SlideShare une entreprise Scribd logo
1  sur  32
Industrial Security
Network security
Answers for industry.
Brochure
Edition
February
2014
© Siemens AG 2014
Industrial Security2
Industrial Security
That is why industrial security is so important
As the use of Ethernet connections increases all the way
down to the field level, the associated security issues are
becoming a more urgent topic for industry. After all, open
communication and the increased networking of produc-
tion systems involve not only huge opportunities, but also
high risks.
To provide an industrial plant with comprehensive securi-
ty protection against attacks, the appropriate measures
must be taken. Siemens can support you here in selective-
ly implementing these measures – within the scope of an
integrated range for industrial security.
Threat overview
1)
Industrial Control Systems (ICS)
Source:
BSI-A-CS 004 | Version 1.00 dated April 12, 2012; page 2 of 2
Note:
This list of threats was compiled in close cooperation between BSI and rep-
resentatives of the industry.
Using BSI analyses, the Federal Office for Information Security (BSI) pub-
lishes statistics and reports on current topics dealing with cyber-security.
Please direct all comments and notes to:
cs-info@bsi.bund.de
No. Threat Explanation
1 Unauthorized use of remote
maintenance access
Maintenance access provides deliberate openings to the outside in the ICS network1)
which,
however, are often inadequately protected.
2 Online attacks via
office/enterprise networks
In general, office IT equipment is connected with the Internet in many ways. Usually, there are
also network connections from the office network to the ICS network, allowing attackers to use
this route, too.
3 Attacks against standard compo-
nents used in the
ICS network
Commercial off-the-shelf (COTS) standard IT components such as operating systems, applica-
tion servers, or databases generally contain flaws and weak points which can be exploited by
attackers. If these standard components are also used in the ICS network, it increases the risk
of a successful attack on the ICS systems.
4 (D)DoS attacks (Distributed) denial of service attacks can be used to disrupt network connections and required
resources and cause systems to crash, e.g. to disrupt the functionality of an ICS.
5 Human error and sabotage Deliberate actions – regardless of whether by internal or external agents – are a massive threat
for all security goals. In addition, negligence and human error are a great danger, especially
when it comes to protecting confidentiality and availability.
6 Introduction of harmful code via
removable media and external
hardware
The use of removable media and mobile IT components by external employees always presents
a great risk of malware infections. The importance of this aspect was demonstrated by Stuxnet,
for example.
7 Reading and writing messages in
the ICS network
Because most control components at present communicate via plain-text protocols, and are
thus unprotected, it is often possible to read and insert commands without great difficulty.
8 Unauthorized access to resources In particular, insiders or follow-up attacks after intrusion from the outside have an easy time
if authentication and authorization for services and components in the process network are
non-existent or insecure.
9 Attacks on network components Network components can be manipulated by attackers, for example to carry out man-in-the-
middle attacks or to make sniffing easier.
10 Technical faults and force majeure Failures are always possible as a result of extreme environmental influences or technical de-
fects – the risk and the potential for damage can only be minimized here.
© Siemens AG 2014
Industrial Security 3
Network security as a central component of the Siemens Industrial Security concept
Siemens Industrial Security –
continuous protection for your plant
An optimum industrial security solution can only be imple-
mented if new approaches are taken because it must be con-
tinuously adapted to new threats. There is no such thing as ab-
solute security. To ensure a comprehensive and permanent so-
lution, we provide in-depth advice, partner-like cooperation,
and continuous development of our security measures and
products.
All-round, but also in-depth protection
With Defense in Depth, Siemens provides a multi-level con-
cept that offers your plant both all-round and in-depth protec-
tion. The concept is based on the components plant security,
network security, and system integrity, as recommended by
ISA 99 / IEC 62443 – the leading standard for security in indus-
trial automation. While conventional plant security defends
the plant against physical attacks, network protection and the
protection of system integrity offer protection against cyber
attacks and unauthorized access by operators or external per-
sons.
Success factor: network security
Network security means protecting automation networks from
unauthorizedaccess.Thisincludesthemonitoringofallinterfaces
such as the interfaces between office and plant networks or the
remote maintenance access to the Internet. It can be accom-
plished by means of firewalls and, if applicable, by establishing a
secureandprotected"demilitarizedzone"(DMZ).TheDMZisused
for making data available to other networks without granting di-
rect access to the automation network itself. The secure segment-
ing of the plant network into individually protected automation
cells minimizes risks and increases security. Cell division and de-
vice assignment are based on communication and protection re-
quirements. Data transmission is encrypted by means of a VPN
and is thus protected fromdata espionage and manipulation. The
communication stations are securely authenticated. The cell pro-
tectionconceptcanbeimplementedandcommunicationscanbe
secured using "Security Integrated" components such as
SCALANCE S security modules or security CPs for SIMATIC.
Initial risk assessment and information on the Internet
You want to know right now how good the security of your in-
dustrial plant is? We can provide you with detailed information
about the special security issues in your industry in a customer
consultation meeting. Use this opportunity to talk to our con-
sulting team about any open issues. Our experts will gladly
prepare a security strategy that is adapted to suit the needs of
your production plant or process infrastructure. You can
download the additional "Operational Guidelines" with many
recommendations for protecting your production plant from
our Internet site.
Detection of attacks
Patch management
Authentication/user administration
System hardening
Firewalls & VPN
Cell protection and perimeter network
Processes & guidelines
Physical access protection
Security guidelines
Defense in depth
System integrity
Network security
Plant security
Industrial security services
G_IK10_XX_10336
© Siemens AG 2014
Industrial Security4
Domain
Controller
Plant Security
System Integrity
Network Security
Factory Automation
Office Network
Production 1
SIMATIC
S7-400 with
CP 443-1
Advanced
withwith
MRP ring
Ring redundancy
manager
SCALANCE
X308-2M
Sync connection
SIMATIC
TP700
Industrial Ethernet
(Fiber optic)
SCALANCE
X308-2M
SCALANCE
S627-2M
SCALANCE
S627-2M
SCALANCE S623
SIMATIC
ET 200SP
PROFINET
SCALANCE
X204-2
SCALANCE
X204-2
Industrial Security
Network security as a factor for success
© Siemens AG 2014
Industrial Security 5
SSC
Security management
Physical protection
Production 3 Production 5Production 2
SIMOTION D4x5 with
SINAMICS S120
(Booksize)
SIMATIC S7-300 with
CP 343-1 Advanced
SIMATIC Field PG
with SOFTNET
Security Client
PC with
CP 1628
Server
Central
Archiving Server
SIMATIC
S7-1500 with
CP1543-1
Production n
SIMATIC S7-1200
with CP 1243-1
SIMATIC S7-1200
with CP 1243-1
WEB Server
Server
SIMATIC
TP1200 Comfort
SCALANCE
M874-3
GPRS/UMTS
Internet
DMZ
SCALANCE
S623
G_IK10_XX_10362
SINAMICS
G120
SIMATIC
TP700 ET 200
SIMATIC
TP700
SIMATIC
S7-1200
PROFINET
Internet
Router
Internet
Router
Secure communication, network access protection
and network segmentation with Security Integrated components
© Siemens AG 2014
Security Integrated6
Security Integrated
Cell protection concept
Industrial communication is a key factor for corporate suc-
cess – as long as the network is protected.
As a partner, Siemens provides its customers with Security
Integrated components which not only have communica-
tion functions, but also include special security functions
such as firewall and VPN functionality, in order to imple-
ment the cell protection concept.
Secure communication between components with Security Integrated in separate automation cells
Cell protection concept
With the cell protection concept, a plant network is segment-
ed into individual, protected automation cells within which all
devices are able to communicate with each other securely.
The individual cells are connected to the plant network pro-
tected by a VPN and firewall.
Cell protection reduces the susceptibility to failure of the en-
tire production plant and thus increases its availability. Securi-
ty Integrated products such as SCALANCE S, SCALANCE M and
SIMATIC S7/PC communications processors can be used for
implementing this concept.
SIMATIC S7-1500
with CP1543-1
SIMATIC S7-300
with CP343-1
Advanced
SIMATIC
S7-400 with
CP443-1
Advanced
Automation cell 4Automation cell 3Automation cell 2Automation cell 1
SIMATIC S7-1200
with CP 1243-1
PROFINETPROFINETPROFINET
Industrial Ethernet
PROFINET
G_IK10_XX_10373
© Siemens AG 2014
Security Integrated 7
The following Security Integrated products are available:
SIMATIC S7-1200 / S7-1500:
■ Protection of the controller by means of access protec-
tion (authentication) via the S7-1200/S7-1500 CPU:
– Know-how protection
– Manipulation protection
– Copy protection
– Graded security concept for HMI connection
■ Expandable access protection for S7-1200/S7-1500
(firewall) via Security CP 1243-1/CP 1543-1 by means of
– Integrated firewall (monitoring of the data flow)
– Protection against data manipulation and espionage
by means of a VPN
SIMATIC S7-300 and S7-400
■ Protection of controllers by CP 343-1 Advanced and
CP 443-1 Advanced communications processors, which
contain both firewall and VPN (virtual private network)
functionality.
SCALANCE S security modules
■ SCALANCE S modules protect industrial networks and
automation systems by means of security-related seg-
mentation (cell protection) with a firewall against
authorized access and protect data transmission with
VPN against manipulation and espionage.
Industrial PCs
■ Via the CP 1628 communications processor, industrial
PCs are protected by firewall and VPN – for secure
communication without the need for special operating
system settings. In this manner, computers equipped
with the module can be connected to protected cells.
Software
■ The SOFTNET Security Client software enables VPN
access via the Internet or a company intranet to automa-
tion cells or PCs protected by SCALANCE S or another
Security component with VPN functionality.
Remote access
■ SCALANCE M industrial routers for secure remote access
to plants via mobile networks, e.g. M874-3 via UMTS.
Security Integrated products for industrial use with special security functions to improve the security standard
SCALANCES
family
SCALANCEM
family
CP343-1Adv
CP443-1Adv
S7-1200CPU1)
S7-1500CPU
CP1243-11)
CP1543-1
CP1628
SOFTNET
SecurityClient
Configurable copy protection ●
Access protection (authentication) ●
Extended access protection (Firewall) ● ● ● ● ●
Virtual Private Network with IPSec ● ● ● ●
Manipulation protection (communication, configuration) ● ● ● ● ● ● ●
● applies 1) from CPU firmware V4.0
from STEP 7 Professional V13
© Siemens AG 2014
Security Integrated8
The security modules of the SCALANCE S range can be used to
protect all devices of an Ethernet network against unauthor-
ized access. In addition, SCALANCE S modules also protect the
data transmission between devices or network segments
(such as automation cells) against data manipulation and es-
pionage by setting up VPN tunnels; they can also be used for
secure remote access over the Internet.
The SCALANCE S security modules can be operated not only in
bridge mode, i.e. within an IP subnetwork, but also in router
mode, i.e. operated at the IP subnetwork borders.
SCALANCE S is optimized for use in automation and industrial
environments, and meets the specific requirements of auto-
mation systems such as easy upgrades of existing plants, sim-
ple installation, and minimal downtimes in the event of a
fault.
Product versions
SCALANCE S602
• Uses the Stateful Inspection Firewall to protect network
segments against unauthorized access
• Connection via 10/100/1000 Mbit/s ports
• "Ghost mode" for protection of individual, even alternating,
devices by dynamically taking over the IP address
SCALANCE S612
• Uses the Stateful Inspection Firewall to protect network
segments against unauthorized access
• Up to 128 VPN tunnels can be operated simultaneously
• Connection via 10/100/1000 Mbit/s ports
SCALANCE S623
• Uses the Stateful Inspection Firewall to protect network
segments against unauthorized access
• Up to 128 VPN tunnels can be operated simultaneously
• Connection via 10/100/1000 Mbit/s ports
• Additional RJ45 DMZ (demilitarized zone) port for secure
connection, for example, of remote maintenance modems,
laptops, or an additional network. The yellow port is pro-
tected by firewalls from the red and green ports and can
also terminate VPNs
• Redundant protection of automation cells by means of
router and firewall redundancy and stand-by mode of the
