Design Considerations for Securing Industrial Automation and Control System Networks
|
|
|
- Felicity Stanley
- 10 years ago
- Views:
Transcription
1 Design Considerations for Securing Industrial Automation and Control System Networks Synopsis Rockwell Automation and Cisco Four Key Initiatives: Common Technology View: A single system architecture, using open, industry standard networking technologies, such as Ethernet, is paramount for achieving the flexibility, visibility, and efficiency required in a competitive manufacturing environment. Coverged Plantwide Ethernet Architectures: These manufacturing focused reference architectures, comprised of the Rockwell Automation Integrated Architecture and Cisco s Industrial Intelligence, provide users with the foundation for success to deploy the latest technology by addressing topics relevant to both engineering and IT professionals. Joint Product and Solution Collaboration: Stratix 8000 Industrial Ethernet switch incorporating the best of Cisco and the best of Rockwell Automation. People and Process Optimization: Education and services to facilitate Manufacturing and IT convergence and allow successful architecture deployment and efficient operations allowing critical resources to focus on increasing innovation and productivity. The continuing trend in Industrial Automation and Control System (IACS) networking is the convergence of technology, specifically industrial automation technology with information technology (IT). EtherNet/IP helps enable network technology convergence through the use of standard Ethernet and Internet Protocol (IP) technology. EtherNet/IP, as a single industrial network technology, can facilitate (see Figure 1): Multi-discipline application convergence e.g. discrete, continuous process, batch, drive, safety, motion, power, time synchronization, supervisory information, asset configuration/diagnostics and energy management Standard IT technology future-ready, increased sustainability and reduced risk of deployment Better asset utilization through a common network infrastructure that can also support lean initiatives Common toolsets and required skills / training (e.g. assets for design, deployment and troubleshooting, as well as human assets) Standard and established IT security technology, best practices, policies and procedures Seamless plant-wide / site-wide information sharing due to IP pervasiveness - routability and portability across data links (e.g. Ethernet and Wi-Fi) Although technology has been the enabler behind industrial automation and information technology convergence, the business aspects have sustained this continual trend: Integration converging business systems with plant-wide / site-wide systems for more key performance indicators (KPIs), regulatory compliance (e.g. genealogy and track and trace), as well as supply chain management Connectivity more IACS devices connected for better IACS asset utilization, optimization and management Applications expanded application support (e.g. energy management and sustainability initiatives) Collaboration industrial automation and IT groups, who previously had little interaction, are now collaborating to share standards, best practices, innovations and security policies, procedures and technology
2 Figure 1: Converged Plant-wide/Site-wide Network Infrastructure To help further facilitate and support network technology convergence, Rockwell Automation and Cisco have collaborated to develop Converged Plantwide Ethernet (CPwE) reference architectures (see references 1, 4, and 5). These CPwE reference architectures provide design considerations, guidance, recommendations, best practices and solutions. Together, Rockwell Automation and Cisco are able to help customers successfully design and deploy a scalable, robust, secure and future-ready plant-wide / site-wide network infrastructure utilizing standard networking and security technology. This collaboration also helps address the cultural and organizational convergence of the industrial automation and information technology domains. These IACS focused reference architectures are built on technology and industry standards common between industrial automation and information technology (IT). These include technology standards such as the IEEE 802.3/802.1 standard Ethernet, Internet Engineer Task Force (IETF), standard Internet Protocol (IP), and the ODVA Common Industrial Protocol (CIP ). For additional information about ODVA, see references 12, 13 and 14. IACS networks are generally open by default to allow both technology coexistence and device interoperability. This requires that IACS networks be secured by configuration i.e. protect the network and defend the edge. Securing an IACS network infrastructure requires a comprehensive industrial security model based on a well-defined set of security policies and procedures. Industrial security policies and procedures need to protect IACS assets, while balancing functional and application requirements such as 24x7 operations, low Mean-Time-To-Repair (MTTR) and high Overall Equipment Effectiveness (OEE). These industrial security policies and procedures should leverage established IT processes to identify both security risks and potential mitigation techniques to address those risks. 2
3 This white paper outlines general considerations to help design and deploy a holistic defense-in-depth industrial security policy to help secure networked IACS assets. Three aspects of the CPwE Industrial Network Security Framework (see Figure 3) will be specifically expanded upon within this white paper. This content is relevant to both an industrial automation control system engineer and an information technology network engineer: Layer 2 Access Switch Hardening, see Figure 3 Unified Threat Management (UTM), see Figure 4 Controller Hardening Encrypted Communications, see Figure 5 A listing of additional reference materials is available at the end of this white paper. Please note the reference list includes other resources not specifically called-out within this white paper. Holistic Industrial Security No single product, technology or methodology can fully secure Industrial Automation and Control System (IACS) applications. Protecting IACS assets requires a defense-indepth security approach, Figure 2, which addresses internal and external security threats. This approach utilizes multiple layers of defense (physical, procedural and electronic) at separate IACS levels by applying policies and procedures that address different types of threats. For example, multiple layers of network security to help protect networked assets (e.g. data and end points) and multiple layers of physical security to help protect high value assets. Figure 2: Defense-in-Depth Security Multiple Layers of Defense 3
