Setting up security in STEP 7. Professional SIMATIC NET. Industrial Ethernet Security Setting up security in STEP 7 Professional.

Size: px
Start display at page:

Download "Setting up security in STEP 7. Professional SIMATIC NET. Industrial Ethernet Security Setting up security in STEP 7 Professional."

Transcription

1 Setting up security in STEP 7 Professional SIMATIC NET Industrial Ethernet Security Setting up security in STEP 7 Professional Preface 1 User interface and menu commands 2 Basic configuration 3 Firewall in advanced mode 4 VPN for network linking 5 Getting Started 09/2014 C79000-G8976-C379-01

2 Legal information Warning notice system This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are graded according to the degree of danger. DANGER indicates that death or severe personal injury will result if proper precautions are not taken. WARNING indicates that death or severe personal injury may result if proper precautions are not taken. CAUTION indicates that minor personal injury can result if proper precautions are not taken. NOTICE indicates that property damage can result if proper precautions are not taken. If more than one degree of danger is present, the warning notice representing the highest degree of danger will be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to property damage. Qualified Personnel The product/system described in this documentation may be operated only by personnel qualified for the specific task in accordance with the relevant documentation, in particular its warning notices and safety instructions. Qualified personnel are those who, based on their training and experience, are capable of identifying risks and avoiding potential hazards when working with these products/systems. Proper use of Siemens products Note the following: Trademarks WARNING Siemens products may only be used for the applications described in the catalog and in the relevant technical documentation. If products and components from other manufacturers are used, these must be recommended or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and maintenance are required to ensure that the products operate safely and without any problems. The permissible ambient conditions must be complied with. The information in the relevant documentation must be observed. All names identified by are registered trademarks of Siemens AG. The remaining trademarks in this publication may be trademarks whose use by third parties for their own purposes could violate the rights of the owner. Disclaimer of Liability We have reviewed the contents of this publication to ensure consistency with the hardware and software described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the information in this publication is reviewed regularly and any necessary corrections are included in subsequent editions. Siemens AG Industry Sector Postfach NÜRNBERG GERMANY C79000-G8976-C P 09/2014 Subject to change Copyright Siemens AG All rights reserved

3 Table of contents 1 Preface User interface and menu commands User interface and menu commands Basic configuration Configuring IP addresses for SCALANCE S Overview Set up SCALANCE S and the network Making IP settings for the PC Creating a project and security module Creating the security project Assigning IP addresses Downloading the configuration to SCALANCE S Configuring IP addresses for a CP Overview Making IP settings for the PC Creating a project and security module Creating the security project Assigning IP addresses Downloading the configuration to the security module Firewall in advanced mode Global rule sets Overview Make the IP settings for the PCs Configuring the local firewall Configuring global firewall rule sets Downloading the configuration to the security module Testing firewall function Firewall rules for connections Overview Make the IP settings for the PCs Configuring the local firewall Configuring connection firewall rules Downloading the configuration to the security module Testing firewall function User-specific firewall Overview Make the IP settings for the PCs Configuring the local firewall Creating remote access users Configuring user-specific firewall rule sets Downloading the configuration to the security module Activating a user-specific firewall rule set Getting Started, 09/2014, C79000-G8976-C

4 Table of contents Testing firewall function NAT Overview Making IP settings for the PC Configuring destination NAT and local firewall Downloading the configuration to the security module Testing NAT function VPN for network linking VPN tunnel in the LAN between all security products Overview Make the IP settings for the PCs Creating SOFTNET Security Client module Configuring a VPN group Saving the SOFTNET Security Client configuration Downloading the configuration to the security module Set up a tunnel with the SOFTNET Security Client Testing the tunnel VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Overview Make the IP settings for the PCs Creating SOFTNET Security Client module Configuring a VPN group Configuring VPN properties of the security module Saving the SOFTNET Security Client configuration Downloading the configuration to the security module Set up a tunnel with the SOFTNET Security Client Testing the tunnel VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Overview Make the IP settings for the PCs Creating SOFTNET Security Client module Configuring a VPN group Configuring VPN properties of the security module Configuring the local firewall Creating remote access users Configuring user-specific firewall rule sets Saving the SOFTNET Security Client configuration Downloading the configuration to the security module Set up a tunnel with the SOFTNET Security Client Activating a user-specific firewall rule set Testing the tunnel and firewall function Getting Started, 09/2014, C79000-G8976-C379-01

5 Preface 1 Getting results fast with Getting Started Based on simple test networks, you will learn how to handle the security modules and the STEP 7 Professional configuration tool. You will soon see that you can implement the security functions of security modules in the network without any great project engineering effort. Based on a variety of security examples, you will be able to implement the basic functions of the security modules and the SOFTNET Security Client. IP settings for the Examples Note The IP settings in the examples are freely selected and do not cause any conflicts in the isolated test network. In a real network, you would need to adapt these IP settings to avoid possible address conflicts. Validity of this Getting Started Configuration software: STEP 7 Professional V13 Products: SCALANCE S SCALANCE S602, order number: 6GK BA10-2AA3 SCALANCE S612, order number: 6GK BA10-2AA3 SCALANCE S623, order number: 6GK BA10-2AA3 SCALANCE S627-2M, order number: 6GK BA10-2AA3 CPs CP Advanced GX31 as of V3.0, order number: 6GK GX31-0XE0 CP Advanced GX30 as of V3.0, order number: 6GK GX30-0XE0 CP as of V1.1, order number: 6GK AX00-0XE0 CP , order number: 6GK BX30-0XE0 VPN client software SOFTNET Security Client as of V4.0, order number: 6GK VW04-0AA0 Getting Started, 09/2014, C79000-G8976-C

6 Preface Windows: All the examples are implemented with Windows 7. For this reason, the path information of Windows 7 is also described. General terminology "security modules" In this documentation, the following products are grouped together under the term "security module": SCALANCE S602 / SCALANCE S612 / SCALANCE S623 / SCALANCE S627-2M / CP Advanced GX31 / CP Advanced GX30 / CP / CP The CPs Advanced GX31 and Advanced GX30 are called "CP x43-1 Adv.". The CPs and are called "CP 1x43-1". General use of the term "STEP 7" The configuration of the security functions used in this manual is supported as of STEP 7 Professional V13. In the rest of the document this is simply called "STEP 7". Use of the terms "interface" and "port" In this documentation, the ports of security modules are named as follows: "External interface": The external port of the SCALANCE S602 / S612 / S623 or an external port of the SCALANCE S627-2M "Ethernet interface": The external port of the CP x43-1 Adv. / CP 1x43-1 "Internal interface": The internal port of the SCALANCE S602 / S612 / S623 or an internal port of the SCALANCE S627-2M "PROFINET interface": The internal port of the CP 43-1 Adv. "DMZ interface": The DMZ port of the SCALANCE S623 / S627-2M The term "port" itself is used when the focus of interest is a special port of an interface. IP addresses of the security modules in the configuration examples When downloading a configuration to a security module, the IP address via which the interface can currently be reached must always be specified. In the configuration examples in this manual, it is assumed that the IP addresses of the configuration are identical to the current IP addresses of the security modules. If you want to know more You will find further information on the topic of "Industrial Ethernet Security" in the information system of STEP 7 (online help). The information system of STEP 7 also supports you during configuration and programming of your automation system. You will find hardware descriptions and installation instructions in the documents relating to the individual modules. 6 Getting Started, 09/2014, C79000-G8976-C379-01

7 Preface Security information Siemens provides products and solutions with industrial security functions that support the secure operation of plants, solutions, machines, equipment and/or networks. They are important components in a holistic industrial security concept. With this in mind, Siemens products and solutions undergo continuous development. Siemens recommends strongly that you regularly check for product updates. For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive action (e.g. cell protection concept) and integrate each component into a holistic, state-of-the-art industrial security concept. Third-party products that may be in use should also be considered. For more information about industrial security, visit To stay informed about product updates as they occur, sign up for a product-specific newsletter. For more information, visit Getting Started, 09/2014, C79000-G8976-C

8 Preface 8 Getting Started, 09/2014, C79000-G8976-C379-01

9 User interface and menu commands User interface and menu commands User interface for security functions in STEP 7 Getting Started, 09/2014, C79000-G8976-C

10 User interface and menu commands 2.1 User interface and menu commands 1 Global security settings The global security settings are located in the project navigation. These security settings can be configured independently of the module and subsequently assigned to individual security modules as required. If the first security module to be configured is a CP, the global security settings are only displayed when the security functions have been enabled in the local security settings of the CP. If the first security module to be configured is a SCALANCE S module, the global security settings are displayed after logging in to the security project. The following main folders and entries are available in the global security settings: User login For the security configuration within a project, there is a separate user management. Log in to the security configuration using the "User login" entry. The first time that there is a login to the security configuration, a user with the system-defined role "Administrator" is created automatically. You can create further users in the security configuration in the user management. User administration In user administration, you can create users, define rights for roles and assign these roles to users. Certificate manager In the certificate manager, you see an overview of all the certificates used in the project. You can, for example, import new certificates as well as export, modify or replace existing certificates. Firewall Under the "Firewall" entry, you can define global IP and MAC firewall rule sets and user-specific IP rule sets (SCALANCE S modules only) and assign security modules. IP and MAC service definitions are used to define the IP and MAC firewall rules compactly and clearly. VPN groups All created VPN groups are contained in this folder. You can create new VPN groups here and assign security modules to these VPN groups. You can also adapt VPN group properties of VPN groups that have already been created. NTP Here, you can create NTP servers and assign them to one or more security modules. This ensures that time synchronization is performed through the assigned NTP server. Unsecured NTP servers can only be configured in the local security settings. 10 Getting Started, 09/2014, C79000-G8976-C379-01

11 User interface and menu commands 2.1 User interface and menu commands 2 Working area with security module 3 Once you have selected a security module in the work area, you can configure its local security settings in "Properties" > "General". If the selected security module is in a VPN group, related information is displayed in the VPN tab. VPN tab This tab displays information about all the VPN groups to which the security module that was selected in the working area belongs. Information about the respective participants of a VPN group can be displayed and hidden. Getting Started, 09/2014, C79000-G8976-C

12 User interface and menu commands 2.1 User interface and menu commands 4 Local security settings Local security settings are configured for a specific security module. After a security module has been selected in the working area, its local security settings are available in the inspector window under "Properties" > "General". Note for CPs: Before local security settings can be configured for CPs, these must first be enabled. To do this, log in to your security project and then in the Inspector window, select the "Activate security features" check box in the "Properties" > General" tab, "Security" entry. The local security settings are then displayed below the "Security" entry. When the check box is selected, the following settings (assuming they were enabled) are migrated automatically to the local security settings: CP x43-1 Adv.: SNMP FTP configuration Time-of-day synchronization Web server Entries of IP access lists CP : SNMP FTP configuration Time-of-day synchronization CP : SNMP Time-of-day synchronization Additional security functions are also available such as NTP (secure), SNMPv3, FTPS. In addition, firewall rules that enable a connection to be established are created automatically for configured connections. Log settings are available to record blocked packets. Secure and non-secure configuration areas The user interface can be divided into secure and non-secure configuration areas. The secure areas are areas in which configuration is possible only after logging in to the security configuration. These areas are encrypted and therefore only accessible to persons 12 Getting Started, 09/2014, C79000-G8976-C379-01

13 User interface and menu commands 2.1 User interface and menu commands authorized in the user management even if the project is accessible to a wider circle of people. Functions from the non-secure areas, on the other hand, can be configured without logging in to the security configuration. The correctness of the settings must be checked before downloading the project to the plant components if a wider circle of people can make modifications to the project. Below, you will find a list of the configuration areas of the user interface showing which areas are secure and which are non-secure. To some extent, this depends on the security module for which the configuration is created. All settings from the global security settings are secure. Secure and non-secure configuration areas for SCALANCE S modules: All the settings for the interfaces and ports, in particular IP addresses, are non-secure. The settings under the entry "General" in the local security settings are non-secure. Higher-level settings (e.g. MRP settings such as MRP manager etc.) that are not configured on the security module itself but may affect the security module are not secure. This does not relate to the global security settings. The other settings are protected. Secure and non-secure configuration areas for CP Advanced, CP Advanced, CP , CP BX30: All settings outside the "Security" entry are non-secure. Higher-level settings (e.g. MRP settings such as MRP manager, PROFINET settings, connections etc.) that are not configured on the security module itself but may affect the security module are non-secure. This does not relate to the global security settings. All the settings for the interfaces and ports, in particular IP addresses, are non-secure. All settings below the "Security" entry are secure. Getting Started, 09/2014, C79000-G8976-C

14 User interface and menu commands 2.1 User interface and menu commands 14 Getting Started, 09/2014, C79000-G8976-C379-01

15 Basic configuration Configuring IP addresses for SCALANCE S Overview Overview In this example, IP addresses are configured in STEP 7 for a SCALANCE S module that has the factory settings. Then, the configuration is downloaded to the security module via the external interface. Required devices/components: Use the following components to set up the network: 1 x SCALANCE S (additional option: a suitably installed DIN rail with fittings) 1 x 24 V power supply with cable connector and terminal block plug 1 x PC on which the STEP 7 configuration tool is installed The required network cable, TP cable (twisted pair) complying with the IE FC RJ-45 standard for Industrial Ethernet Requirement To be able to work through this example, the following requirements must be met: The SCALANCE S module has the factory-settings. You can restore this status by pressing the Reset button on the SCALANCE S and holding it down for at least 5 seconds. For further information on the Reset button of the SCALANCE S, refer to the section "4.3 Reset button - resetting the configuration to the factory settings" in the manual "SIMATIC NET Industrial Ethernet Security - SCALANCE S V4". Getting Started, 09/2014, C79000-G8976-C

