SlideShare une entreprise Scribd logo
1  sur  41
Tips for Commissioning,
Managing, and Troubleshooting
your Industrial Network
Moxa Technology Webinar Series
Richard Wood
Networking Infrastructure Manager
Agenda
Industrial Network Challenges
Network Configuration & Commissioning
Managing Industrial Networks
Troubleshooting to Minimize Downtime
Tips for Commissioning, Managing & Troubleshooting Your Industrial Network
Industrial Network Challenges
• Harsh operating
environments
• Network availability
requirements are much
higher than enterprise IT
• Cost of downtime is
extremely high
• Interoperability of industrial
devices/networks
• Limited networking
expertise
Typical challenges
Source:
http://www.strategiccompanies.com/pdfs/Assessing%20t
he%20Financial%20Impact%20of%20Downtime.pdf
Network Configuration &
Commissioning
Tips, Tricks & Tools
Network Configuration & Commisioning
Installation Configuration Troubleshooting Testing Commissioning
Typical steps
Unmanaged VS. Managed
HARDWARE
SOFTWARE
APPLICATION
Small Scale Network
P2P Communication
Mid to Large Scale Network
Mission Critical Network with
Remote Monitoring
Packet Switching:
• Entry Level Switch ASIC
Packet Switching + Network
Management:
• Advanced Switch ASIC +
• CPU + Flash / RAM
Simple Data Switching Powerful Performance for
Network Management
POSITION
Plug and Play
No Configuration Required
Web / CLI Setting
• Network Security
• Network Redundancy
• Network Management
• Traffic Prioritization
Unmanaged
Switch
Managed
Switch
Network Topology
Typical Enterprise Star Topology
• Single point of failure
• Long, costly wire/fiber runs
Network Configuration
Selecting the Right Topology for Your Needs
Redundant
Technology
Type Mesh STP RSTP Ring/Chain HSR/PRP
Feature
• Every node
connects to
each other
• IEEE
802.1D
• Loop-free
tree shape
topology
• IEEE 802.1w
• Loop-free
tree shape
topology
• Proprietary
technology
• Ring/Chain
Topology
• IEC 61850
• Dual Network (PRP)
• Dual Path (HSR)
Pros
• Highly
reliable
• Self-healing
• Open
Protocol
• Self-healing
• Open
Protocol
• Faster
recovery time:
~1 sec
• Low cost
• Self-healing
• Faster recovery
time (<20 ms)
• Open protocol
• Self-healing
• Zero recovery time
(0 ms)
Cons
• Too costly for
large network
deployment
• Recovery
time:
~15 sec
• Recovery
time not fast
enough
• Vendor specific
technology
• Prohibitively
expensive unless
absolutely needed
Backup Link
Root
Network Topology
Typical Industrial Ring Topology
• No single point of failure
• Reduced wiring costs
Industrial Protocols
• SCADA control / monitor PLC and field
devices via industrial protocols
Integration of SCADA & PLC Networks
Drive
I/O PLC
Ethernet
Switch
HMI
Network Configuration & Commissioning
• Two different methodologies for configuration of
network devices
• Many users from the industrial side prefer web
GUI
• Most users for commercial/enterprise side will
favor CLI
– Used by Cisco
Web Interface vs CLI
Device Configuration
Command Line Interface (CLI)
Device Configuration
Graphical User Interface
• Visual confirmation of current settings
• Menu based configuration
• Standard web browser interface
Network Management Tools
Easy Configuration @ Installation Stage
Efficient Monitoring @ Operation Stage
Easy Backup/recovery @ Maintenance Stage
Quick Troubleshooting @ Diagnostics Stage
Mass Configuration Tools
Up to 10X Productivity Boost
One by One Setting by Web Batch Configuration by MXconfig
Multiple Devices Wiring
in Series
Broadcast Search
Group IP
Configuration
Group Redundancy
Configuration
Finish
400
sec
20
sec
200
sec
100
sec
Total
12 min
Single Power Supply
Single Device Wiring
IP Configuration
Redundancy Configuration
Repeat
100 times
Finish
10
sec
30
sec
35
sec
Total
125 min
Fast Group Configuration
Network (IP address) Setting
Confidential
IP address setting for
mass devices
Fast Group Configuration
802.1Q VLAN Setting
Confidential
Quick Add Panel
for cloning setting
*Mass 802.1Q VLAN Setting only for devices with the same model name
Fast Configuration Deployment
Copy Configuration
Confidential
Quick configuration copy
from one specific setting
to mass devices
Support mass IP
address setting
*Copy Configuration only for devices with the same model name
Configuration Check
Status Overview
Confidential
Redundancy Setting
Overview
802.1Q VLAN Setting
Overview
Startup Troubleshooting
Confidential21
Compare a Single Device with Whole Network
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=101, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
Comparison
Sample
Benefit
Reduce Manual Setting Errors
Documentation
Export Configuration
Confidential
Export mass
configurations by
preference name
Network Management & Maintenance
Best Practices