4 To achieve a defense-in-depth approach, an operational process is required to establish and maintain the security capability. A security operational process includes the follow actions: 1. Identify IACS asset device types and locations within the plant-wide / site-wide network infrastructure 2. Identify potential internal and external vulnerabilities and threats to those IACS assets and assess the associated risks 3. Understand the application and functional requirements of the IACS assets (e.g. 24x7 operations, communication patterns, topology, required resiliency and traffic types) 4. Understand the associated risks of balancing the application and functional requirements of IACS assets with the need to protect the availability, integrity and confidentiality of IACS asset data Designing and implementing a comprehensive IACS network security framework should serve as a natural extension to the IACS process. The industrial network security framework should be pervasive and core to the IACS process. Network security should not be implemented as a bolt-on component. A balanced security framework must address both technical (technology) and non-technical (policies and procedures) elements. As depicted in Figure 2, defense-in-depth layers for securing IACS assets include, but are not limited to: Policies, Procedures and Awareness plan of action around procedures and education to protect company assets (risk management) and provide rules for controlling human interactions in IACS systems. Physical Security document and implement the operational and procedural controls to manage physical access to cells/areas, control panels, devices, cabling, the control room and other locations to authorized personnel only. This should also include policies, procedures and technology to escort and track visitors. Network Security industrial network security framework (see Figure 3) is made up of network infrastructure hardware and software designed to block communication paths and services that are not explicitly authorized. Assets may include firewalls, unified threat management (UTM) security appliances and integrated protection within network assets such as switches and routers. Computer Hardening patch management policy (see reference 10), Anti-X (e.g. virus, spyware, malware) detection software, uninstall unused windows components; protect unused or infrequently used USB, parallel or serial interfaces on any computer being connected to the IACS network. Application Security implement change management and accounting (e.g. FactoryTalk AssetCentre), as well as authentication and authorization (e.g. FactoryTalk Security) to help keep track of both access and changes by users. Device Hardening restrict physical access to authorized personnel only, disable remote programming capabilities, encrypt communications (see Figure 5), restrict network connectivity through authentication (see Figure 5), restrict access to internal resources (e.g. routines and tags) through authentication and authorization. 4 For additional information on defense-in-depth security, see references 4, 5, 6, 7 and 9.
5 Industrial Network Security Framework Converged Plantwide Ethernet (CPwE) reference architectures use industry standards to establish an industrial network security framework as shown in Figure 3. This industrial network security framework establishes a foundation for network segmentation for both traffic management and policy enforcement (e.g. security, remote access, and Quality of Service (QoS)). The industrial network security framework utilizes a defense-in-depth approach and is aligned to industrial security standards such as ISA/IEC (formerly ISA-99) Industrial Automation and Control Systems (IACS) Security and NIST Industrial Control System (ICS) Security. Figure 3: CPwE Industrial Network Security Framework 5
6 The key tenets of industrial network security framework utilizing defense-in-depth includes: Industrial Security Policy The key to a successful industrial security strategy is risk assessment and analysis to understand the potential vulnerabilities that need to be mitigated, specifically what to protect and how. Establishing an industrial security policy focused on the needs of an IACS provides a roadmap for applying security technologies and best practices to protect IACS assets, while avoiding unnecessary expenses and excessive restrictive access. The industrial network security framework should be pervasive and core to the IACS process. Industrial network security services should not inhibit nor compromise the IACS operation Risk and security assessments are the starting point for any security policy implementation. Security assessments analyze your current state, from technologies to policies, procedures to behavior. This analysis offers a realistic picture of your security posture (current risk state) and what it will take (mitigation techniques) to get to where you need to be (acceptable risk state). A multi-discipline team of operations, engineering, IT and safety representatives should collaborate in the development and deployment of this industrial security policy based on your risk assessment. Industrial Demilitarized Zone (IDMZ) Sometimes referred to as a perimeter network that exposes a trusted network to an untrusted network, the purpose of the IDMZ is to add an additional buffer layer of security. This buffer zone provides a barrier between the Industrial and Enterprise Zones, but allows for data and services to be shared securely. - All network traffic from either side of the IDMZ terminates in the