mbNETFIX-Manager Instructions For Use-1 2 7-DR01-en
mbNETFIX-Manager Instructions For Use-1 2 7-DR01-en
.
For the latest information and updates, visit our webpages under:
www.mbconnectline.com
We are always pleased to receive proposals, improvement suggestions and constructive criticism.
Publisher:
Red Lion Europe GmbH
Winnettener Str. 6
91550 Dinkelsbühl
GERMANY
Phone:
+49 (0) 9851 58 25 29 0
Internet:
www.mbconnectline.com
General
Our products include, among other things, open source software, which is manufactured by a third party and
has been published for free use by anyone. The open-source software is available under special open-source
software licences and copyright of third parties. In principle, each customer can use open source software
free of charge under the licence terms of the respective manufacturers. The customer's right to use the open
source software for purposes other than those for which our products were intended is regulated in detail by
the relevant open source software licences. The customer may freely use the open source software as set out
in the respective valid licence, beyond the intended purpose of the open source software in our products. In
the event that there is a contradiction between the licensing terms of one of our products and the respective
open source software licence, the respective applicable open source software licence shall take priority over
our licensing terms if the respective open source software is affected by this.
Use of the open source software is free of charge. We do not charge any usage fees or similar charges for the
use of open source software included in our products. Customer use of open source software in our products
is not part of the profit that we obtain from the contractual remuneration. All open source software programs
contained in our products are in the available list. The most important open source software licenses are listed
in the Licences section at the end of this publication.
If programs that are included in our products are under the GNU General Public License (GPL), GNU Less-
er General Public License (LGPL), the Berkeley Software Distribution (BSD), the Massachusetts Institute of
Technology (MIT), or other open source software license, which requires that the source code be made avail-
able, and this software was not already supplied with our product on a disk or in the source code, we will send
this at any time upon request. If we are required to send this on a disk, there will be a flat rate charge of €35.00.
Our offer to send the source code upon request, shall automatically end 3 years after delivery of the respective
product to the customer.
Requests must, where possible, be sent to the following address with the product's serial number:
Red Lion Europe GmbH · Winnettener Str. 6 · 91550 Dinkelsbühl GERMANY
Tel. +49 (0) 98 51/58 25 29 0 · Fax +49 (0) 98 51/58 25 29 99 · [email protected]
1 General................................................................................................................................................... 6
1.1 Brief description of the mbNETFIX-Manager............................................................................... 8
1.2 Biref description of the industrial firewall mbNETFIX NFH 100....................................................9
5 Create a project...................................................................................................................................34
5.1 Device project - device: The principle........................................................................................ 35
5.2 Device project with or without a password?...............................................................................37
6 Configuration....................................................................................................................................... 38
6.1
Start......................................................................................................................................39
6.1.1
Quick Setup / Configuration Wizard........................................................................ 39
6.2
Settings................................................................................................................................ 60
6.2.1
Operation mode - general....................................................................................... 60
6.2.2 Bridge mode (condition as supplied)..............................................................................60
6.2.3 Gateway mode................................................................................................................62
6.2.4 Application cases - possible Operating mode and recommended feature..................... 63
6.2.5 Which function is available in which operating mode?...................................................63
6.2.6
Select Operating mode............................................................................................64
6.2.7
Interfaces................................................................................................................. 65
6.2.8
NAT settings (gateway mode only)......................................................................... 67
6.2.9
Packet filter.............................................................................................................. 80
6.2.10
Routes to networks on the WAN side (Gateway mode only).................................. 90
6.2.11
System..................................................................................................................... 92
6.2.12 Data exchange..............................................................................................................101
This document describes the installation and configuration of the mbNETFIX-Manager software, version V
1.2.7, for the mbNETFIX NFH100 industrial firewall, firmware version V 1.2.6.
Version notes
The device (mbNETFIX) can now also be reset to its factory settings using
the "admin" user. See chapter "Reset to factory settings".
The column widths of the tables for "SimpleNAT", "DNAT" and in the "Pack-
etfilter" can be adjusted with the mouse pointer.
In the "Diagnostics" chapter, the status of "I/0 1" and "I/0 2" is displayed in
the device graphics.
1.2.7 DR01 Feb 15th, 2022 General fixes and enhancements
* For future functional expansion of the mbNETFIX devices, the hardware versions HW 02 have changed the
interface designations for the digital inputs "I1" and "I2" to "1" and "2".
Current software, manuals and further information about products for secure remote maintenance can be found
in the download portal at www.mbconnectline.com
The mbNETFIX-Manager is a configuration software that supports you in the configuration of your industrial
firewall mbNETFIX NFH100 and the Compact Industrial Firewall RA10C and extends the performance spec-
trum of the firewall.
• Learning Mode
The integrated learn function of the firewall records To condition the data traffic, the industrial firewall fil-
all connections. Then, with the aid of the recorded ters the permissible and forbidden data traffic based
packet table, the user decides which connections are on the originating MAC/IP addresses, the destination
to be permitted and disables all the others. MAC/IP addresses and the ports. Of course, all other
The function MapView aids the user in the straightfor- firewall functions such as NAT, port forwarding and
ward performance of this task. This unique graphical routing are implemented.
portrayal gives the user a view of which connections
are currently configured in the firewall and which net- A free version of the mbNETFIX Manager Lite can
work clients have been detected. be downloaded at https://goo.gl/g6FQDV.
Additionally, the network architecture and activities
can be documented with it.
Performance characteristics
• Protects the machines in the network from attacks from the Internet.
• Easy network segmentation with controlled routing and NAT.
• Convenient learning mode makes creation of filter tables simple & easy.
• Integration into existing networks.
• Bridge or Gateway mode.
• IP, port, and protocol filters to monitor and restrict traffic.