Network Management & Maintenance
• Industrial NMS
– Auto topology visualization
– Remote device management
– Real-time event management
– Comprehensive performance
reporting
Network Management Software
Confidential
Network Management & Maintenance
Efficient Visual Monitoring
Virtual Device Panel
Real-time Event
VLAN/IGMP
Visualization
CONFIGURATION CENTER
 1-click for mass configuration backup and
firmware upgrade
 Job scheduling for nightly configuration backup
 Configuration change history
Network Management & Maintenance
Schedule Automatic Backups
• One-click Backup
– Only trigger ‘Reset’ button on switch to copy configuration and log
files to ABC-02-USB
• Files Import & Backup
– Configuration import & backup
– Firmware upgrade
– System log backup
Confidential
Rotate blinking under backup
Network Management & Maintenance
Easy Field Backup & Recovery
Potential Cyber Security Threats in Automation
• Operations disrupted by huge number of nuisance messages on
network, slowing or blocking legitimate network traffic
Denial of service
• Causes computer to run attacker’s programStorage modification
• Replaces pieces of running program with attacker’s program
Memory modification /Memory
Injection / SQL injection
• Attacker impersonates trusted computer, inserting itself as a
middleman between trusted partner computers, modifying the
messages between them to accomplish the attacker’s goals
Man-in-the-Middle
• Watches messages between computers to gain information about
systemNetwork monitoring
• Gives attacker administrative privileges on systemEscalation of privilege
• Convincing users to unknowingly install malware by clicking on links,
bypassing outward-directed firewallsPhishing attacks
• Attackers exploit trusting, helpful impulses of plant personnel to
gain information used to bypass defenses and physical modification
or sabotage of control equipment
Social engineering
Past Control
network security
• Physical perimeter
security
• Air-gapping
• Security through
obscurity
Maximize system
availability
• Remote access portals
were added by plant
engineering and
vendor personnel
• Often without the
acknowledge or
approval by IT people
The security threat
environment has
substantially changed
• Nearly all systems are directly or
indirectly connected to public
networks
• Attackers are now aware of the
possibilities of attacking control
systems
Cyber Security Trend of Automation Network
Ref: Best practices in automation security by Murray McKay, Principal Application Engineer, Siemens Industry, Inc.
Create a Defense-in-Depth
Network Security Environment
Defense in Multiple Places
• Defend the Networks and Infrastructure
(encryption and traffic flow security
measures to resist passive monitoring)
• Defend the Enclave Boundaries (deploy
Firewalls and Intrusion Detection to resist
active network attacks)
• Defend the Computing Environment
Layered Defenses
• Each of these mechanisms must present
unique obstacles to the adversary.
• Further, each should include both
“protection” and “detection” measures
Confidential
The Best Countermeasure against Cyber Threats
Layered Cyber Security Solution for Automation
Security Site
• High-performance
• 500 Mbps
Security Zone
• Best Cost/Performance
• 300Mbps
Security Cell
• Best Integration
• 110 Mbps
Firmware updates
• FW updates are critical to ensuring your devices
are always up to date with the latest technology
– Includes both technology and security updates
• Many manufacturers offer free FW upgrades to
ensure their customers have longevity with the
products they have purhcased
Network Troubleshooting
Minimizing Downtime
Alerts on Unmanaged Switches
• While unmanaged switches
generally cannot communicate
status over the network, they
can be simply configured to
provide relay outputs for
alarms such as:
– Power Supply Failure
– Port Break Alarms
Monitoring System Changes
Alerts & Event Logs
Monitoring System Changes
Predictive Monitoring & Alerts
Comprehensive Fiber Status Monitoring and Warnings
Fiber Status Monitoring – Fiber
Temperature, Working Voltage,
Tx /Rx Powers
Auto Event Warning – SNMP
trap, Relay, Email, Event log
(DDM: Digital Diagnostics Monitoring)
SC ST SFP
All Fiber should be monitored
for fault prevention
Troubleshooting Tools
Network “Snapshot” Comparison Tools
• Quickly Collect Switch Info
(Take Network Snapshot)
• Quickly Compare Switch Info
(Compare Network Snapshots)
Troubleshooting Tools
Event Playback
EVENT PLAYBACK
 Record network status in 30 days
 Network playback on any time/any event
 Play at 1x, 2x, or 4x speed
Troubleshooting Tools
• Speed up on-site device finding to quickly diagnosis
Switch Finder
Confidential
Troubleshooting Tools
Network Protocol Analyzer
Q&A
Thank You