redundant device; status matching by means of synchroni-
zation cable between the yellow ports
SCALANCE S627-2M
• Uses the Stateful Inspection Firewall to protect network
segments against unauthorized access
• Up to 128 VPN tunnels can be operated simultaneously
• Connection via 10/100/1000 Mbit/s ports
• Additional RJ45 DMZ (demilitarized zone) port for secure
connection, for example, of remote maintenance modems,
laptops, or an additional network. The yellow port is pro-
tected by firewalls from the red and green ports and can
also terminate VPNs
• Redundant protection of automation cells by means of
router and firewall redundancy and stand-by mode of the
redundant device; status matching by means of synchroni-
zation cable between the yellow ports
• Two additional slots for 2-port media modules (of
SCALANCE X-300) for direct integration in ring structures
and FO networks with two additional switched red or green
ports per module
• Bridging of longer cable runs or use of existing 2-core
cables (e.g. PROFIBUS) by deploying the MM992-2VD
media modules (variable distance)
Security Integrated
Protection of automation cells with SCALANCE S modules
© Siemens AG 2014
Security Integrated 9
Connection of a local or remote service PC (by means of Internet access) via the DMZ port of the SCALANCE S623
SCALANCE S security functions
VPN (Virtual Private Networks)
(only for SCALANCE S612, S623 and SCALANCE S627-2M);
for reliable authentication (identification) of the network
stations, for encrypting data and checking data integrity.
• Authentication
All incoming data traffic is monitored and checked.
Since IP addresses can be falsified (IP spoofing), checking
the IP address (of the client access) alone is not sufficient.
In addition, client PCs may have changing IP addresses. For
this reason, authentication is performed by means of tried
and tested VPN mechanisms.
• Data encryption
Secure encryption is necessary in order to protect data
communication from espionage and unauthorized manip-
ulation. This means that the data traffic remains incompre-
hensible to any eavesdropper in the network. The
SCALANCE Security Module establishes VPN tunnels to
other security modules for this purpose.
Firewalls
Can be used as an alternative or to supplement VPN with flexi-
ble access control. Firewalls filter data packets and disable or
enable communication links in accordance with the filter list
and stateful inspection.
Both incoming and outgoing communication can be filtered, ei-
ther according to IP and MAC addresses as well as communica-
tion protocols (ports), or user-specifically.
• Logging
Access data is stored by the Security Module in a log file.
This ensures both identification of how, when and by
whom data has been accessed as well as facilitating identi-
fication of access attempts, thus ensuring that appropriate
preventative measures can be taken.
Configuration
Configuration is carried out using the Security Configuration
Tool (SCT), which enables all SIMATIC NET security products to
be configured and diagnosed from a central position. All the
configuration data can be saved on the optional C-PLUG swap
media (not included in scope of supply) so that the Security
Module can be replaced quickly in the event of a fault, without
the need for a programming device.
Local
service PC Remote
service PC
with SOFTNET
Security Client
Service access
Plant network/
secure automation cell
Company network
InternetSCALANCE
S623Industrial Ethernet
G_IK10_XX_10303
Internet
Router
Internet
Router
Advantages at a glance
■ High level of IT security for machines and plants thanks
to implementation of the cell protection concept
■ System-widenetworkdiagnosticsthankstointegration
into IT infrastructures and network management
systems by means of SNMP
■ Simple remote maintenance via the Internet by means
of PPPoE and DNS using dynamic IP addresses
■ Easy integration into existing networks without
reconfiguring terminal nodes or setting up new IP
subnetworks
■ Module replacement without the need for a program-
ming device, using the C-PLUG swap media for backing
up the configuration data
© Siemens AG 2014
Security Integrated10
Secure remote access without direct connection to the automation network with SCALANCE S623
Task
A system integrator requires secure Internet access to their ma-
chine, or part of an end user's plant, for servicing purposes. But
they should only be given access to specific devices and not the
plant network. In addition, a secured connection is to be set up
from the system to a remote station using mobile networks
(e.g. UMTS).
Solution
Starting points are, for example, system integrator with VPN
client (SOFTNET Security Client, CP 1628, SCALANCE M874-3)
End point (automation system):
SCALANCE S623 as VPN server
• Red port: connection to plant network
• Yellow port: connection of Internet modem/router
• Green port: connection to protected cell
SSC
Automation Cell 1Automation Cell n-1Automation Cell n
Internet
router
Plant network
Automation Applications
Automation plant
Remote stations
SIMATIC
Field PG with
SOFTNET
Security
Client
VPN
tunnel
VPN
tunnel
G_IK10_XX_10339
SCALANCE
S623
PROFINETPROFINETPROFINET
Industrial Ethernet
Security
Module
SCALANCE S
Security
Module
SCALANCE S
...
Internet
Router
SCALANCE
M874-3
SIMATIC
S7-1200
GPRS/UMTS
Internet
Advantages at a glance
■ Secure remote access via Internet or mobile
networks such as UMTS by safeguarding
the data transmission with VPN (IPSec)
■ Restriction of access possibilities with
integrated firewall function
■ Secure remote access to plant units without direct
access to the plant network with SCALANCE S623
3-port firewall
Security Integrated
Application examples with SCALANCE S modules
© Siemens AG 2014
Security Integrated 11
Setup of a demilitarized zone (DMZ) using SCALANCE S623
Task
Network participants or servers (e.g. MES servers) should be
accessible both from the secure and non-secure network with-
out a direct connection between the networks.
Solution
A DMZ can be set up at the yellow port by means of a
SCALANCE S623. The servers can be positioned in this DMZ.
Office Network Untrusted Zone
DMZ Zone
Data base
server
Server with web
application
limited accessblocked accesspermitted access
Trusted Zone
G_IK10_XX_10340
SCALANCE
S623
Domain
Controller
Advantages at a glance
■ Secure data exchange through the use of a
"demilitarized zone" for the exchange of data
between corporate and plant network using a
SCALANCE S623 3-port firewall
■ Protection of automation networks against
unauthorized access at the network boundaries
© Siemens AG 2014
Security Integrated12
Secure, redundant connection between two MRP rings with SCALANCE S627-2M
Task
Two rings should be securely and redundantly connected to one
another.
Solution
Ring A is connected to the ports of the first media module (red
ports) and Ring B with the ports of the second media module
(green ports) using SCALANCE S627-2M.
S627-2M functions as a router and firewall. A second
SCALANCE S627-2M is likewise connected and operates in
stand-by mode. In order to match the firewall status between
the two SCALANCE S modules, the yellow ports are coupled by
means of a synchronization cable.
MRP ring A
MRP ring B
Ring redundancy
manager
Ring redundancy
manager
CU or fiber optic
Sync connection
Industrial Ethernet
(Fiber optic)
Industrial Ethernet
SCALANCE S627-2MSCALANCE S627-2M
G_IK10_XX_10366
Advantages at a glance
■ Secure redundant coupling of redundant rings
■ Control of data communication between
redundant rings
■ High availability due to redundant design of the
SCALANCE S627-2M
Security Integrated
Application examples with SCALANCE S modules
© Siemens AG 2014
Security Integrated 13
Secure, redundant connection of an automation cell to a redundant ring with SCALANCE S627-2M
Task
An automation cell is to be connected securely and redundantly
to a higher-level ring.
Solution
The ring is connected to the ports of the first media module
(red ports) and the lower-level cell with the ports of the sec-
ond media module (green ports) using SCALANCE S627-2M.
A second SCALANCE S627-2M is likewise connected and oper-
ates in stand-by mode. In order to match the firewall status
between the two SCALANCE S modules, the yellow ports are
coupled by means of a synchronization cable.
Alternative:
The ring is coupled with the red RJ45 port and the lower-level
automation cell is connected to the ports of the second media
module (green ports) using SCALANCE S627-2M. A second
SCALANCE S627-2M is likewise connected and operates in
stand-by mode. In order to match the firewall status between
the two SCALANCE S modules, the yellow ports are coupled by
means of a synchronization cable.
MRP ring
Ring redundancy manager
MRP ring
Ring redundancy manager
Automation Cell
Automation Cell
CU or fiber opticSync connection
CU or fiber optic
Sync connection Industrial Ethernet
(Fiber optic)
Industrial Ethernet
SCALANCE S627-2MSCALANCE S627-2M
MRP-Switch
CU
SCALANCE S627-2MSCALANCE S627-2M
G_IK10_XX_10367
Advantages at a glance
■ Secure redundant connection of an automation cell
to a higher-level ring
■ Control of the data communication between a
redundant ring and a lower-level automation cell
■ High availability due to redundant design of the
SCALANCE S627-2M
© Siemens AG 2014
Security Integrated14
Secure, redundant connection of a redundant ring to a plant network with SCALANCE S627-2M
Task
The ring is to be securely and redundantly connected to the
plant network.
Solution
The ring is connected to the ports of the second media module
(green ports) and the production network with the ports of the
first media module (red ports) using SCALANCE S627-2M.
A second SCALANCE S627-2M is likewise connected and oper-
ates in stand-by mode. In order to match the firewall status be-
tween the two SCALANCE S modules, the yellow ports are cou-
pled by means of a synchronization cable.
Alternative:
The ring is connected to the ports of the second media mod-
ule (green ports) and the production network with the red
RJ45 port using SCALANCE S627-2M.
A second SCALANCE S627-2M is likewise connected and oper-
ates in stand-by mode. In order to match the firewall status
between the two SCALANCE S modules, the yellow ports are
coupled by means of a synchronization cable.
MRP ring
Ring redundancy manager
MRP ring
Ring redundancy manager
CU or fiber optic
Sync connection
CU or fiber optic
Sync connection
MRP-Switch
CU
SCALANCE S627-2MSCALANCE S627-2M
G_IK10_XX_10368
SCALANCE S627-2MSCALANCE S627-2M
Industrial Ethernet
(Fiber optic)
Industrial Ethernet
Advantages at a glance
■ Secure redundant connection of a redundant ring
to the plant network
■ Control of data communication between
plant network and redundant ring
■ High availability due to redundant design of the
SCALANCE S627-2M
Security Integrated
Application examples with SCALANCE S modules
© Siemens AG 2014
Security Integrated 15
SCALANCE M874
SCALANCE M874-3 and SCALANCE M874-2 are mobile wire-
less routers for cost-effective and secure connection of Ether-
net-based subnets and programmable controllers via UMTS
(3rd generation mobile network) or GSM (2nd generation mo-
bile network).
SCALANCE M874-3
Supports HSPA+ (High Speed Packet Access) and allows high
transfer rates of up to 14.4 Mbit/s in the downlink and up to
5.76 Mbit/s in the uplink (depending on the infrastructure of
the mobile wireless provider).
SCALANCE M874-2
Supports GPRS (General Packet Radio Service) and EDGE
(Enhanced Data Rates for GSM Evolution).
Protects against unauthorized access and offers data transmis-
sion via the Integrated Security functions Firewall and VPN
(IPSec).
SCALANCE M875
The SCALANCE M875 UMTS router offers IP routing, stateful
inspection firewall, and a VPN gateway to protect lower-level
devices from security risks such as manipulation or espionage.
SCALANCE M875 has obtained type approval as a vehicle
component in accordance with directive 72/245/EEC in its
2009/19/EC version and type approval for use on rail vehicles
in accordance with EN 50155.
Secure access to plant sections via mobile networks
© Siemens AG 2014
Security Integrated16
VPN for secure remote maintenance with SCALANCE M874
Task
Conventional applications such as remote programming, pa-
rameterization and diagnostics, but also monitoring of ma-
chines and plants installed worldwide, should be performed
by a service center that is connected over the Internet.
Solution
Any IP-based devices and particularly automation devices that
are downstream of the SCALANCE M875 or SCALANCE M874 in
the local network can be accessed. Multimedia applications
such as video streaming can also be implemented due to the in-
creased bandwidth in the uplink. The VPN functionality allows
the secure transfer of data around the world.
S7-1500 with
CP 1543-1IP camera
S7-300 with
CPU 315-2 DP
and CP 343-1
Lean
Service Center
VPN
tunnel 1
VPN tunnel 2
Remote Station 1
Remote Station 2
Service PC with
Software SOFTNET
Security Client
Mobile radio
Internet
router
Internet
router
Industrial Ethernet
Internet
PROFIBUS
Industrial Ethernet
G_IK10_XX_30188
SCALANCE
M874-3
SCALANCE
M874-2
SCALANCE
S612
Advantages at a glance
■ Low investment and operating costs for secure
remote access to machines and plants
■ Reduced travel costs and telephone charges thanks
to remote programming and remote diagnostics via
3G/UMTS
■ User-friendly diagnostics via Web interface
■ Short transmission times thanks to high transmission
rates with HSDPA and HSUPA
■ Protection by integrated firewall and VPN
■ Utilization of existing (3G)UMTS infrastructure of
mobile network providers
■ Simple planning and commissioning of telecontrol