IDMZ; no traffic directly traverses the IDMZ Only path between Industrial and Enterprise Zones No common protocols in each logical firewall - EtherNet/IP IACS traffic does not enter the IDMZ, it remains in the Industrial Zone - Primary services are not permanently stored in the IDMZ - All data is transient, the IDMZ shall not permanently store data - Utilize an application data mirror to move data in and out of the Industrial Zone - Limit outbound connections from the IDMZ - Be prepared to turn-off access to the Industrial Zone via the firewall - Set-up functional sub-zones within the IDMZ to segment access to data and services (e.g. IT, Operations, Trusted Partner zone) - IDMZ is also a demarcation line for segmenting network policies between the Enterprise and Industrial Zones. Segmenting network services such as Quality of Service (QoS), Virtual LANS (VLANs), and Multicast traffic. These services exist in both the Enterprise and Industrial Zones and should be segmented. 6
7 Controller Hardening - Restrict logical access through authentication and authorization (see Figure 5), encrypt communications (see Figure 5), and use change management to track both access and changes - Restrict physical access to IACS assets. Utilize cable lock-in and port blockout devices (such as Panduit s) to prevent walk up, plug in access Layer 2 Access Switch Hardening - Restrict logical access by enabling cryptographic version of switch operating system (OS) (e.g. SSH, HTTPS, SNMPv3 and implement port MAC security) - Restrict physical access. Utilize cable lock-in and port blockout devices (i.e. Panduit s) to prevent walk up, plug in access Firewalls Modern firewalls (i.e. unified threat management (UTM)) provide a range of security services: deploy a UTM security appliance with stateful packet inspection (SPI) firewall (barrier), application awareness and intrusion detection/ prevention systems (IDS/IPS) around and within the industrial network infrastructure (see Figure 4). Network Infrastructure Access Protection Implement access control lists (ACLs) and port security on network infrastructure devices such as switches and routers. Implement network infrastructure resiliency with redundant path topologies to ensure the availability of IACS data. Domains of Trust Segment the network into smaller areas based on functions or access requirements. Secure Remote Access Policy Implement policies, procedures and infrastructure to enable employee and trusted partner secure remote access. For additional information on secure remote access, see references 8 and 9. Three aspects of the CPwE Industrial Network Security Framework (see Figure 3) will be specifically expanded upon within this white paper. This content is relevant to both an industrial automation control system engineer and an information technology network engineer: Layer 2 Access Switch Hardening, see Figure 3 Unified Threat Management (UTM), see Figure 4 Controller Hardening Encrypted Communications, see Figure 5 Layer 2 Access Switch Hardening Layer 2 access switches, such as the Stratix 5700 and Stratix 8000, can be hardened to restrict access by several techniques as shown in Figure 3: 1. Physically: a. Restrict access to the control panel or zone enclosure to authorized personnel only b. Utilize Panduit s block outs for the open access ports and lock-ins for the copper and fiber media 7
8 2. Electronically: a. Layer 2 media access control address (MAC) security on access ports b. Layer 3 access control lists (ACLs) c. Virtual local area networks (VLANs) to segment the Cell/Area Zone into smaller domains of trust d. Disabling access ports from the programmable automation controller (PAC) and operator interface utilizing CIP communications (application layer protocol for EtherNet/IP) e. Traffic threshold settings to monitor (via CIP communication) any potential denial of service (DOS) attacks f. Enabling cryptographic version of switch operating system (OS) (e.g. SSH, HTTPS, SNMPv3) Unified Threat Management Modern firewalls provide a range of security services. These unified threat management (UTM) devices combine several security functions into a single appliance to protect your IACS network at the perimeter. The Stratix 5900 UTM security appliance is a ruggedized all-inclusive UTM with features such as firewall, secure routing, virtual private network (VPN), intrusion prevention, network address translation (NAT) and content filtering. There are 3 use cases (see Figure 4) specifically addressed within this white paper for UTM within the CPwE Industrial Network Security Framework (see Figure 3): 1. Site-to-Site Connection tunnels the Industrial Zone trusted network to a remote site over an untrusted network using a site-to-site VPN connection 2. Cell/Area Zone Firewall to protects Cell/Area Zone from the greater Industrial Zone 3. OEM Integration provides seamless integration from a machine builder or process skid builder solution into their customer s plant-wide / site-wide network infrastructure. For additional information about OEM integration solutions, see reference Stratix 5900 Site-to-Site Connection Capabilities - A traditional virtual private network (VPN) is a secured connection between two devices over an untrusted (unsecured) network. Choice of VPN technology varies between each implementation and vendor; generally, the data to be transmitted over the untrusted network is either encrypted or encapsulated to protect the integrity of the data and to prevent any form of eavesdropping. - Site-to-site VPN to help create a connection between remote IACS applications back to the central site (Industrial Zone) over an untrusted network (private, semi-private, or a public). Site-to-site VPNs use well established technologies that are widely deployed in enterprise networks and IT domains. - Since EtherNet/IP is built on standard IP, the site-to-site network can use any Layer 2 technology that supports IP. The Stratix 5900 has both Ethernet and Smart Serial wide area network (WAN) ports which help allow connectivity to a variety of WAN network technologies (e.g. Ethernet, Wi-Fi, 3/4G cellular, MPLS or other traditional technologies such as xdsl or T1/E1).
