In an office environment, you can use most world-wide known brand products.
It is recommended to use the STP cable.
In an Industrial Application
You have to select products that fulfill industrial requirements on:
• Temperature
• Humidity
• MTBF
• EMC
• Supervision
In the industrial application it is recommended to use the multi-mode fiber 62.5/125
or better 50/125 fiber, 100Base-FX between hubs or switches. The max distance is
at least 1500 m. Special network components can be used to obtain longer distance.
It is safe to use twisted pair cable only where you have full control of the cabling
inside an area with the same common ground, for example inside cabinets or
between cabinets in a control room with cabinets connected to the same common
ground.
3BSE034463R5001 183
Environmental Consideration Section 7 Ethernet and Network Equipment
184 3BSE034463R5001
Section 7 Ethernet and Network Equipment Connecting to a Redundant Network
3BSE034463R5001 185
Connecting a PC Section 7 Ethernet and Network Equipment
Connecting a PC
When connecting the network to the PC it may be difficult to know which of the two
network interface boards is the primary. One way to find out is to do the following:
1. Connect one of the network interfaces cables to the switch.
2. Open the Start Menu > Settings > Network and Dial-Up Connections.
Figure 87. Network Status View with only Primary Network Interface Connected
3. The icons show which of the network interfaces you have connected.
4. Disconnect the network cable.
5. Verify that both network interfaces now are marked disconnected.
186 3BSE034463R5001
Section 7 Ethernet and Network Equipment Connecting a Controller with CPU Redundancy
CEX bus
RCU link
Lower CPU 4 Redundant
Switches
If the two network paths are implemented as rings or with some similar kind of
ethernet redundancy the complete solution will be very fault tolerant.
3BSE034463R5001 187
Routers Section 7 Ethernet and Network Equipment
Routers
Separate standard non-RNRP routers are normally not used within the Control
Network. The routing required between Client/Server Network and Control
Network Areas is taken care of by the Connectivity Servers running RNRP.
Standard routers may be used for connections between a network running RNRP
and an external network. This must in many cases be done with a device which acts
as a firewall, see Connecting to a Redundant Network on page 185.
188 3BSE034463R5001
Section 8 Network Security
3BSE034463R5001 189
The Onion Approach Section 8 Network Security
The security policy should be based on the principle of least privilege and
compartmentalization, i.e., every application, user, or subsystem should be
restricted to the minimum number of rights for the minimum number of resources
that is necessary to fulfill its purpose. Network access to functions that are not
explicitly required should be disabled. This reduces the possibilities that an attacker
can exploit and limits the damage in case an intrusion attempt is successful.
190 3BSE034463R5001
Section 8 Network Security The Onion Approach
Internet
Firewall system
Office network
Domain
controller … …
Separate
domains Automation System Network
Firewall
Connectivity servers
Controllers
Figure 89. Example of how the Onion Approach could be applied when connecting
an 800xA System to an Office Network, which in turn is connected to Internet
3BSE034463R5001 191
Firewalls Section 8 Network Security
The security measures described in this document represent possible steps that a
user of an 800xA system could consider, based on a risk assessment for a
particular application and installation. This risk assessment, as well as the proper
implementation, configuration, installation, operation, administration, and
maintenance of all relevant security related equipment, software, and procedures,
are the responsibility of the user of the 800xA system.
Firewalls
The selection and design of a firewall system should be based on the corporate
security policy. It should be revised on a regular basis, as requirements and
environment change. Note also that while firewalls block traffic from the outside of
a protected area to the inside, they normally allow users on the inside to
communicate freely with outside services. For manufacturing and control systems,
more restrictive policies are likely to be appropriate.
A firewall system can be a dedicated hardware box, a workstation, one or more
servers, or a mix of all of these. There are four general classes of firewall functions:
• Packet filtering firewalls check the address information in each packet before
forwarding it to its destination. If this information does not match certain
criteria, the packet is dropped. Advantages of packet filtering firewalls include
low cost and low impact on network performance. Packet filtering firewalls are
also referred to as Static Filtering firewalls.
• Stateful Filtering firewalls are similar to Static Filtering firewalls but they
remember outgoing requests („keep state information“) and dynamically
reconfigure rules to let responses back in. This often simplifies the firewall
configuration, particularly if the connections through the firewall are
established only from one side and the traffic from the other side can be
considered as responses to accepted requests.
192 3BSE034463R5001
Section 8 Network Security Firewalls
3BSE034463R5001 193
Connections to 800xA Systems through Firewalls Section 8 Network Security
194 3BSE034463R5001
Section 8 Network Security Network Address Translation in Firewalls
firewall translates between static pairs of external and internal addresses. For each
individual server that is to be accessed from the external network the firewall needs
to expose an address in addition to the firewalls own address on the external
network. See Figure 90.