substations without the need for special radio expertise
■ Worldwide availability thanks to UMTS/GSM (quad
band) technology; observe national regulations
Security Integrated
Secure access to plant sections via mobile networks
© Siemens AG 2014
Security Integrated 17
CP 1243-1
The CP 1243-1 communications processor securely connects
the SIMATIC S7-1200 controller to Ethernet networks.
With its integrated security functions of firewall (Stateful
Inspection) and VPN protocol (IPSec), the communications
processor protects S7-1200 stations and lower-level networks
against unauthorized access, and protects the data transmis-
sion against manipulation and espionage by means of encryp-
tion.
Furthermore, the CP can also be used for integrating the
S7-1200 station into the TeleControl Server Basic control center
software via IP-based remote networks.
Protection of an S7-1200 and lower-level automation cell with CP1243-1
Task
Communication between the automation network and lower-
level networks with S7-1200 is to be secured by means of ac-
cess control.
Solution
The CP 1243-1 is placed upstream of the automation cells to be
protected in the rack of the S7-1200. In this way, the communi-
cation to and from the S7-1200 and the lower-level automation
cell is restricted to the permitted connections with the aid of
firewall rules and, if necessary, protected against manipulation
or espionage by setting up VPN tunnels.
SIMATIC S7-1200
with CP 1243-1
Production
Mobile TeleserviceEngineering control center
Industrial
Ethernet
Industrial Ethernet
G_IK10_XX_10371
Field PG
TIA Portal
Engineering
LAN
ET 200
SIMATIC
TP700
SIMATIC
S7-1200
PROFINET
Advantages at a glance
■ Secure connection of the SIMATIC S7-1200 to
Industrial Ethernet by means of integrated Stateful
Inspection Firewall and VPN
■ Can be used in an IPv6-based infrastructure
■ Connection to control centers with TeleControl
Server Basic
Protection of controllers through communications processors
© Siemens AG 2014
Security Integrated18
CP 1543-1
The CP 1543-1 communication processor securely connects
the SIMATIC S7-1500 controller to Ethernet networks.
With its integrated security functions of firewall (Stateful In-
spection), VPN protocol (IPSec) and protocols for data encryp-
tion such as FTPS and SNMPv3, the communications processor
protects S7-1500 stations and lower-level networks against
unauthorized access, as well as protecting data transmission
against manipulation and espionage by means of encryption.
Segmentation of networks and protection of the S7-1500 with CP1543-1
Task
Communication between the automation network and lower-
level networks with S7-1500 is to be secured by means of ac-
cess control.
Solution
The CP 1543-1 is placed in the rack of the S7-1500, upstream
of the automation cells to be protected. In this way, the com-
munication to and from the S7-1500 and the lower-level auto-
mation cell is restricted to the permitted connections with the
aid of firewall rules and, if necessary, protected against manip-
ulation or espionage by setting up VPN tunnels.
Automation Cell
SIMATIC
S7-1500 with
CP 1543-1
S7-300 with
CP 343-1 Lean
Automation Cell
SIMATIC
S7-1500 with
CP 1543-1
S7-300 with
CP 343-1 Lean
PROFINET
SINAMICS
ET 200S
Industrial
Ethernet
Industrial Ethernet
G_IK10_XX_10350
TIA Portal Field PG
PROFINET
SINAMICS
ET 200S
Industrial
Ethernet
Advantages at a glance
■ Secure connection of the SIMATIC S7-1500 to Industrial
Ethernet by means of integrated Stateful Inspection
Firewall and VPN
■ Additional communication options:
File transfer and e-mail
■ Can be used in an IPv6-based infrastructure
Security Integrated
Protection of controllers through communications processors
© Siemens AG 2014
Security Integrated 19
CP 343-1 Advanced and CP 443-1 Advanced
Alongside the familiar communication functions, an integrat-
ed switch, and Layer 3 routing functionality, the Industrial
Ethernet communications processors, CP 343-1 Advanced and
CP 443-1 Advanced for SIMATIC S7-300 or S7-400, contain
Security Integrated with a Stateful Inspection Firewall and a
VPN gateway to protect the controller and lower-level devices
against security risks.
Task
Communication between the office level administration sys-
tem and lower-level networks of the automation level is to be
secured by means of access control.
Solution
CP 343-1 Advanced and CP 443-1 Advanced are placed up-
stream of the automation cells to be protected. This limits
communication to the permitted connections with the aid of
firewall rules.
Advantages at a glance
■ Firewall, VPN gateway, and CP in one device:
With the latest generation of Advanced CPs and for
the same price as the predecessor version, the user
gets the integrated security functions of firewall and
VPN for implementing a protected automation cell
and for protecting data transmission.
■ Secure communication integration: The CP is easily
configured with STEP 7; VPN tunnels can be set up
between the CPs themselves or to the SCALANCE S
security appliance, the SOFTNET Security Client VPN
software, the secure CP 1628 PC module, and the
SCALANCE M mobile wireless router.
Particularly users already employing Advanced CPs will find
it simple to set up secure networks. All CP 343-1 Advanced
and CP 443-1 Advanced users get Security Integrated and
do not need any separate hardware or special tools besides
SIMATIC S7 to configure the security of industrial plants.
© Siemens AG 2014
Security Integrated20
Segmentation of networks and protection of the S7-300 or S7-400 controllers with CP 343-1 Advanced or CP 443-1 Advanced
PC with management system
and database (e.g. Oracle)
SIMATIC
S7-300 with
CP 343-1
Advanced
SIMATIC
S7-400 with
CP 443-1
Advanced
G_IK10_XX_10337
Field PG
ET
200S
ET
200S
PROFINET
Industrial Ethernet
PROFINET
Industrial Ethernet
Security Integrated
Protection of controllers through communications processors
© Siemens AG 2014
Security Integrated 21
CP 1628
Via the CP 1628 Industrial Ethernet communications processor,
industrial PCs are protected by firewall and VPN – for secure com-
munication without special operating system settings. In this
manner,computersequippedwiththemodulecanbeconnected
to protected cells.
The CP 1628 makes it possible to connect SIMATIC PG/PC
and PCs with PCI Express slots to Industrial Ethernet
(10/100/1000 Mbit/s). Additional field devices can be flexibly
connected to Industrial Ethernet via the integrated switch.
Along with the automation functions familiar from CP 1623, the
communicationsprocessoralso containsSecurityIntegrated,com-
prising a Stateful Inspection Firewall and a VPN gateway to protect
the PG/PC systems against security risks.
Advantages at a glance
■ Firewall, VPN gateway, and CP in one device: This new
product version offers users an integrated, fully-fledged
security module that protects the PC from manipulation
and unauthorized access.
■ Secure communication integration:
The CP is easily configured using STEP 7/NCM PC
(V5.5 SP3 or higher) or TIA Portal (V12 SP1 or higher).
© Siemens AG 2014
Security Integrated22
Secure redundant connection to CP 1628 and CP 443-1 Advanced
Task
Protection for the redundant connections between a PC sys-
tem and the S7-400H controllers in a high-availability plant.
Solution
VPN tunnels are set up between the security communications
processors CP 1628 and CP 443-1 Advanced, which allow the
secure transmission of the H communication. In addition, the
CP 1628 protects the PC system from unauthorized access by
means of its integrated firewall.
PC with 4 x CP 1628 and
HARDNET-IE S7-REDCONNECT
(ISO on TCP)
S7-400H with
CP 443-1
Advanced
S7-400H with
CP 443-1
Advanced
S7-400H with
CP 443-1
Advanced
S7-400H with
CP 443-1
Advanced
VPN tunnel
Internet
router Internet router
Control center
SIMATIC PCS 7 Client
PROFINET
Industrial Ethernet
Terminalbus (Ethernet)
Industrial Ethernet
G_IK10_XX_10354
PROFIBUS
Internet
Security Integrated
Protection of controllers through communications processors
© Siemens AG 2014
Security Integrated 23
Product type
designation SCALANCE S602 SCALANCE S612 SCALANCE S623 SCALANCE S627-2M
Article No. 6GK5602-0BA10-2AA3 6GK5612-0BA10-2AA3 6GK5623-0BA10-2AA3 6GK5627-2BA10-2AA3
Transmission rate
Transfer rate 1 / 2 / 3 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s
Ports
Electrical connection
■ for internal network
■ for external network
■ for DMZ
■ for signaling contact
■ for power supply
C-PLUG swap media
1 x RJ45 port
1 x RJ45 port
–
1 x 2-pole terminal block
1 x 4-pole terminal block
Yes
1 x RJ45 port
1 x RJ45 port
–
1 x 2-pole terminal block
1 x 4-pole terminal block
Yes
1 x RJ45 port
1 x RJ45 port
1 x RJ45 port
1 x 2-pole terminal block
1 x 4-pole terminal block
Yes
3 x RJ45 ports + media module
3 x RJ45 ports + media module
1 x RJ45 port
1 x 2-pole terminal block
1 x 4-pole terminal block
Yes
Supply voltage, current consumption, power loss
Supply voltage, external
Range
24 V DC
19.2 V ... 28.8 V DC
24 V DC
19.2 V ... 28.8 V DC
24 V DC
19.2 V ... 28.8 V DC
24 V DC
19.2 V ... 28.8 V DC
Permissible ambient conditions
Ambient temperature
■ during operation
■ during storage
■ during transportation
Degree of protection
-40 °C ... +60 °C
-40 °C ... +80 °C
-40 °C ... +80 °C
IP20
-40 °C ... +60 °C
-40 °C ... +80 °C
-40 °C ... +80 °C
IP20
-40 °C ... +60 °C
-40 °C ... +80 °C
-40 °C ... +80 °C
IP20
-40 °C ... +60 °C
-40 °C ... +70 °C
-40 °C ... +70 °C
IP20
Design, dimensions, and weight
Design
Width / height / depth
Net weight
Compact
60 mm / 125 mm / 124 mm
0.8 kg
Compact
60 mm / 125 mm / 124 mm
0.8 kg
Compact
60 mm / 125 mm / 124 mm
0.81 kg
Compact
120 mm / 125 mm / 124 mm
1.3 kg
Product function: Security
Firewall configuration
Product function in
VPN connection
Product function
■ Password protection
■ Restricted bandwidth
■ NAT/NAPT
Encryption algorithms
Authentication procedure
Hashing algorithms
Stateful inspection
–
Yes
Yes
Yes
–
–
–
Stateful Inspection
IPSec
Yes
Yes
Yes
AES-256, AES-192,
AES-128, 3DES-168, DES-56
Preshared key,
X.509v3 certificates
MD5, SHA-1
Stateful inspection
IPSec
Yes
Yes
Yes
AES-256, AES-192,
AES-128, 3DES-168, DES-56
Preshared key,
X.509v3 certificates
MD5, SHA-1
Stateful Inspection
IPSec
Yes
Yes
Yes
AES-256, AES-192,
AES-128, 3DES-168, DES-56
Preshared key,
X.509v3 certificates
MD5, SHA-1
Technical data at a glance
© Siemens AG 2014
Security Integrated24
Product type designation SCALANCE M874-2/M874-3 SCALANCE M875
Article No. 6GK5874-2AA00-2AA2
6GK5874-3AA00-2AA2
6GK5875-0AA10-1AA2
Transmission rate
1 for Industrial Ethernet / 2 for Industrial Ethernet
for GSM transmission
for GPRS transmission
for eGPRS transmission
for UMTS transmission
10 Mbit/s / 100 Mbit/s
–
max. 42.8/85.6 kbit/s uplink/downlink
max. 118/236.8 kbit/s uplink/downlink
max. 5.76/14.4 Mbit/s uplink/downlink
(for M874-3 only)
10 Mbit/s / 100 Mbit/s
9 600 bit/s
max. 42.8/85.6 kbit/s uplink/downlink
max. 118/236.8 kbit/s uplink/downlink
max. 5.76/14.4 Mbit/s uplink/downlink
Ports
Electrical connection
■ for network components/terminal equipment
■ for external antenna(s)
■ for power supply
RJ45 port (10/100 Mbit/s, TP, autocrossover)
SMA antenna sockets (50 ohms)
RJ45 port (10/100 Mbit/s, TP, autocrossover)
SMA antenna sockets (50 ohms)
Terminal strip
Supply voltage, current consumption, power loss
Supply voltage
Range 12 V ... 28.8 V DC 12 V ... 30 V DC
Permissible ambient conditions
Ambient temperature
■ during operation
■ during storage
Degree of protection
-20 °C ... +60 °C
-40 °C ... +85 °C
IP20
-40 °C ... +75 °C
-40 °C ... +85 °C
IP20
Design, dimensions, and weight
Design
Width / height / depth
Net weight
Compact
35 mm / 147 mm / 127 mm
–
Compact
45 mm / 99 mm / 114 mm
280 g
Product function: Security
Firewall configuration
Product function
■ Password protection
■ Packet filter
Suitability for VPN use
Product function in VPN connection
Number of possible connections in the case of VPN
connection
Type of authentication for VPN PSK
Protocol is supported, IPsec tunnel and transport mode
Key length
■ for IPsec DES for VPN
■ 1 for IPsec AES for VPN
■ 2 for IPsec AES for VPN
■ 3 for IPsec AES for VPN
Type of Internet key exchange for VPN main mode
Key length for IPsec 3DES for VPN
Type of Internet key exchange for VPN quick mode
Type of packet authentication for VPN
Stateful Inspection
Yes
Yes
Yes
Yes
10
Yes
Yes
56 bit
128 bit
192 bit
256 bit
Yes
168 bit
Yes
MD5, SHA-1
Stateful Inspection
Yes
Yes
Yes
Yes
10
Yes
Yes
56 bit
128 bit
192 bit
256 bit
Yes
168 bit
Yes
MD5, SHA-1
Security Integrated
Technical data at a glance
© Siemens AG 2014
Security Integrated 25
Product type designation CP 1243-1 CP 1543-1
Article No. 6GK7243-1BX30-0XE0 6GK7543-1AX00-0XE0
Transmission rate
■ at interface 1 / 2 10 … 100 Mbit/s / – 10 … 1 000 Mbit/s / –
Ports
Electrical connection
■ to interface 1 according to IE
■ to interface 2 according to IE
■ for power supply
C-PLUG swap media
1 x RJ45 port
–
–
–
1 x RJ45 port
–
–
–
Supply voltage, current consumption, power loss
Supply voltage
■ 1 from backplane bus
■ External
5 V DC
–
15 V DC
–
Permissible ambient conditions
Ambient temperature
■ during operation
- when installed vertically
- when installed horizontally
■ during storage
■ during transportation
Degree of protection
-20 °C +60 °C
-20 °C … +70 °C
-40 °C … +70 °C
-40 °C … +70 °C
IP20
0 °C … +40 °C
0 °C … +60 °C
-40 °C … +70 °C
-40 °C … +70 °C
IP20
Design, dimensions, and weight
Module format
Width / height / depth
Net weight
Compact S7-1200, single width
30 mm / 110 mm / 75 mm
0.122 kg
Compact S7-1500, single width
35 mm / 142 mm / 129 mm
0.35 kg
Product function: Security
Firewall configuration
Product function in VPN connection