16 Basic configuration 3.1 Configuring IP addresses for SCALANCE S Overview of the next steps: Set up SCALANCE S and the network Follow the steps outlined below: 1. First unpack the SCALANCE S and check that it is undamaged. 2. Connect the power supply to the SCALANCE S. Result: After connecting the power, the Fault LED (F) is lit yellow. WARNING Use safety extra-low voltage only The SCALANCE S device is designed for operation with safety extra-low voltage. This means that only safety extra-low voltages (SELV) complying with IEC950/EN60950/ VDE0805 can be connected to the power supply terminals. The power supply unit to supply the SCALANCE S must comply with NEC Class 2 (voltage range V, current requirement approx. 250 ma). 16 Getting Started, 09/2014, C79000-G8976-C379-01

17 Basic configuration 3.1 Configuring IP addresses for SCALANCE S 3. Establish the physical network connection by connecting the external interface of the SCALANCE S to the PC. 4. Turn on the PC. Note The Ethernet interfaces are handled differently by the SCALANCE S and must not be swapped over when connecting to the communication network: Interface X1 - external network Red marking = unprotected network area; Interface X2 - internal network Green marking = network protected by SCALANCE S; Only for SCALANCE S623 and SCALANCE S627-2M: Interface X3 - DMZ port (universal network interface) Yellow marking = unprotected network area or network area protected by SCALANCE S. If the interfaces are swapped over, the device loses its protective function Making IP settings for the PC The following IP address settings are made for the PC: PC IP address Subnet mask PC Follow the steps outlined below: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. Getting Started, 09/2014, C79000-G8976-C

18 Basic configuration 3.1 Configuring IP addresses for SCALANCE S 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Enter the values assigned to the PC from the table "Making IP settings for the PC" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel Creating a project and security module Creating a new project: 1. Install and start the STEP 7 configuration tool on PC1. 2. Select the menu item "Create new project". 3. In the dialog that follows, assign a project name for your project, if necessary change the storage path and confirm the dialog with "Create". Result: A new STEP 7 is created and opened in the Portal view. 18 Getting Started, 09/2014, C79000-G8976-C379-01

19 Basic configuration 3.1 Configuring IP addresses for SCALANCE S Creating a new security module 1. Change to the project view with the "Open the project view". menu item. 2. In the Project tree, double-click on the "Devices & networks" menu item. Result: The network view opens. 3. Open the "Hardware catalog" and drag the relevant security module to add it to the network view. Make sure that the firmware version is correct; this can be adapted in the "Information" area. You will find the security module by navigating as follows in the "Hardware catalog": Security module Navigation in the hardware catalog SCALANCE S "Network components" > "Industrial Security" > "SCALANCE S" Creating the security project Follow the steps below: 1. Change to the device view. 2. Select the security module so that you can configure the properties. 3. In the Inspector window, "General" tab, select the menu item "Security properties". 4. In the dialog that follows click "User login". 5. Create a new user with user name and the corresponding password. The "administrator" role is assigned to the user automatically. 6. Confirm your entries with "Log in". Result: The security project has been created. All the security settings you make from now on will be stored in the project encrypted and can only be edited or viewed with the user and password you have created Assigning IP addresses Assigning the external IP address: 1. Select the menu "Online" > "Accessible devices". 2. From the "Type of the PG/PC interface" drop-down list, select the entry "PN/IE". 3. Select the network adapter via which you are connected to the security module. 4. If the MAC address of the SCALANCE S is displayed, select the corresponding entry in the table and click the "Show" button. Result: The SCALANCE S is displayed in the project tree in the "Online access" menu below the selected network adapter: Getting Started, 09/2014, C79000-G8976-C

20 Basic configuration 3.1 Configuring IP addresses for SCALANCE S 5. Double-click on "Online & Diagnostics". 6. In the window that follows, select the "Functions" > "Assign IP address" menu. 7. Enter the external IP address ( ) and the external subnet mask ( ). 8. Click the "Assign IP address" button. Configuring IP addresses for the internal interface and the DMZ interface: 1. In the Inspector window, "General" tab, check whether "Routing mode" is enabled under "Mode". 2. Enter the following IP addresses: Interface IP address Subnet mask External interface [P1] red Internal interface [P2] green Only for S623 or S627-2M: DMZ interface [P3] yellow For each address, click the "Add new subnet" button in the "Interface networked with" box. Result: The IP addresses have been assigned and the interfaces networked. 20 Getting Started, 09/2014, C79000-G8976-C379-01

21 Basic configuration 3.1 Configuring IP addresses for SCALANCE S Downloading the configuration to SCALANCE S Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 4. In the "Connection to interface/subnet" drop-down list, select the entry "Try all interfaces". With SCALANCE S modules, the HTTPS protocol is used for the download. 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Getting Started, 09/2014, C79000-G8976-C

22 Basic configuration 3.2 Configuring IP addresses for a CP Result: The security module restarts automatically and the downloaded configuration is activated. Result: SCALANCE S in productive operation The SCALANCE S is now in productive operation. This mode is indicated by the Fault display being lit green. You can now download configurations via all interfaces. The basic configuration is completed. 3.2 Configuring IP addresses for a CP Overview Overview In this example, IP addresses are configured in STEP 7 for one of the following CPs. Following this, the configuration is downloaded to the station via the security module. CP CP CP Advanced CP Advanced Requirement To be able to work through this example, the following requirements must be met: The STEP 7 configuration tool is installed on a PC and a station with a CPU has already been created. The memory card of the CPU is empty. The CPU memory has been reset. The CPU has a valid time of day and forwards this via the backplane bus. You will find more detailed information on the precise procedure in the relevant device manual and in the information system (online help) of STEP Getting Started, 09/2014, C79000-G8976-C379-01

23 Basic configuration 3.2 Configuring IP addresses for a CP Overview of the next steps: Making IP settings for the PC The following IP address settings are made for the PC: PC IP address Subnet mask PC Follow the steps outlined below: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. Getting Started, 09/2014, C79000-G8976-C

24 Basic configuration 3.2 Configuring IP addresses for a CP 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Enter the values assigned to the PC from the table "Making IP settings for the PC" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel Creating a project and security module Creating a new project: 1. Install and start the STEP 7 configuration tool on PC1. 2. Select the menu item "Create new project". 3. In the dialog that follows, assign a project name for your project, if necessary change the storage path and confirm the dialog with "Create". Result: A new STEP 7 is created and opened in the Portal view. 24 Getting Started, 09/2014, C79000-G8976-C379-01

25 Basic configuration 3.2 Configuring IP addresses for a CP Creating a new security module 1. Change to the project view with the "Open the project view". menu item. 2. In the Project tree, double-click on the "Devices & networks" menu item. Result: The network view opens. 3. Open the "Hardware catalog" and drag the relevant security module to add it to the network view. Make sure that the firmware version is correct; this can be adapted in the "Information" area. You will find the security module by navigating as follows in the "Hardware catalog": Security module Navigation in the hardware catalog CP Advanced "Controller" >"SIMATIC S7-300" > "Communications modules" > "PROFINET/Ethernet" > "CP Advanced-IT" CP 443- Advanced "Controller" >"SIMATIC S7-400" > "Communications modules" > "PROFINET/Ethernet" > "CP Advanced-IT" CP "Controller" > "SIMATIC S7-1200" > "Communications modules" > "Industrial Remote Control" > "CP " CP "Controller" > "SIMATIC S7-1500" > "Communications modules" > "PROFINET/Ethernet" > "CP " Creating the security project Follow the steps below: 1. Change to the device view. 2. Select the security module so that you can configure the properties. 3. In the Inspector window, "General" tab, select the menu item "Security > Security properties". 4. In the dialog that follows click "User login". 5. Create a new user with user name and the corresponding password. The "administrator" role is assigned to the user automatically. 6. Confirm your entries with "Log in". 7. Change to the network view and select the security module. 8. Under "Security", select the "Activate security features" check box. Result: The security project has been created. All the security settings you make from now on will be stored in the project encrypted and can only be edited or viewed with the user and password you have created. Getting Started, 09/2014, C79000-G8976-C

26 Basic configuration 3.2 Configuring IP addresses for a CP Assigning IP addresses Assigning the external IP address: 1. Select the menu "Online" > "Accessible devices". 2. From the "Type of the PG/PC interface" drop-down list, select the entry "PN/IE". 3. Select the network adapter via which you are connected to the security module. 4. If the MAC address of the CP is displayed, select the corresponding entry in the table and click the "Show" button. Result: The CP is displayed in the project tree in the "Online access" menu below the selected network adapter. 5. Click on "Online & Diagnostics". 6. In the window that follows, select the "Functions" > "Assign IP address" menu. 7. Enter the external IP address ( ) and the external subnet mask ( ). 8. Click the "Assign IP address" button. 9. For each address, click the "Add new subnet" button in the "Interface networked with" box. Result: The IP addresses have been assigned and the interfaces networked. Configuring IP addresses for the internal interface: 1. Enter the following IP addresses in the Inspector window "General tab: Security module IP address Subnet mask CP 1x43-1 Ethernet interface [X1]: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: For each address, click the "Add new subnet" button in the "Interface networked with" box. Result: The IP addresses have been assigned and the interfaces networked Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 26 Getting Started, 09/2014, C79000-G8976-C379-01

27 Basic configuration 3.2 Configuring IP addresses for a CP 4. In the "Connection to interface/subnet" drop-down list, select the entry "Try all interfaces". For CPs, the S7 protocol is used for the download. 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. Result: Security module in productive mode The security module is now in productive operation. You can now download configurations via all interfaces. The basic configuration is complete. Getting Started, 09/2014, C79000-G8976-C

28 Basic configuration 3.2 Configuring IP addresses for a CP 28 Getting Started, 09/2014, C79000-G8976-C379-01

29 Firewall in advanced mode Global rule sets Overview In this example you configure the advanced firewall and use the function of the global rule sets. By making the settings in the firewall of the security module, you restrict configuration and diagnostics of the controllers using the S7 protocol to the IP address of PC1 and therefore make this possible from the external network. In addition to this, all nodes from the external network can use the HTTPS protocol for communication. This allows security diagnostics of the security modules or, depending on the test setup, communication with Web servers in the internal network. With the global rule sets, denied access attempts to the security module or the internal network are logged. Setting up the test network for SCALANCE S, CP x43-1 Adv. Getting Started, 09/2014, C79000-G8976-C

30 Firewall in advanced mode 4.1 Global rule sets Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a SIMATIC S7 station with an integrated Web server that supports the HTTPS protocol. The station is connected to the internal interface of the security module. Station1: Represents a node in the internal network Security module - A security module for protection of the internal network can be: SCALANCE S CP Advanced in a SIMATIC S7-300 station CP Advanced in a SIMATIC S7-400 station External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 Setup of the test network CP 1x43-1 Station - one of the following stations with security module: CP in a SIMATIC S station CP in a SIMATIC S station External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 30 Getting Started, 09/2014, C79000-G8976-C379-01

31 Firewall in advanced mode 4.1 Global rule sets Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. Only for CP x43-1 Adv. and SCALANCE S: A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with one of the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: CP 1x43-1 Ethernet interface [X1]: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: The project with the "basic configuration" of the security module is open on PC1. Figure 4-1 IP settings of the basic configuration You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. Getting Started, 09/2014, C79000-G8976-C

32 Firewall in advanced mode 4.1 Global rule sets Overview of the next steps: Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Follow the steps below for PC1: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]"" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 32 Getting Started, 09/2014, C79000-G8976-C379-01

33 Firewall in advanced mode 4.1 Global rule sets 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel Configuring the local firewall Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. For a CP: Select the "Security" menu item and then the "Activate security features" check box. Result: The security functions of the module are shown below the "Security" entry and can be configured. Getting Started, 09/2014, C79000-G8976-C

34 Firewall in advanced mode 4.1 Global rule sets 3. Select the "Firewall" menu item. 4. In the "General" box, enable the "Activate firewall" option. 5. Enable the "Activate firewall in advanced mode" function. Confirm the prompt with "Yes". Result: The firewall of the security module is switched to the advanced mode. You can now configure firewall rules that filter for IP addresses and services. Switching back to the standard mode of the firewall is not possible. 6. Select the "IP rules" menu and add the following firewall rules depending on the security module you are using: Security module Action From To 1) Source IP address Destination IP address Service SCALANCE S Allow External Internal S7 Allow External Internal - - HTTPS CP 1x43-1 Allow External Station S7 Allow External Station - - Security diagnostics CP x43-1 Allow External Any S7 Allow External Any - - HTTPS 1) Due to the "Stateful inspection" function of the firewall, the response frames are allowed automatically and do not need to be allowed specifically. Result: The local firewall rules are displayed in the list: Figure 4-2 Local IP rules in advanced firewall mode 34 Getting Started, 09/2014, C79000-G8976-C379-01

35 Firewall in advanced mode 4.1 Global rule sets Configuring global firewall rule sets Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "Global firewall rule sets" > "IP rule sets" > "Add new IP rule set". Result: A global IP rule set is created. 2. Enter any name and a description for the IP rule set. In this example: Name: IP rule set 1 Description: Logging denied accesses 3. Add the following firewall rules to the list: Action From To Source IP address Destination IP address Service Logging Drop External Internal - - All Drop External Station - - All Drop External Any - - All Result: A new global firewall rule set is created. You can assign the global firewall rule set to every security module without needing to create these rules separately for each security module. Figure 4-3 Global IP rule set 4. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "Global firewall rule sets" > "IP rule sets" > "Assign module to a firewall rule set". 5. Select the created rule set from the "Rule set " drop-down list. 6. Select the security module being used in the Available modules list. Getting Started, 09/2014, C79000-G8976-C

36 Firewall in advanced mode 4.1 Global rule sets 7. With the "<<" button, move it to "Assigned modules" list. Figure 4-4 Assigning a global rule set Result: The global firewall rule set has been inserted in the local firewall of the security module 8. To check this, go to the Inspector window and open the menu "Properties" > "Firewall" > "IP rules". Figure 4-5 Displaying a global rule set 36 Getting Started, 09/2014, C79000-G8976-C379-01