• Configuration with secure software.
• Less attack vectors by avoiding a web interface.
• Versatile NAT functionalities, eg 1: 1 NAT, SimpleNAT and port forwarding.
Further information about the industrial firewall mbNETFIX NFH100 can be found in the "Quick start-up guide"
or on our website at www.mbconnectline.com.
1. Create a Project
Create a separate device project for each
device (mbNETFIX).
NO TI CE
System requirements
• Standard Windows PC
• Administrator rights
• At least 25 MB storage
b. In the Help menu of the mbNETFIX Manager you can "Check for updates" and download and install
the latest firmware.
When installing the mbNETFIX Manager on your PC, the "mbnetfixmanager" folder is automatically created.
\ drivers
\ events
\ projects
\ settings
\ updates
In the subfolder "projects", all projects with their project-related data (configuration, users, settings, etc.) are
saved here.
1. Start mbNETFIX Manager via your PC’s start menu or via the corresponding desktop symbol.
Interface layout
Configuration is saved.
Configuration has been changed in the relevant menu but not yet saved in
the project file.
To accept the data, the project file must be saved.
4. Main window - The individual settings for the configuration menus are defined here.
5. Event list - Listing of all logged events in total or by device.
4.1.1 File
4.1.1.1
File > New
4.1.1.2
File > Open
An open project can be recognized by the symbol (open lock mbNETFIX1) in front of the project name.
4.1.1.3
File > Close
4.1.1.5
File > Delete
4.1.1.6
File > Duplicate
NO TI CE
When a project is duplicated, the entire content is copied, but a new RSA key pair is generated.
4.1.1.7
File > Export > Project
NO TI CE
Please note that the keys (public kex and private key) are passed on or duplicated when sharing an
exported project.
NO TI CE
This configuration file contains the basic settings of a project and is helpful for analysis in case of support.
This configuration file contains no keys or passwords and can not be imported back into a project.
4.1.1.9
Datei > Import
NO TI CE
When importing a project (*.nfp file), a new project is automatically created on the target computer.
An existing project with the same name can not be overwritten.
To open an imported project you need the original password.
4.1.1.10
File > Exit
The following functions assume that a Device (mbNETFIX) is connected to the same PC on which the
mbNETFIX manager is also installed. Use the supplied USB cable
If the Configuration Access Level is set to WAN / LAN active and the access rights permit it, connect the PC
and the device with a network cable.
NO TI CE
If you have created your project with a project password, you no longer need a password after Project-
Device pairing.
NO TI CE
After the first connection from a Project to a Device ( Go online) and uploading the Project settings to
the Device, the Project-Device Pairing is complete.
° Yes = The settings are permanently stored on the device and are retained beyond a device restart.
° No = The settings are saved only temporarily (until a device restart).
NO TI CE
After the first connection from a Project to a Device ( Go online) and uploading the Project settings
to the Device, the Project-Device Pairing is complete.
• After a confirmation prompt, the project settings are overwritten by the device settings.
• With this selection you can edit the device settings directly.
• From here you can
4.1.2.2
Device> Go Offline
• The connection to the Device is disconnected and you are working again with the Project settings.
4.1.2.3
Device > Download Device Settings
4.1.2.4
Device> Upload Project Settings to the Device
Upload to Device
NO TI CE
The mbNETFIX is only reset to its factory settings by the user "factory reset" and only via the USB interface.
If you are logged in as the "admin" user, you can also carry out the action directly without having to log out
and log in again with the user "factoryreset".
Further more, you always need the original device password for this action, even if the device is already
paired or the device password has been changed.
1. Select the project file that is paired with the device (mbNETFIX) that should be reset to its factory set-
tings.
Firmware Update
When firmware update, the mbNETFIX-Manager represents the central exchange between the auto-update
server and the Device (mbNETFIX).
NO TI CE
If you are not able or you do not want to connect to the auto-update server, you can save a newer firmware
version* on your computer.
By clicking on the symbol , you can navigate to this saved firmware file (eg 1-1-1-fwnf.swu). By simply
clicking (left-click) the firmware file, it will be moved to the "downloads" folder.
* The latest firmware version for the industrial firewall mbNETFIX can be requested via the Red Lion Europe
support email to Support.
NO TI CE
NO TI CE
4.1.2.7
Device > Reboot
Reboot
NO TI CE
Regardless of whether the device is online or offline, you can initiate a restart by pressing the Reset button
on the front of the device.
4.1.3 Extras
4.1.3.1
Extras > Settings
NO TI CE
For the search for software updates on the auto-update server, an internet connection is generally necessary.
4.1.3.2
Extras > Install USB-Driver
In rare cases, you may need to update the USB driver for the "Device-to-PC" connection.
NO TI CE
When installing the mbNETFIX Manager, the USB driver was included on
C:\Users\YourUser\AppData\Roaming\mbnetfixmanager\drivers
Here, provided you have an Internet connection, you can check whether the latest version of mbNETFIX
Manager is installed.
License
N OTICE
About me
User level
admin (0) operator (1) viewer (2) factoryreset (9)
LAN/ LAN/ LAN/ LAN/
Configuration interface USB USB USB USB
WAN WAN WAN WAN
Action
Device
Go online E E E E E E E -
Go offline E E E E E E E -
Download E E E E E E - -
Upload E E E E - - - -
Factory reset E - - - - - E -
NO TI CE
The mbNETFIX is only reset to its factory settings by the user "factory reset" and only via the USB interface.
If you are logged in as the "admin" user, you can also carry out the action directly without having to log
out and log in again with the user "factoryreset".
Further more, you always need the original device password for this action, even if the device is already
paired or the device password has been changed.
Firmware Update E E E E - - - -
Reboot E E E E E E E -
E = execute; - = no access
NO TI CE
The users "admin" and "factoryreset" are created by default and cannot be deactivated or changed.