An alternative to NAT is PAT (Port Address Translation): The Firewall only exposes
one IP address but is configured to forward traffic directed to specific ports on its
external network interface to another port on a node on the automation system
network. A separate external port number is reserved for each local server. To be
able to use PAT it must be possible to configure which port the external clients
should connect to.
By usage of Network Address Translation the addresses used by the 800xA
system do not need to be known anywhere except internally on the automation
system network. This makes it possible to use the same address range (see
Recommended IP Address Plan on page 28 and Choosing Address Space on page
218) for each 800xA system even if there are more than one 800xA system
connected to the same external network and even if they need to be accessed
from outside or even need to access each other.
3BSE034463R5001 195
Network Address Translation in Firewalls Section 8 Network Security
Example:
Two Terminal servers on the Client Server Network to be used by remote clients on
the plant network.
Static PAT: If the port numbers, used by the Terminal Clients when they connect to
the Terminal Servers, can be changed it is not necessary to expose any other
addresses for the Plant Network than the address of the Firewall (10.1.1.101). The
Terminal Clients select which Terminal Server to use by selecting different port
numbers (33389 or 33390). The Firewall translates access towards
10.1.1.101:33389 to 172.16.4.41:3389 and 10.1.1.101:33390 to 172.16.4.42:3389.
Internal External
Node IP Address Port # IP Address Port #
Firewall 172.16.5.245 10.1.1.101
Terminal Server 1 172.16.4.41 3389 10.1.1.101 33389
Terminal Server 2 172.16.4.42 3389 10.1.1.101 33390
Static NAT: If it is desired not to set any special port numbers for the Terminal
Clients it is necessary to expose specific IP addresses for the Terminal Servers on
the Plant Network. The Terminal Clients select which Terminal Server to use by
selecting different IP addresses (10.1.1.141 or 10.1.1.142). The Firewall translates
access towards 10.1.1.141:3389 to 172.16.4.41:3389 and 10.1.1.142:3389 to
172.16.4.42:3389.
Internal External
Node IP Address Port # IP Address Port #
Firewall 172.16.5.245 10.1.1.101
Terminal Server 1 172.16.4.41 3389 10.1.1.141 3389
Terminal Server 2 172.16.4.42 3389 10.1.1.142 3389
196 3BSE034463R5001
Section 8 Network Security Single Firewall or a Demilitarized Zone
3BSE034463R5001 197
Single Firewall or a Demilitarized Zone Section 8 Network Security
Figure 92. Firewall with demilitarized zone between 800xA and external network
198 3BSE034463R5001
Section 8 Network Security Single Firewall or a Demilitarized Zone
The idea with a Demilitarized zone is that the traffic between the external network
and the 800xA system needs to go via nodes on the demilitarized zone. Connections
should not be made directly between an external node and a node on the 800xA
System network. Exactly how this can be done depends on the actual service which
is to be accessed. One example is that anti virus updates and security patches can be
loaded to a server in the demilitarized zone and fetched from that node from the
system network. For some services there are Application proxies (see Firewalls on
page 192) that can be connected in the demilitarized zone.
Another common usage of a demilitarized zone is as the location of VPN gateways
for VPN connections terminated outside the Automation System Network, see
Figure 96 on page 204.
By using two firewalls of different types the security of the demilitarized zone can
be built even stronger, see Figure 93. If there is a problem with the firewall on the
outside of the demilitarized zone there is still a chance that this can be detected
allowing actions to be taken before there is a problem also with the firewall on the
inside. The nodes and services to connect to the demilitarized zone can be the same
in this solution as in the previous one. A further extension could be to use different
demilitarized zones for different services.
3BSE034463R5001 199
Single Firewall or a Demilitarized Zone Section 8 Network Security
Figure 93. Dual firewalls with demilitarized zone between 800xA and external
network
200 3BSE034463R5001
Section 8 Network Security Connecting a Firewall to a Redundant Network
Figure 94. Connecting directly on the primary network or via an RNRP router
Left: Connect the firewall to the primary path of the redundant network and let it
communicate directly to all nodes it needs to reach. In this case the firewall
can only communicate with nodes for which the primary network path is
working OK. If a node looses the primary path the firewall can not reach it.
Middle: Use a server running RNRP as router between the redundant network and
the firewall. In this case the firewall can communicate with nodes even if
they loose the primary network path. It is however dependant on the RNRP
router node to work OK.