9 Figure 4: Stratix 5900, UTM Security Appliance, within CPwE - Site-to-site VPN is a permanent, always on technology. This allows for continual monitoring of the remote IACS application. Because the networking technology is standard, the IACS VPN connection can also be leveraged for other critical applications such as IP surveillance cameras or physical security systems for remote sites. - Stratix 5900 Site-to-Site Connection Design Considerations Installation of an untrusted network (private, semi-private, or a public) to all distributed remote sites is not required Firewalls terminate the VPN tunnels and filter traffic on both sides of the connection Not an ad hoc, temporary, dial on-demand solution 9
10 2. Stratix 5900 Cell/Area Zone Firewall Capabilities - As a Cell/Area Zone firewall, the Stratix 5900 can filter traffic between the Cell/Area Zone and the rest of the Industrial Zone - Stratix 5900 Cell/Area Zone Firewall Design Considerations Restricts network communication paths and services to and from the Cell/Area Zone Zone based firewall that supports traffic filtering, stateful inspection, and IPS/IDS. It can be used as either a routed or a transparent firewall Supports Authentication, Authorization and Accounting (AAA) network security server (Tacacs+ or Radius) Supports network address translation (NAT), to allow network address transparency from the Cell/Area Zone IACS network to the plant-wide / site-wide network, thus minimizing the quantity of IP addressing to be assigned and managed within the Industrial Zone 3. Stratix 5900 OEM Integration Capabilities OEM (machine builder or process skid builder) simplified design and deployment - Network address translation (NAT) project reuse (IP addressing), enabling network address transparency from OEM solutions within the Cell/Area Zone IACS network to the plant-wide / site-wide network, thus minimizing the quantity of IP addressing to be assigned and managed within the Industrial Zone. - Strong OEM solution segmentation through Layer 3 routing and firewall. For example, an OEM may include a Stratix 5900 as part of their solution to tightly control traffic in and out of the OEM machine/skid. Conversely, an end user might deploy a Stratix 5900 between their plant-wide / site-wide network and the OEM machine/skid to tightly control traffic in and out of that OEM machine/skid into the greater Industrial Zone. Stratix 5900 OEM Integration Design Considerations - Restricts traffic to and from an OEM solution Basic stateful inspection of all traffic Intrusion Prevention System / Intrusion Detection System (IPS/IDS) on some traffic Supports both routed and transparent firewalls Supports Authentication, Authorization and Accounting (AAS) network security server (Tacacs+ or Radius) Stratix 5900 Physical Features 1-1 Gbps WAN port Smart Serial WAN port Mbps LAN ports Shock / Vibration & Extended Temperature DIN rail mount Stratix 5900 Network Features Access Control Lists (ACLs) / Firewall DHCP Quality of Service (QoS) Virtual Local Area Network (VLAN) Network Address Translation (NAT) 10
11 Controller Hardening Encrypted Communications Within the Converged Plantwide Ethernet (CPwE) Industrial Network Security Framework (Figure 3), securing controller communications over a trusted network is about applying additional access control (authentication) and protecting the integrity (encryption) of the data. An example would be protecting the integrity and confidentiality of a batch profile or recipe that is being communicated from the Level 3 site operations to a controller in the Cell/Area Zone. The ControlLogix (PAC) 1756-EN2TSC secure communication module utilizes either IP security (IPsec) or Layer 2 Tunneling Protocol (L2TP) to provide authentication and data encryption over a trusted CPwE network. There are four use cases (see Figure 5) specifically addressed within this white paper to harden controller communications within the trusted CPwE Industrial Network Security Framework (see Figure 3): 1. ControlLogix to ControlLogix permanent connection for peer to peer ControlLogix communications, IPsec-encrypted tunnel between the two 1756-EN2TSC modules 2. ControlLogix to FactoryTalk Application permanent connection between ControlLogix and FactoryTalk application/data server a. Smaller applications, IPsec-encrypted tunnel from 1756-EN2TSC module to Windows Server 2008 b. Larger applications, IPsec-encrypted tunnel from 1756-EN2TSC module to Cisco ASA firewall, and then IPsec-encrypted tunnel from ASA firewall to Windows Server This approach provides scalability through centralized management of security policies within the Cisco ASA firewall to simplify deployment and manageability on larger IACS applications 3. Workstation to ControlLogix ad hoc temporary connection for ControlLogix configuration and management, L2TP-encrypted tunnel from Windows 7 client to 1756-EN2TSC module 11
12 Figure 5: 1756-EN2TSC Secure Controller Communication within CPwE 1756-EN2TSC Secure Communication Module Capabilities: - Authenticates the communication end points (both client and server) - Data authentication and integrity (via message integrity checks) - Data confidentiality (via encryption algorithms) - Support for up to 8 secure tunnels per module - Advanced Encryption Standard (AES) 256 (NIST standard for the encryption of data) - Optional disablement of onboard USB port and configuration dip switches to prevent physical tampering 12
13 - Secure HTTPS interface for configuration and monitoring of security related features - Data Encryption Design Considerations: Can be used in conjunction with other controller and device hardening features for additional granularity to access rules Uses separate communication bridge module(s) for connectivity to networked IACS devices (e.g. I/O, drives, instrumentation) The 1756-EN2TSC does not currently support communication through NAT devices Uses standard Microsoft Windows 7 VPN Client to connect transient, ad hoc devices, like engineering workstations, to the controller Embedded standard VPN clients are also used to connect to permanent devices like other controllers and Windows Server This module is intended for use within the trusted CPwE industrial network security framework (Figure 3). This module in not intended for use on an untrusted (private, semi-private, or a public) network. Summary No single product, technology or methodology can fully secure Industrial Automation and Control