Type of encryption algorithms for
VPN connection
Type of authentication algorithms for VPN
connection
Type of hashing algorithms for VPN connection
Number of possible connections
in the case of VPN connection
Product function
■ Password protection for Web applications
■ ACL – IP-based
■ ACL – IP-based for PLC/routing
■ Deactivation of non-required services
■ Blocking of communication via
physical ports
■ Log file for unauthorized access
Stateful Inspection
IPSec
AES-256, AES-192, AES-128, 3DES-168
Preshared key (PSK), X.509v3 certificates
MD5, SHA-1
8
No
No
No
Yes
No
No
Stateful Inspection
IPSec
AES-256, AES-192, AES-128, 3DES-168,
DES-5
Preshared key (PSK), X.509v3 Certificates
MD5, SHA-1
16
No
No
No
Yes
No
Yes
© Siemens AG 2014
Security Integrated26
Product type designation CP 343-1 Advanced CP 443-1 Advanced
Article No. 6GK7343-1GX31-0XE0 6GK7443-1GX30-0XE0
Transmission rate
■ at interface 1 / 2 10 ... 1000 Mbit/s / 10 ... 100 Mbit/s 10 ... 1000 Mbit/s / 10 ... 100 Mbit/s
Ports
Electrical connection
■ to interface 1 according to IE
■ to interface 2 according to IE
■ for power supply
C-PLUG swap media
1 x RJ45 port
2 x RJ45 ports
2-pole plug-in terminal strip
Yes
1 x RJ45 port
4 x RJ45 ports
–
Yes
Supply voltage, current consumption, power loss
Supply voltage
■ 1 from backplane bus
■ External
5 V DC
24 V DC
5 V DC
–
Permissible ambient conditions
Ambient temperature
■ during operation
- when installed vertically
- when installed horizontally
■ during storage
■ during transportation
Degree of protection
0 °C … +40 °C
0 °C … +60 °C
-40 °C ... +70 °C
-40 °C ... +70 °C
IP20
0 °C … +60 °C
–
–
-40 °C ... +70 °C
-40 °C ... +70 °C
IP20
Design, dimensions, and weight
Module format
Width / height / depth
Net weight
Compact
80 mm / 125 mm / 120 mm
0.8 kg
Compact S7-400, single width
25 mm / 290 mm / 210 mm
0.7 kg
Product function: Security
Firewall configuration
Product function in VPN connection
Type of encryption algorithms for
VPN connection
Type of authentication algorithms for VPN
connection
Type of hashing algorithms for VPN connection
Number of possible connections
in the case of VPN connection
Product function
■ Password protection for Web applications
■ ACL – IP-based
■ ACL – IP-based for PLC/routing
■ Deactivation of non-required services
■ Blocking of communication via physical ports
■ Log file for unauthorized access
Stateful Inspection
IPSec
AES-256, AES-192, AES-128, 3DES-168,
DES-56
Preshared key (PSK), X.509v3 certificates
MD5, SHA-1
32
Yes
Yes
Yes
Yes
Yes
No
Stateful Inspection
IPSec
AES-256, AES-192, AES-128, 3DES-168,
DES-56
Preshared key (PSK), X.509v3 certificates
MD5, SHA-1
32
Yes
Yes
Yes
Yes
Yes
No
Security Integrated
Technical data at a glance
© Siemens AG 2014
Security Integrated 27
Product type designation CP 1628 SOFTNET Security Client
Article No. 6GK1162-8AA00 6GK1704-1VW04-0AA0
Ports
Electrical connection
■ to interface 1 according to IE
■ of the backplane bus
■ for power supply
2 x RJ45 port
PCI Express x1
1 x 2-pole terminal block
Supply voltage, current consumption, power loss
Type of power supply voltage
Optional external supply
Supply voltage
■ 1 from backplane bus
■ 2 from backplane bus
■ external
■ range
DC
Yes
3.3 V
12 V
24 V
10.5 V ... 32 V
Permissible ambient conditions
Ambient temperature
■ during operation
■ during storage
■ during transportation
+5 °C ... +55 °C
-20 °C ... +60 °C
-20 °C ... +60 °C
Design, dimensions, and weight
Module format
Width / height / depth
Net weight
PCI Express x1 (half length)
18 mm / 111 mm / 167 mm
0.124 kg
Product function: Security
Firewall configuration
Product function in VPN connection
Type of encryption algorithms for
VPN connection
Type of authentication algorithms for VPN
connection
Type of hashing algorithms for VPN connection
Number of possible connections
in the case of VPN connection
Maximum number of usable IP addresses on VPN
connection
Stateful Inspection
IPSec
AES-256, AES-192, AES-128, 3DES-168,
DES-56
Preshared key (PSK), X.509v3 certificates
MD5, SHA-1
64
16
–
IPSec
AES-256, AES-192, AES-128, 3DES-168,
DES-56
Preshared key (PSK), X.509v3 certificates
MD5, SHA-1
Unlimited or depending on computer config-
uration
Depends on computer configuration
© Siemens AG 2014
Industrial Security28
The merge of data systems in the production and office envi-
ronments has made many processes faster and easier, while the
use of the same data processing programs creates synergies.
This development, however, also increases risks to security.
Today it is no longer just the office environment that is under
threat from viruses, trojans, hackers, etc., but production
plants are also at risk of malfunctions and data loss. Many
weak spots in security are not obvious at first glance. For this
reason, it is advisable to check existing plants in regard to se-
curity and to optimize them in order to maintain a higher level
of plant availability. To enhance the security of a plant against
cyber attacks, a multi-level service concept for Industrial Secu-
rity is available from Siemens Industry.
The first step involves "assessment" – the initial examination
of the existing plant. This identifies weak spots or deviations
from standards. The result of this examination is a detailed re-
port about the actual status of the plant with a description of
the weak points and an assessment of the risks. The report
also contains suggested actions for improving the level of
security.
In the second stage of "implementation", the measures
defined in the assessment are implemented, i.e.:
• Training:
Personnel are given specific training so that they under-
stand what IT and infrastructure security means in the
industrial environment.
• Process improvement:
Security-relevant regulations and guidelines relating to
the existing plant requirements are drawn up and imple-
mented.
• Security technologies:
Protective measures are implemented for hardware and
software, as well as in the plant network, in addition
longterm protection through monitoring is available.
The measures defined and implemented in the first two phases
are continuously developed in the third phase of "operation
and management", i.e. monitoring the security status of the
plant, checking the security level, redefining and optimizing ac-
tions, as well as regular reports and functions such as updates,
backup and restore. Even if changes are made to the plant net-
work, the software environment or the administration of access
rights for users and administrators, the services increase the se-
curity level so that the corresponding data remains in the plant
and attackers are given minimal opportunities to compromise
the plant. The phases of implementation, operation and man-
agement are tailored precisely to meet the existing needs.
Industrial Security
Industrial security services
© Siemens AG 2014
Industrial Security 29
Know your security
posture and develop
a security roadmap
Step 1:
Assess
Provide continuous protection
through proactive defense
Step 3:
Operate &
Manage
Engineering, design and
implementation of a holistic
cyber security program
Step 2:
Implement
Cyber security training
Development of security
policies and procedures
Implementation of security
technology
Global threat intelligence
Incident detection and
remediation
Timely response to the
changing threat landscape
Vulnerability assessment
Threat assessment
Risk analysis
G_IK10_XX_10376
Advantages at a glance
■ Determination of the security level and, based on this,
drawing up a plan of action for reducing the risks
■ Specific training for building up technical knowledge
■ Tightened plant security through coordinated
processes and specifications
■ Implementation of a comprehensive security solution
for protecting the automation system
■ Connection to a Managed Service Center for continu-
ous monitoring of the security status of the plant
■ Continuous monitoring of the security status of the
plant
■ Detection of incidents and adaptation of the environ-
ment to deal with threat situations
■ Plant kept state-of-the-art by means of updates
(patterns, patches, signatures).
© Siemens AG 2014
Industrial Security30
Industrial Security
Terms, definitions
DDNS
The Dynamic Domain Name System is an IT system that can
update domain name entries.
Demilitarized Zone (DMZ)
A demilitarized zone or DMZ denotes a computer network
with security monitoring of the ability to access the connected
servers.
The systems in the DMZ are shielded by one or more firewalls
against other networks (such as Internet, LAN). This separation
can allow access to publicly available services (e.g. email)
while allowing the internal network (LAN) to be protected
against unauthorized access. The point is to make computer
network services available to both the WAN (Internet) and the
LAN (intranet) on the most secure basis possible.
A DMZ's protective action works by isolating a system from
two or more networks.
Firewalls
Security modules that allow or block data communication be-
tween interconnected networks according to specified securi-
ty restrictions. Firewall rules can be configured for this. It is
thus possible to specify that only a particular PC may access a
given controller, for example.
Port security
The access control function allows individual ports to be
blocked for unknown nodes. If the access control function is
enabled on a port, packets arriving from unknown MAC ad-
dresses are discarded immediately. Only packets arriving from
known nodes are accepted.
RADIUS: External authentication server
The concept of RADIUS is based on an external authentication
server. An end device can only access the network after the In-
dustrial Ethernet switch has verified the logon data of the de-
vice with the authentication server. Both the end device and
the authentication server must support the Extensive Authen-
tication Protocol (EAP).
System hardening
The system hardening package closes interfaces and ports
that are not required, thereby reducing the vulnerability of the
network to external and internal attacks. Every level of an au-
tomation system is considered: the control system, network
components, PC-based systems, and programmable logic con-
trollers.
Virtual private networks (VPN)
A "VPN tunnel" connects two or more network stations (e.g.
security modules) and the network segments behind them. En-
crypting the data within this tunnel makes it impossible for third
parties to listen in on or falsify the data when it is transmitted
over an insecure network (e.g. the Internet).
Virtual LANs (VLAN)
The special feature of a VLAN: Devices can be assigned by con-
figuration to a device group, irrespective of their physical loca-
tion. In doing so, several of these device groups share a single
physical network infrastructure. The result is several "virtual
networks" on the same physical network. Data communica-
tion takes place only within a VLAN.
Whitelisting
Whether it's for individuals, companies, or programs:
A whitelist– or positive list – refers to a collection of identical
elements that are consideredtrustworthy. WhitelistingforPCs en-
suresthatonlythoseprograms that are actu-
allyrequiredcanbeexecuted.
© Siemens AG 2014
31
Follow us on:
twitter.com/siemensindustry
youtube.com/siemens
Industrial
Security –
take a look!
Get the full Industrial Security
experience:
■ An overview of our security products
and services
■ The latest innovations from the field
of Industrial Security
© Siemens AG 2014
Get more information
Information material available for downloading:
www.siemens.com/automation/infocenter
Service & Support:
www.siemens.com/automation/servive&support
SIMATIC NET contacts:
www.siemens.com/automation/partner
Industry Mall for electronic ordering:
www.siemens.com/industrymall
The information provided in this brochure contains merely general
descriptions or characteristics of performance which in case of actual
use do not always apply as described or which may change as a result
of further development of the products. An obligation to provide the
respective characteristics shall only exist if expressly agreed in the
terms of contract. Availability and technical specifications are subject
to change without notice.
All product designations may be trademarks or product names of
Siemens AG or supplier companies whose use by third parties for their
own purposes could violate the rights of the owners.
Siemens AG
Industry Sector
Industrial Automation Systems
Postfach 48 48
90026 NÜRNBERG
GERMANY
Subject to change without notice
Article No.: 6ZB5530-1AP02-0BA3
DR.PN.SC.14.XXBR.95.31 / Dispo 26000
BR 0314 2. PES 32 En
Printed in Germany
© Siemens AG 2014
www.siemens.com/automation
Security information
Siemens provides products and solutions with
industrial security functions that support the
secure operation of plants, solutions, machines,
equipment and/or networks. They are important
components in a holistic industrial security
concept. With this in mind, Siemens’ products
and solutions undergo continuous development.
Siemens recommends strongly that you regularly
check for product updates.
For the secure operation of Siemens products
and solutions, it is necessary to take suitable
preventive action (e.g. cell protection concept)
and integrate each component into a holistic,
state-of-the-art industrial security concept. Third-
party products that may be in use should also be
considered. For more information about industrial
security, visit:
http://www.siemens.com/industrialsecurity
To stay informed about product updates as they
occur, sign up for a product-specific newsletter.
For more information, visit:
http://support.automation.siemens.com
© Siemens AG 2014