37 Firewall in advanced mode 4.1 Global rule sets Result: The global firewall rule set has been added to the list after the last local firewall rule. Depending on the security module you are using, only the firewall rules from the global firewall rule set will be adopted if these are valid for the security module. You can see the resulting firewall rules in the following table: Security module Action From To Source IP address Destination IP address Service Logging CP 1x43-1 Drop External CP x43-1 Adv. Drop External Drop External SCALANCE S602/S612 Drop External Station - - All Station - - All Any - - All Internal - - All Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". Getting Started, 09/2014, C79000-G8976-C

38 Firewall in advanced mode 4.1 Global rule sets 4. Select the "Connection to interface/subnet" via which you are connected to the security module. For CPs, the S7 protocol is used for the download, for SCALANCE S the HTTPS protocol. Figure 4-6 Downloading to the security module 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. 38 Getting Started, 09/2014, C79000-G8976-C379-01

39 Firewall in advanced mode 4.1 Global rule sets Result: Security module in productive mode The configuration is complete. The security module protects the station in which the security module is located or Station1 in the internal network of the security module (if it exists). Incoming S7 data traffic is permitted only from PC1 and HTTPS communication for diagnostics of the security module is allowed for every node from the external network. Every blocked access attempt is logged Testing firewall function How can you test the configured function? The function tests are performed with PC1 on which a Web browser is installed. So that the denied access attempts are recorded and displayed by the firewall, use the packet filter logging function. Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external: 1. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): the project for the station in which the security module is located 2. Select the station in the project tree. 3. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Getting Started, 09/2014, C79000-G8976-C

40 Firewall in advanced mode 4.1 Global rule sets Figure 4-7 S7 diagnostics and configuration of the station Test phase 2 - PC1: HTTPS access to the Web server of the station Now test the function of the HTTPS firewall rule for all nodes from the external network as follows: Open a standard Web browser on PC1 and enter the following URL: for CP x43-1 Adv. and SCALANCE S: " for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): " Result: Access to the Web server using the HTTPS protocol is possible. 40 Getting Started, 09/2014, C79000-G8976-C379-01

41 Firewall in advanced mode 4.1 Global rule sets Figure 4-8 HTTPS access to the Web server of the station Test phase 3 PC1 with modified IP address: S7 diagnostics and configuration of the station By changing the IP address of PC1 in this test phase, an unauthorized access attempt will be simulated. To do this, change the IP address from " " to " " as explained in the section "Make the IP settings for the PCs (Page 32)". Now test the function of the S7 firewall rule for PC1 from external with the modified IP address as follows: 1. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): the project for the station in which the security module is located 2. Select the station in the project tree. 3. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. The time for the connection attempt expires and no connection can be established to the station. Getting Started, 09/2014, C79000-G8976-C

42 Firewall in advanced mode 4.1 Global rule sets Figure 4-9 S7 diagnostics and configuration of the station Test phase 4 PC1 with modified IP address: HTTPS access to the Web server of the station By changing the IP address of PC1 in this test phase, an access attempt by another PC will be simulated. In keeping with test phase 3, here instead of the IP address " ", PC1 has the IP address " ". Open a standard Web browser on PC1 and enter the following URL: for CP x43-1 Adv. and SCALANCE S: " for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): " Result: Access to the Web server using the HTTPS protocol is possible. Figure 4-10 HTTPS access to the Web server of the security module Test phase 5 - PC1: S7 diagnostics and configuration of the station As explained in the section "Make the IP settings for the PCs (Page 32)", change the IP address of PC1 from " " back to " ". 42 Getting Started, 09/2014, C79000-G8976-C379-01

43 Firewall in advanced mode 4.1 Global rule sets Now test the function of the packet filter logging of the firewall rules you activated in the global firewall rules as follows: 1. Open the project for configuration and diagnostics of the station. 2. To log in to the project, enter your login in the project tree using "Global security settings" > "User login". 3. Select the security module in the project tree. 4. Select the menu command "Online" > "Online & Diagnostics". 5. For CPs: In the "Diagnostics" > "Security" > "Status" menu, click the "Connect online" button. Figure 4-11 Connecting to the security module online Result: The "Online access" dialog opens. As "Type of the PG/PC interface", the "HTTPS" protocol is preset. 6. Select the "PG/PC interface" and the "Connection to interface/subnet via which you are connected to the security module. Getting Started, 09/2014, C79000-G8976-C

44 Firewall in advanced mode 4.1 Global rule sets 7. Click the "Connect online" button. Result: The online connection to the security module is established and security diagnostics with HTTPS is possible. Figure 4-12 Running security diagnostics with HTTPS 8. In the "Diagnostics" > "Packet filter log" menu, click the "Start reading" button. Result: The unauthorized connection attempts from test phase 3 were recorded in the packet filter log and will be displayed as follows: Figure 4-13 Display of the unauthorized connection attempts 44 Getting Started, 09/2014, C79000-G8976-C379-01

45 Firewall in advanced mode 4.2 Firewall rules for connections 4.2 Firewall rules for connections Overview In this example, you configure the advanced firewall. With the settings made in the firewall of the security module, the connections configured via the CPs are allowed in the firewall and restricted to the services used. The configuration and diagnostics of the controllers using the S7 protocol are restricted in the firewall to the IP address of PC1 and therefore allowed from the external network. In addition to this, all nodes from the external network can use the HTTPS protocol for communication. This allows security diagnostics of the security modules. Denied attempts to access the security module or the station are logged. Setting up the test network Getting Started, 09/2014, C79000-G8976-C

46 Firewall in advanced mode 4.2 Firewall rules for connections Station1 - one of the following stations with security module: SIMATIC S7-300 where CP Advanced SIMATIC S7-400 where CP Advanced SIMATIC S where CP SIMATIC S where CP External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. Switch: Switch to network the connection partners and PC1 with each other. PC1: PC with configuration software STEP 7 Active partner station (Station2): Partner station that actively establishes the connections to Station1 Passive partner station (Station3): Partner station that accepts active connections from Station1 Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. A STEP 7 project has already been created with one of the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask CP 1x43-1 Ethernet interface [X1]: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: In the STEP 7 project, communications connections were configured via the CP. The type and number of communications connections are irrelevant. In this example, the following communications connections of the CP to the partner stations were configured: Connection type Connection establishment Partner station Partner address S7 connection passive active_partner_station S7 connection active passive_partner_station Getting Started, 09/2014, C79000-G8976-C379-01

47 Firewall in advanced mode 4.2 Firewall rules for connections The project with the "basic configuration" of the security module is open on PC1. Figure 4-14 IP settings of the basic configuration You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. Overview of the next steps: Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Getting Started, 09/2014, C79000-G8976-C

48 Firewall in advanced mode 4.2 Firewall rules for connections Follow the steps below for PC1: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]"" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel. 48 Getting Started, 09/2014, C79000-G8976-C379-01

49 Firewall in advanced mode 4.2 Firewall rules for connections Configuring the local firewall Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. Select the "Security" menu item and then the "Activate security features" check box. Result: The security functions of the module are shown below the "Security" entry and can be configured. 3. Select the "Firewall" menu item. 4. In the "General" box, enable the "Activate firewall" option. 5. Enable the "Activate firewall in advanced mode" function. Confirm the prompt with "Yes". Result: The firewall of the security module is switched to the advanced mode. You can now configure firewall rules that filter for IP addresses and services. Switching back to the standard modem firewall is not possible. 6. Select the "IP rules" menu and add the following firewall rules depending on the security module you are using: Security module Action From To Source IP address Destination IP address Service CP 1x43-1 Allow External Station S7 Allow External Station - - Security diagnostics Drop External Station - - All CP x43-1 Adv. Allow External Station S7 Allow External Station - - HTTPS Drop External Station - - All Result: The local firewall rules are displayed in the list: Logging Figure 4-15 Local IP rules in advanced firewall mode Getting Started, 09/2014, C79000-G8976-C

50 Firewall in advanced mode 4.2 Firewall rules for connections Configuring connection firewall rules Follow the steps below: 1. Click the "Update connection rules" button. Result: The firewall rules for the active and passive connection to the station are automatically added at the start of the list of IP rules. Figure 4-16 Configuring connection firewall rules According to the connection establishment, only the direction in which the connection is established is opened in the firewall. Due to the "Stateful inspection" function of the firewall, the response frames are allowed automatically and do not need to be allowed specifically. The additional Drop firewall rule prevents connections being established in the opposite direction. In the following table, you will find the firewall rules that result for connection establishment depending on the configured direction: Connection establishment Action From To Source IP address Destination IP address passive Allow External Station Drop Station External active Drop External Station Allow Station External Restrict the connection firewall rules to the protocol being used. In this example, S7 connections were configured; the S7 protocol therefore needs to be used. Result: Only S7 connections to the partner station can pass through the firewall. Result: The firewall is now completely configured Connection firewall rules are automatically inserted at the start of the firewall list and cannot be moved. Settings such as service, bandwidth or logging can be adapted. The "Source IP address" and "Destination IP address" boxes have default values and cannot be changed since the information is taken from the connection configuration. The configuration of the firewall is completed. 50 Getting Started, 09/2014, C79000-G8976-C379-01

51 Firewall in advanced mode 4.2 Firewall rules for connections Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 4. Select the "Connection to interface/subnet" via which you are connected to the security module. For CPs, the S7 protocol is used for the download. 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Getting Started, 09/2014, C79000-G8976-C

52 Firewall in advanced mode 4.2 Firewall rules for connections Result: The security module restarts automatically and the downloaded configuration is activated. Result: Security module in productive mode The configuration is complete. The security module protects the station in which the security module is located. S7 connections to the partner stations are allowed. Incoming S7 data traffic is permitted only from PC1 and HTTPS communication for diagnostics of the security module is allowed for every node from the external network. Every blocked access attempt is logged Testing firewall function How can you test the configured function? The function tests are performed with PC1 on which a Web browser is installed. So that the denied access attempts are recorded and displayed by the firewall, use the packet filter logging function. Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external: 1. Open the project for configuration and diagnostics of the station. 2. Select the station in the project tree. 52 Getting Started, 09/2014, C79000-G8976-C379-01

53 Firewall in advanced mode 4.2 Firewall rules for connections 3. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Figure 4-17 Uploading S7 diagnostics 4. Select the security module in the project tree. 5. Select the menu command "Online" > "Connect online". 6. Start special diagnostics in the "Functions" > "Special diagnostics" menu. Result: NCM S7 diagnostics for CPs starts and sets up a connection to the CP. 7. In the "Connections" > "S7 connections" menu, you can check the connection status for the connections that have been set up. Result: The S7 connections are established and ready for communication. Getting Started, 09/2014, C79000-G8976-C

54 Firewall in advanced mode 4.2 Firewall rules for connections Test phase 2 - PC1: HTTPS access to the Web server of the station Now test the function of the HTTPS firewall rule for all nodes from the external network as follows: Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server using the HTTPS protocol is possible. Test phase 3 PC1 with modified IP address: S7 diagnostics and configuration of the station By changing the IP address of PC1 in this test phase, an unauthorized access attempt will be simulated. To do this, change the IP address from " " to " " as explained in the section "Make the IP settings for the PCs (Page 47)". Now test the function of the S7 firewall rule for PC1 from external with the modified IP address as follows: 1. Open the project for configuration and diagnostics of the station. 2. Select the station in the project tree. 3. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. The time for the connection attempt expires and no connection can be established to the station. 54 Getting Started, 09/2014, C79000-G8976-C379-01

55 Firewall in advanced mode 4.2 Firewall rules for connections Figure 4-18 S7 diagnostics and configuration of the station Test phase 4 PC1 with modified IP address: HTTPS access to the Web server of the station By changing the IP address of PC1 in this test phase, an access attempt by another PC will be simulated. In keeping with test phase 3, here instead of the IP address " ", PC1 has the IP address " ". Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server using the HTTPS protocol is possible. Test phase 5 - PC1: S7 diagnostics and configuration of the station As explained in the section "Make the IP settings for the PCs (Page 47)", change the IP address of PC1 from " " back to " ". Now test the function of the packet filter logging of the firewall rules you activated in the global firewall rules as follows: 1. Open the project for configuration and diagnostics of the station. 2. To log in to the project, enter your login in the project tree using "Global security settings" > "User login". Getting Started, 09/2014, C79000-G8976-C

56 Firewall in advanced mode 4.2 Firewall rules for connections 3. Select the security module in the project tree. 4. Select the menu command "Online" > "Online & Diagnostics". 5. In the "Diagnostics" > "Security" > "Status" menu, click the "Connect online" button. Figure 4-19 Connecting to the security module online Result: The "Online access" dialog opens. As "Type of the PG/PC interface", the "HTTPS" protocol is preset. 6. Select the "PG/PC interface" and the "Connection to interface/subnet via which you are connected to the security module. 56 Getting Started, 09/2014, C79000-G8976-C379-01

57 Firewall in advanced mode 4.2 Firewall rules for connections 7. Click the "Connect online" button. Result: The online connection to the security module is established and security diagnostics with HTTPS is possible. 8. In the "Diagnostics" > "Packet filter log" menu, click the "Start reading" button. Result: The unauthorized connection attempts from test phase 3 were recorded in the packet filter log and will be displayed as follows: Getting Started, 09/2014, C79000-G8976-C

58 Firewall in advanced mode 4.3 User-specific firewall 4.3 User-specific firewall Overview In this example you configure the advanced firewall and use the function of the user-specific rule sets. By making these settings in the firewall of the security module, you restrict configuration and diagnostics of the station in the internal network using the S7 protocol to one user making the station accessible only for this one user from the external network. In addition to this, all nodes from the external network can use the HTTPS protocol for communication. This allows security diagnostics of the security modules and communication with Web servers in the internal network. Denied attempts to access the security module or the station are logged. Setting up the test network Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a SIMATIC S7 station with an integrated Web server that supports the HTTPS protocol. The station is connected to the internal interface of the security module. Station1: Represents a node in the internal network Security module - A security module for protection of the internal network can be: SCALANCE S 58 Getting Started, 09/2014, C79000-G8976-C379-01

