Security Settings in WAGO 758 Series IPCs Application Note



Similar documents
Remote Connection to a WAGO using a High-Speed Internet connection Application note

WAGO PFC 750-8xx Interface to Horner HMI Application note

Connect Ethernet-Controller to TO-PASS web portal via GPRS-Router Application note

Transmitting s with the WAGO IPC Application note

Ethernet/IP Comms between a WAGO and a Mettler Toledo JAGXTREME Terminal Application note

Transmitting s in a local network with a WAGO CONTROLLER Application note

Application note. A103202, English Version 1.0.1

Using the WAGO PROFINET Coupler as Remote I/O with a Siemens S7 PLC

Using the SysLibFile.lib and the WagoLibFtp.lib for file access Application note

Accessing EtherNet/IP Network Variables in a WAGO with a ControlLogix PLC Application note

Ethernet PFC Sending Application note

WAGO-I/O-SYSTEM in ABB robot control systems Application note

Using library WagoLibMySQL to communicate with MySQL-Databases Application note

Sending / receiving SMS using a GSM modem Application note

Transmitting s with the library "WagoLibMail_02.lib" Application note

Application Note. WAGO EtherNet/IP Communications with a CompactLogix PLC Using Explicit Messaging. A500620e, English Version: 1.0.

WAGO PFC as a MODBUS MASTER Application note

WAGO-I/O-SYSTEM. Using library WagoLibMSSQL_03.lib in CoDeSys 2.3 for interface to Microsoft SQL Server 200x. Application Note

Configuration a Profibus-DP node using Step7 and WAGO-I/O components Application note

EtherNet/IP communications between a WAGO PFC and a SICK IVC-2D Camera Application note

Modular I/O System Quick Start for WAGO-I/O-IPC /000-xxx Features

Modular I/O System ETHERNET StarterKit Quick Start ETHERNET Fieldbus Controller

Using library WagoLibHttp_02.lib to communicate with remote web server Application note

READYNAS INSTANT STORAGE. Quick Installation Guide

ReadyNAS Setup Manual

Secure TCP/IP connection Description for UMG 604, UMG 605, UMG 508, UMG 509, UMG 511 and UMG 512

Network/Floating License Installation Instructions

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: Rev 6

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Network Monitoring User Guide Pulse Appliance

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Quick Start Guide FLIR Firmware Update Tool

Using Internet or Windows Explorer to Upload Your Site

Contents Notice to Users

UPS Network Interface. Quick InstallationGuide

ReadyNAS Duo Setup Manual

OCS Virtual image. User guide. Version: Viking Edition

Multi-Homing Dual WAN Firewall Router

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Intel Active Management Technology with System Defense Feature Quick Start Guide

Emerson Smart Firewall

Projetex 9 Workstation Setup Quick Start Guide 2012 Advanced International Translations

Lab Configuring Access Policies and DMZ Settings

emerge 50P emerge 5000P

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

MGC WebCommander Web Server Manager

Web Remote Access. User Guide

Upgrade your Software

RealPresence Platform Director

S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s

Chapter 6 Using Network Monitoring Tools

IIS, FTP Server and Windows

SANGFOR SSL VPN. Quick Start Guide

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

HP A-IMC Firewall Manager

Lab Configuring Access Policies and DMZ Settings

UBS KeyLink Quick reference WEB Installation Guide

Advantage for Windows Copyright 2012 by The Advantage Software Company, Inc. All rights reserved. Client Portal blue Installation Guide v1.

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

Technical Note. Monitoring Ethernet Traffic with Tolomatic ACS & Managed Switch. Contents

Sharpdesk V3.5. Push Installation Guide for system administrator Version

M2Web - Browser-Based Mobile Remote Access

Quick Start Guide. for Installing vnios Software on. VMware Platforms

Two Factor Authentication in SonicOS

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Prestige 314 Read Me First

Easy Setup Guide for the Sony Network Camera

Configuring security in ION devices using ION Setup

QNAP SYSTEMS INC. QNAP Digital Signage Player Web Console Manual

Gigabyte Content Management System Console User s Guide. Version: 0.1

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

Metasys System Direct Connection and Dial-Up Connection Application Note

Chapter 6 Using Network Monitoring Tools

Deployment Guide: Transparent Mode

Savvius Insight Initial Configuration

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

Router CLI Overview. CradlePoint, Inc.

Device Log Export ENGLISH

Setting Up Scan to SMB on TaskALFA series MFP s.