Contenu connexe

Tendances

Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPanduit
 
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsIntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsPanduit
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesInductive Automation
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Panduit
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationWestermo Network Technologies
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation InfrastructurePanduit
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlInductive Automation
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...sequi_inc
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityRed Hat India Pvt. Ltd.
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substationNikandrov Maxim
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overviewali raza
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017Jiunn-Jer Sun
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan BardaTI Safe
 
ICP DAS USA Products Presentation
ICP DAS USA Products PresentationICP DAS USA Products Presentation
ICP DAS USA Products PresentationColin McLeod
 

Tendances (20)

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IP
 
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsIntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation Infrastructure
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process Control
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
 
Ap6522 ss
Ap6522 ssAp6522 ss
Ap6522 ss
 
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
ICP DAS USA Products Presentation
ICP DAS USA Products PresentationICP DAS USA Products Presentation
ICP DAS USA Products Presentation
 

En vedette

THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014 THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014 Saad El Zein
 
Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkRai University
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationZubair Nabi
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First SemesterHem Pokhrel
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Olivier Bonaventure
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devicesHarman Grewal
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer networkAshita Agrawal
 

En vedette (10)

THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014 THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014
 
Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similaire à Commissioning, Managing &amp; Troubleshooting Industrial Networks

2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation networkJose Juan Santiago Gomez
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management SystemSandesh Sonar
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsHoneywell
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overviewali raza
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds5nine
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214Mac An
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Canada
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataPrecisely
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for youCisco Canada
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate PresentationRohit Kumar
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15winiravmahida
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinChiradeep Vittal
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Gerardo Pardo-Castellote
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 

Similaire à Commissioning, Managing &amp; Troubleshooting Industrial Networks (20)

2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
LAN Security
LAN Security LAN Security
LAN Security
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 

Dernier

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Alkin Tezuysal
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...AliaaTarek5
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 

Dernier (20)

Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
Unleashing Real-time Insights with ClickHouse_ Navigating the Landscape in 20...
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
(How to Program) Paul Deitel, Harvey Deitel-Java How to Program, Early Object...
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 