59 Firewall in advanced mode 4.3 User-specific firewall External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: The project with the "basic configuration" of the security module is open on PC1. Figure 4-20 IP settings You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Getting Started, 09/2014, C79000-G8976-C

60 Firewall in advanced mode 4.3 User-specific firewall Follow the steps below for PC1: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]"" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel. 60 Getting Started, 09/2014, C79000-G8976-C379-01

61 Firewall in advanced mode 4.3 User-specific firewall Configuring the local firewall Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. Select the "Firewall" menu item. 3. In the "General" box, enable the "Activate firewall" option. 4. Enable the "Activate firewall in advanced mode" function. Confirm the prompt with "Yes". Result: The firewall of the security module is switched to the advanced mode. You can now configure firewall rules that filter for IP addresses and services. Switching back to the standard modem firewall is not possible. 5. Select the "IP rules" menu and add the following firewall rules: Action From To Source IP address Destination IP address Service Logging Allow External Internal - - HTTPS Drop External Internal - - All Result: The local firewall rules are displayed in the list: Creating remote access users Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "User management". 2. Create a new user and password with the following settings: User name: remote Role: Remote access Password: <freely selectable> Getting Started, 09/2014, C79000-G8976-C

62 Firewall in advanced mode 4.3 User-specific firewall Figure 4-21 Creating remote access users Configuring user-specific firewall rule sets Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "Global firewall rule sets" > "IP rule sets" > "Add new IP rule set". Result: A global IP rule set is created. 2. Enter any name and a description for the IP rule set. In this example: Name: User-specific IP rule set 1 Description: Access using S7 protocol 3. Add the following firewall rules to the list: Action From To Source IP address Destination IP address Service Logging Allow External Internal S7 Result: A user-specific IP rule set is created: Figure 4-22 User-specific IP rule set 4. Change from the "User-specific IP rule set" view to the "User" view. Assign a user to the rule set who will have the right to activate the rule set. 5. Select the remote user in the "Available users" list. 62 Getting Started, 09/2014, C79000-G8976-C379-01

63 Firewall in advanced mode 4.3 User-specific firewall 6. With the "<<" button, move the user to "Assigned users" list. Figure 4-23 Assigning remote access user 7. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "User-specific IP rule sets" > "Assign user-specific IP rule set". 8. Select the created rule set from the "Rule set " drop-down list. 9. Select the security module being used in the Available modules list. Getting Started, 09/2014, C79000-G8976-C

64 Firewall in advanced mode 4.3 User-specific firewall 10.With the "<<" button, move it to "Assigned modules" list. Result: The user-specific firewall rule set has been inserted in the local firewall of the security module. Figure 4-24 Assigning a user-specific IP rule set to a module 11.To check this, go to the Inspector window and open the menu "Properties" > "Firewall" > "IP rules". Result: The user-specific firewall rule set has been added to the list before the local firewall rules. The firewall configuration is complete. Figure 4-25 Displaying a user-specific rule set 64 Getting Started, 09/2014, C79000-G8976-C379-01

65 Firewall in advanced mode 4.3 User-specific firewall Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 4. Select the "Connection to interface/subnet" via which you are connected to the security module. With SCALANCE S, the HTTPS protocol is used for the download. Figure 4-26 Downloading to the security module 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. Getting Started, 09/2014, C79000-G8976-C

66 Firewall in advanced mode 4.3 User-specific firewall 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. Result: Security module in productive mode The configuration is complete. The security module protects the station in the internal network. S7 communication for configuration and diagnostics of the station in the internal network is only possible after successful authentication with the user-specific firewall of the security module. HTTPS communication for diagnostics of the station in the internal network is allowed for every node from the external network. Every blocked access attempt is logged Activating a user-specific firewall rule set 1. Open a standard Web browser on PC1 and enter the following URL: " 2. In the following window, enter the user name "remote" and the corresponding password. 3. Click the "Login" button. Result: The defined firewall rule set is enabled for the "remote" user. Access to the station in the internal network of the security module using the S7 protocol of PC1 in the external network is permitted for 30 minutes. 66 Getting Started, 09/2014, C79000-G8976-C379-01

67 Firewall in advanced mode 4.3 User-specific firewall Testing firewall function How can you test the configured function? The function tests are performed with PC1 on which a Web browser is installed. So that the denied access attempts are recorded and displayed by the firewall, use the packet filter logging function. Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external as follows: 1. Activate the user-specific firewall rule set as described in the section "Activating a userspecific firewall rule set (Page 66)": 2. Open the project for configuration and diagnostics of the station in the internal network. 3. Select the station in the project tree. Getting Started, 09/2014, C79000-G8976-C

68 Firewall in advanced mode 4.3 User-specific firewall 4. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Figure 4-27 S7 diagnostics and configuration of the station 5. Deactivate the user-specific firewall rule set by clicking the "Logout" button in the Web browser. 6. As described in points 2-4, try to reach the station again using the S7 protocol. Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. The time for the connection attempt expires and no connection can be established to the station. 68 Getting Started, 09/2014, C79000-G8976-C379-01

69 Firewall in advanced mode 4.3 User-specific firewall Figure 4-28 S7 diagnostics and configuration of the station Test phase 2 - PC1: HTTPS access to the Web server of the station Now test the function of the HTTPS firewall rule for all nodes from the external network as follows: Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server using the HTTPS protocol is possible. Test phase 3 - diagnostics of denied access attempts with packet filter logging Now test the function of the packet filter logging of the firewall rules you activated in the global firewall rules as follows: 1. Open the project for configuration and diagnostics of the station. 2. To log in to the project, enter your login in the project tree using "Global security settings" > "User login". 3. Select the security module in the project tree. Getting Started, 09/2014, C79000-G8976-C

70 Firewall in advanced mode 4.3 User-specific firewall 4. Select the menu command "Online" > "Online & Diagnostics". Result: The "Online access" dialog opens. As "Type of the PG/PC interface", the "HTTPS" protocol is preset. 5. Select the "PG/PC interface" and the "Connection to interface/subnet via which you are connected to the security module. 6. Click the "Connect online" button. Result: The online connection to the security module is established and security diagnostics with HTTPS is possible. 7. In the "Diagnostics" > "Packet filter log" menu, click the "Start reading" button. Result: The unauthorized connection attempts from test phase 1 were recorded in the packet filter log and will be displayed as follows: Figure 4-29 Display of the unauthorized connection attempts 70 Getting Started, 09/2014, C79000-G8976-C379-01

71 Firewall in advanced mode 4.4 NAT 4.4 NAT Overview In this example, you configure NAT function and the advanced firewall. With the configuration, Station1 is reachable via an NAT IP address that belongs to the external subnet. Only Station1 from the internal network will be reachable for PC1 from the external network. Other nodes from the internal subnet cannot be reached. By making the settings in the firewall of the security module, you restrict configuration of the controller Station1 using the S7 protocol to the IP address of PC1 and therefore make this possible from the external network. In addition to this, all nodes from the external network can use the HTTPS protocol for communication. This allows security diagnostics of the security modules or also communication with Web servers in the internal network. Denied attempts to access the security module or the station are logged. Setting up the test network Getting Started, 09/2014, C79000-G8976-C

72 Firewall in advanced mode 4.4 NAT Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a SIMATIC S7 station with an integrated Web server that supports the HTTPS protocol. Station1: Represents a node in the internal network Security module - A security module for protection of the internal network can be: SCALANCE S CP Advanced in a SIMATIC S7-300 station CP Advanced in a SIMATIC S7-400 station External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with one of the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: Getting Started, 09/2014, C79000-G8976-C379-01

73 Firewall in advanced mode 4.4 NAT The project with the "basic configuration" of the security module is open on PC1. Figure 4-30 IP settings of the basic configuration You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. Overview of the next steps: Making IP settings for the PC The following IP address settings are made for the PC: PC IP address Subnet mask PC Follow the steps outlined below: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". Getting Started, 09/2014, C79000-G8976-C

74 Firewall in advanced mode 4.4 NAT 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Enter the values assigned to the PC from the table "Making IP settings for the PC" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel. 74 Getting Started, 09/2014, C79000-G8976-C379-01

75 Firewall in advanced mode 4.4 NAT Configuring destination NAT and local firewall Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. For a CP: Select the "Security" menu item and then the "Activate security features" check box. Result: The security functions of the module are shown below the "Security" entry and can be configured. 3. Select the "NAT/NAPT" menu item. 4. Select the "Activate NAT" function and add the following NAT rules: Action From To Source IP address Source translation Destination IP address Destination translation Destination NAT External Internal Destination NAT External Internal Result: The following NAT rule sets will be created: Figure 4-31 NAT rules 5. In the "General" box, enable the "Activate firewall" option. Getting Started, 09/2014, C79000-G8976-C

76 Firewall in advanced mode 4.4 NAT 6. Enable the "Activate firewall in advanced mode" function. Confirm the prompt with "Yes". Result: The firewall of the security module is switched to the advanced mode. You can now configure firewall rules that filter for IP addresses and services. Switching back to the standard mode of the firewall is not possible. 7. Select the "IP rules" menu. Result: The previously inserted NAT rules have automatically generated two firewall rules to which you can now add additional IP addresses and services. The expanded firewall rules then filter based on the specified IP addresses and services. Expand the two NAT firewall rules and add a logging rule at the end according to the following table: Security module Action From To Source IP address Destination IP address Service Logging SCALANCE S NAT_1 Allow External Internal S7 NAT_2 Allow External Internal HTTPS Drop External Internal - - All CP x43-1 Adv. NAT_1 Drop External Station S7 Allow External Any S7 NAT_2 Drop External Station HTTPS Allow External Any HTTPS Drop External Any - - All Result: The local firewall rules are displayed in the list: Figure 4-32 Local IP rules in advanced firewall mode 76 Getting Started, 09/2014, C79000-G8976-C379-01

77 Firewall in advanced mode 4.4 NAT Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 4. Select the "Connection to interface/subnet" via which you are connected to the security module. For CPs, the S7 protocol is used for the download, for SCALANCE S the HTTPS protocol. Figure 4-33 Downloading to the security module 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. Getting Started, 09/2014, C79000-G8976-C

78 Firewall in advanced mode 4.4 NAT 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. Result: Security module in productive mode The configuration is complete. The security module protects the station in which the security module is located or Station1 in the internal network of the security module (if it exists). Incoming S7 data traffic to Station1 is only permitted from PC1 and uses the NAT IP address of the security module. The HTTPS communication for diagnostics of Station1 is permitted for every node from the external network via the NAT IP address Every blocked access attempt is logged Testing NAT function How can you test the configured function? The function tests are performed with PC1 on which a Web browser is installed. So that the denied access attempts are recorded and displayed by the firewall, use the packet filter logging function. Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 NAT firewall rule for PC1 from external as follows: 1. Open the project for configuration and diagnostics of the station in the internal network. 2. Select the station in the project tree. 3. Select the menu command "Online" > "Download to device". 78 Getting Started, 09/2014, C79000-G8976-C379-01

79 Firewall in advanced mode 4.4 NAT 4. In the "Compatible devices in target subnet" list, enter the NAT IP address " " in the Access address box. Confirm the input by clicking on a point outside the row. Result: The NAT IP address is defined as the access address to Station1. 5. Click the "Load" button. 6. In the "Load preview" dialog, click the "Load" button. Result: The configuration is downloaded to the security module. 7. Click the "Finish" button to complete the download and to restart Station1. Result: Diagnostics and downloading configuration data via the NAT IP address are possible using the S7 protocol. Test phase 2 - PC1: HTTPS access to the Web server of the station Now test the function of the HTTPS firewall rule for all nodes from the external network as follows: Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server via the NAT IP address using the HTTPS protocol is possible. Getting Started, 09/2014, C79000-G8976-C

80 Firewall in advanced mode 4.4 NAT Test phase 3 PC1 with modified IP address: S7 diagnostics and configuration of the station By changing the IP address of PC1 in this test phase, an unauthorized access attempt will be simulated. To do this, change the IP address from " " to " " as explained in the section "Making IP settings for the PC (Page 73)". Now test the function of the S7 NAT firewall rule for PC1 from external with the modified IP address as follows: 1. Open the project for configuration and diagnostics of the station. 2. Select the station in the project tree. 3. Select the menu command "Online" > "Download to device". 4. In the "Compatible devices in target subnet" list, enter the NAT IP address " " in the Access address box. Confirm the input by clicking on a point outside the row. Result: The NAT IP address cannot be reached. Diagnostics and downloading of a configuration are not possible using the S7 protocol. The time for the connection attempt expires and no connection can be established to the station. 80 Getting Started, 09/2014, C79000-G8976-C379-01

81 Firewall in advanced mode 4.4 NAT Figure 4-34 S7 diagnostics and configuration of the station Getting Started, 09/2014, C79000-G8976-C

82 Firewall in advanced mode 4.4 NAT Test phase 4 PC1 with modified IP address: HTTPS access to the Web server of the station By changing the IP address of PC1 in this test phase, an access attempt by another PC will be simulated. In keeping with test phase 3, here instead of the IP address " ", PC1 has the IP address " ". Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server via the NAT IP address using the HTTPS protocol is possible. Test phase 5 - PC1: S7 diagnostics and configuration of the station As explained in the section "Making IP settings for the PC (Page 73)", change the IP address of PC1 from " " back to " ". Now test the function of the packet filter logging of the firewall rules you activated in the global firewall rules as follows: 1. Open the project for configuration and diagnostics of the station. 2. To log in to the project, enter your login in the project tree using "Global security settings" > "User login". 3. Select the security module in the project tree. 4. Select the menu command "Online" > "Online & Diagnostics". 82 Getting Started, 09/2014, C79000-G8976-C379-01