Contenu connexe

Tendances

Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
Vishnu Suresh
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco Service Provider
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
TI Safe
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
Jimmy Saigon
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
Tammy Clark
 
Medical grade network_campus
Medical grade network_campusMedical grade network_campus
Medical grade network_campus
Jonathan Dender
 

Tendances (20)

Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
Cisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design GuideCisco VMDC Cloud Security 1.0 Design Guide
Cisco VMDC Cloud Security 1.0 Design Guide
 
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed FirewallsIRJET- Data Security in Local Network for Mobile using Distributed Firewalls
IRJET- Data Security in Local Network for Mobile using Distributed Firewalls
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
Cloud Security Solution Overview
Cloud Security Solution OverviewCloud Security Solution Overview
Cloud Security Solution Overview
 
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriaisAprendizado de máquinas aplicado à segurança cibernética de plantas industriais
Aprendizado de máquinas aplicado à segurança cibernética de plantas industriais
 
Cloud security
Cloud securityCloud security
Cloud security
 
Cisco ccna security
Cisco ccna securityCisco ccna security
Cisco ccna security
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
PCI DSS & Virtualization
 PCI DSS & Virtualization PCI DSS & Virtualization
PCI DSS & Virtualization
 
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
Watchguard security proposal 2012
Watchguard security proposal 2012Watchguard security proposal 2012
Watchguard security proposal 2012
 
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
How Technology, People, And Processes Converged To Achieve A 95 Percent Reduc...
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...Dubai Cyber Security   01   Ics Scada Cyber Security Solutions and Challenges...
Dubai Cyber Security 01 Ics Scada Cyber Security Solutions and Challenges...
 
Medical grade network_campus
Medical grade network_campusMedical grade network_campus
Medical grade network_campus
 
Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6Cisco cybersecurity essentials chapter - 6
Cisco cybersecurity essentials chapter - 6
 

Similaire à Brochure network security-en

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
aquazac
 

Similaire à Brochure network security-en (20)

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
withsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdfwithsecure-elements-epp-brochure-en.pdf
withsecure-elements-epp-brochure-en.pdf
 
Aensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity SolutionsAensis Advanced Cybersecurity Solutions
Aensis Advanced Cybersecurity Solutions
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
IntelAdapt
IntelAdaptIntelAdapt
IntelAdapt
 
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
Frost & Sullivan 2015 North American Encrypted Network Security Solutions New...
 