Commissioning, Managing &amp; Troubleshooting Industrial Networks

  • 1. Tips for Commissioning, Managing, and Troubleshooting your Industrial Network Moxa Technology Webinar Series Richard Wood Networking Infrastructure Manager
  • 2. Agenda Industrial Network Challenges Network Configuration & Commissioning Managing Industrial Networks Troubleshooting to Minimize Downtime Tips for Commissioning, Managing & Troubleshooting Your Industrial Network
  • 3. Industrial Network Challenges • Harsh operating environments • Network availability requirements are much higher than enterprise IT • Cost of downtime is extremely high • Interoperability of industrial devices/networks • Limited networking expertise Typical challenges Source: http://www.strategiccompanies.com/pdfs/Assessing%20t he%20Financial%20Impact%20of%20Downtime.pdf
  • 5. Network Configuration & Commisioning Installation Configuration Troubleshooting Testing Commissioning Typical steps
  • 6. Unmanaged VS. Managed HARDWARE SOFTWARE APPLICATION Small Scale Network P2P Communication Mid to Large Scale Network Mission Critical Network with Remote Monitoring Packet Switching: • Entry Level Switch ASIC Packet Switching + Network Management: • Advanced Switch ASIC + • CPU + Flash / RAM Simple Data Switching Powerful Performance for Network Management POSITION Plug and Play No Configuration Required Web / CLI Setting • Network Security • Network Redundancy • Network Management • Traffic Prioritization Unmanaged Switch Managed Switch
  • 7. Network Topology Typical Enterprise Star Topology • Single point of failure • Long, costly wire/fiber runs
  • 8. Network Configuration Selecting the Right Topology for Your Needs Redundant Technology Type Mesh STP RSTP Ring/Chain HSR/PRP Feature • Every node connects to each other • IEEE 802.1D • Loop-free tree shape topology • IEEE 802.1w • Loop-free tree shape topology • Proprietary technology • Ring/Chain Topology • IEC 61850 • Dual Network (PRP) • Dual Path (HSR) Pros • Highly reliable • Self-healing • Open Protocol • Self-healing • Open Protocol • Faster recovery time: ~1 sec • Low cost • Self-healing • Faster recovery time (<20 ms) • Open protocol • Self-healing • Zero recovery time (0 ms) Cons • Too costly for large network deployment • Recovery time: ~15 sec • Recovery time not fast enough • Vendor specific technology • Prohibitively expensive unless absolutely needed Backup Link Root
  • 9. Network Topology Typical Industrial Ring Topology • No single point of failure • Reduced wiring costs
  • 10. Industrial Protocols • SCADA control / monitor PLC and field devices via industrial protocols Integration of SCADA & PLC Networks Drive I/O PLC Ethernet Switch HMI
  • 11. Network Configuration & Commissioning • Two different methodologies for configuration of network devices • Many users from the industrial side prefer web GUI • Most users for commercial/enterprise side will favor CLI – Used by Cisco Web Interface vs CLI
  • 13. Device Configuration Graphical User Interface • Visual confirmation of current settings • Menu based configuration • Standard web browser interface
  • 14. Network Management Tools Easy Configuration @ Installation Stage Efficient Monitoring @ Operation Stage Easy Backup/recovery @ Maintenance Stage Quick Troubleshooting @ Diagnostics Stage
  • 15. Mass Configuration Tools Up to 10X Productivity Boost One by One Setting by Web Batch Configuration by MXconfig Multiple Devices Wiring in Series Broadcast Search Group IP Configuration Group Redundancy Configuration Finish 400 sec 20 sec 200 sec 100 sec Total 12 min Single Power Supply Single Device Wiring IP Configuration Redundancy Configuration Repeat 100 times Finish 10 sec 30 sec 35 sec Total 125 min
  • 16. Fast Group Configuration Network (IP address) Setting Confidential IP address setting for mass devices
  • 17. Fast Group Configuration 802.1Q VLAN Setting Confidential Quick Add Panel for cloning setting *Mass 802.1Q VLAN Setting only for devices with the same model name
  • 18. Fast Configuration Deployment Copy Configuration Confidential Quick configuration copy from one specific setting to mass devices Support mass IP address setting *Copy Configuration only for devices with the same model name
  • 19. Configuration Check Status Overview Confidential Redundancy Setting Overview 802.1Q VLAN Setting Overview
  • 20. Startup Troubleshooting Confidential21 Compare a Single Device with Whole Network VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=101, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 Comparison Sample Benefit Reduce Manual Setting Errors
  • 22. Network Management & Maintenance Best Practices