83 Firewall in advanced mode 4.4 NAT 5. For CPs: In the "Diagnostics" > "Security" > "Status" menu, click the "Connect online" button. Result: The "Online access" dialog opens. As "Type of the PG/PC interface", the "HTTPS" protocol is preset. Figure 4-35 Connecting to the security module online 6. Select the "PG/PC interface" and the "Connection to interface/subnet via which you are connected to the security module. Getting Started, 09/2014, C79000-G8976-C

84 Firewall in advanced mode 4.4 NAT 7. Click the "Connect online" button. Result: The online connection to the security module is established and security diagnostics with HTTPS is possible. Figure 4-36 Running security diagnostics with HTTPS 8. In the "Diagnostics" > "Packet filter log" menu, click the "Start reading" button. Result: The unauthorized connection attempts from test phase 3 were recorded in the packet filter log and will be displayed as follows: 84 Getting Started, 09/2014, C79000-G8976-C379-01

85 Firewall in advanced mode 4.4 NAT Figure 4-37 Display of the unauthorized connection attempts Getting Started, 09/2014, C79000-G8976-C

86 Firewall in advanced mode 4.4 NAT 86 Getting Started, 09/2014, C79000-G8976-C379-01

87 VPN for network linking VPN tunnel in the LAN between all security products Overview In this example the VPN tunnel function will be configured. In this example, the security modules form the tunnel endpoints via a local network. With this configuration, IP traffic is possible only over the established VPN tunnel connections between the authorized partners. Setting up the test network Getting Started, 09/2014, C79000-G8976-C

88 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a SIMATIC S7 station with an integrated Web server that supports the HTTPS protocol. The station is connected to the internal interface of the security module. Station1: Represents a node in the internal network PC2: Is used to test the tunnel function with S7 diagnostics and for configuration of Station1. Security module 1- A security module for protection of the internal network can be: SCALANCE S (not S602) CP Advanced in a SIMATIC S7-300 station CP Advanced in a SIMATIC S7-400 station Station2 with security module 2 - One of the following stations with security module: CP in a SIMATIC S station CP in a SIMATIC S station External network - attachment to the external interface of the security module The external network is represented by a switch to which the external interfaces of all security modules are connected. If there are only two security modules to connect, these can also be connected directly via the external interface. PC1: PC with configuration software STEP 7 and SOFTNET Security Client Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software and the SOFTNET Security Client are installed on PC1. Only for CP x43-1 Adv. and SCALANCE S: A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: CP 1x43-1 Ethernet interface [X1]: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: Getting Started, 09/2014, C79000-G8976-C379-01

89 VPN for network linking 5.1 VPN tunnel in the LAN between all security products The project with the "basic configuration" of the security module is open on PC1. Figure 5-1 IP settings of the basic configuration You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. Overview of the next steps: Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Getting Started, 09/2014, C79000-G8976-C

90 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Follow these steps: 1. On PC1, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change Adapter Settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Making the IP settings for the PCs" in the relevant boxes. 90 Getting Started, 09/2014, C79000-G8976-C379-01

91 VPN for network linking 5.1 VPN tunnel in the LAN between all security products 9. Close the dialogs with "OK" and close the Control Panel. 10.Repeat the steps listed above on PC2 and assign the following network parameters: IP address: Subnet mask: Default gateway: Note To be able to communicate within the various internal networks of the security modules, you need to set explicit routes on the PC. To do this, use the "route add" function in the command prompt Creating SOFTNET Security Client module Creating a new security module 1. Change to the project view with the "Open the project view". menu item. 2. In the Project tree, double-click on the "Devices & networks" menu item. Result: The network view opens. 3. Open the "Hardware catalog" and drag the relevant security module to add it to the network view. You will find the security module by navigating as follows in the "Hardware catalog": Security module SOFTNET Security Client Navigation in the hardware catalog "PC systems" > "Softnet Security Client" Configuring a VPN group The SOFTNET Security Client and the security modules can establish a VPN tunnel for secure communication if they are assigned to the same group in the project. Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Add new VPN group". Result: A VPN group is created. 2. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Assign module to a VPN group". 3. Select the created VPN group from the "VPN " drop-down list. Getting Started, 09/2014, C79000-G8976-C

92 VPN for network linking 5.1 VPN tunnel in the LAN between all security products 4. Select the SOFTNET Security Client module and the security module being used in the Available modules list. 5. With the "<<" button, move this to the "Assigned modules" list. Result: The security modules were added to the VPN group. Figure 5-2 VPN assignment 6. To check this, open the "VPN" tab in the network view. Figure 5-3 Displaying VPN membership 7. Double-click on the newly created VPN group in the project tree. 8. In the Inspector window, select the "Advanced settings phase 1" menu item and change the "SA lifetime" to the value "2879". 9. In the Inspector window, select the "Advanced settings phase 2" menu item and change the "SA lifetime" to the value "2879". 92 Getting Started, 09/2014, C79000-G8976-C379-01

93 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Saving the SOFTNET Security Client configuration Follow the steps below: 1. Select the SOFTNET Security Client in the project tree. 2. Select the "Edit" > "Compile" menu command and assign a password for the private key of the certificate. Result: The configuration file "Projectname.SSC-Modulename.dat" and the certificates are stored in the "Path to the SSC configuration files". You can adapt the path in the properties of the SOFTNET Security Client module Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". Getting Started, 09/2014, C79000-G8976-C

94 VPN for network linking 5.1 VPN tunnel in the LAN between all security products 4. Select the "Connection to interface/subnet" via which you are connected to the security module. For CPs, the S7 protocol is used for the download, for SCALANCE S the HTTPS protocol. Figure 5-4 Downloading to the security module 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. Perform the steps listed above for all existing security modules. 94 Getting Started, 09/2014, C79000-G8976-C379-01

95 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Result: Security module in productive mode The configuration is complete. The security module protects the station in which the security module is located or Station1 in the internal network of the security module (if it exists). The communication with the station or to the station in internal network can now only be encrypted and via the VPN tunnel Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC1. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-Modulename.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. You will now be asked whether the tunnel connections for all internal nodes should be activated. Click the "Yes" button in this dialog. 5. Click the "Tunnel Overview" button. Result: Active tunnel connection The tunnel between the security module and the SOFTNET Security Client was established. This status is indicated by the green circle beside the "S612" entry. In the Logging Console of the Tunnel Overview, among other things information on the sequence of executed connection attempts is displayed. Getting Started, 09/2014, C79000-G8976-C

96 VPN for network linking 5.1 VPN tunnel in the LAN between all security products The configuration is complete. The security module and the SOFTNET Security Client have established a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network Testing the tunnel How can you test the configured function? The function tests are performed with PC1. Test phase 1 can also be performed analogously with PC2. 96 Getting Started, 09/2014, C79000-G8976-C379-01

97 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external: 1. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): the project for the station in which the security module is located 2. Select the station in the project tree. 3. Select the menu command "Online" > "Connect online". Figure 5-5 S7 diagnostics and configuration of the station Getting Started, 09/2014, C79000-G8976-C

98 VPN for network linking 5.1 VPN tunnel in the LAN between all security products Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Since no other communication has been explicitly allowed in the firewall, these packets must have been transported through the VPN tunnel. Test phase 2 - PC1: S7 diagnostics and configuration of the station Now repeat the test for the function with the terminated tunnel connection for PC1 from external as follows: 1. Close the tunnel overview in the SOFTNET Security Client. 2. Click the "Enable" button. 3. Confirm the next dialog with "OK". Result: The tunnel connection to the security module is terminated. 4. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): the project for the station in which the security module is located 5. Select the station in the project tree. 6. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. Since no other communication has been explicitly allowed in the firewall, these packets cannot reach the station without a VPN tunnel. 98 Getting Started, 09/2014, C79000-G8976-C379-01

99 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Overview In this example, you configure the VPN tunnel function. In this example, the SOFTNET Security Client and a security module form the two tunnel endpoints for the secure tunnel connection via a public network. With this configuration, IP traffic is possible only over the established VPN tunnel connection between the two authorized partners. Setting up the test network for SCALANCE S, CP x43-1 Adv. Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a SIMATIC S7-Station with an integrated Web server that supports the HTTPS protocol. The station is connected to the internal interface of the security module. Station1: Represents a node in the internal network Security module - A security module for protection of the internal network can be: SCALANCE S (not S602) CP Advanced in a SIMATIC S7-300 station CP Advanced in a SIMATIC S7-400 station External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 and SOFTNET Security Client Getting Started, 09/2014, C79000-G8976-C

100 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Setup of the test network CP 1x43-1 Station - one of the following stations with security module: CP in a SIMATIC S station CP in a SIMATIC S station External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 and SOFTNET Security Client software Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. Only for CP x43-1 Adv. and SCALANCE S: A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with one of the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: Getting Started, 09/2014, C79000-G8976-C379-01

101 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Security module IP address Subnet mask CP 1x43-1 Ethernet interface [X1]: CP x43-1 Adv. Ethernet interface [X1]: PROFINET interface [X2]: The project with the "basic configuration" of the security module is open on PC1. You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. Overview of the next steps: Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Getting Started, 09/2014, C79000-G8976-C

102 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Follow the steps below for PC1: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]"" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel. 102 Getting Started, 09/2014, C79000-G8976-C379-01

103 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Creating SOFTNET Security Client module Creating a new security module 1. Change to the project view with the "Open the project view". menu item. 2. In the Project tree, double-click on the "Devices & networks" menu item. Result: The network view opens. 3. Open the "Hardware catalog" and drag the relevant security module to add it to the network view. You will find the security module by navigating as follows in the "Hardware catalog": Security module SOFTNET Security Client Navigation in the hardware catalog "PC systems" > "Softnet Security Client" Configuring a VPN group The SOFTNET Security Client and a security module can establish a VPN tunnel for secure communication when they are assigned to the same VPN group in the project. Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Add new VPN group". Result: A VPN group is created. 2. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Assign module to a VPN group". 3. Select the created VPN group from the "VPN " drop-down list. 4. Select the created SOFTNET Security Client module and the security module being used in the Available modules list. Getting Started, 09/2014, C79000-G8976-C

104 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S 5. With the "<<" button, move this to the "Assigned modules" list. Result: The security modules were added to the VPN group. 6. To check this, open the "VPN" tab in the network view. Figure 5-6 Displaying VPN membership 7. Double-click on the newly created VPN group in the project tree. 8. In the Inspector window, select the "Advanced settings phase 1" menu item and change the "SA lifetime" to the value "2879". 9. In the Inspector window, select the "Advanced settings phase 2" menu item and change the "SA lifetime" to the value "2879". 104 Getting Started, 09/2014, C79000-G8976-C379-01

105 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Configuring VPN properties of the security module Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. Select the "VPN" menu item. 3. Change the entry from "Permission to initiate connection establishment" to "Waiting for partner (responder)". Result: The security module waits for a VPN connection to be established by the client (SSC). Note If a WAN is used as an external public network, enter an IP address from the internal subnet of your DSL router as "IP address ext.". As the standard router, the internal IP address of the DSL router must be entered. Enter the public IP address assigned by the provider in the "VPN" tab of the module properties in "WAN IP address / FQDN". If you use a DSL router as Internet gateway, the following ports of the router must be forwarded to the external IP address of the security module: Port 500 (ISAKMP) Port 4500 (NAT-T) Saving the SOFTNET Security Client configuration Follow the steps below: 1. Select the SOFTNET Security Client in the project tree. 2. Select the "Edit" > "Compile" menu command and assign a password for the private key of the certificate. Result: The configuration file "Projectname.SSC-Modulename.dat" and the certificates are stored in the "Path to the SSC configuration files". You can adapt the path in the properties of the SOFTNET Security Client module Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". Getting Started, 09/2014, C79000-G8976-C

106 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 4. Select the "Connection to interface/subnet" via which you are connected to the security module. For CPs, the S7 protocol is used for the download, for SCALANCE S the HTTPS protocol. Figure 5-7 Downloading to the security module 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. 106 Getting Started, 09/2014, C79000-G8976-C379-01

107 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Result: Security module in productive mode The configuration is complete. The security module protects the station in which the security module is located or Station1 in the internal network of the security module (if it exists). The communication with the station or to the station in internal network can now only be encrypted and via the VPN tunnel Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC1. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-Modulename.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. You will now be asked whether the tunnel connections for all internal nodes should be activated. Click the "Yes" button in this dialog. 5. Click the "Tunnel Overview" button. Result: Active tunnel connection The tunnel between the security module and the SOFTNET Security Client was established. This status is indicated by the green circle beside the "S612" entry. In the Logging Console of the Tunnel Overview, among other things information on the sequence of executed connection attempts is displayed. Getting Started, 09/2014, C79000-G8976-C

108 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S The configuration is complete. The security module and the SOFTNET Security Client have established a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network Testing the tunnel How can you test the configured function? The function tests are performed with PC Getting Started, 09/2014, C79000-G8976-C379-01

109 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external as follows: 1. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (as an alternative also possible for station1 with CP x43-1 Adv.): the project for the station in which the security module is located 2. Select the station in the project tree. 3. Select the menu command "Online" > "Connect online". Figure 5-8 S7 diagnostics and configuration of the station Getting Started, 09/2014, C79000-G8976-C

110 VPN for network linking 5.2 VPN tunnel SOFTNET Security Client and CPs or SCALANCE S Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Since no other communication has been explicitly allowed in the firewall, these packets must have been transported through the VPN tunnel. Test phase 2 - PC1: S7 diagnostics and configuration of the station Now repeat the test for the function with the terminated tunnel connection for PC1 from external as follows: 1. Close the tunnel overview in the SOFTNET Security Client. 2. Click the "Enable" button. 3. Confirm the next dialog with "OK". Result: The tunnel connection to the security module is terminated. 4. Open the project for configuration and diagnostics of the station: for CP x43-1 Adv. and SCALANCE S: the project for Station1 from the internal network for CP 1x43-1 (also possible as an alternative to Station 1 with CP x43-1 Adv.): the project for the station in which the security module is located 5. Select the station in the project tree. 6. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. Since no other communication has been explicitly allowed in the firewall, these packets cannot reach the station without a VPN tunnel. 110 Getting Started, 09/2014, C79000-G8976-C379-01