8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx8 Top Cybersecurity Tools.pptx
8 Top Cybersecurity Tools.pptx
 
8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf8 Top Cybersecurity Tools.pdf
8 Top Cybersecurity Tools.pdf
 
Network Security v1.0 Network Security v
Network Security v1.0 Network Security vNetwork Security v1.0 Network Security v
Network Security v1.0 Network Security v
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Messaging Gateway
Messaging GatewayMessaging Gateway
Messaging Gateway
 
Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens Industrial IoT summit_andresg_guilarte Siemens
Industrial IoT summit_andresg_guilarte Siemens
 
Cisco Connected Factory - Security
Cisco Connected Factory - SecurityCisco Connected Factory - Security
Cisco Connected Factory - Security
 
Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017Aensis Cyber_Sec 2017
Aensis Cyber_Sec 2017
 
Security Incidents
Security IncidentsSecurity Incidents
Security Incidents
 
Laser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect AssetsLaser Pioneer Secures Network End-to-End to Protect Assets
Laser Pioneer Secures Network End-to-End to Protect Assets
 
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
Securing the Future Safeguarding 5G Networks with Advanced Security Solutions...
 

Dernier

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
ciinovamais
 

Dernier (20)

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Dyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptxDyslexia AI Workshop for Slideshare.pptx
Dyslexia AI Workshop for Slideshare.pptx
 
Fostering Friendships - Enhancing Social Bonds in the Classroom
Fostering Friendships - Enhancing Social Bonds  in the ClassroomFostering Friendships - Enhancing Social Bonds  in the Classroom
Fostering Friendships - Enhancing Social Bonds in the Classroom
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 