System (IACS) applications. Securing an IACS network infrastructure requires a defense-in-depth industrial network security framework to address both internal and external security threats. A balanced industrial network security framework must address both technical (electronic technology) and non-technical (e.g. physical, policy, procedural) elements. This industrial network security framework should be based on a well-defined set of security policies and procedures, leveraging established IT processes, while balancing the functional requirements of the IACS application itself. Risk and security assessments are the starting point for any security policy implementation. Security assessments should look at your specific situation from technologies to policies, procedures to behavior, and give you a realistic picture of your current security posture (current risk state) and what it will take (mitigation techniques) to get to where you need to be (acceptable risk state). Rockwell Automation and Cisco recommend the formation of a multi-discipline team of operations, engineering, IT and safety representatives to collaborate in the development and deployment of your industrial security policy based on your risk assessment. Rockwell Automation and Cisco have also collaborated to develop Converged Plantwide Ethernet (CPwE) reference architectures to help you address this industrial network security framework. This comes in the form of design considerations, guidance, recommendations, best practices, solutions and services to help you successfully design and deploy a scalable, robust, secure and future-ready plant-wide / site-wide network infrastructure. The CPwE Industrial Network Security Framework is aligned to industrial security standards such as ISA/IEC (formerly ISA-99) Industrial Automation and Control Systems (IACS) Security and NIST Industrial Control System (ICS) Security in regards to a defense-in-depth security approach. 13
14 Additional Reference Material 1. Rockwell Automation References Architectures Website 2. Rockwell Automation EtherNet/IP Website 3. Rockwell Automation Network and Security Services Website 4. Reference Architectures for Manufacturing White paper 5. Converged Plant-wide Ethernet Reference Architectures Design and Implementation Guide (DIG) 6. Top 10 Recommendations for Plantwide EtherNet/IP Deployments White paper 7. Securing Manufacturing Computing and Controller Assets White paper 8. Scalable Secure Remote Access - Solutions for OEMs White paper 9. Achieving Secure, Remote Access to Plant-Floor Applications and Data White paper 10. Patch Management and Computer System Security Updates White paper 11. Segmentation Techniques within the CPwE Cell/ Area Zone White paper 12. ODVA Website 13. Network Infrastructure for EtherNet/IP: Introduction and Considerations ODVA 14. Securing EtherNet/IP Networks Guide To learn more about how Cisco and Rockwell Automation can help you, please visit: Cisco is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at For ongoing news, please go to Cisco equipment in Europe is supplied by Cisco Systems International BV, a wholly owned subsidiary of Cisco Systems, Inc. Americas Headquarters Cisco Systems, Inc. San Jose, CA Asia Pacific Headquarters Cisco Systems (USA) Pte. Ltd. Singapore Europe Headquarters Cisco Systems International BV Amsterdam, The Netherlands Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play, and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare, GigaDrive, HomeLink, Internet Quotient, IOS, iphone, iquick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries. All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0809R) Rockwell Automation is a leading provider of power, control and information solutions that enable customers to get products to market faster, reduce their total cost of ownership, better utilize plant assets, and minimize risks in their manufacturing environments. Americas: Rockwell Automation 1201 South Second Street Milwaukee, WI USA Tel: (1) , Fax: (1) Asia Pacific: Rockwell Automation Level 14, Core F, Cyberport Cyberport Road, Hong Kong Tel: (852) , Fax: (852) Europe/Middle East/Africa: Rockwell Automation NV, Pegasus Park, De Kleetlaan 12a 1831 Diegem, Belgium Tel: (32) , Fax: (32) Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved. Publication ENET-WP031A-EN-E June 2013
Securing Manufacturing Computing and Controller Assets
Securing Manufacturing Computing and Controller Assets Rockwell Automation and Cisco Four Key Initiatives: Common Technology View: A single system architecture, using open, industry standard networking
Production Software Within Manufacturing Reference Architectures
Production Software Within Manufacturing Reference Architectures Synopsis Industry adoption of EtherNet/IP for control and information has driven the wide deployment of standard Ethernet for manufacturing
PCI Compliance: Improve Payment Security
PCI Compliance: Improve Payment Security The latest Payment Card Industry (PCI) Data Security Standards (DSS) for customer data give you more ways to address an evolving risk environment and meet PCI compliance
Cisco Director Class SAN Planning and Design Service
Cisco Director Class SAN Planning and Design Service Improve data center infrastructure for accessing, managing, and protecting growing information resources. Mitigate risk and accelerate the deployment
Network Security Trends & Fundamentals of Securing EtherNet/IP Networks
Network Security Trends & Fundamentals of Securing EtherNet/IP Networks Presented by Rockwell Automation Industrial Network Security Trends Security Quips "Good enough" security now, is better than "perfect"
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation
Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples
Terminal Services Overview
Terminal Services Overview This chapter provides an overview of Cisco IOS terminal services and includes the following main sections: Cisco IOS Network Access Devices Line Characteristics and s Asynchronous
Cisco Data Center Business Continuity Planning Service
Cisco Data Center Business Continuity Planning Service Build a Comprehensive Business Continuity Strategy with Cisco Technology and Expertise. The Cisco Data Center Business Continuity Planning Service
Cisco Data Center Virtualization Assessment Service
Cisco Data Center Virtualization Assessment Service Prepare for End-to-End Virtualization of Your Data Center A proactive approach to virtualization helps maintain the application performance, security,