  • 23. Network Management & Maintenance • Industrial NMS – Auto topology visualization – Remote device management – Real-time event management – Comprehensive performance reporting Network Management Software Confidential
  • 24. Network Management & Maintenance Efficient Visual Monitoring Virtual Device Panel Real-time Event VLAN/IGMP Visualization
  • 25. CONFIGURATION CENTER  1-click for mass configuration backup and firmware upgrade  Job scheduling for nightly configuration backup  Configuration change history Network Management & Maintenance Schedule Automatic Backups
  • 26. • One-click Backup – Only trigger ‘Reset’ button on switch to copy configuration and log files to ABC-02-USB • Files Import & Backup – Configuration import & backup – Firmware upgrade – System log backup Confidential Rotate blinking under backup Network Management & Maintenance Easy Field Backup & Recovery
  • 27. Potential Cyber Security Threats in Automation • Operations disrupted by huge number of nuisance messages on network, slowing or blocking legitimate network traffic Denial of service • Causes computer to run attacker’s programStorage modification • Replaces pieces of running program with attacker’s program Memory modification /Memory Injection / SQL injection • Attacker impersonates trusted computer, inserting itself as a middleman between trusted partner computers, modifying the messages between them to accomplish the attacker’s goals Man-in-the-Middle • Watches messages between computers to gain information about systemNetwork monitoring • Gives attacker administrative privileges on systemEscalation of privilege • Convincing users to unknowingly install malware by clicking on links, bypassing outward-directed firewallsPhishing attacks • Attackers exploit trusting, helpful impulses of plant personnel to gain information used to bypass defenses and physical modification or sabotage of control equipment Social engineering
  • 28. Past Control network security • Physical perimeter security • Air-gapping • Security through obscurity Maximize system availability • Remote access portals were added by plant engineering and vendor personnel • Often without the acknowledge or approval by IT people The security threat environment has substantially changed • Nearly all systems are directly or indirectly connected to public networks • Attackers are now aware of the possibilities of attacking control systems Cyber Security Trend of Automation Network Ref: Best practices in automation security by Murray McKay, Principal Application Engineer, Siemens Industry, Inc.
  • 29. Create a Defense-in-Depth Network Security Environment Defense in Multiple Places • Defend the Networks and Infrastructure (encryption and traffic flow security measures to resist passive monitoring) • Defend the Enclave Boundaries (deploy Firewalls and Intrusion Detection to resist active network attacks) • Defend the Computing Environment Layered Defenses • Each of these mechanisms must present unique obstacles to the adversary. • Further, each should include both “protection” and “detection” measures Confidential The Best Countermeasure against Cyber Threats
  • 30. Layered Cyber Security Solution for Automation Security Site • High-performance • 500 Mbps Security Zone • Best Cost/Performance • 300Mbps Security Cell • Best Integration • 110 Mbps
  • 31. Firmware updates • FW updates are critical to ensuring your devices are always up to date with the latest technology – Includes both technology and security updates • Many manufacturers offer free FW upgrades to ensure their customers have longevity with the products they have purhcased
  • 33. Alerts on Unmanaged Switches • While unmanaged switches generally cannot communicate status over the network, they can be simply configured to provide relay outputs for alarms such as: – Power Supply Failure – Port Break Alarms Monitoring System Changes
  • 34. Alerts & Event Logs Monitoring System Changes
  • 35. Predictive Monitoring & Alerts Comprehensive Fiber Status Monitoring and Warnings Fiber Status Monitoring – Fiber Temperature, Working Voltage, Tx /Rx Powers Auto Event Warning – SNMP trap, Relay, Email, Event log (DDM: Digital Diagnostics Monitoring) SC ST SFP All Fiber should be monitored for fault prevention
  • 36. Troubleshooting Tools Network “Snapshot” Comparison Tools • Quickly Collect Switch Info (Take Network Snapshot) • Quickly Compare Switch Info (Compare Network Snapshots)
  • 37. Troubleshooting Tools Event Playback EVENT PLAYBACK  Record network status in 30 days  Network playback on any time/any event  Play at 1x, 2x, or 4x speed
  • 38. Troubleshooting Tools • Speed up on-site device finding to quickly diagnosis Switch Finder Confidential
  • 40. Q&A