Brochure network security-en

  • 1. Industrial Security Network security Answers for industry. Brochure Edition February 2014 © Siemens AG 2014
  • 2. Industrial Security2 Industrial Security That is why industrial security is so important As the use of Ethernet connections increases all the way down to the field level, the associated security issues are becoming a more urgent topic for industry. After all, open communication and the increased networking of produc- tion systems involve not only huge opportunities, but also high risks. To provide an industrial plant with comprehensive securi- ty protection against attacks, the appropriate measures must be taken. Siemens can support you here in selective- ly implementing these measures – within the scope of an integrated range for industrial security. Threat overview 1) Industrial Control Systems (ICS) Source: BSI-A-CS 004 | Version 1.00 dated April 12, 2012; page 2 of 2 Note: This list of threats was compiled in close cooperation between BSI and rep- resentatives of the industry. Using BSI analyses, the Federal Office for Information Security (BSI) pub- lishes statistics and reports on current topics dealing with cyber-security. Please direct all comments and notes to: cs-info@bsi.bund.de No. Threat Explanation 1 Unauthorized use of remote maintenance access Maintenance access provides deliberate openings to the outside in the ICS network1) which, however, are often inadequately protected. 2 Online attacks via office/enterprise networks In general, office IT equipment is connected with the Internet in many ways. Usually, there are also network connections from the office network to the ICS network, allowing attackers to use this route, too. 3 Attacks against standard compo- nents used in the ICS network Commercial off-the-shelf (COTS) standard IT components such as operating systems, applica- tion servers, or databases generally contain flaws and weak points which can be exploited by attackers. If these standard components are also used in the ICS network, it increases the risk of a successful attack on the ICS systems. 4 (D)DoS attacks (Distributed) denial of service attacks can be used to disrupt network connections and required resources and cause systems to crash, e.g. to disrupt the functionality of an ICS. 5 Human error and sabotage Deliberate actions – regardless of whether by internal or external agents – are a massive threat for all security goals. In addition, negligence and human error are a great danger, especially when it comes to protecting confidentiality and availability. 6 Introduction of harmful code via removable media and external hardware The use of removable media and mobile IT components by external employees always presents a great risk of malware infections. The importance of this aspect was demonstrated by Stuxnet, for example. 7 Reading and writing messages in the ICS network Because most control components at present communicate via plain-text protocols, and are thus unprotected, it is often possible to read and insert commands without great difficulty. 8 Unauthorized access to resources In particular, insiders or follow-up attacks after intrusion from the outside have an easy time if authentication and authorization for services and components in the process network are non-existent or insecure. 9 Attacks on network components Network components can be manipulated by attackers, for example to carry out man-in-the- middle attacks or to make sniffing easier. 10 Technical faults and force majeure Failures are always possible as a result of extreme environmental influences or technical de- fects – the risk and the potential for damage can only be minimized here. © Siemens AG 2014
  • 3. Industrial Security 3 Network security as a central component of the Siemens Industrial Security concept Siemens Industrial Security – continuous protection for your plant An optimum industrial security solution can only be imple- mented if new approaches are taken because it must be con- tinuously adapted to new threats. There is no such thing as ab- solute security. To ensure a comprehensive and permanent so- lution, we provide in-depth advice, partner-like cooperation, and continuous development of our security measures and products. All-round, but also in-depth protection With Defense in Depth, Siemens provides a multi-level con- cept that offers your plant both all-round and in-depth protec- tion. The concept is based on the components plant security, network security, and system integrity, as recommended by ISA 99 / IEC 62443 – the leading standard for security in indus- trial automation. While conventional plant security defends the plant against physical attacks, network protection and the protection of system integrity offer protection against cyber attacks and unauthorized access by operators or external per- sons. Success factor: network security Network security means protecting automation networks from unauthorizedaccess.Thisincludesthemonitoringofallinterfaces such as the interfaces between office and plant networks or the remote maintenance access to the Internet. It can be accom- plished by means of firewalls and, if applicable, by establishing a secureandprotected"demilitarizedzone"(DMZ).TheDMZisused for making data available to other networks without granting di- rect access to the automation network itself. The secure segment- ing of the plant network into individually protected automation cells minimizes risks and increases security. Cell division and de- vice assignment are based on communication and protection re- quirements. Data transmission is encrypted by means of a VPN and is thus protected fromdata espionage and manipulation. The communication stations are securely authenticated. The cell pro- tectionconceptcanbeimplementedandcommunicationscanbe secured using "Security Integrated" components such as SCALANCE S security modules or security CPs for SIMATIC. Initial risk assessment and information on the Internet You want to know right now how good the security of your in- dustrial plant is? We can provide you with detailed information about the special security issues in your industry in a customer consultation meeting. Use this opportunity to talk to our con- sulting team about any open issues. Our experts will gladly prepare a security strategy that is adapted to suit the needs of your production plant or process infrastructure. You can download the additional "Operational Guidelines" with many recommendations for protecting your production plant from our Internet site. Detection of attacks Patch management Authentication/user administration System hardening Firewalls & VPN Cell protection and perimeter network Processes & guidelines Physical access protection Security guidelines Defense in depth System integrity Network security Plant security Industrial security services G_IK10_XX_10336 © Siemens AG 2014
  • 4. Industrial Security4 Domain Controller Plant Security System Integrity Network Security Factory Automation Office Network Production 1 SIMATIC S7-400 with CP 443-1 Advanced withwith MRP ring Ring redundancy manager SCALANCE X308-2M Sync connection SIMATIC TP700 Industrial Ethernet (Fiber optic) SCALANCE X308-2M SCALANCE S627-2M SCALANCE S627-2M SCALANCE S623 SIMATIC ET 200SP PROFINET SCALANCE X204-2 SCALANCE X204-2 Industrial Security Network security as a factor for success © Siemens AG 2014
  • 5. Industrial Security 5 SSC Security management Physical protection Production 3 Production 5Production 2 SIMOTION D4x5 with SINAMICS S120 (Booksize) SIMATIC S7-300 with CP 343-1 Advanced SIMATIC Field PG with SOFTNET Security Client PC with CP 1628 Server Central Archiving Server SIMATIC S7-1500 with CP1543-1 Production n SIMATIC S7-1200 with CP 1243-1 SIMATIC S7-1200 with CP 1243-1 WEB Server Server SIMATIC TP1200 Comfort SCALANCE M874-3 GPRS/UMTS Internet DMZ SCALANCE S623 G_IK10_XX_10362 SINAMICS G120 SIMATIC TP700 ET 200 SIMATIC TP700 SIMATIC S7-1200 PROFINET Internet Router Internet Router Secure communication, network access protection and network segmentation with Security Integrated components © Siemens AG 2014
  • 6. Security Integrated6 Security Integrated Cell protection concept Industrial communication is a key factor for corporate suc- cess – as long as the network is protected. As a partner, Siemens provides its customers with Security Integrated components which not only have communica- tion functions, but also include special security functions such as firewall and VPN functionality, in order to imple- ment the cell protection concept. Secure communication between components with Security Integrated in separate automation cells Cell protection concept With the cell protection concept, a plant network is segment- ed into individual, protected automation cells within which all devices are able to communicate with each other securely. The individual cells are connected to the plant network pro- tected by a VPN and firewall. Cell protection reduces the susceptibility to failure of the en- tire production plant and thus increases its availability. Securi- ty Integrated products such as SCALANCE S, SCALANCE M and SIMATIC S7/PC communications processors can be used for implementing this concept. SIMATIC S7-1500 with CP1543-1 SIMATIC S7-300 with CP343-1 Advanced SIMATIC S7-400 with CP443-1 Advanced Automation cell 4Automation cell 3Automation cell 2Automation cell 1 SIMATIC S7-1200 with CP 1243-1 PROFINETPROFINETPROFINET Industrial Ethernet PROFINET G_IK10_XX_10373 © Siemens AG 2014
  • 7. Security Integrated 7 The following Security Integrated products are available: SIMATIC S7-1200 / S7-1500: ■ Protection of the controller by means of access protec- tion (authentication) via the S7-1200/S7-1500 CPU: – Know-how protection – Manipulation protection – Copy protection – Graded security concept for HMI connection ■ Expandable access protection for S7-1200/S7-1500 (firewall) via Security CP 1243-1/CP 1543-1 by means of – Integrated firewall (monitoring of the data flow) – Protection against data manipulation and espionage by means of a VPN SIMATIC S7-300 and S7-400 ■ Protection of controllers by CP 343-1 Advanced and CP 443-1 Advanced communications processors, which contain both firewall and VPN (virtual private network) functionality. SCALANCE S security modules ■ SCALANCE S modules protect industrial networks and automation systems by means of security-related seg- mentation (cell protection) with a firewall against authorized access and protect data transmission with VPN against manipulation and espionage. Industrial PCs ■ Via the CP 1628 communications processor, industrial PCs are protected by firewall and VPN – for secure communication without the need for special operating system settings. In this manner, computers equipped with the module can be connected to protected cells. Software ■ The SOFTNET Security Client software enables VPN access via the Internet or a company intranet to automa- tion cells or PCs protected by SCALANCE S or another Security component with VPN functionality. Remote access ■ SCALANCE M industrial routers for secure remote access to plants via mobile networks, e.g. M874-3 via UMTS. Security Integrated products for industrial use with special security functions to improve the security standard SCALANCES family SCALANCEM family CP343-1Adv CP443-1Adv S7-1200CPU1) S7-1500CPU CP1243-11) CP1543-1 CP1628 SOFTNET SecurityClient Configurable copy protection ● Access protection (authentication) ● Extended access protection (Firewall) ● ● ● ● ● Virtual Private Network with IPSec ● ● ● ● Manipulation protection (communication, configuration) ● ● ● ● ● ● ● ● applies 1) from CPU firmware V4.0 from STEP 7 Professional V13 © Siemens AG 2014
  • 8. Security Integrated8 The security modules of the SCALANCE S range can be used to protect all devices of an Ethernet network against unauthor- ized access. In addition, SCALANCE S modules also protect the data transmission between devices or network segments (such as automation cells) against data manipulation and es- pionage by setting up VPN tunnels; they can also be used for secure remote access over the Internet. The SCALANCE S security modules can be operated not only in bridge mode, i.e. within an IP subnetwork, but also in router mode, i.e. operated at the IP subnetwork borders. SCALANCE S is optimized for use in automation and industrial environments, and meets the specific requirements of auto- mation systems such as easy upgrades of existing plants, sim- ple installation, and minimal downtimes in the event of a fault. Product versions SCALANCE S602 • Uses the Stateful Inspection Firewall to protect network segments against unauthorized access • Connection via 10/100/1000 Mbit/s ports • "Ghost mode" for protection of individual, even alternating, devices by dynamically taking over the IP address SCALANCE S612 • Uses the Stateful Inspection Firewall to protect network segments against unauthorized access • Up to 128 VPN tunnels can be operated simultaneously • Connection via 10/100/1000 Mbit/s ports SCALANCE S623 • Uses the Stateful Inspection Firewall to protect network segments against unauthorized access • Up to 128 VPN tunnels can be operated simultaneously • Connection via 10/100/1000 Mbit/s ports • Additional RJ45 DMZ (demilitarized zone) port for secure connection, for example, of remote maintenance modems, laptops, or an additional network. The yellow port is pro- tected by firewalls from the red and green ports and can also terminate VPNs • Redundant protection of automation cells by means of router and firewall redundancy and stand-by mode of the redundant device; status matching by means of synchroni- zation cable between the yellow ports SCALANCE S627-2M • Uses the Stateful Inspection Firewall to protect network segments against unauthorized access • Up to 128 VPN tunnels can be operated simultaneously • Connection via 10/100/1000 Mbit/s ports • Additional RJ45 DMZ (demilitarized zone) port for secure connection, for example, of remote maintenance modems, laptops, or an additional network. The yellow port is pro- tected by firewalls from the red and green ports and can also terminate VPNs • Redundant protection of automation cells by means of router and firewall redundancy and stand-by mode of the redundant device; status matching by means of synchroni- zation cable between the yellow ports • Two additional slots for 2-port media modules (of SCALANCE X-300) for direct integration in ring structures and FO networks with two additional switched red or green ports per module • Bridging of longer cable runs or use of existing 2-core cables (e.g. PROFIBUS) by deploying the MM992-2VD media modules (variable distance) Security Integrated Protection of automation cells with SCALANCE S modules © Siemens AG 2014
  • 9. Security Integrated 9 Connection of a local or remote service PC (by means of Internet access) via the DMZ port of the SCALANCE S623 SCALANCE S security functions VPN (Virtual Private Networks) (only for SCALANCE S612, S623 and SCALANCE S627-2M); for reliable authentication (identification) of the network stations, for encrypting data and checking data integrity. • Authentication All incoming data traffic is monitored and checked. Since IP addresses can be falsified (IP spoofing), checking the IP address (of the client access) alone is not sufficient. In addition, client PCs may have changing IP addresses. For this reason, authentication is performed by means of tried and tested VPN mechanisms. • Data encryption Secure encryption is necessary in order to protect data communication from espionage and unauthorized manip- ulation. This means that the data traffic remains incompre- hensible to any eavesdropper in the network. The SCALANCE Security Module establishes VPN tunnels to other security modules for this purpose. Firewalls Can be used as an alternative or to supplement VPN with flexi- ble access control. Firewalls filter data packets and disable or enable communication links in accordance with the filter list and stateful inspection. Both incoming and outgoing communication can be filtered, ei- ther according to IP and MAC addresses as well as communica- tion protocols (ports), or user-specifically. • Logging Access data is stored by the Security Module in a log file. This ensures both identification of how, when and by whom data has been accessed as well as facilitating identi- fication of access attempts, thus ensuring that appropriate preventative measures can be taken. Configuration Configuration is carried out using the Security Configuration Tool (SCT), which enables all SIMATIC NET security products to be configured and diagnosed from a central position. All the configuration data can be saved on the optional C-PLUG swap media (not included in scope of supply) so that the Security Module can be replaced quickly in the event of a fault, without the need for a programming device. Local service PC Remote service PC with SOFTNET Security Client Service access Plant network/ secure automation cell Company network InternetSCALANCE S623Industrial Ethernet G_IK10_XX_10303 Internet Router Internet Router Advantages at a glance ■ High level of IT security for machines and plants thanks to implementation of the cell protection concept ■ System-widenetworkdiagnosticsthankstointegration into IT infrastructures and network management systems by means of SNMP ■ Simple remote maintenance via the Internet by means of PPPoE and DNS using dynamic IP addresses ■ Easy integration into existing networks without reconfiguring terminal nodes or setting up new IP subnetworks ■ Module replacement without the need for a program- ming device, using the C-PLUG swap media for backing up the configuration data © Siemens AG 2014