T46 - Integrated Architecture Tools for Securing Your Control System
T46 - Integrated Architecture Tools for Securing Your Control System PUBLIC PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. The Connected Enterprise PUBLIC Copyright
Cisco Data Center Architecture Assessment Service
Cisco Data Center Architecture Assessment Service Align networks, computer systems, and storage devices. Increase the efficiency, adaptability, and scalability of your data center by deploying Cisco Data
Cisco IronPort Encryption Appliance 6.5.5 Release Notes
Cisco IronPort Encryption Appliance 6.5.5 Release Notes Published: August 30, 2011 Contents These release notes contain important information about running the latest version of the IronPort Encryption
Securing The Connected Enterprise
Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise
ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions
Network Segmentation Methodology Application Guide ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions By Josh Matson and Gregory
AUP28 - Implementing Security and IP Protection
AUP28 - Implementing Security and IP Protection Features in the Integrated Architecture Mads Laier DK Commercial Engineer Logix & Networks Rev 5058-CO900E Agenda Why IACS Security Now! Defense in depth
Transferring Files Using HTTP or HTTPS
Transferring Files Using HTTP or HTTPS First Published: May 5, 2005 Last Updated: May 14, 2009 Cisco IOS Release 12.4 provides the ability to transfer files between your Cisco IOS software-based device
Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix
Cisco 100-Megabit Ethernet SFP Modules Compatibility Matrix This document contains information about the Cisco platforms and software versions that support the 100-Megabit Ethernet Small Form-Factor Pluggable
Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway
Configuring Cisco Unified Communications Manager for the NovaTec TransNova S3 Voice Gateway This document describes how to configure Cisco Unified Communications Manager systems to use the NovaTec TransNova
Cisco IronPort Hosted and Hybrid Hosted Email Security Services
FAQ Cisco IronPort Hosted and Hybrid Hosted Email Security Services Cisco IronPort Hosted and Hybrid Hosted Email Security services provide industry-leading anti-spam efficacy, capacity assurance, a dedicated
Cisco Unified Wireless IP Phone 7925G Accessory Guide
Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:
How To Create A Security Solution For Retail Banking
Cisco Physical Security for Retail Banking Enabling a Collaborative Customer Experience What You Will Learn Physical security systems that effectively protect your assets, customers, and employees are
Cipher Suites and WEP
Cipher Suites and WEP This module describes how to configure the cipher suites required for using Wireless Protected Access (WPA) and Cisco Centralized Key Management (CCKM); Wired Equivalent Privacy (WEP);
Cisco Unified Wireless IP Phone 7925G Accessory Guide
Cisco Unified Wireless IP Phone 7925G Accessory Guide This guide describes the accessories that you can order for your Cisco Unified Wireless IP Phone 7925G. Contents This document contains these sections:
REFERENCE ARCHITECTURES FOR MANUFACTURING
Synopsis Industry adoption of EtherNet/IP TM for control and information resulted in the wide deployment of standard Ethernet in manufacturing. This deployment acts as the technology enabler for the convergence
Cisco Unified Attendant Console Backup and Restore Guide
Cisco Unified Attendant Console Backup and Restore Guide Revised: January 28, 2013, 2011, This document describes how to back up Cisco Unified Attendant Console server Version 9.0 (all Editions), and restore
Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network
Connecting Cisco Fast Ethernet ISDN PRI Network Modules to the Network Revised: May 1, 2008, OL-12808-01 This guide describes how to connect Cisco Fast Ethernet Integrated Services Digital Network (ISDN)
Release Notes for Cisco Support Tools Release 2.4(1)
Release Notes for Cisco Support Tools Release 2.4(1) July 2009 Contents Introduction, page 1 System Requirements, page 2 New Features, page 4 Limitations and Restrictions, page 4 Important Notes, page
Connecting Cisco Serial High-Speed WAN Interface Cards
Connecting Cisco Serial High-Speed WAN Interface Cards Revised: April 5, 008, Overview This document describes Cisco serial and high-speed WAN interface cards (HWICs) and how to connect them to a network.
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
Cisco Virtual Desktop Infrastructure Planning and Design Service
Cisco Virtual Desktop Infrastructure Planning and Design Service Reduce IT costs and increase application availability, scalability, and manageability with a virtualized desktop solution The Cisco Virtual
AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)
AUP28 Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) Clive Barwise, Rockwell Automation European Product Manager Networks and Security
Medical Data Exchange A New Approach to Healthcare Interoperability
Medical Data Exchange A New Approach to Healthcare Interoperability Introduction The healthcare industry has reached a tipping point. Costs have escalated at an unprecedented rate in the United States
Release Notes for Cisco IronPort Email Security Plug-in 7.1
Release Notes for Cisco IronPort Email Security Plug-in 7.1 Revised: December 10, 2010 Contents These release notes contain information critical to upgrading and running the Cisco IronPort Email Security
Cisco Cloud Security: Choosing the Right Email Security Deployment
Cisco Cloud Security White Paper Cisco Cloud Security: Choosing the Right Email Security Deployment Executive Summary Table of Contents 1 Executive Summary 2 Cloud Email Security 4 Hybrid EmailSecurity
The Internet of Things (IoT) and Industrial Networks. Guy Denis [email protected] Rockwell Automation Alliance Manager Europe 2015
The Internet of Things (IoT) and Industrial Networks Guy Denis [email protected] Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects
Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R)
Cisco Aironet Dual Band MIMO Low Profile Ceiling Mount Antenna (AIR-ANT2451NV-R) This document outlines the specifications for the AIR-ANT2451NV-R dual band MIMO low profile ceilng mount antenna and provides
Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement
Cisco Network Planning Solution 2.0.2 Documentation Guide and Supplemental License Agreement June 2007 This documentation guide contains the End User Supplemental License Agreement for Cisco Systems Network
Danish Train Operator Gets Customer Service Back On Track
Danish Train Operator Gets Customer Service Back On Track Danish Rail uses Cisco Unified Communications to sharpen its customer focus and revitalise its call centre operation EXECUTIVE SUMMARY Customer
Data Center Infrastructure Design Guide 2.1 Readme File
Data Center Infrastructure Design Guide 2.1 Readme File Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
How to Register, Start, and Access a Cisco Online Exam
How to Register, Start, and Access a Cisco Online Exam Lifecycle Services and SMB Exams The process for registering and taking a Cisco online exam is different from the process for registering and taking
Cisco Registered Envelope Recipient Guide
September 8, 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part Number:
Release Notes for Cisco IronPort Email Security Plug-in 7.2
Release Notes for Cisco IronPort Email Security Plug-in 7.2 Revised: October 12, 2011 Contents These release notes contain information critical to installing and running the Cisco IronPort Email Security
AUD20 - Industrial Network Security
AUD20 - Industrial Network Security Lesley Van Loo EMEA Senior Commercial engineer - Rockwell Automation Rev 5058-CO900B Copyright 2012 Rockwell Automation, Inc. All rights reserved. 2 Agenda Connected
Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service
Cisco Smart Care Services Questions and Answers About the Voice Quality Monitor Service For Qualified Cisco Partners October 2008 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose,
Cisco Smar t Busines s Communications System IP Phone Por tfolio
Cisco Smar t Busines s Communications System IP Phone Por tfolio Rich voice conversations, stylish appearance, and support for business applications. The Cisco Smart Business Communications System (SBCS)
Configuring the SA 500 for Active Directory Authentication of VPN Clients 2. Establishing a SSL VPN Connection By Using a Different Port Number 35
Application Note Configuring a Cisco SA 500 for Active Directory Authentication of SSL VPN Clients This application note document provides information on how to enable the authentication of SSL VPN Clients
Cisco Unified Contact Center Express Port Utilization Guide
Cisco Unified Contact Center Express Utilization Guide Cisco Unified Contact Center Express and Cisco Unified IP IVR Release 7.0(1) April 2009 Americas Headquarters Cisco Systems, Inc. 170 West Tasman
System Message Logging
System Message Logging This module describes how to configure system message logging on your wireless device in the following sections: Understanding System Message Logging, page 1 Configuring System Message
Authentication on the Cisco IronPort Web Security Appliance
Cisco IronPort Web Security Appliance White Paper Authentication on the Cisco IronPort Web Security Appliance Executive Summary Table of Contents 1 Executive Summary 2 Introduction 2 Authentication Protocals
Constraining IP Multicast in a Switched Ethernet Network
Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure routers to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast
Upgrading to the Cisco ubr7246vxr Universal Broadband Router
Upgrading to the Cisco ubr7246vxr Universal Broadband Router This document outlines the process for upgrading an existing Cisco ubr7246 universal broadband router to a Cisco ubr7246vxr chassis, along with
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the 10-Gigabit Ethernet transceiver
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module
FIPS 140-2 Level 1 Security Policy for Cisco Secure ACS FIPS Module Contents Overview, page 1 Security Requirements, page 2 Cryptographic Module Specification, page 2 Cryptographic Module Ports and Interfaces,
Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1
Release Notes for the Cisco WAN Modeling Tools, Release 15.4.00 Patch 1 June 2007 Rev. A0 These release notes are for use with the Cisco WAN Modeling Tools, which includes the following subsystems: NMT
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix
Cisco 10-Gigabit Ethernet Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the 10-Gigabit Ethernet transceiver
Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X
QUICK START GUIDE Cisco ASA 5500-X Series ASA 5512-X, ASA 5515-X, ASA 5525-X, ASA 5545-X, and ASA 5555-X 1 Package Contents 1 Powering On the ASA 2 Connecting Interface Cables and Verifying Connectivity
Scalable Secure Remote Access Solutions for OEMs
Scalable Secure Remote Access Solutions for OEMs Introduction Secure remote access to production assets, data, and applications, along with the latest collaboration tools, provides manufacturers with the
Cisco TelePresence Solutions
Cisco TelePresence Solutions To excel in today s economy you have to collaborate with colleagues, partners, and customers around the globe at a moment s notice. You must continuously innovate and focus
Achieving Secure, Remote Access to Plant-Floor Applications and Data
Achieving Secure, Remote Access to Plant-Floor Applications and Data Abstract To increase the flexibility and efficiency of production operations, manufacturers are adopting open networking standards for
L2TP Dial-Out Load Balancing and Redundancy
L2TP Dial-Out Load Balancing and Redundancy The L2TP Dial-Out Load Balancing and Redundancy feature enables an L2TP network server (LNS) to dial out to multiple L2TP access concentrators (LACs) When the
Cisco Certified Security Professional (CCSP)
529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination
Cisco PIX 515E Security Appliance Getting Started Guide
Cisco PIX 515E Security Appliance Getting Started Guide Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Industrial Security in the Connected Enterprise
Industrial Security in the Connected Enterprise Presented by Rockwell Automation 2008 Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved. THE CONNECTED ENTERPRISE Optimized for Rapid
Cisco IronPort M-Series Security Management Appliance
Cisco IronPort M-Series Security Management Appliance Flexible management and complete security control at the network gateway The Cisco IronPort M-Series security management appliance is the perfect complement
Implementation Note for NetFlow Collectors