111 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 5.3 VPN with SOFTNET Security Client and SCALANCE S as userspecific firewall Overview In this example, you configure the VPN tunnel function. In this example, the SOFTNET Security Client and a security module form the two tunnel endpoints for the secure tunnel connection via a public network. With this configuration, IP traffic is possible only over the established VPN tunnel connection between the two authorized partners. In this example you also configure the advanced firewall and use the function of the userspecific rule sets. By making these settings in the firewall of the security module, you restrict configuration and diagnostics of the station in the internal network using the S7 protocol to one user making the station accessible only for this one user via the VPN tunnel connection that has been set up. In addition to this, all nodes can use the HTTPS protocol for communication via the tunnel connection. This allows security diagnostics of the security modules and communication with Web servers in the internal network. Denied attempts to access the security module or the station are logged. Setting up the test network Getting Started, 09/2014, C79000-G8976-C

112 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Internal network - connection to the internal interface of the security module In the internal network in the test setup, the network node is implemented by a device with an integrated Web server that supports the HTTPS protocol. The device is connected to the internal interface of the security module. Station1: Represents a node in the internal network Security module - A security module for protection of the internal network can be: SCALANCE S (not S602) External network - connection to the external interface of the security module The public, external network is connected to the external interface of the security module. PC1: PC with configuration software STEP 7 and SOFTNET Security Client Requirement: To be able to work through the example, the following requirements must be met: The STEP 7 configuration software is installed on PC1. A SIMATIC S7 station with integrated Web server that supports the HTTPS protocol exists as a node in the internal network with the following settings: Controller IP address Subnet mask Default gateway Controller A STEP 7 project has already been created with the following settings and downloaded to the security module or the controller (for more detailed information on the precise procedure, refer to the section Basic configuration (Page 15)): Security module IP address Subnet mask SCALANCE S External interface [P1] red: Internal interface [P2] green: The project with the "basic configuration" of the security module is open on PC1. Figure 5-9 IP settings of the basic configuration You have logged in with your security login in the project tree with the "Global security settings" > "User login" menu. 112 Getting Started, 09/2014, C79000-G8976-C379-01

113 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Overview of the next steps: Make the IP settings for the PCs For the test, PC1 is given the following IP address setting: PC IP address Subnet mask Default gateway PC Follow the steps below for PC1: 1. On the PC, open the Control Panel with the menu command "Start" > "Control Panel". 2. Click the "Network and Internet" icon > "Network and Sharing Center" and select the "Change adapter settings" option in the navigation menu on the left. 3. Double-click on the required network connection. 4. In the "Status of [network]"" dialog, click the "Properties" button. 5. Confirm the Windows prompt with "Yes". 6. Make sure that the option "Internet Protocol Version 4 (TCP/IPv4)" is enabled and double-click on it. Getting Started, 09/2014, C79000-G8976-C

114 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 7. In the "Internet Protocol Version 4 (TCP/IPv4) Properties" dialog, select the "Use the following IP address" radio button. 8. Now enter the values assigned to the PC from the table "Make the IP settings for the PCs" in the relevant boxes. 9. Close the dialogs with "OK" and close the Control Panel. 114 Getting Started, 09/2014, C79000-G8976-C379-01

115 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Creating SOFTNET Security Client module Creating a new security module 1. Change to the project view with the "Open the project view". menu item. 2. In the Project tree, double-click on the "Devices & networks" menu item. Result: The network view opens. 3. Open the "Hardware catalog" and drag the relevant security module to add it to the network view. You will find the security module by navigating as follows in the "Hardware catalog": Security module SOFTNET Security Client Navigation in the hardware catalog "PC systems" > "Softnet Security Client" Configuring a VPN group The SOFTNET Security Client and a SCALANCE S can establish a VPN tunnel for secure communication if they are assigned to the same VPN group in the project. Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Add new VPN group". Result: A VPN group is created. 2. In the project tree, double-click on the entry "Global security settings" > "VPN groups" > "Assign module to a VPN group". 3. Select the created VPN group from the "VPN " drop-down list. 4. Select the SOFTNET Security Client module and the security module being used in the Available modules list. Getting Started, 09/2014, C79000-G8976-C

116 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 5. With the "<<" button, move these to the "Assigned modules" list. Result: The security modules were added to the VPN group. 6. To check this, open the "VPN" tab in the network view. 7. Double-click on the newly created VPN group in the project tree. 8. In the Inspector window, select the "Advanced settings phase 1" menu item and change the "SA lifetime" to the value "2879". 9. In the Inspector window, select the "Advanced settings phase 2" menu item and change the "SA lifetime" to the value "2879". 116 Getting Started, 09/2014, C79000-G8976-C379-01

117 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Configuring VPN properties of the security module Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. Select the "VPN" menu item. 3. Change the entry from "Permission to initiate connection establishment" to "Waiting for partner (responder)". Result: The security module waits for a VPN connection to be established by the client (SSC). Note If a WAN is used as an external public network, enter an IP address from the internal subnet of your DSL router as "IP address ext.". As the standard router, the internal IP address of the DSL router must be entered. Enter the public IP address assigned by the provider in the "VPN" tab of the module properties in "WAN IP address / FQDN". If you use a DSL router as Internet gateway, the following ports of the router must be forwarded to the external IP address of the security module: Port 500 (ISAKMP) Port 4500 (NAT-T) Configuring the local firewall Follow the steps below: 1. Change to the device view and select the security module. Result: The properties of the security module become configurable. 2. Select the "Firewall" menu item. 3. In the "General" box, enable the "Activate firewall" option. Getting Started, 09/2014, C79000-G8976-C

118 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 4. Enable the "Activate firewall in advanced mode" function. Confirm the prompt with "Yes". Result: The firewall of the security module is switched to the advanced mode. You can now configure firewall rules that filter for IP addresses and services. Switching back to the standard mode of the firewall is not possible. 5. Select the "IP rules" menu and add the following firewall rules depending on the security module you are using: Action From To Source IP address Destination Service Logging IP address Allow Tunnel Internal - - HTTPS Drop Tunnel Internal - - All Result: The local firewall rules are displayed in the list: Figure 5-10 Local IP rules in advanced firewall mode Creating remote access users Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "User management". 2. Create a new user and password with the following settings: User name: remote Role: Remote access Password: <freely selectable> 118 Getting Started, 09/2014, C79000-G8976-C379-01

119 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Figure 5-11 Creating remote access users Configuring user-specific firewall rule sets Follow the steps below: 1. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "Global firewall rule sets" > "IP rule sets" > "Add new IP rule set". Result: A global IP rule set is created. 2. Enter any name and a description for the IP rule set. In this example: Name: User-specific IP rule set 1 Description: Access using S7 protocol 3. Add the following firewall rule to the list: Action From To Source IP address Destination IP address Service Allow Tunnel Internal S7 Result: A user-specific IP rule set is created. Logging Figure 5-12 User-specific IP rule set 4. Change from the "User-specific IP rule set" view to the "User" view. Assign a user to the rule set who will have the right to activate the rule set. 5. Select the remote user in the "Available users" list. Getting Started, 09/2014, C79000-G8976-C

120 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 6. With the "<<" button, move the user to "Assigned users" list. 7. In the project tree, double-click on the entry "Global security settings" > "Firewall" > "User-specific IP rule sets" > "Assign user-specific IP rule set". 8. Select the created rule set from the "Rule set " drop-down list. 9. Select the security module being used in the Available modules list. 120 Getting Started, 09/2014, C79000-G8976-C379-01

121 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 10.With the "<<" button, move it to "Assigned modules" list. Result: The user-specific firewall rule set has been inserted in the local firewall of the security module. Figure 5-13 Assigning a user-specific IP rule set to a module 11.To check this, go to the Inspector window and open the menu "Properties" > "Firewall" > "IP rules". Result: The user-specific firewall rule set has been added to the list before the local firewall rules. The firewall configuration is therefore complete. Figure 5-14 Displaying a user-specific rule set Getting Started, 09/2014, C79000-G8976-C

122 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Saving the SOFTNET Security Client configuration Follow the steps below: 1. Select the SOFTNET Security Client in the project tree. 2. Select the "Edit" > "Compile" menu command and assign a password for the private key of the certificate. Result: The configuration file "Projectname.SSC-Modulename.dat" and the certificates are stored in the "Path to the SSC configuration files". You can adapt the path in the properties of the SOFTNET Security Client module Downloading the configuration to the security module Follow the steps below: 1. Select the security module in the project tree. 2. Select the menu command "Online" > "Download to device". 3. In the next window, select the "Type of the PG/PC interface" and the "PG/PC interface". 122 Getting Started, 09/2014, C79000-G8976-C379-01

123 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 4. Select the "Connection to interface/subnet" via which you are connected to the security module. With SCALANCE S, the HTTPS protocol is used for the download. 5. Click the "Start search" button. Result: The security module is displayed in the "Compatible devices in target subnet" list. 6. Select the security module in the list and click the "Load" button. 7. After the check, click the "Load" button in the next dialog. Result: The configuration is downloaded to the security module. 8. If the download was completed free of error, click the "Finish" button. Result: The security module restarts automatically and the downloaded configuration is activated. Result: Security module in productive mode The configuration is complete. The security module protects Station1 in the internal network of the security module (if this exists). Getting Started, 09/2014, C79000-G8976-C

124 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall The communication with the station or to the station in internal network can now only be encrypted and via the VPN tunnel Set up a tunnel with the SOFTNET Security Client Follow the steps outlined below: 1. Start the SOFTNET Security Client on PC1. 2. Click the "Load Configuration" button, change to your project folder and load the "Projectname.SSC-Modulename.dat" configuration file. 3. Enter the password for the private key of the certificate and confirm with "Next". 4. You will now be asked whether the tunnel connections for all internal nodes should be activated. Click the "Yes" button in this dialog. 5. Click the "Tunnel Overview" button. Result: Active tunnel connection The tunnel between the security module and the SOFTNET Security Client was established. This status is indicated by the green circle beside the "S612" entry. In the Logging Console of the Tunnel Overview, among other things information on the sequence of executed connection attempts is displayed. 124 Getting Started, 09/2014, C79000-G8976-C379-01

125 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall The configuration is complete. The security module and the SOFTNET Security Client have established a communication tunnel over which network nodes can communicate securely with PC2 from within the internal network. Getting Started, 09/2014, C79000-G8976-C

126 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Activating a user-specific firewall rule set 1. Open a standard Web browser on PC1 and enter the following URL: " 2. In the following window, enter the user name "remote" and the corresponding password. 3. Click the "Login" button. Result: The defined firewall rule set is enabled for the "remote" user. Access to the station in the internal network of the security module using the S7 protocol of PC1 in the external network is permitted for 30 minutes. 126 Getting Started, 09/2014, C79000-G8976-C379-01

127 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Testing the tunnel and firewall function How can you test the configured function? The function tests are performed with PC1 on which a Web browser is installed. So that the denied access attempts are recorded and displayed by the firewall, use the packet filter logging function. Test phase 1 - PC1: S7 diagnostics and configuration of the station Now test the function of the S7 firewall rule for PC1 from external: 1. Activate the user-specific firewall rule set as described in the section "Activating a userspecific firewall rule set (Page 126)": 2. Open the project for configuration and diagnostics of the station in the internal network: 3. Select the station in the project tree. Getting Started, 09/2014, C79000-G8976-C

128 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 4. Select the menu command "Online" > "Connect online". Result: Diagnostics and downloading of a configuration are possible using the S7 protocol. Since no other communication other than via the VPN tunnel was allowed explicitly in the firewall, these packets must have been transported through the VPN tunnel. 5. Deactivate the user-specific firewall rule set by clicking the "Logout" button in the Web browser. 6. As described in points 2-4, try to reach the station again using the S7 protocol. Result: Diagnostics and downloading of a configuration are not possible using the S7 protocol. The time for the connection attempt expires and no connection can be established to the station. 128 Getting Started, 09/2014, C79000-G8976-C379-01

129 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall Test phase 2 - PC1: HTTPS access to the Web server of the station Now test the function of the HTTPS firewall rule for all nodes from the external network as follows: Open a standard Web browser on PC1 and enter the following URL: " Result: Access to the Web server using the HTTPS protocol is possible. Test phase 3 - diagnostics of denied access attempts with packet filter logging Now test the function of the packet filter logging of the firewall rules you activated in the global firewall rules as follows: 1. Open the project for configuration and diagnostics of the station. 2. Enter your login in the project tree with "Global security settings" >"User login" to log in to the project. 3. Select the security module in the project tree. 4. Select the menu command "Online" > "Online & Diagnostics". Result: The "Online access" dialog opens. As "Type of the PG/PC interface", the "HTTPS" protocol is preset. Getting Started, 09/2014, C79000-G8976-C

130 VPN for network linking 5.3 VPN with SOFTNET Security Client and SCALANCE S as user-specific firewall 5. Select the "PG/PC interface" and the "Connection to interface/subnet via which you are connected to the security module. 6. Click the "Connect online" button. Result: The online connection to the security module is established and security diagnostics with HTTPS is possible. 7. In the "Diagnostics" > "Packet filter log" menu, click the "Start reading" button. Result: The unauthorized connection attempts from test phase 1 were recorded in the packet filter log and will be displayed as follows: Figure 5-15 Display of the unauthorized connection attempts 130 Getting Started, 09/2014, C79000-G8976-C379-01

Security basics and application SIMATIC NET. Industrial Ethernet Security Security basics and application. Preface. Introduction and basics

Security basics and application SIMATIC NET. Industrial Ethernet Security Security basics and application. Preface. Introduction and basics Preface Introduction and basics 1 SIMATIC NET Industrial Ethernet Security Configuration Manual Configuring with the Security Configuration Tool 2 Creating modules and setting network parameters 3 Configure

More information

Validity 1. Improvements in STEP 7 2. Improvements in WinCC 3. Simatic. Readme. Readme

Validity 1. Improvements in STEP 7 2. Improvements in WinCC 3. Simatic. Readme. Readme Validity 1 Improvements in STEP 7 2 Simatic Improvements in WinCC 3 2012 Legal information Warning notice system This manual contains notices you have to observe in order to ensure your personal safety,

More information

WinCC Runtime Professional Readme SIMATIC HMI. WinCC V11 SP1. Readme WinCC Runtime Professional. Special considerations for Windows 7.