The "operator" and "viewer" users are created (activated or deactivated) in the System > " Access - edit
authentication method for individual users" menu.
Start R/W - - - - - - -
Settings R/W R R R R R - -
Interfaces R/W R R R R R - -
Diagnosis R R R R R R - -
Loggings R R R R R R - -
New E E E E
Open E E E E
Close E E E E
Save E E - -
Delete E E - -
Duplicate E E - -
Export E E - -
Project E E - -
Configuration E E - -
Import E E E E
Project E E E E
Configuration E E - -
Exit E E E E
Edit E E E -
Expand all E E E -
Collapse all E E E -
Extras E E E E
Settings E E E E
Help E E E E
License E E E E
About R R R E
Start mbNETFIX Manager via your PC’s start menu or via the corresponding desktop symbol.
During the first Start you are requested to create a new project.
You can create additional device projects via File > New.
When specifying the name, only the following numbers and/or letters are permitted: 0
to 9, A to Z, a to z - without any spaces.
I don't want to use If you activate this checkbox, no password is required to open this project.
a password...
Password If you want to protect the project with a password, assign a password (min. 8 charac-
ters) for the user "admin" here.
Repeat Password When a password is assigned, RSA encryption is active and the project can only be
opened / edited after entering the password.
Random Process Move your mouse over the form field to generate an additional random value for cal-
culation of a security key. This value is added to the algorithm of the random gener-
ator as an additional “unknown” factor. In this way back calculation of the generated
security key is nearly impossible.
Ignore the Ran- Optionally, you can suppress generation of the additional value by confirmation of this
dom generator... checkbox. In this case, only the random value generated by the PC's operating sys-
tem is used.
The mbNETFIX manager generates a corresponding project folder and starts with its user interface.
The mbNETFIX manager supports you with the configuration of the industrial firewall mbNETFIX NFH100.
NO TI CE
The possible number of devices (mbNETFIX NFH100) that can be managed in the NETFIX Manager is
theoretically unlimited.
The only possible restriction: Each open project uses approx. 2 MB RAM.
"I don't want to use a password for my project and use instead the device password!"
With this checkbox you specify whether a device project should be created with or without a project password.
• A password is required to open the project. • No password is required to open the project.
• The first time the configuration is transferred • When the configuration is first transferred from
from the project to the device, a Project-De- the project to the device, there is no Project-De-
vice Pairing takes place. vice Pairing.
• After the project-device pairing has taken • For communication, the current device pass-
place, the current device password is no longer word must be entered every time a connection
active. is established to the device.
No additional password needs to be entered
for communication with the device.
NO TI CE
ATTENTION: If you do not use a password for a device project, this project can be opened and edited /
changed at any time!
NO TI CE
The original device password is definitely required again if you want to reset the device to its factory settings.
NO TI CE
Before you begin with the configuration, you should be clear in which operating mode - bridge mode or
gateway mode - you want to use / use the industrial firewall mbNETFIX.
See " Operation mode - general"
NO TI CE
•
Download Device Settings
•
Upload Project Settings to the Device
•
via "File > Open",
• or direct selection in the configuration menu.
and
You will be automatically forwarded to the Settings > Operating mode menu.
6.1.1
Quick Setup / Configuration Wizard
In the Quick Setup, an assistant guides you through all relevant settings.
Because you have to make various decisions during configuration (eg Setup Mode, Operation Mode, NAT
Mode, etc.), the configuration wizard is variable.
The menus to be edited during the configuration are explained in detail in the chapter "Settings".
Online
NO TI CE
• The device (mbNETFIX) is connected to the same PC on which the mbNETFIX manager is installed.
• The device is integrated in the network structure to be monitored.
Click on "Next"
Click on "Connect"
As soon as the device has been integrated into the network structure and is switched on, it automatically starts
recording the network data. In a network list (Mapview) all reachable network subscribers are listed.
From here, you can analyze the network data and - with just a click of the mouse - allow and block connections.
Offline
For offline configuration, the device (mbNETFIX) neither needs to be connected to the computer nor integrated
into a network structure.
You can upload the configuration (Project Settings) to the device at any time - provided the device is connected
to the configuration computer.
Clicking on “Next” leads you through all the menus relevant for the configuration (see also from " Settings",
Page 60).
NO TI CE
Bridge Mode
After clicking "Next" you will be prompted to configure the LAN / WAN interface.
After clicking on "Next" you will be redirected to the setting of the Filter mode.
Select the appropriate rules under the desired communication directions (WAN > LAN or LAN > WAN).
• Allow everything except filter rules (see " Rules", Page 85) - so-called blacklisting
Here all packets are accepted at the end of the filter table. The filter sorts but is effectively only off.
• Allow everything (Filter Off)
All filters are inactive here and the data transfer is completely accepted.
NO TI CE
Further information can be found in the "Packet filter > Filter mode" settings menu.
A set of rules consists of the settings in the Filter mode and the set of Rules created.
The policy processes / checks both incoming packets as well as the response packets generated by the network
participant and allows allowed connections to pass through the firewall (ACCEPT) or blocks (DROP, REJECT)
unauthorized connections.
NO TI CE
Further information is available in the Settings menu "Packet filter > Rules".
Click on "Connect"
Gateway Mode
WAN Interface
Label Description
IP Addresse Enter the appropriate values for the network on the WAN side here.
Subnet Mask
Default Gateway A default gateway is required if
LAN Interface
Label Description
IP Address Enter the appropriate values for the network on the LAN side here.
Subnet Mask
After clicking on "Next" you will get to the NAT mode selection menu.
NO TI CE
Use Simple NAT to access an IP address from network B (LAN) 1:1 on network A (WAN).