This document describes the implementation details for NetFlow collectors for the ASA 5580 adaptive security appliance, and includes the following sections: Event-Driven Data Export Bidirectional Flows
CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 3800 SERIES ROUTERS
PRODUCT BULLETIN NO. 2877 CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND FEATURE SETS FOR THE CISCO 3800 SERIES ROUTERS This product bulletin details changes to the Cisco IOS Software packaging for Cisco
Cisco ASA 5505 Getting Started Guide
Cisco ASA 5505 Getting Started Guide Software Version 7.2 Corporate Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Cisco Unified Communications
Cisco Unified Communications Brochure Cisco Unified Communications To effectively excel in today s fast-paced world, employees must communicate and collaborate in every imaginable way, including mobile
Scalable Secure Remote Access Solutions
Scalable Secure Remote Access Solutions Jason Dely, CISSP Principal Security Consultant [email protected] Scott Friberg Solutions Architect Cisco Systems, Inc. [email protected] Jeffrey A. Shearer,
CCNA Security 2.0 Scope and Sequence
CCNA Security 2.0 Scope and Sequence Last Updated August 26, 2015 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security
Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture
Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture Industrial Ethernet networking is advancing technology applications throughout the plant. These applications are rapidly
Installation and Configuration Guide Cisco Unified CRM Connector for SAP
Installation and Configuration Guide Cisco Unified CRM Connector for SAP Release 1.0(x) December 2009 Corpora te Headquarters Cisco System s, Inc. 170 West Tasman Drive San Jo se, CA 95134-1706 USA htt
Hardware and System Software Specification for Cisco Unified Web and E-Mail Interaction Manager
Hardware and System Software Specification f Cisco Unified Web and E-Mail Interaction Manager F Unified Contact Center Express Release 4.2(5) October 2009 Americas Headquarters Cisco Systems, Inc. 170
Figure 1. The Cisco Aironet Power Injectors Provide Inline Power to Cisco Aironet Access Points and Bridges
DATA SHEET CISCO AIRONET POWER INJECTOR Cisco Aironet Power Injector products increase the deployment flexibility of Cisco Aironet wireless access points and bridges by providing an alternative powering
White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange)
White Paper: Active Directory Capacity Planning (Cisco Unity Versions 4.x, 3.1, and 3.0(3) and Later with Microsoft Exchange) Revised August 10, 2007 Purpose This document provides capacity planning recommendations
Securing the Connected Enterprise
Securing the Connected Enterprise ABID ALI, Network and Security Consultant. Why Infrastructure Matters Rapidly Growing Markets Global Network Infrastructure and Security Markets 13.7% CAGR over the next
Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix
Cisco OC-3/OC-12/OC-48 SFP Transceiver Modules Compatibility Matrix This publication contains information about the Cisco platforms and software versions that support the OC-3/OC-12/OC-48 Small Form-Factor
CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND 12.4T FEATURE SETS FOR THE CISCO 2800 SERIES ROUTERS
PRODUCT BULLETIN NO. 2879 CISCO IOS SOFTWARE RELEASES 12.4 MAINLINE AND FEATURE SETS FOR THE CISCO 2800 SERIES ROUTERS This product bulletin details changes to the Cisco IOS Software packaging for Cisco
This feature was introduced. This feature was integrated in Cisco IOS Release 12.2(11)T.
BGP Link Bandwidth The Border Gateway Protocol (BGP) Link Bandwidth feature is used to advertise the bandwidth of an autonomous system exit link as an extended community. This feature is configured for
Aluminium Smelter Benefits from New Approach to Networking
Aluminium Smelter Benefits from New Approach to Networking Customer Case Study One of world s largest aluminium smelters uses Ethernet-to-the-Factory to improve manufacturing efficiency. EXECUTIVE SUMMARY
Cisco GLBP Load Balancing Options
Data Sheet Cisco GLBP Load Balancing Options Last updated: December 2005 INTRODUCTION The purpose of this document is to discuss the options that Cisco Gateway Load Balancing Protocol (GLBP) one of Cisco
ADMINISTRATION GUIDE Cisco Small Business
ADMINISTRATION GUIDE Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco Ironport, the Cisco logo, Cisco Lumin, Cisco Nexus, Cisco
CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES
OVERVIEW CISCO SMALL AND MEDIUM BUSINESS CLASS VOICE SOLUTIONS: CISCO CALLMANAGER EXPRESS BUNDLES COMPANY PROFILE Cisco CallManager Express (CME) promotional bundles are appropriate for small businesses
Cisco IP Phone 7961G/7961G-GE and 7941G/7941G-GE Enhancements
Enhancements The purpose of this document is to provide a summary of some of the feature behavior enhancements on the new, and how they differ from the Cisco IP Phone 7960G/7940G. Complete information
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications
Cisco Small Form-Factor Pluggable Modules for Gigabit Ethernet Applications The industry-standard Cisco Small Form-Factor Pluggable (SFP) Gigabit Interface Converter is a hotswappable input/output device
How To Extend Security Policies To Public Clouds
What You Will Learn Public sector organizations without the budget to build a private cloud can consider public cloud services. The drawback until now has been tenants limited ability to implement their
Cisco Router and Security Device Manager File Management
Application Note Cisco Router and Security Device Manager File Management Introduction Cisco Router and Security Device Manager (SDM) allows you to view and manage the file system on your Cisco router
Telepresence in an IPv6 World. Simplify the Transition
Telepresence in an IPv6 World Simplify the Transition IPV6 has the potential to transform communications, collaboration, learning, entertainment, physical security and more. What You Will Learn If you
Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N)
Cisco Aironet 5-dBi Omnidirectional Antenna (AIR-ANT2450V-N) This document describes the Cisco Aironet AIR-ANT2450V-N 5-dBi Omnidirectional Antenna and provides instructions for mounting it. The antenna
ADMINISTRATION GUIDE Cisco Small Business
ADMINISTRATION GUIDE Cisco Small Business WAP200 Wireless-G Access Point with Power Over Ethernet and Rangebooster CCDE, CCENT, CCSI, Cisco Eos, Cisco HealthPresence, Cisco Ironport, the Cisco logo, Cisco