WinCC Runtime Professional Readme SIMATIC HMI. WinCC V11 SP1. Readme WinCC Runtime Professional. Special considerations for Windows 7. WinCC Runtime Professional Readme SIMATIC HMI WinCC V11 SP1 Special considerations for Windows 7 1 Installation 2 Runtime 3 Options 4 HMI devices 5 Readme WinCC Runtime Professional System Manual Online

More information

Validity 1. Installation 2 SIMATIC. WinCC flexible Tag simulator Update 1. Readme

Validity 1. Installation 2 SIMATIC. WinCC flexible Tag simulator Update 1. Readme Validity 1 Installation 2 SIMATIC WinCC flexible Readme 05/2011 Legal information Warning notice system This manual contains notices you have to observe in order to ensure your personal safety, as well

More information

CPU 317-2 PN/DP: Configuring an ET. 200S as PROFINET IO device SIMATIC. PROFINET CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device

CPU 317-2 PN/DP: Configuring an ET. 200S as PROFINET IO device SIMATIC. PROFINET CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device SIMATIC PROFINET CPU 317-2 PN/DP: Configuring an ET 200S as PROFINET IO device Introduction 1 Preparation 2 Learning units 3 Further Information

More information

Creating the program. TIA Portal. SIMATIC Creating the program. Loading the block library. Deleting program block Main [OB1] Copying program blocks

Creating the program. TIA Portal. SIMATIC Creating the program. Loading the block library. Deleting program block Main [OB1] Copying program blocks Loading the block library 1 Deleting program block Main [OB1] 2 TIA Portal SIMATIC Getting Started Copying program blocks 3 Cyclic interrupt OB 4 Copying tag tables 5 Compiling a project 6 Load project

More information

Visualization SIMATIC. Visualization. Present sample project. HMI configuration. Insert HMI device from libraries 3. Configuring HMI connection 4

Visualization SIMATIC. Visualization. Present sample project. HMI configuration. Insert HMI device from libraries 3. Configuring HMI connection 4 Present sample project 1 HMI configuration 2 SIMATIC Getting Started Insert HMI device from libraries 3 Configuring HMI connection 4 Configuring system diagnostics 5 Simulating an HMI device 6 05/2014

More information

Validity 1. Improvements in STEP 7 2. Improvements in WinCC 3 SIMATIC. Readme. Programming and Operating Manual

Validity 1. Improvements in STEP 7 2. Improvements in WinCC 3 SIMATIC. Readme. Programming and Operating Manual Validity 1 Improvements in STEP 7 2 SIMATIC Improvements in WinCC 3 Readme Programming and Operating Manual 07/2013 Legal information Warning notice system This manual contains notices you have to observe

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

LOGO! LOGO! App V.10. LOGO! app 1. Making basic settings and establishing a connection to LOGO! Using the device overview 3. Creating controls 4

LOGO! LOGO! App V.10. LOGO! app 1. Making basic settings and establishing a connection to LOGO! Using the device overview 3. Creating controls 4 LOGO! app 1 Making basic settings and establishing a connection to LOGO! 2 LOGO! Using the device overview 3 Creating controls 4 Settings and project information 5 Operating Manual 04/2016 A5E38071463-AA

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Multi-User Systems 1 ArchiveServer 2 SIMATIC HMI WinCC V7.0 SP1 File Server 3 WinCC ServiceMode 4 Redundant Systems 5 System Manual Print of the Online Help 11/2008 Legal information Warning notice system

More information

COMOS. Lifecycle COMOS Snapshots. "COMOS Snapshots" at a glance 1. System requirements for installing "COMOS Snapshots" Database management 3

COMOS. Lifecycle COMOS Snapshots. COMOS Snapshots at a glance 1. System requirements for installing COMOS Snapshots Database management 3 "" at a glance 1 System requirements for installing "COMOS Snapshots" 2 COMOS Lifecycle Operating Manual Database management 3 Configuring "COMOS Snapshots" 4 Default settings for "COMOS Snapshots" 5 Starting

More information

Getting Started - SINAMICS Startdrive. Startdrive. SINAMICS Getting Started - SINAMICS Startdrive. Introduction 1

Getting Started - SINAMICS Startdrive. Startdrive. SINAMICS Getting Started - SINAMICS Startdrive. Introduction 1 Introduction 1 Connecting the drive unit to the PC 2 Startdrive SINAMICS Getting Started - SINAMICS Startdrive Getting Started Creating a project 3 Going online and incorporating devices 4 Commissioning

More information

Applications & Tools. Remote Control Concept with SCALANCE S Modules over IPsec-secured VPN Tunnel SCALANCE S. Application Description February 2010

Applications & Tools. Remote Control Concept with SCALANCE S Modules over IPsec-secured VPN Tunnel SCALANCE S. Application Description February 2010 Cover Remote Control Concept with SCALANCE S Modules over IPsec-secured VPN Tunnel SCALANCE S Application Description February 2010 Applications & Tools Answers for industry. Industry Automation and Drives

More information

Easy Setup Guide for the Sony Network Camera

Easy Setup Guide for the Sony Network Camera -878-191-11 (1) Easy Setup Guide for the Sony Network Camera For setup, a computer running the Microsoft Windows Operating System is required. For monitoring camera images, Microsoft Internet Explorer

More information

DB Administration COMOS. Platform DB Administration. Trademarks 1. Prerequisites. MS SQL Server 2005/2008 3. Oracle. Operating Manual 09/2011

DB Administration COMOS. Platform DB Administration. Trademarks 1. Prerequisites. MS SQL Server 2005/2008 3. Oracle. Operating Manual 09/2011 Trademarks 1 Prerequisites 2 COMOS Platform MS SQL Server 2005/2008 3 Oracle 4 Operating Manual 09/2011 A5E03638301-01 Legal information Legal information Warning notice system This manual contains notices

More information

SSL-VPN 200 Getting Started Guide

SSL-VPN 200 Getting Started Guide Secure Remote Access Solutions APPLIANCES SonicWALL SSL-VPN Series SSL-VPN 200 Getting Started Guide SonicWALL SSL-VPN 200 Appliance Getting Started Guide Thank you for your purchase of the SonicWALL SSL-VPN

More information

Service & Support. How can you establish a connection between a S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC.

Service & Support. How can you establish a connection between a S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC. Cover How can you establish a connection between a S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC FAQ November 2009 Service & Support Answers for industry. Question This entry is from the

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn)

NETVIGATOR Wireless Modem Setup Guide. (TG789Pvn) NETVIGATOR Wireless Modem Setup Guide (TG789Pvn) Configure the NETVIGATOR Wireless Modem Make sure that system meets the following requirement prior to NETVIGATOR Wireless Modem usage: - Subscribers who

More information

Patch management and security. updates SIMATIC. Process Control System PCS 7 Patch management and security updates. Preface 1

Patch management and security. updates SIMATIC. Process Control System PCS 7 Patch management and security updates. Preface 1 Patch management and security updates SIMATIC Preface 1 Patch management and security updates 2 Practical information 3 Process Control System PCS 7 Patch management and security updates Commissioning

More information

Performing an automated installation

Performing an automated installation Principles of an automated installation 1 Automated installation using the record / play mode 2 Automated installation via the command line 3 Parameter list 4 Return values from the installation process

More information

Service & Support. How can you establish a connection between an S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC.

Service & Support. How can you establish a connection between an S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC. Cover How can you establish a connection between an S7-1200 PLC and SIMATIC NET OPC? S7-1200 PLC, SIMATIC NET OPC FAQ January 2010 Service & Support Answers for industry. This entry is from the Service&Support

More information

Chapter 10 Troubleshooting

Chapter 10 Troubleshooting Chapter 10 Troubleshooting This chapter provides troubleshooting tips and information for your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. After each problem description, instructions are provided

More information

Information Server Documentation SIMATIC. Information Server V8.0 Update 1 Information Server Documentation. Introduction 1. Web application basics 2

Information Server Documentation SIMATIC. Information Server V8.0 Update 1 Information Server Documentation. Introduction 1. Web application basics 2 Introduction 1 Web application basics 2 SIMATIC Information Server V8.0 Update 1 System Manual Office add-ins basics 3 Time specifications 4 Report templates 5 Working with the Web application 6 Working

More information

PROFINET CPU 314C-2 PN/DP, 315-2 PN/DP, 317-2 PN/DP, 319-3 PN/DP: Configuring the PROFINET interface

PROFINET CPU 314C-2 PN/DP, 315-2 PN/DP, 317-2 PN/DP, 319-3 PN/DP: Configuring the PROFINET interface CPU 314C-2 PN/DP, 315-2 PN/DP, Introduction 1 317-2 PN/DP, 319-3 PN/DP: Configuring the PROFINET interface SIMATIC PROFINET CPU 314C-2 PN/DP, 315-2 PN/DP, 317-2 PN/DP, 319-3 PN/DP: Configuring the PROFINET

More information

Creating the project and hardware. TIA Portal. SIMATIC Creating the project and hardware. Introduction to the TIA Portal 1. Creating a project

Creating the project and hardware. TIA Portal. SIMATIC Creating the project and hardware. Introduction to the TIA Portal 1. Creating a project Introduction to the TIA Portal 1 Creating a project 2 TIA Portal SIMATIC Getting Started Creating an S7-1500 CPU 3 Running the hardware detection 4 Creating ET 200 interface modules 5 Networking ET 200

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

DANGER indicates that death or severe personal injury will result if proper precautions are not taken. Basic Settings 1 Configuring the firewall 2 SIMATIC HMI Configuring DCOM 3 Configuring DCOM Machine Default 4 Using OPC via DCOM with Windows XP SP3 Readme 01/2010 Safety Guidelines This manual contains

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub

TW100-BRF114 Firewall Router. User's Guide. Cable/DSL Internet Access. 4-Port Switching Hub TW100-BRF114 Firewall Router Cable/DSL Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION...1 TW100-BRF114 Features...1 Package Contents...3 Physical Details...

More information

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Firewall VPN Router. Quick Installation Guide M73-APO09-380 Firewall VPN Router Quick Installation Guide M73-APO09-380 Firewall VPN Router Overview The Firewall VPN Router provides three 10/100Mbit Ethernet network interface ports which are the Internal/LAN, External/WAN,

More information

TW100-BRV204 VPN Firewall Router

TW100-BRV204 VPN Firewall Router TW100-BRV204 VPN Firewall Router Cable/DSL Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 TW100-BRV204 Features... 1 Package Contents... 3 Physical Details...

More information

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2.

SIMATIC. Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Preface 1. Virus scanner administration 2. Preface 1 Virus scanner administration 2 SIMATIC Configuration 3 Process Control System PCS 7 Configuration Symantec Endpoint Protection (V12.1) Commissioning Manual 04/2013 A5E03874574-02 Legal information

More information

Setting up VPN Access for Remote Diagnostics Support

Setting up VPN Access for Remote Diagnostics Support Setting up VPN Access for Remote Diagnostics Support D. R. Joseph, Inc. supports both dial-up and Internet access for remote support of 3GIBC1 and LF-Sizer control systems. This document describes how

More information

SIMATIC. SIMATIC Logon. User management and electronic signatures. Hardware and Software Requirements. Scope of delivery 3.

SIMATIC. SIMATIC Logon. User management and electronic signatures. Hardware and Software Requirements. Scope of delivery 3. SIMATIC SIMATIC SIMATIC User management and electronic signatures 1 Hardware and Software Requirements 2 Scope of delivery 3 Installation 4 5 Configuration Manual 08/2008 A5E00496669-05 Legal information

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

Configuring PDM. Starting PDM with Internet Explorer CHAPTER

Configuring PDM. Starting PDM with Internet Explorer CHAPTER CHAPTER 4 This section describes how to configure your PDM. It includes the following topics: Starting PDM with Internet Explorer, page 4-1 Starting PDM with Netscape Navigator, page 4-2 Using the PDM

More information

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0

LevelOne. User Manual. FBR-1430 VPN Broadband Router, 1W 4L V1.0 LevelOne FBR-1430 VPN Broadband Router, 1W 4L User Manual V1.0 Table of Contents CHAPTER 1 INTRODUCTION... 1 VPN BROADBAND ROUTER FEATURES... 1 Internet Access Features... 1 Advanced Internet Functions...

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Automation License Manager

Automation License Manager s Contents Product Overview 1 Installation 2 Working with the Automation License Manager 3 Glossary Manual Index 12/2008 A5E02389428-01 Legal information Warning notice system This manual contains notices

More information

Configuring the WT-4 for ftp (Infrastructure Mode)

Configuring the WT-4 for ftp (Infrastructure Mode) Introduction En Configuring the WT-4 for ftp (Infrastructure Mode) This document provides basic instructions on configuring the WT-4 wireless transmitter and a ftp server for transmission over an infrastructure

More information

Technical Support Information

Technical Support Information Technical Support Information Broadband Module/Broadband Module Plus Configuration Guidance Setting up Remote Access to a Network Device (Mail/File Server/Camera Etc) connected to the LAN port of the Broadband

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

Broadband Router ALL1294B

Broadband Router ALL1294B Broadband Router ALL1294B Broadband Internet Access 4-Port Switching Hub User's Guide Table of Contents CHAPTER 1 INTRODUCTION... 1 Broadband Router Features... 1 Package Contents... 3 Physical Details...