With this function, a network participant in the LAN can be directly addressed via a WAN IP address. As it were,
the IP address of a LAN participant with an IP address from the WAN area is mirrored in the WAN. This does
not require a virtual IP address, as is usual with a NAT function.
Image 2: Example: Data packet delivery to two subscribers using Simple-NAT from WAN to LAN
and the LAN IP address of the recipient from the LAN network to be "natted" with.
NO TI CE
You need a separate WAN IP address for each receiver (network subscriber in the LAN network).
NO TI CE
If one of the network participants to be reached has no or a wrong (inappropriate) gateway entry and can
therefore not send a response to an delivered data packet, you must also activate the "WAN to LAN" function
in the SNAT.
Label Description
WAN IP-Address Enter a free WAN IP address from the WAN network.
LAN IP-Address Enter the IP address of the recipient from the LAN network.
Comment Here you can enter a comment for the defined assignment.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically
deactivate and reactivate a SimpleNAT filter rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
You can easily set the column widths of the table with the mouse.
NO TI CE
As soon as you have added and activated an assignment, the rule for this assignment is automatically
entered and activated under Packet filter > Rules > WAN > LAN.
After clicking on "Next" you will be redirected to the setting of the Filter mode.
NO TI CE
DNAT stands for Destination NAT. This changes the destination of the data packet.
With port forwarding, a single port can be forwarded to a specific IP address specifying the port.
Port forwarding is available from WAN to LAN as well as LAN to WAN.
Image 7: Related address assignment table with the selection WAN > LAN
NO TI CE
An entry in the address assignment table is only effective if the relevant "Active" checkbox is checked. An
active entry is highlighted in green.
Label Description
Source IP IP address of the sender of the data packets.
Source Port The specification of a port serves for a better overview.
With ANY there is no restriction.
WAN Port WAN port of the firewall.
NOTICE
The entry of the WAN port is important because this port is forwarded to the LAN IP / port.
A WAN port = ANY is technically possible, but not useful. Then everything will be forwarded.
• ANY (all)
• ICMP
• UDP
• TCP
LAN IP IP address of the subscriber (receiver) in the LAN network.
LAN Port Port of the subscriber (receiver) in the LAN network.
Comment Here you can enter a comment for the defined port forwarding.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically de-
activate and reactivate a DNAT rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
Label Description
Source IP IP address of the sender of the data packets.
Source Port The specification of a port serves for a better overview.
With ANY there is no restriction.
LAN Port LAN port of the firewall.
NOTICE
The entry of the LAN port is important because this port is forwarded to the WAN IP / port.
A LAN port = ANY is technically possible, but not useful. Then everything will be forwarded.
• ICMP
• UDP
• TCP
WAN IP IP address of the subscriber (receiver) in the WAN network.
WAN Port Port of the subscriber (receiver) in the WAN network.
Comment Here you can enter a comment for the defined port forwarding.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically de-
activate and reactivate a DNAT rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
Add/Delete
TIP
You can easily set the column widths of the table with the mouse.
After clicking on "Next" you will be redirected to the setting of the Filter mode.
After clicking on "Next" you will be redirected to the setting of the Filter mode.
Select the appropriate rules under the desired communication directions (WAN > LAN or LAN > WAN).
• Allow everything except filter rules (see " Rules", Page 85) - so-called blacklisting
Here all packets are accepted at the end of the filter table. The filter sorts but is effectively only off.
• Allow everything (Filter Off)
All filters are inactive here and the data transfer is completely accepted.
NO TI CE
Further information can be found in the "Packet filter > Filter mode" settings menu.
Here you create the individual rules for the firewall ruleset; both WAN > LAN and LAN > WAN.
A set of rules consists of the settings in the Filter mode and the set of Rules created.
The policy processes / checks both incoming packets as well as the response packets generated by the network
participant and allows allowed connections to pass through the firewall (ACCEPT) or blocks (DROP, REJECT)
unauthorized connections.
NO TI CE
Further information is available in the Settings menu "Packet filter > Rules".
Click on "Connect"
6.2
Settings
6.2.1
Operation mode - general
Bridge mode
Network A = Network B
Without any network changes, the mbNETFIX protects
the data exchange between WAN <> LAN by means of a
packet filter.
In bridge mode the firewall is easily integrated into existing
networks that are in the same network segment - ideal for
upgrades.
The firewall integrates transparently and no IP address
specification is necessary.
192.168.0x/24 192.168.0x/24
By activating the mbNETFIX as an external cyber security watchdog, the PLC security can be in-
creased without continually having to implement updates.
NO TI CE
By default, the mbNETFIX is set to bridge mode with packet filter enabled - security by default. The transitions
WAN <> LAN are blocked.
The bridging of input I/O 1 is ignored after the initial configuration and
can only be used again after the mbNETFIX has been reset to its fac-
tory settings.
You should choose the default setting with bridged input I/O 1 if at least one of the two conditions applies.
Gateway mode allows individual areas of a network to be separated. Here too, learning mode simplifies the
creation of filter tables.
Gateway mode
Netzwork A Netzwork A
Using the mbNETFIX, machine installations can be simplified and shortened. At the same time, inter-
nal network conventions are complied with.
With simple NAT, mbNETFIX easily routes the addresses from the WAN to the LAN side. All that is
necessary is for the so-called mapping table to be filled out.
With mbNETFIX, network segments can be isolated, data traffic locally limited and the bandwidth of
the corporate network protected.
Based on the following table, you can assign the recommended feature of the mbNETFIX for different appli-
cations.
The following functions are available in the Settings menu, depending on the selected operating mode:
Here you select the operating mode (Bridge mode or Gateway mode) for which the device is to be configured.
Bridge Mode
WAN Interface
Label Description
IP Addresse Enter the appropriate values for the network on the WAN side here.