Right: The middle solution can be slightly modified to save some hardware: The
router node does not need to use 3 network interfaces. It is possible to do
the connection between the router node and the firewall using the primary
network. This (or the middle) method is recommended at least when a
tunnel area is used (see Use of Standard IP Routers between RNRP
Network Areas on page 63) since this anyway requires an extra router node:
the tunnel area border node.
3BSE034463R5001 201
Using an Extra Network for Remote Access Section 8 Network Security
Figure 95. Extra network for remote access limiting the Client Server network
traffic
This is particularly useful if there is much traffic for remote access and if only a few
internal nodes are to be accessed from the outside, for example some terminal
servers for Remote Clients. Connect only the nodes that will have much remote
access traffic to the extra network. If needed the other nodes can be reached via one
of these nodes that will act as a router as in the middle alternative in Figure 94 on
page 201. Disable IP forwarding in the other nodes.
This method provides some degree of improved security since it limits the amount
of remote access traffic on the Clients Server network.
202 3BSE034463R5001
Section 8 Network Security Virtual Private Networks (VPN) for Secure Connections
3BSE034463R5001 203
Use cases for Connections through Firewalls Section 8 Network Security
Figure 96. Terminating the VPN inside or outside the 800xA System Network
204 3BSE034463R5001
Section 8 Network Security Remote/External Client
Remote/External Client
It is possible to use client functionality on nodes outside the 800xA system network.
The way this should be done depends on what type of client functionality to access:
• External node working with the same functions as the client inside the system,
e.g. with the Operator Workplace. This is a case where the external node is
used for interactive operation with data which stays inside the system. It is not
a matter of extracting data from the system to use in any external system or to
import data to the system. The recommended method is to use some kind of
remote windows workplace functionality, e.g. Windows Terminal Server and
Remote Desktop.
• A user on an external node remotely controls a node on the system network.
• External user accessing OPC data from the 800xA system using Excel and the
Information Manager Desktop Tools.
3BSE034463R5001 205
Remote Windows Workplace Section 8 Network Security
The following sections will describe these use cases in more detail. For each use
case it will be described which network ports that are needed to be opened in the
Firewall.
206 3BSE034463R5001
Section 8 Network Security Remote Usage of a Node on the System Network
3BSE034463R5001 207
Secure Connections for Remote Clients Section 8 Network Security
208 3BSE034463R5001
Section 8 Network Security Site to Site Connections via a Firewall
The VPN connection tunnels all communication so that it can not be intercepted by
any node between the two sides. Filtering of the traffic between the two sides does
not need to be done since both sides are regarded as being on the same trusted
network. If filtering is desired the VPN connections may be terminated outside of a
firewall on either of the sides as described in Figure 96 on page 204.
The two sides communicating via the VPN connection may be one 800xA system
with an extended automation system network with some distributed nodes as some
of the examples in Section 2, Distributed System Topologies.
3BSE034463R5001 209
Integration with 3rd Party Systems Section 8 Network Security
If the connection between the sites needs to be redundant this can be achieved with
two RNRP tunnel areas, see Figure 99. See also Figure 24 in Use of Standard IP
Routers between RNRP Network Areas on page 63
210 3BSE034463R5001
Section 8 Network Security Accessing OPC Data from External Network
3BSE034463R5001 211
Asset Optimization Integrations Section 8 Network Security
212 3BSE034463R5001
Section 8 Network Security Batch Integrations
Batch Integrations
With the function Batch Scheduling Interface it is possible for an external node to
access data from the Batch system. The Batch Scheduling Interface is installed on
one of the Batch client nodes in the 800xA system. The external node needs to be
able to communicate with that node via port 80.
3BSE034463R5001 213
Other Services to be Used Through a Firewall Section 8 Network Security
214 3BSE034463R5001
Section 8 Network Security Summary of Ports to Open in Firewalls
3BSE034463R5001 215
Summary of Ports to Open in Firewalls Section 8 Network Security
216 3BSE034463R5001
Appendix A Reference Details
IP Addresses
All nodes in the IndustrialIT System networks are identified by their IP Address.
IP stands for Internet Protocol. The IP address is a 32-bit word (4×8 bits) that often
is written in the form X.Y.Z.Q with four decimal numbers 0-255, separated by
periods.
The IP standard uses the terms NetID and HostID. The subnet mask specifies the
boundary between the NetID part and the HostID part of the IP address (the zero
bits indicate the HostID part). A (part of a) network where all nodes use the same
NetID is called a subnet.