Lab Developing ACLs to Implement Firewall Rule Sets

OroTimesheet 7 Installation Guide

eprism Security Suite

Kaspersky Security Center Web-Console

Updating MNS-6K software on Magnum 6K Switches

Connecting the DG-102S VoIP Gateway to your network

HP IMC Firewall Manager

Kaspersky Security Center Web-Console

Information Sheet IS13011A. VS Series - Recovering / Installing the Operating System. (For Software Version 4.x) Issue

Hypercom Key Loading and Management (HKLM) RS232 PPP Key Injection PC Setup Guide

M2M Series Routers. Port Forwarding / DMZ Setup

H3C SSL VPN RADIUS Authentication Configuration Example

Broadband Router ESG-103. User s Guide

H0/H2/H4 -ECOM100 DHCP & HTML Configuration. H0/H2/H4--ECOM100 DHCP Disabling DHCP and Assigning a Static IP Address Using HTML Configuration

F-Secure Messaging Security Gateway. Deployment Guide

Patching the Windows 2000 Server Operating System on S8100 Media Servers, IP600 Communications Servers, & DEFNITY ONE Communications Systems

Networking Guide Redwood Manager 3.0 August 2013

USER CONFERENCE 2011 SAN FRANCISCO APRIL Running MarkLogic in the Cloud DEVELOPER LOUNGE LAB

Transcription:

Security Settings in WAGO 758 Series IPCs Application Note, English Version 1.0.0

2 General Copyright 2012 by WAGO Kontakttechnik GmbH All rights reserved. WAGO Kontakttechnik GmbH Hansastraße 27 D-32423 Minden Phone: +49 (0) 571/8 87 0 Fax: +49 (0) 571/8 87 1 69 E-Mail: info@wago.com Web: http://www.wago.com Technical Support Phone: +49 (0) 571/8 87 5 55 Fax: +49 (0) 571/8 87 85 55 E-Mail: support@wago.com Every conceivable measure has been taken to ensure the correctness and completeness of this documentation. However, as errors can never be fully excluded we would appreciate any information or ideas at any time. We wish to point out that the software and hardware terms as well as the trademarks of companies used and/or mentioned in the present manual are generally trademark or patent protected.

Table of Contents 3 TABLE OF CONTENTS 1 Important comments...4 1.1 Legal principles...4 1.1.1 Copyright...4 1.1.2 Personnel qualification...4 1.1.3 Intended use... 4 1.2 Range of validity... 5 1.3 Symbols...5 2 Description... 6 3 Reference Material... 6 4 Web Based Management Passwords...6 4.1 Overview... 6 4.2 Changing Passwords for Web Based Management... 7 5 Changing the Password in the Linux Console...9 5.1 Overview... 9 5.2 Changing the Linux Console passwords...10 6 Additional Security Features... 11 6.1 Limiting Access via the Serial Port... 11 6.2 Limiting Access via the Ethernet Ports... 12 6.2.1 Telnet...12 6.2.2 CoDeSys Web Server...12 6.2.3 FTP Function...13 6.2.4 CoDeSys...14 7 Security recommendations...15

4 Important comments 1 Important comments 1.1 Legal principles 1.1.1 Copyright To ensure fast installation and start-up of the units described in this manual, we strongly recommend that the following information and explanation is carefully read and adhered to. This manual is copyrighted, together with all figures and illustrations contained therein. Any use of this manual which infringes the copyright provisions stipulated herein, is not permitted. Reproduction, translation and electronic and photo-technical archiving and amendments require the written consent of WAGO Kontakttechnik GmbH. Non-observance will entail the right of claims for damages. 1.1.2 Personnel qualification 1.1.3 Intended use The use of the product detailed in this manual is exclusively geared to specialists having qualifications in PLC programming, electrical specialists or persons instructed by electrical specialists who are also familiar with the valid standards. WAGO Kontakttechnik GmbH declines all liability resulting from improper action and damage to WAGO products and third party products due to non-observance of the information contained in this manual. For each individual application, the components supplied are to work with a dedicated hardware and software configuration. Modifications are only admitted within the framework of the possibilities documented in the manuals. All other changes to the hardware and/or software and the non-conforming use of the components entail the exclusion of liability on part of WAGO Kontakttechnik GmbH. Please direct any requirements pertaining to a modified and/or new hardware or software configuration directly to WAGO Kontakttechnik GmbH.