More information

Configuration limits for products of the SIMATIC NET PC Software V12 SIMATIC NET. Configuration limits for products of the SIMATIC NET PC Software V12

Configuration limits for products of the SIMATIC NET PC Software V12 SIMATIC NET. Configuration limits for products of the SIMATIC NET PC Software V12 Configuration limits for products of the SIMATIC NET PC Software V12 Communications partners and configuration limits for HARDNET-PB DP-Base 1 software Configuration limits, SOFTNET-PB DP 2 SIMATIC NET

More information

Starting a Management Session

Starting a Management Session Management Software AT-S63 Starting a Management Session AT-S63 Version 2.2.0 for the AT-9400 Layer 2+ Switches AT-S63 Version 3.0.0 for the AT-9400 Basic Layer 3 Switches 613-000817 Rev. A Copyright 2007

More information

User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000

User Manual Version 4.0.0.5. User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 User Manual Version 4.0.0.5 User Manual A20 / A50 / A100 / A250 / A500 / A1000 / A2000 / A4000 I Endpoint Protector Appliance User Manual Table of Contents 1. Endpoint Protector Appliance Setup... 1 1.1.

More information

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version 3.40 12/2004 Prestige 202H Plus ISDN Internet Access Router Quick Start Guide Version 3.40 12/2004 Table of Contents 1 Introducing the Prestige...3 2 Hardware Installation...4 2.1 Rear Panel...4 2.2 The Front Panel

More information

Quick Installation Guide Network Management Card

Quick Installation Guide Network Management Card Rev.1.1 www.cyberpowersystems.com Quick Installation Guide Network Management Card Intelligent Network Management Card allows UPS to be managed, monitored, and configured via SNMP Card Configuration Tool

More information

SonicWALL Global Management System Configuration Guide Standard Edition

SonicWALL Global Management System Configuration Guide Standard Edition SonicWALL Global Management System Configuration Guide Standard Edition Version 2.3 Copyright Information 2002 SonicWALL, Inc. All rights reserved. Under copyright laws, this manual or the software described

More information

Andover Continuum. Network Security Configuration Guide

Andover Continuum. Network Security Configuration Guide Andover Continuum Network Security Configuration Guide 2010, Schneider Electric All Rights Reserved No part of this publication may be reproduced, read or stored in a retrieval system, or transmitted,

More information

Configuring the WT-4 for ftp (Ad-hoc Mode)

Configuring the WT-4 for ftp (Ad-hoc Mode) En Configuring the WT-4 for ftp (Ad-hoc Mode) Mac OS X Introduction This document provides basic instructions on configuring the WT-4 wireless transmitter and a Mac OS X (10.5.2) ftp server for transmission

More information

Connecting the DG-102S VoIP Gateway to your network

Connecting the DG-102S VoIP Gateway to your network Contents of Package: DG-102S VoIP Station Gateway Power adapter CD-ROM, including User s Manual Quick Install Guide Requirements: RS-232 Console Cable Two RJ-45 CAT-5 Straight-Through Cables For more information

More information

Web server SIMATIC. S7-1500 Web server. Preface. Documentation guide. General information. Websites 3. Function Manual 12/2014 A5E03484625-AD

Web server SIMATIC. S7-1500 Web server. Preface. Documentation guide. General information. Websites 3. Function Manual 12/2014 A5E03484625-AD Preface Documentation guide 1 SIMATIC S7-1500 General information 2 Websites 3 Function Manual 12/2014 A5E03484625-AD Legal information Warning notice system This manual contains notices you have to observe

More information

Front LEDs... 2 Rear Ports... 3 BASIC INSTALLATION... 4 Connecting Your Router... 5 Network Configuration... 6

Front LEDs... 2 Rear Ports... 3 BASIC INSTALLATION... 4 Connecting Your Router... 5 Network Configuration... 6 0 P a g e Table of contents Front LEDs... 2 Rear Ports... 3 BASIC INSTALLATION... 4 Connecting Your Router... 5 Network Configuration... 6 Gateway Configuration... 11 Accessing your gateway... 11 Displaying

More information

Fujitsu Global Cloud Platform Basic System Setup Windows VM

Fujitsu Global Cloud Platform Basic System Setup Windows VM Fujitsu Global Cloud Platform Basic System Setup Windows VM This guide documents the basic configuration that should be performed to a vsys and VM to employ the standard FGCP services such as DNS, Internet

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

Protecting the Home Network (Firewall)

Protecting the Home Network (Firewall) Protecting the Home Network (Firewall) Basic Tab Setup Tab DHCP Tab Advanced Tab Options Tab Port Forwarding Tab Port Triggers Tab DMZ Host Tab Firewall Tab Event Log Tab Status Tab Software Tab Connection

More information

OUTDOOR IR NETWORK CAMERA Series

OUTDOOR IR NETWORK CAMERA Series OUTDOOR IR NETWORK CAMERA Series INSTALLATION GUIDE Please read instructions thoroughly before operation and retain it for future reference. 1. OVERVIEW 1.1 Package Content Network camera Installation

More information

User Manual. Page 2 of 38

User Manual. Page 2 of 38 DSL1215FUN(L) Page 2 of 38 Contents About the Device...4 Minimum System Requirements...5 Package Contents...5 Device Overview...6 Front Panel...6 Side Panel...6 Back Panel...7 Hardware Setup Diagram...8

More information

MN-700 Base Station Configuration Guide

MN-700 Base Station Configuration Guide MN-700 Base Station Configuration Guide Contents pen the Base Station Management Tool...3 Log ff the Base Station Management Tool...3 Navigate the Base Station Management Tool...4 Current Base Station

More information

N300 WiFi Range Extender WN2000RPT User Manual

N300 WiFi Range Extender WN2000RPT User Manual N300 WiFi Range Extender WN2000RPT User Manual December 2013 202-11333-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device,

More information

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation

Basic ViPNet VPN Deployment Schemes. Supplement to ViPNet Documentation Basic ViPNet VPN Deployment Schemes Supplement to ViPNet Documentation 1991 2015 Infotecs Americas. All rights reserved. Version: 00121-04 90 01 ENU This document is included in the software distribution

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual

CCNA Discovery 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual 4.0.3.0 Networking for Homes and Small Businesses Student Packet Tracer Lab Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

How do I set up a branch office VPN tunnel with the Management Server?

How do I set up a branch office VPN tunnel with the Management Server? Fireware How To VPN How do I set up a branch office VPN tunnel with the Management Server? Introduction Using the WatchGuard Management Server, you can make fully authenticated and encrypted IPSec tunnels

More information

SIMATIC. WinCC V7.0. Getting started. Getting started. Welcome 2. Icons 3. Creating a project 4. Configure communication 5

SIMATIC. WinCC V7.0. Getting started. Getting started. Welcome 2. Icons 3. Creating a project 4. Configure communication 5 SIMATIC WinCC V7.0 SIMATIC WinCC V7.0 Printout of the Online Help 1 Welcome 2 Icons 3 Creating a project 4 Configure communication 5 Configuring the Process Screens 6 Archiving and displaying values 7

More information

Two kinds of size notation are employed in this manual. With this machine refer to the metric version.

Two kinds of size notation are employed in this manual. With this machine refer to the metric version. Network Guide 1 2 3 4 5 6 7 Functions Available over a Network Connecting the Network Cable to the Network Setting Up the Machine on a Network Windows Configuration Using the Printer Function Configuring

More information

SCALANCE M875 SIMATIC NET. Industrial Remote Communication Remote Networks SCALANCE M875. Preface. Description of the device. Configuration examples 2

SCALANCE M875 SIMATIC NET. Industrial Remote Communication Remote Networks SCALANCE M875. Preface. Description of the device. Configuration examples 2 Preface Description of the device 1 SIMATIC NET Industrial Remote Communication Remote Networks Operating Instructions Configuration examples 2 Installation, connecting up, commissioning 3 Configuration

More information

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client.

Service & Support. How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client. Cover How do you create a communication of RDP with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry

More information

Configuring Security for FTP Traffic

Configuring Security for FTP Traffic 2 Configuring Security for FTP Traffic Securing FTP traffic Creating a security profile for FTP traffic Configuring a local traffic FTP profile Assigning an FTP security profile to a local traffic FTP

More information

How to Program a Commander or Scout to Connect to Pilot Software

How to Program a Commander or Scout to Connect to Pilot Software How to Program a Commander or Scout to Connect to Pilot Software Commander and Scout are monitoring and control products that can transfer physical environmental conditions and alarm sensor electrical

More information

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance

QUICK START GUIDE. Cisco S170 Web Security Appliance. Web Security Appliance 1 0 0 0 1 1 QUICK START GUIDE Web Security Appliance Web Security Appliance Cisco S170 303417 Cisco S170 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation

More information

UPS Network Interface. Quick InstallationGuide

UPS Network Interface. Quick InstallationGuide UPS Network Interface Quick InstallationGuide Version 1.1 March 1999 COPYRIGHT Copyright 1999 RINGDALE UK Limited. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

PROFINET IRT: Getting Started with The Siemens CPU 315 PLC

PROFINET IRT: Getting Started with The Siemens CPU 315 PLC PROFINET IRT: Getting Started with The Siemens CPU 315 PLC AN-674 Application Note This document shows how to demonstrate a working design using the PROFINET isochronous real-time (IRT) device firmware.

More information

Cisco S380 and Cisco S680 Web Security Appliance

Cisco S380 and Cisco S680 Web Security Appliance QUICK START GUIDE Cisco S380 and Cisco S680 Web Security Appliance 1 Welcome 2 Before You Begin 3 Document Network Settings 4 Plan the Installation 5 Install the Appliance in a Rack 6 Plug In the Appliance

More information

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos 0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

SNMP Web Management. User s Manual For SNMP Web Card/Box

SNMP Web Management. User s Manual For SNMP Web Card/Box SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...

More information

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo

ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo ADSL Router Quick Installation Guide Revised, edited and illustrated by Neo A typical set up for a router PCs can be connected to the router via USB or Ethernet. If you wish to use a telephone with the

More information

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN

More information

Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client.

Service & Support. How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client. Cover How do you create a communication of VNC with an Industrial Thin Client SIMATIC ITC? Thin Client FAQ August 2012 Service & Support Answers for industry. Question This entry is from the Siemens Industry

More information

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client

Astaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not

More information

Deploying Windows Streaming Media Servers NLB Cluster and metasan

Deploying Windows Streaming Media Servers NLB Cluster and metasan Deploying Windows Streaming Media Servers NLB Cluster and metasan Introduction...................................................... 2 Objectives.......................................................

More information

Quick Installation Guide DAP-1360. Wireless N 300 Access Point & Router

Quick Installation Guide DAP-1360. Wireless N 300 Access Point & Router DAP-1360 Wireless N 300 Access Point & Router BEFORE YOU BEGIN Delivery Package Access point DAP-1360 Power adapter DC 12V Ethernet cable (CAT 5E) (brochure). If any of the items are missing, please contact

More information

Installation Guide for Windows May 2016

Installation Guide for Windows May 2016 Installation Guide for Windows May 2016 1 Welcome to KITE Client Software for Windows Note: The KITE Client software is supported for both 32-bit and 64-bit Windows computers. The Kansas Interactive Testing

More information

D-Link Central WiFiManager Configuration Guide

D-Link Central WiFiManager Configuration Guide Table of Contents D-Link Central WiFiManager Configuration Guide Introduction... 3 System Requirements... 3 Access Point Requirement... 3 Latest CWM Modules... 3 Scenario 1 - Basic Setup... 4 1.1. Install

More information

FAQ Communication over IE

FAQ Communication over IE FAQ Communication over IE S7 communication between S7-200 and S7-300/400 FAQ Table of Contents Table of Contents... 2 Question...2 How do I configure a S7 connection to exchange data between S7-200 and

More information

Emerson Smart Firewall

Emerson Smart Firewall DeltaV TM Distributed Control System Product Data Sheet Emerson Smart Firewall The Emerson Smart Firewall protects the DeltaV system with an easy to use perimeter defense solution. Purpose built for easy

More information

Multi-Homing Dual WAN Firewall Router

Multi-Homing Dual WAN Firewall Router Multi-Homing Dual WAN Firewall Router Quick Installation Guide M73-APO09-400 Multi-Homing Dual WAN Firewall Router Overview The Multi-Homing Dual WAN Firewall Router provides three 10/100Mbit Ethernet

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note

Configuring NXT Hardware with Mercury Inside into Doors.NET TM Application Note 1.0 Installing the Mercury SCP Gateway The MSC/SCP gateway must be installed to interface with Mercury hardware. This gateway must be chosen during the installation of the software, or it can be added

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

VPNC Interoperability Profile

VPNC Interoperability Profile VPNC Interoperability Profile Valid for Barracuda NG Firewall 5.0 Revision 1.1 Barracuda Networks Inc. 3175 S. Winchester Blvd Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2004-2010,

More information

RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP

RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP RouteFinder SOHO SOHO Security Appliance EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP Quick Start Guide RouteFinder RF825 Series Quick Start Guide RouteFinder SOHO Security Appliance

More information

Using SonicWALL NetExtender to Access FTP Servers

Using SonicWALL NetExtender to Access FTP Servers SSL-VPN Using SonicWALL NetExtender to Access FTP Servers Problem: Using NetExtender to access an FTP Server on the LAN segment of a SonicWALL PRO 4060. Solution: Perform the following setup steps. Step

More information

Savvius Insight Initial Configuration

Savvius Insight Initial Configuration The configuration utility on Savvius Insight lets you configure device, network, and time settings. Additionally, if you are forwarding your data from Savvius Insight to a Splunk server, You can configure

More information