Depending on the value of X, IP addresses are divided mainly into three classes,
A–C:
3BSE034463R5001 217
How to Choose IP Addresses Appendix A Reference Details
218 3BSE034463R5001
Appendix A Reference Details Using Implicit or Explicit RNRP Configuration
3BSE034463R5001 219
Using Implicit or Explicit RNRP Configuration Appendix A Reference Details
220 3BSE034463R5001
Appendix A Reference Details Suggested Configuration of RNRP and IP Addresses
3BSE034463R5001 221
Configuring IP Addresses with DHCP Appendix A Reference Details
The default addresses of a Backup CPU is the same addresses as the backup except
that: BackupNodeNumber = PrimaryNodeNumber + 512.
Note that this is an exception to the rule that node numbers can not be higher than
500.
Byte wise this means that if the address of the Primary is A.B.C.D the address of the
Backup is: A.B.C+2.D
This is not the recommended method but can be chosen by advanced users.
If implicit RNRP configuration is used and all RNRP configuration parameters can
use the default values, it could even be considered to use a DHCP server to
distribute the IP addresses for Windows nodes (not for the Domain Server and DNS
server). If explicit RNRP configuration is used manual configuration is anyway
needed on each node, i.e. you do not gain anything with using DHCP.
To use a DHCP server for an RNRP network the server has to be explicitly
configured with the relations between MAC-address and IP address. It is not
possible to run DHCP with actual dynamic allocation of IP addresses for the 800xA
System nodes. One reason is that a DHCP server has no possibility to apply the
address rules of RNRP.
222 3BSE034463R5001
INDEX
Numerics Client/Server Network 21
800xA for AC 800M 106 Clients allowed to set Time 129
800xA for AC 800M Time Adaptor 96 CLK_MAST 136
800xA for Advant Master 106 CLK_SEND 136
800xA for Harmony 106 CLOCK_SYNCH 120, 136
Adjusting Time 151 CNCP 120
Clock Sync 138 Communication
SettingTime 151 Broadcast 42
800xA for Melody 106 Multicast 42
Adjusting Time 151 Connectivity Server 90
Clock Sync 139 as Routers 47
Setting Time 151 using RNRP 23
Control Network 21
A CPU Redundancy 187, 221
Adapters and Bindings 87 CS CNCP ClockMasterOrderNo 118
Address Space 218 CS Protocol Type 118
AfwTime 144 CS SNTP ServerAddr1 118
AfwTime Client 132 CS SNTP ServerAddr2 118
AfwTime Server 130 CS Synch Interval 118
AfwTime Service 126 CS Time Set Enabled 118, 147
Local Time Service 96
Allowed to Set Time 133 D
Aspect Server 90 Data Recover Time 45
Daylight Saving Time 141
B Support 141
Backup CPU 91, 221 Defense in depth 190
Base Address 54 DHCP 222
DNS 74, 89
Configuration 83, 93
C
Introduction 34
Cable Color 185
Parameters 73
CAT5 178
Queries 34
CI855 107, 111
Server 34, 78
Class A 217
Strategies 71
Class B 217
Domain Controllers 71, 143
Class C 217
3BSE034463R5001 223
Index
E M
Ethernet 173 MAC-address 222
MaxLostMessages 45
F MB 300 107
Fault Handling 44 as Clock Master 111
Firewalls 192 Clock Synchronization 124
Application Proxies 193 via CI855 119
Packet Filtering 192 MMS Time Synchronization 126
Stateful Inspection 193 MPLS 66
flushdns 93 Multi-mode fiber 183
Forward Lookup 91
N
G NetBIOS 72
GPS 122 Configuration 93
GPS Receiver 100 Considerations 73
NetID 217
H NetID part 52
Hop Count 46, 49 NetRemoteTOD 129
HostID 217 Network Address Translation (NAT). 194
HostID Part 52 Network Area 43
Hubs 174 Network Area Number 43
Network Areas 22
Network Fail over Time 45
I
Network Interfaces 86
IGMP Snooping 176
Network Redundancy 41
Interface Status 165
Introduction 26
Internet Protocol 217
Primary Network 26
IP Address 52, 217
Secondary Network 26
IP Address Plan 28
Network Security 189
IP Routers 63
Network Segment 174
ipconfig 93
Node Administration structure 155
IPSec 67
Node down 161
Node Number 43
L Node up 161
Layer 2 VPN 66 nslookup 91
Layer 3 VPN 67
224 3BSE034463R5001
Index
3BSE034463R5001 225
Index
3BSE034463R5001 226
3BSE034463R5001. Printed in Sweden September 2006
Copyright © 2003-2006 by ABB. All Rights Reserved
® Registered Trademark of ABB.
™ Trademark of ABB.
http://www.abb.com