Important comments 5 1.2 Range of validity 1.3 Symbols This application note is based on the stated hardware and software of the specific manufacturer as well as the correspondent documentation. This application note is therefore only valid for the described installation. New hardware and software versions may need to be handled differently. Please note the detailed description in the specific manuals. Danger Always observe this information to protect persons from injury. Warning Always observe this information to prevent damage to the device. Attention Marginal conditions must always be observed to ensure smooth operation. ESD (Electrostatic Discharge) Warning of damage to the components by electrostatic discharge. Observe the precautionary measure for handling components at risk. Note Routines or advice for efficient use of the device and software optimisation. More information References to additional literature, manuals, data sheets and INTERNET pages

6 Description 2 Description This document provides information on security settings for WAGO s Industrial PCs (IPCs) 3 Reference Material WAGO strongly recommends changing the default passwords that are shipped with our products as these are publicly documented. Therefore they do not provide sufficient protection. WAGO s IPC products have several passwords that need to be changed. This includes both the Web Based Management and the Linux Console. To help reduce the risk of unwanted or unintended access to the IPC there are several functions that can be disabled to minimize the access to the IPC as outlined in section 6. This procedure has been tested with WAGO s 758-874, 758-875 and 758-876 versions. 4 Web Based Management Passwords 4.1 Overview The WAGO IPCs have implemented HTML pages for Web Based Management that are used to configure the IPC. To access the Web Based Management use the following procedure: 1. Connect the IPC with the LAN via X9 Ethernet interface. 2. Access the Web Based Management by starting your internet browser and enter the IP address in the address bar. The factory preset IP address is 192.168.2.17. Refer to the product manual for addition connection information. All the HTML pages are password protected except the Information and WebVisu pages.

Web Based Management Passwords 7 4.2 Changing Passwords for Web Based Management First go online with the Web-Based Management system as described above. Select the Users page. On this page you are able to change the passwords for the Web Based Management system user and admin privileges. Users have access to the TCP/IP, NTP, Clock, Port and Modbus pages. Admin has access to all pages. To access the User page you must have admin privileges. When you select the User page, you will be prompted for a user name a password in a window that looks like the following:

8 Web Based Management Passwords Once you have access to this page you will see a page that looks like this: T o c h a n g e t h e u T T T o change the user password, simply type the new password in the New Password input field and verify it in the Confirm Password Field, then click on SUBMIT. To change the admin password, select the drop down and click on admin. Follow the same steps as above. Note that the password changes will take effect immediately after clicking the SUBMIT button.

Changing the Password in the Linux Console 9 5 Changing the Password in the Linux Console 5.1 Overview The WAGO IPCs are Linux based PCs and you can connect to the Linux Console through a variety of different paths including through Telnet through the RS-232 port, Telnet through the Ethernet port, or through a monitor on the DVI-I interface in combination with a keyboard connected to the USB interface. The WAGO IPCs are shipped with several different user names and default passwords. Root / wago Admin / wago User / user Guest /guest The passwords for these login names must be changed to help secure your system. Note the login name and passwords are independent from the Web Based Management login name and passwords. It is strongly recommend selecting passwords that will be difficult for someone to discover. The WAGO IPCs are optimized for using a minimum of 8 characters that include one or more of the following sets. Lower case alphabetic Upper case alphabetic Digits 0 thru 9 Punctuation marks

10 Changing the Password in the Linux Console 5.2 Changing the Linux Console passwords To change the passwords in the Linux Console, you must first connect to the IPC via one of the methods described in the overview section. The next step is to log into the operating system. For the purpose of changing passwords, it is recommend to login as root. At the login prompt type: root and then press enter. Next you will be asked for the password. Type in wago and press enter. The root and admin logins provide you with super user settings and therefore can change all the passwords at once. Note that user and guest logins, can only change their own passwords. Once you are logged in, you will see the prompt root@wago-io-ipc. Now type: passwd guest and then press enter. You will be prompted to enter the new password and also to confirm it a second time. Now change the passwords for the user, admin and root logins, using the same process. For example to change the user password, type in: passwd user and the press enter at the command line.