Subnet Mask
Default Gateway A default gateway is required if
LAN Interface
Label Description
IP Address Enter the appropriate values for the network on the LAN side here.
Subnet Mask
NAT (Network Address Translation) is the umbrella term for the automatic replacement of address information
(IP addresses) inside packets.
As a result of the replacement functionality, this only functions for addresses of different networks A and B.
• Ports for NTP and DNS of the local service on the device are hard-coded in the packet filter if one of
these services is enabled.
• The WAN-IP of the mbNETFIX can not be pinged by default. This must be released in the filter.
• If a DNAT rule is specified, it is automatically bypassed at the layer 3 packet filter. The exception is lay-
er 2 (MAC filter). If this is active or a rule specified including MAC address, a corresponding rule can al-
so supplement the DNAT rule.
• Layer 3 packet filter (IP filter) is independent of the set filter mode (whitelisting, blacklisting, etc.).
• Layer 2 packet filter (MAC filter) is switched off by default.
– Bridge mode
Broadcast, PROFINET and other layer 2 protocols are passed through.
– Gateway modeOnly IP packets are accepted, i.e. Broadcast, PROFINET and other layer 2 protocols
are NOT passed through.
• MAC filter
As soon as a MAC address is entered in the filter table, the MAC filter is activated; i.e. the layer 2 pack-
et filter then follows the setting from the firewall filter mode (whitelisting, blacklisting, etc.).
NO TI CE
If the packet filter is operated in the "whitelisting" filter mode and the MAC filter (Layer 2) is activated,
only packets that the MAC filter accepts reach the IP filter (Layer 3).
For the description of the individual menus / functions and examples, the following is defined:
NO TI CE
Use SNAT if the network subscriber to be reached is outside the network area of the sender, has no or an
incorrect (inappropriate) gateway entry and can therefore not send a reply to an delivered data packet.
For SNAT, the sender IP address of all packets, e.g. from network A (WAN), exchanged against the LAN
interface address of the firewall (network B).
Since the receiver in network B does not see the original sender IP address, but the LAN interface address of
the own network, no gateway is necessary for the packet response.
This means: the receiver sends the answer to the LAN interface of its own network. Since the firewall "remem-
bered" the IP traffic due to the SNAT, it replaces the packet address with the original sender address.
Image 11: Example: Data packet shipment via SNAT from WAN to LAN
PC A1 (IP 172.16.20.74) on the WAN side sends a data packet to PLC B1 (IP 192.168.0.112) on the
LAN side.
Since SPS B1 does not have a valid gateway entry, it could not send a response packet to the original
IP.
Therefore, in the firewall, the sender IP (IP 172.16.20.74) is replaced by the interface IP of the firewall
on the LAN side (IP 192.168.0.101) and the packet is delivered to the PLC B1.
When transferring to the WAN side, the original IP address of PC A1 (172.16.20.74) is reinstated in the
firewall and the packet is delivered.
NO TI CE
In addition, you must still enable the communication to the individual nodes in the Packet filter !
NO TI CE
Use Simple NAT to access an IP address from network B (LAN) 1:1 on network A (WAN).
With this function, a network participant in the LAN can be directly addressed via a WAN IP address. As it were,
the IP address of a LAN participant with an IP address from the WAN area is mirrored in the WAN. This does
not require a virtual IP address, as is usual with a NAT function.
Image 12: Example: Data packet delivery to two subscribers using Simple-NAT from WAN to LAN
and the LAN IP address of the recipient from the LAN network to be "natted" with.
NO TI CE
You need a separate WAN IP address for each receiver (network subscriber in the LAN network).
NO TI CE
If one of the network participants to be reached has no or a wrong (inappropriate) gateway entry and can
therefore not send a response to an delivered data packet, you must also activate the "WAN to LAN" function
in the SNAT.
Label Description
WAN IP-Address Enter a free WAN IP address from the WAN network.
LAN IP-Address Enter the IP address of the recipient from the LAN network.
Comment Here you can enter a comment for the defined assignment.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically
deactivate and reactivate a SimpleNAT filter rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
You can easily set the column widths of the table with the mouse.
NO TI CE
As soon as you have added and activated an assignment, the rule for this assignment is automatically
entered and activated under Packet filter > Rules > WAN > LAN.
NO TI CE
Use Network NAT to reach an IP range (complete or partial) from Network B (LAN) 1: 1 in Network A (WAN).
With the network NAT function, the entire area or a subarea of the LAN network can be addressed directly
via a virtual network. It is almost an IP address of a LAN participant with an IP address mirrored from the
virtual network.
Each network participant from the LAN uses a separate IP address from the virtual network.
The host part of each virtual IP address is the same as the host part of the real recipient address.
• The virtual network must not be in the same address range as the WAN or LAN network.
• Each network participant needs a corresponding gateway entry.
NO TI CE
If a network subscriber from the LAN network has no or a wrong (inappropriate) gateway entry, you must
additionally activate the SNAT function "WAN to LAN".
• The communication between the individual participants must also be released in the packet filter.
Here, the real IP addresses of the LAN side must be used for the packet filter.
That is, if you define the destination IPs from "WAN to LAN", you will need to use the IPs of the LAN
side, not the NAT IPs (virtual IPs).
NO TI CE
DNAT stands for Destination NAT. This changes the destination of the data packet.
With port forwarding, a single port can be forwarded to a specific IP address specifying the port.
Port forwarding is available from WAN to LAN as well as LAN to WAN.
Image 17: Related address assignment table with the selection WAN > LAN
NO TI CE
An entry in the address assignment table is only effective if the relevant "Active" checkbox is checked. An
active entry is highlighted in green.
Label Description
Source IP IP address of the sender of the data packets.
Source Port The specification of a port serves for a better overview.
With ANY there is no restriction.
WAN Port WAN port of the firewall.
NOTICE
The entry of the WAN port is important because this port is forwarded to the LAN IP / port.
A WAN port = ANY is technically possible, but not useful. Then everything will be forwarded.
• ANY (all)
• ICMP
• UDP
• TCP
LAN IP IP address of the subscriber (receiver) in the LAN network.
LAN Port Port of the subscriber (receiver) in the LAN network.
Comment Here you can enter a comment for the defined port forwarding.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically de-
activate and reactivate a DNAT rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
Label Description
Source IP IP address of the sender of the data packets.
Source Port The specification of a port serves for a better overview.
With ANY there is no restriction.
LAN Port LAN port of the firewall.
NOTICE
The entry of the LAN port is important because this port is forwarded to the WAN IP / port.
A LAN port = ANY is technically possible, but not useful. Then everything will be forwarded.
• ICMP
• UDP
• TCP
WAN IP IP address of the subscriber (receiver) in the WAN network.
WAN Port Port of the subscriber (receiver) in the WAN network.
Comment Here you can enter a comment for the defined port forwarding.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically de-
activate and reactivate a DNAT rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
TIP
You can easily set the column widths of the table with the mouse.
Packet filters, also called network filters, filter the incoming and outgoing data traffic in a computer network.
This usually serves both the protection of the network against attackers and the protection against unintention-
ally outgoing data packets.
In a firewall rule, you define which traffic is permitted or forbidden by a firewall. Depending on the sender,
delivery address and protocol allowed data packets may pass (ACCEPT), forbidden data packets are rejected
(REJECT) or discarded (DROP).
a.
use the Filter mode to restrict all traffic between the WAN and LAN networks
b.
and define under Rules the communication of individual network subscribers.
Image 19: Sample graphic for a packet filter WAN > LAN
Source- Dest.
# Source-IP Destination-IP Protocol Action Comment
Port Port
allowed connection
1 192.168.0.101 ANY 192.168.0.112 80 TCP ACCEPT
(accept)
unauthorized connection
2 192.168.1.225 ANY 192.168.0.112 560 UDP DROP
(drop)
unauthorized connection
3 192.168.0.74 ANY ANY ANY ANY REJECT
(reject)
Image 20: Device view of detected / learned network participants / network communication
In the device view, the recognized (detected) network participants and the learned network communication are
displayed in a mapping table.
and
• the firewall must be in online mode.
By clicking on the " Download Networkdata" button, the device view is updated and additionally detected
network participants are listed.
By clicking on the " Delete Networkdata" button, the display of the device participants is deleted.
Click on " Download Networkdata", the current network participants are displayed again.
The control of the data traffic takes place over the switches for the respective direction.
Example:
Clicking the switch ("All traffic from WAN to LAN is allowed") changes the switch setting
At the same time, WAN>LAN Filtermode changes to "Decline everything except filter rules (recom-
mended)".
The communication of individual network subscribers is determined by the switches for the re-
spective direction and the respective entry of a network subscriber
Example:
Click the entry of the network sub-
scriber for whom you want to create /
change a rule.
The entries under Rules then look like this for WAN> LAN traffic:
Filter mode is part of the firewall policy. Here you regulate the general procedure of all data packets arriving
at the firewall.
1. Select the appropriate rules under the desired communication directions (WAN > LAN or LAN > WAN).
Select the appropriate rules under the desired communication directions (WAN > LAN or LAN > WAN).
• Allow everything except filter rules (see " Rules", Page 85) - so-called blacklisting
Here all packets are accepted at the end of the filter table. The filter sorts but is effectively only off.
• Allow everything (Filter Off)
All filters are inactive here and the data transfer is completely accepted.
Filter mode
Decline everything, except filter rules Allow everthing, except filter rules - Allow everything (filter OFF)
(recommended) - Whitelisting Blacklisting
Decline Mode
Here you create the individual rules for the firewall ruleset; both WAN > LAN and LAN > WAN.
A set of rules consists of the settings in the Filter mode and the set of Rules created.
The policy processes / checks both incoming packets as well as the response packets generated by the network
participant and allows allowed connections to pass through the firewall (ACCEPT) or blocks (DROP, REJECT)
unauthorized connections.
NO TI CE
The firewall rules are evaluated from top to bottom. Exception rules that affect individual Mac or IP addresses
should therefore be at the top.
• Ports for NTP and DNS of the local service on the device are hard-coded in the packet filter if one of
these services is enabled.
• The WAN-IP of the mbNETFIX can not be pinged by default. This must be released in the filter.
• If a DNAT rule is specified, it is automatically bypassed at the layer 3 packet filter. The exception is lay-
er 2 (MAC filter). If this is active or a rule specified including MAC address, a corresponding rule can al-
so supplement the DNAT rule.
• Layer 3 packet filter (IP filter) is independent of the set filter mode (whitelisting, blacklisting, etc.).
• Layer 2 packet filter (MAC filter) is switched off by default.
– Bridge mode
Broadcast, PROFINET and other layer 2 protocols are passed through.
– Gateway modeOnly IP packets are accepted, i.e. Broadcast, PROFINET and other layer 2 protocols
are NOT passed through.
• MAC filter
As soon as a MAC address is entered in the filter table, the MAC filter is activated; i.e. the layer 2 pack-
et filter then follows the setting from the firewall filter mode (whitelisting, blacklisting, etc.).
NO TI CE
If the packet filter is operated in the "whitelisting" filter mode and the MAC filter (Layer 2) is activated,
only packets that the MAC filter accepts reach the IP filter (Layer 3).
1. Select the appropriate tab (WAN > LAN or LAN > WAN) to define the required rules.
2. Using the "MACs", "IPs" and "Ports" checkboxes, you can hide and / or display the associated columns
as required.