Additional Security Features 11 6 Additional Security Features There are many ways to help increase the security of an industrial control system. Several of these are outlined in section 7. Limiting access to the control system will help reduce risks. The WAGO IPC offers several features that can help you reduce the access to the controller, thus limiting the risk of unwanted or unintended entry to the system. 6.1 Limiting Access via the Serial Port The WAGO IPC has an onboard RS-232 serial port that can be configured for multiple functions. The default of this port is set to Linux Console. With this setting the serial port can be used as a Telnet interface with a remote PC. The serial port can be configured for other uses, thus blocking the port for Telnet operations. If this port is not intended to be accessed regularly as a Telnet port, then it is prudent to configure this for MODBUS RTU functions to reduce the risk of unwanted Telnet accesses. The Telnet function of the serial port can be disabled by setting the use of the port to MODBUS RTU. This is accomplished through the Web Based Management page. The function can be found under the administration tab. Note that this page is password protected. Once logged into the page, select the radio button next to the MODBUS RTU in the Configuration of Serial Interface section. Then click on SUBMIT.

12 Additional Security Features 6.2 Limiting Access via the Ethernet Ports The WAGO IPC has two independent Ethernet ports onboard that can be used for a variety of functions. These functions can be limited via configuration, to help reduce the risk of unwanted access to the controller. The WAGO IPC s Web Based Management is used to configure the use of these functions. The following configurations can be found on the Port page in the Web Based Management system. Note that this page is password protected. 6.2.1 Telnet Most remote software tools used for Telnet applications can be configured to communicate either a serial connection or a TCP connection. Therefore it may be prudent to disable the Telnet function on the WAGO IPC. This may be accomplished via the Web Based Management Port page. In this tab you will find a section for Telnet configuration. By selecting the disable radio button and clicking on SUBMIT, you will block Telnet access via the Ethernet ports. 6.2.2 CoDeSys Web Server The WAGO IPC has a built in web server that can be used to monitor and control your system. If this feature is not intended to be used in the system architecture, it can be disabled.

Additional Security Features 13 This may be accomplished via the Web Based Management Port page. In this page you will find a section for CoDeSys Webserver configuration. By selecting the disable radio button and clicking on SUBMIT, you will block access to / from the Webserver. 6.2.3 FTP Function The WAGO IPC has the ability to transfer files to / from the device using FTP technology. If this feature is not intended to be used regularly in the system, it can be disabled. This may be accomplished via the Web Based Management Port page. In this page you will find a section for FTP configuration. By selecting the disable radio button and clicking on SUBMIT, you will block FTP access to / from the IPC.

14 Additional Security Features 6.2.4 CoDeSys WAGO IPCs offer the powerful CoDeSys runtime. This allows you to program the IPC just like a programmable logic controller using the CoDeSys programming software. The developed program is typically downloaded via the Ethernet ports to the IPC. When the IPC s program is finalized, it may be prudent to disable CoDeSys access to the device to help prevent unwanted access. This may be accomplished via the Web Based Management Port page. In this tab you will find a section for CoDeSys configuration. By selecting the disable radio button and clicking on SUBMIT, you will block CoDesys access to the IPC

Security recommendations 15 7 Security recommendations WAGO recommends that users of industrial control systems develop Defense-In-Depth practices to secure their assets. Defense-In-Depth is the implementation of multiple electronic and physical security techniques to help mitigate the risk of undesired access to control equipment and enhance overall system security. WAGO suggests you apply multiple technologies and complement them with your own company s best practices. The following are some suggested control system security practices: Change the default passwords that are shipped with the devices to unique passwords and have a program to change the passwords on a regular basis. Enable user name and password protection on appropriate devices within your control system. Ensure only authorized personnel have access to this information and periodically change the passwords. Limit access to WAGO Ethernet networked controllers by disabling services available via the IP protocol. This can be accomplished through the device s Web-based Management System s Port tab. It is best to disable all services that are not required for normal operation. Locate control systems behind firewalls with intrusion detection and intrusion prevention technologies. These systems should be validated on regular basis to help ensure proper operation. Divide common control system architectures into zones to create clear boundaries in order to effectively apply multiple layers of defense. When possible, isolate the control system s network from the corporate enterprise and external networks. Implement procedures that only allow trained and authorized people physical and electronic access to control systems. Develop well documented control system policies and procedures. Many of the same policies used for IT security and corporate systems could be applied directly to control system networks. The document should be reviewed annually to help ensure the best and latest security methods are in place. Please contact WAGO s technical support group at 1-800-DINRAIL if you have questions related to WAGO s Ethernet based controllers and couplers.

WAGO Kontakttechnik GmbH Postfach 2880 D-32385 Minden Hansastraße 27 D-32423 Minden Phone: 05 71/8 87 0 Telefax: 05 71/8 87 1 69 E-Mail: info@wago.com Internet: http://www.wago.com