NOTICE
a. highlight the relevant field and press the "Delete" key on your keyboard
or
b. delete the complete entry => ANY will be automatically entered again.
TIP
You can easily set the column widths of the table with the mouse.
NOTICE
Source IP IP address of the network subscriber from which a data packet originates.
Source Port Port no. of the network subscriber from which a data packet originates.
Destination MAC address (physical address) of the network subscriber to which a data packet is ad-
MAC dressed.
Destination IP address of the network subscriber to which a data packet is addressed.
IP
Destination Port no. to which the network subscriber listens to which a data packet is addressed.
Port
Protocol Selection of the permitted protocol
• ANY (all)
• ICMP
• UDP
• TCP
Action Selection of the action, how to proceed with a data package
• ACCEPT
• REJECT (The sender is informed by ICMP package.)
• DROP (The package is discarded without notifying the sender.)
Comment Here you can enter a comment on a defined rule.
Option Selection field for using the FTP helper.
In addition to control port 21, the FTP server can also use dynamic ports.
By selecting this function, dynamic ports are recognized on the packet filter, via which the
data connection is then established.
Condition Selection field for specifying the condition when a rule is or remains active.
By wiring (high / low) DI1 or DI2 (digital inputs of the mbNETFIX), you can dynamically de-
activate and reactivate a packet filter rule.
If you select NONE, the rule remains unaffected.
NOTICE
Only active packet filter rules are transferred to the device. That means: A rule can only be deactivated
and reactivated by a signal change at a digital input (high -> low or low -> high).
As soon as a rule has been added, it receives a serial number and can be active (highlighted in green) or
inactive (highlighted in orange).
NO TI CE
Avoid defining rules that cancel each other or block all traffic.
Example
In the filter mode, "Allow everything except filter rules" (blacklisting) and the direction WAN > LAN is se-
lected.
Rule #1 if active, would override the filter mode setting and block all traffic.
Rule #2 drops all data packets sent from a specific device/network adapter with MAC address 9C-EB-
E8-84-3D-5E.
Regel #3 discards all data packets sent from the IP address 192.168.0.101
and addressed to a network participant with the IP 192.168.0.112
and this device is listening to the port no. 80
and the transmission protocol used is TCP.
The mbNETFIX provides, via static routes, the access from the LAN network to any subscribers in the WAN
network, including isolated network segments.
Image 24: Example: PC B2 from network A accesses PLC C1 via the routing. PLC C1 is a network participant in WAN subnet C.
2. By clicking on the "Add / Delete" button, add a route or delete an existing route.
Designation Description
Network Specification of the network to be reached.
Netmask Specification of the subnet mask of the network to be reached.
Gateway Specification of the corresponding gateway to the receiver network.
Comment Here you can leave a comment on the defined route.
Active By confirming the checkbox the route will be activated.
Device Information
Here you can change the name of the device and add a description.
Depending on the selected operating mode (bridge or gateway mode), you can regulate the access authoriza-
tion for the device configuration via the WAN and / or LAN interfaces here.
• If bridge mode is selected, the authorization to configure via the WAN and LAN interfaces can only be
assigned to one user.
• In gateway mode, the configuration permission for the WAN and LAN interfaces can be split between
two different users.
• disabled
The device is configured exclusively via the USB interface.
• admin, operator und viewer
The users named here receive the corresponding rights according to the table "Access rights for the in-
dividual user levels" after their login.
• operator and viewer
The „Operator“ user has the possibility to add/delete/edit the “NAT”, “Packet filter” and “Routes” rules.
Any other setting cannot be edited and can only be viewed.
• viewer
The „Viewer“ user is only able to view the whole configuration but has no writing-access to any setting.
NO TI CE
Here you can change the project password for this project.
• Set a project password (project RSA key) for this project or change the existing password.
• Set / change the device password.
• Activate user (operator / viewer).
1. In the main window, click the lock icon next to "Set Project Password".
2. Enter the old password* and a new password. And repeat the input of the new password.
NO TI CE
To change the device password, the device (mbNETFIX) must be connected to the configuration PC and
ready for operation. And you have to "Go online" with the mbNETFIX.
1. In the main window, click the lock icon next to "Set Device Password".
2. Enter the old password* and a new password. And repeat the input of the new password.
Operator - Viewer
For each project file, two additional users with corresponding rights can be assigned / activated.
• Operator
The „Operator“ user has the possibility to add / delete / edit the “NAT”, “Packet filter” and “Routes”
rules. Any other setting cannot be edited and can only be viewed.
• Viewer
The „Viewer“ user is only able to view the whole configuration but has no writing-access to any setting.
NO TI CE
NO TI CE
Activation / deactivation of users (operator, viewer) can only be carried out by the Admin user.
Click on "Yes"
Click on "Ok"
Deactivate user
NO TI CE
If you deactivate an activated user again, this user is deleted. Set passwords are lost.
This is where you select the time zone to be used in your device.
NTP
Optionally, you can also assign an NTP server for synchronising the time.
The Syslog server records all events with a date and time.
The time must be set so that the Syslog server can log all configuration changes and user logins (see " Time",
Page 98).
Protocol
• UDP
• TCP
• Emergency
• Alert
• Critical
• Error
• Warning
• Notice
• Informational
• Debug
Dependent on the selection, all higher priority levels are also automatically logged.
Page 100 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
6.2.11.4
NetCap
Here you can specify if and how much network data should be recorded.
• Normal
• Mode 1
• .....
• Mode 9
• Here you set the max. Number of detected network participants to be listed in the device view (map-
ping table).
NO TI CE
After all configuration work is completed, the data must be uploaded onto your device (see "Device (mb-
NETFIX hardware)").
Information about:
• System
• WAN Interface
• LAN 1 ... LAN 3 Interface
• USB Interface
• Status of input 1 and input 2 (green = input is connected)
Page 102 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
6.3.1
Loggings
All events that have occurred are logged and saved in mbNETFIX.
The tabs “Loggings” and “Device” are opened to view the individual events.
NO TI CE
The last 1000 entries are always displayed (rolling update system).
NO TI CE
The mbNETFIX is only reset to its factory settings by the user "factory reset" and only via the USB interface.
If you are logged in as the "admin" user, you can also carry out the action directly without having to log out
and log in again with the user "factoryreset".
Further more, you always need the original device password for this action, even if the device is already
paired or the device password has been changed.
1. Select the project file that is paired with the device (mbNETFIX) that should be reset to its factory set-
tings.
Page 104 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
4. Make sure that "USB" is selected for the interface
to be connected and click on "Connect".
Devices
mbNETFIX
• NF1
Network NAT: 192.168.100.0/24
Static Routes: Network 192.168.101.0/24 via Gateway 172.25.15.80
• NF2
Network NAT: 192.168.101.0/24
Static Routes: Network 192.168.100.0/24 via Gateway 172.25.15.90
NO TI CE
In addition, communication to the individual clients must also be approved in the packet filter!
E.g. to PING from PC1: 192.168.0.112 (192.168.100.112) to PC2: 192.168.0.112 (192.168.101.112), the ICMP
protocol must be enabled in the LAN > WAN packet filter of NF1 and also in the WAN > LAN packet filter of NF2.
Consequently, it must first go “out” from NF1 before it can be incoming at NF2.
A gateway must be entered for both PC1 and PC2, as they would like to route into other networks. In principle
the SNAT “WAN to LAN” function can also be enabled here, if for example only direction PC1 to PC2 is required.
Consequently no gateway need be entered on PC2. Then in NF2, SNAT “WAN to LAN” must be activated.
Page 106 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
7.2 Network segmenting of dissimilar network addresses
Devices
mbNETFIX
• NF1
Static Routes: Network 192.168.1.0/24 via Gateway 172.25.15.80
• NF2
Static Routes: Network 192.168.0.0/24 via Gateway 172.25.15.90
NO TI CE
In addition, communication to the individual clients must also be approved in the packet filter!
E.g. to PING from PC1: 192.168.0.112 to PC2: 192.168.112, the ICMP protocol must be enabled in the LAN
> WAN packet filter of NF1 and also in the WAN > LAN packet filter of NF2.
Consequently, it must first go “out” from NF1 before it can be incoming at NF2.
A gateway must be entered for both PC1 and PC2, as they would like to route into other networks. In principle
the SNAT “WAN to LAN” function can also be enabled here, if for example only direction PC1 to PC2 is required.
Consequently no gateway need be entered on PC2. Then in NF2, SNAT “WAN to LAN” must be activated.
Devices
mbNETFIX
• NF1
SNAT WAN to LAN: disabled
SNAT LAN to WAN: active
Devices
mbNETFIX
• NF1
SNAT WAN to LAN: active
SNAT LAN to WAN: disabled
Replaces the sender address of each IP packet that goes from WAN to LAN with the LAN IP. In the above
case a PING goes from 172.25.15.74 to 192.168.0.112. However, PC1 does not see the sender address
172.25.15.74, rather 192.168.0.105. As the sender address is thus in a network, it is not necessary to use a
gateway. I.e. PC1 sends the answer to 192.168.0.105. Because of the SNAT, the NF1 has noted the IP traffic
and converts the response back to the original IP addresses.
NO TI CE
In addition, communication to the individual clients must also be approved in the packet filter!
Page 108 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
E.g. to PING from PC1: 192.168.0.112 to PC2: 172.25.15.74, the ICMP protocol must be enabled in the LAN
> WAN packet filter of NF1.
Example:
Both PLCs should be accessible via PC2 via their own IP addresses. Port forwarding (DNAT) is not possible
here because especially with a Siemens PLC, the port assignment cannot be made in PC2.
Devices
mbNETFIX (NF1)
• Replaces the sender address of each IP packet that goes from WAN to LAN with the LAN IP address.
Simple NAT
NO TI CE
In addition, communication to the individual clients must also be approved in the packet filter!
E.g. to PING from PC1: 192.168.0.112 to PC2: 172.25.15.74, the ICMP protocol must be enabled in the LAN
> WAN packet filter of NF1.
Example:
SPS1 (Programmed port 102) and HMI1 (webserver port 443) should be accessible via PC2.
Devices
mbNETFIX (NF1)
Page 110 von 111 | Version: 1.2.7 DR01 - EN | Feb 15th, 2022
• Replaces the sender address of each IP packet that goes from WAN to LAN with the LAN IP address.
DNAT
• Here the destination address and the destination port are rerouted to another destination address and
destination port.
Specifically for the above case, each packet that has the destination 172.25.15.90, TCP 102 is
rerouted to the destination 192.168.0.112, TCP102. The same occurs for 172.25.15.90 , TCP 443 to
192.168.0.114 , TCP 443. This ensures that the PLC and the HMI are each accessibly via their own
port of the firewall WAN IP.
Here, the advantage in comparison with other systems is that port 443 is not used as a web service in
the firewall and thus is available if such routing is required.
Packet Filter
• No setting is required here as all DNAT entries bypass the packet filter, as they already contain all nec-
essary filter functions. In principle, however, a DROP can be entered, for example, for defined MAC ad-
dresses.
NO TI CE
In addition, communication to the individual clients must also be approved in the packet filter!
E.g. to PING from PC1: 192.168.0.112 to PC2: 172.25.15.74, the ICMP protocol must be enabled in the LAN
> WAN packet filter of NF1.