  • 10. Security Integrated10 Secure remote access without direct connection to the automation network with SCALANCE S623 Task A system integrator requires secure Internet access to their ma- chine, or part of an end user's plant, for servicing purposes. But they should only be given access to specific devices and not the plant network. In addition, a secured connection is to be set up from the system to a remote station using mobile networks (e.g. UMTS). Solution Starting points are, for example, system integrator with VPN client (SOFTNET Security Client, CP 1628, SCALANCE M874-3) End point (automation system): SCALANCE S623 as VPN server • Red port: connection to plant network • Yellow port: connection of Internet modem/router • Green port: connection to protected cell SSC Automation Cell 1Automation Cell n-1Automation Cell n Internet router Plant network Automation Applications Automation plant Remote stations SIMATIC Field PG with SOFTNET Security Client VPN tunnel VPN tunnel G_IK10_XX_10339 SCALANCE S623 PROFINETPROFINETPROFINET Industrial Ethernet Security Module SCALANCE S Security Module SCALANCE S ... Internet Router SCALANCE M874-3 SIMATIC S7-1200 GPRS/UMTS Internet Advantages at a glance ■ Secure remote access via Internet or mobile networks such as UMTS by safeguarding the data transmission with VPN (IPSec) ■ Restriction of access possibilities with integrated firewall function ■ Secure remote access to plant units without direct access to the plant network with SCALANCE S623 3-port firewall Security Integrated Application examples with SCALANCE S modules © Siemens AG 2014
  • 11. Security Integrated 11 Setup of a demilitarized zone (DMZ) using SCALANCE S623 Task Network participants or servers (e.g. MES servers) should be accessible both from the secure and non-secure network with- out a direct connection between the networks. Solution A DMZ can be set up at the yellow port by means of a SCALANCE S623. The servers can be positioned in this DMZ. Office Network Untrusted Zone DMZ Zone Data base server Server with web application limited accessblocked accesspermitted access Trusted Zone G_IK10_XX_10340 SCALANCE S623 Domain Controller Advantages at a glance ■ Secure data exchange through the use of a "demilitarized zone" for the exchange of data between corporate and plant network using a SCALANCE S623 3-port firewall ■ Protection of automation networks against unauthorized access at the network boundaries © Siemens AG 2014
  • 12. Security Integrated12 Secure, redundant connection between two MRP rings with SCALANCE S627-2M Task Two rings should be securely and redundantly connected to one another. Solution Ring A is connected to the ports of the first media module (red ports) and Ring B with the ports of the second media module (green ports) using SCALANCE S627-2M. S627-2M functions as a router and firewall. A second SCALANCE S627-2M is likewise connected and operates in stand-by mode. In order to match the firewall status between the two SCALANCE S modules, the yellow ports are coupled by means of a synchronization cable. MRP ring A MRP ring B Ring redundancy manager Ring redundancy manager CU or fiber optic Sync connection Industrial Ethernet (Fiber optic) Industrial Ethernet SCALANCE S627-2MSCALANCE S627-2M G_IK10_XX_10366 Advantages at a glance ■ Secure redundant coupling of redundant rings ■ Control of data communication between redundant rings ■ High availability due to redundant design of the SCALANCE S627-2M Security Integrated Application examples with SCALANCE S modules © Siemens AG 2014
  • 13. Security Integrated 13 Secure, redundant connection of an automation cell to a redundant ring with SCALANCE S627-2M Task An automation cell is to be connected securely and redundantly to a higher-level ring. Solution The ring is connected to the ports of the first media module (red ports) and the lower-level cell with the ports of the sec- ond media module (green ports) using SCALANCE S627-2M. A second SCALANCE S627-2M is likewise connected and oper- ates in stand-by mode. In order to match the firewall status between the two SCALANCE S modules, the yellow ports are coupled by means of a synchronization cable. Alternative: The ring is coupled with the red RJ45 port and the lower-level automation cell is connected to the ports of the second media module (green ports) using SCALANCE S627-2M. A second SCALANCE S627-2M is likewise connected and operates in stand-by mode. In order to match the firewall status between the two SCALANCE S modules, the yellow ports are coupled by means of a synchronization cable. MRP ring Ring redundancy manager MRP ring Ring redundancy manager Automation Cell Automation Cell CU or fiber opticSync connection CU or fiber optic Sync connection Industrial Ethernet (Fiber optic) Industrial Ethernet SCALANCE S627-2MSCALANCE S627-2M MRP-Switch CU SCALANCE S627-2MSCALANCE S627-2M G_IK10_XX_10367 Advantages at a glance ■ Secure redundant connection of an automation cell to a higher-level ring ■ Control of the data communication between a redundant ring and a lower-level automation cell ■ High availability due to redundant design of the SCALANCE S627-2M © Siemens AG 2014
  • 14. Security Integrated14 Secure, redundant connection of a redundant ring to a plant network with SCALANCE S627-2M Task The ring is to be securely and redundantly connected to the plant network. Solution The ring is connected to the ports of the second media module (green ports) and the production network with the ports of the first media module (red ports) using SCALANCE S627-2M. A second SCALANCE S627-2M is likewise connected and oper- ates in stand-by mode. In order to match the firewall status be- tween the two SCALANCE S modules, the yellow ports are cou- pled by means of a synchronization cable. Alternative: The ring is connected to the ports of the second media mod- ule (green ports) and the production network with the red RJ45 port using SCALANCE S627-2M. A second SCALANCE S627-2M is likewise connected and oper- ates in stand-by mode. In order to match the firewall status between the two SCALANCE S modules, the yellow ports are coupled by means of a synchronization cable. MRP ring Ring redundancy manager MRP ring Ring redundancy manager CU or fiber optic Sync connection CU or fiber optic Sync connection MRP-Switch CU SCALANCE S627-2MSCALANCE S627-2M G_IK10_XX_10368 SCALANCE S627-2MSCALANCE S627-2M Industrial Ethernet (Fiber optic) Industrial Ethernet Advantages at a glance ■ Secure redundant connection of a redundant ring to the plant network ■ Control of data communication between plant network and redundant ring ■ High availability due to redundant design of the SCALANCE S627-2M Security Integrated Application examples with SCALANCE S modules © Siemens AG 2014
  • 15. Security Integrated 15 SCALANCE M874 SCALANCE M874-3 and SCALANCE M874-2 are mobile wire- less routers for cost-effective and secure connection of Ether- net-based subnets and programmable controllers via UMTS (3rd generation mobile network) or GSM (2nd generation mo- bile network). SCALANCE M874-3 Supports HSPA+ (High Speed Packet Access) and allows high transfer rates of up to 14.4 Mbit/s in the downlink and up to 5.76 Mbit/s in the uplink (depending on the infrastructure of the mobile wireless provider). SCALANCE M874-2 Supports GPRS (General Packet Radio Service) and EDGE (Enhanced Data Rates for GSM Evolution). Protects against unauthorized access and offers data transmis- sion via the Integrated Security functions Firewall and VPN (IPSec). SCALANCE M875 The SCALANCE M875 UMTS router offers IP routing, stateful inspection firewall, and a VPN gateway to protect lower-level devices from security risks such as manipulation or espionage. SCALANCE M875 has obtained type approval as a vehicle component in accordance with directive 72/245/EEC in its 2009/19/EC version and type approval for use on rail vehicles in accordance with EN 50155. Secure access to plant sections via mobile networks © Siemens AG 2014
  • 16. Security Integrated16 VPN for secure remote maintenance with SCALANCE M874 Task Conventional applications such as remote programming, pa- rameterization and diagnostics, but also monitoring of ma- chines and plants installed worldwide, should be performed by a service center that is connected over the Internet. Solution Any IP-based devices and particularly automation devices that are downstream of the SCALANCE M875 or SCALANCE M874 in the local network can be accessed. Multimedia applications such as video streaming can also be implemented due to the in- creased bandwidth in the uplink. The VPN functionality allows the secure transfer of data around the world. S7-1500 with CP 1543-1IP camera S7-300 with CPU 315-2 DP and CP 343-1 Lean Service Center VPN tunnel 1 VPN tunnel 2 Remote Station 1 Remote Station 2 Service PC with Software SOFTNET Security Client Mobile radio Internet router Internet router Industrial Ethernet Internet PROFIBUS Industrial Ethernet G_IK10_XX_30188 SCALANCE M874-3 SCALANCE M874-2 SCALANCE S612 Advantages at a glance ■ Low investment and operating costs for secure remote access to machines and plants ■ Reduced travel costs and telephone charges thanks to remote programming and remote diagnostics via 3G/UMTS ■ User-friendly diagnostics via Web interface ■ Short transmission times thanks to high transmission rates with HSDPA and HSUPA ■ Protection by integrated firewall and VPN ■ Utilization of existing (3G)UMTS infrastructure of mobile network providers ■ Simple planning and commissioning of telecontrol substations without the need for special radio expertise ■ Worldwide availability thanks to UMTS/GSM (quad band) technology; observe national regulations Security Integrated Secure access to plant sections via mobile networks © Siemens AG 2014
  • 17. Security Integrated 17 CP 1243-1 The CP 1243-1 communications processor securely connects the SIMATIC S7-1200 controller to Ethernet networks. With its integrated security functions of firewall (Stateful Inspection) and VPN protocol (IPSec), the communications processor protects S7-1200 stations and lower-level networks against unauthorized access, and protects the data transmis- sion against manipulation and espionage by means of encryp- tion. Furthermore, the CP can also be used for integrating the S7-1200 station into the TeleControl Server Basic control center software via IP-based remote networks. Protection of an S7-1200 and lower-level automation cell with CP1243-1 Task Communication between the automation network and lower- level networks with S7-1200 is to be secured by means of ac- cess control. Solution The CP 1243-1 is placed upstream of the automation cells to be protected in the rack of the S7-1200. In this way, the communi- cation to and from the S7-1200 and the lower-level automation cell is restricted to the permitted connections with the aid of firewall rules and, if necessary, protected against manipulation or espionage by setting up VPN tunnels. SIMATIC S7-1200 with CP 1243-1 Production Mobile TeleserviceEngineering control center Industrial Ethernet Industrial Ethernet G_IK10_XX_10371 Field PG TIA Portal Engineering LAN ET 200 SIMATIC TP700 SIMATIC S7-1200 PROFINET Advantages at a glance ■ Secure connection of the SIMATIC S7-1200 to Industrial Ethernet by means of integrated Stateful Inspection Firewall and VPN ■ Can be used in an IPv6-based infrastructure ■ Connection to control centers with TeleControl Server Basic Protection of controllers through communications processors © Siemens AG 2014
  • 18. Security Integrated18 CP 1543-1 The CP 1543-1 communication processor securely connects the SIMATIC S7-1500 controller to Ethernet networks. With its integrated security functions of firewall (Stateful In- spection), VPN protocol (IPSec) and protocols for data encryp- tion such as FTPS and SNMPv3, the communications processor protects S7-1500 stations and lower-level networks against unauthorized access, as well as protecting data transmission against manipulation and espionage by means of encryption. Segmentation of networks and protection of the S7-1500 with CP1543-1 Task Communication between the automation network and lower- level networks with S7-1500 is to be secured by means of ac- cess control. Solution The CP 1543-1 is placed in the rack of the S7-1500, upstream of the automation cells to be protected. In this way, the com- munication to and from the S7-1500 and the lower-level auto- mation cell is restricted to the permitted connections with the aid of firewall rules and, if necessary, protected against manip- ulation or espionage by setting up VPN tunnels. Automation Cell SIMATIC S7-1500 with CP 1543-1 S7-300 with CP 343-1 Lean Automation Cell SIMATIC S7-1500 with CP 1543-1 S7-300 with CP 343-1 Lean PROFINET SINAMICS ET 200S Industrial Ethernet Industrial Ethernet G_IK10_XX_10350 TIA Portal Field PG PROFINET SINAMICS ET 200S Industrial Ethernet Advantages at a glance ■ Secure connection of the SIMATIC S7-1500 to Industrial Ethernet by means of integrated Stateful Inspection Firewall and VPN ■ Additional communication options: File transfer and e-mail ■ Can be used in an IPv6-based infrastructure Security Integrated Protection of controllers through communications processors © Siemens AG 2014
  • 19. Security Integrated 19 CP 343-1 Advanced and CP 443-1 Advanced Alongside the familiar communication functions, an integrat- ed switch, and Layer 3 routing functionality, the Industrial Ethernet communications processors, CP 343-1 Advanced and CP 443-1 Advanced for SIMATIC S7-300 or S7-400, contain Security Integrated with a Stateful Inspection Firewall and a VPN gateway to protect the controller and lower-level devices against security risks. Task Communication between the office level administration sys- tem and lower-level networks of the automation level is to be secured by means of access control. Solution CP 343-1 Advanced and CP 443-1 Advanced are placed up- stream of the automation cells to be protected. This limits communication to the permitted connections with the aid of firewall rules. Advantages at a glance ■ Firewall, VPN gateway, and CP in one device: With the latest generation of Advanced CPs and for the same price as the predecessor version, the user gets the integrated security functions of firewall and VPN for implementing a protected automation cell and for protecting data transmission. ■ Secure communication integration: The CP is easily configured with STEP 7; VPN tunnels can be set up between the CPs themselves or to the SCALANCE S security appliance, the SOFTNET Security Client VPN software, the secure CP 1628 PC module, and the SCALANCE M mobile wireless router. Particularly users already employing Advanced CPs will find it simple to set up secure networks. All CP 343-1 Advanced and CP 443-1 Advanced users get Security Integrated and do not need any separate hardware or special tools besides SIMATIC S7 to configure the security of industrial plants. © Siemens AG 2014
  • 20. Security Integrated20 Segmentation of networks and protection of the S7-300 or S7-400 controllers with CP 343-1 Advanced or CP 443-1 Advanced PC with management system and database (e.g. Oracle) SIMATIC S7-300 with CP 343-1 Advanced SIMATIC S7-400 with CP 443-1 Advanced G_IK10_XX_10337 Field PG ET 200S ET 200S PROFINET Industrial Ethernet PROFINET Industrial Ethernet Security Integrated Protection of controllers through communications processors © Siemens AG 2014
  • 21. Security Integrated 21 CP 1628 Via the CP 1628 Industrial Ethernet communications processor, industrial PCs are protected by firewall and VPN – for secure com- munication without special operating system settings. In this manner,computersequippedwiththemodulecanbeconnected to protected cells. The CP 1628 makes it possible to connect SIMATIC PG/PC and PCs with PCI Express slots to Industrial Ethernet (10/100/1000 Mbit/s). Additional field devices can be flexibly connected to Industrial Ethernet via the integrated switch. Along with the automation functions familiar from CP 1623, the communicationsprocessoralso containsSecurityIntegrated,com- prising a Stateful Inspection Firewall and a VPN gateway to protect the PG/PC systems against security risks. Advantages at a glance ■ Firewall, VPN gateway, and CP in one device: This new product version offers users an integrated, fully-fledged security module that protects the PC from manipulation and unauthorized access. ■ Secure communication integration: The CP is easily configured using STEP 7/NCM PC (V5.5 SP3 or higher) or TIA Portal (V12 SP1 or higher). © Siemens AG 2014
  • 22. Security Integrated22 Secure redundant connection to CP 1628 and CP 443-1 Advanced Task Protection for the redundant connections between a PC sys- tem and the S7-400H controllers in a high-availability plant. Solution VPN tunnels are set up between the security communications processors CP 1628 and CP 443-1 Advanced, which allow the secure transmission of the H communication. In addition, the CP 1628 protects the PC system from unauthorized access by means of its integrated firewall. PC with 4 x CP 1628 and HARDNET-IE S7-REDCONNECT (ISO on TCP) S7-400H with CP 443-1 Advanced S7-400H with CP 443-1 Advanced S7-400H with CP 443-1 Advanced S7-400H with CP 443-1 Advanced VPN tunnel Internet router Internet router Control center SIMATIC PCS 7 Client PROFINET Industrial Ethernet Terminalbus (Ethernet) Industrial Ethernet G_IK10_XX_10354 PROFIBUS Internet Security Integrated Protection of controllers through communications processors © Siemens AG 2014
  • 23. Security Integrated 23 Product type designation SCALANCE S602 SCALANCE S612 SCALANCE S623 SCALANCE S627-2M Article No. 6GK5602-0BA10-2AA3 6GK5612-0BA10-2AA3 6GK5623-0BA10-2AA3 6GK5627-2BA10-2AA3 Transmission rate Transfer rate 1 / 2 / 3 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s 10 / 100 / 1000 Mbit/s Ports Electrical connection ■ for internal network ■ for external network ■ for DMZ ■ for signaling contact ■ for power supply C-PLUG swap media 1 x RJ45 port 1 x RJ45 port – 1 x 2-pole terminal block 1 x 4-pole terminal block Yes 1 x RJ45 port 1 x RJ45 port – 1 x 2-pole terminal block 1 x 4-pole terminal block Yes 1 x RJ45 port 1 x RJ45 port 1 x RJ45 port 1 x 2-pole terminal block 1 x 4-pole terminal block Yes 3 x RJ45 ports + media module 3 x RJ45 ports + media module 1 x RJ45 port 1 x 2-pole terminal block 1 x 4-pole terminal block Yes Supply voltage, current consumption, power loss Supply voltage, external Range 24 V DC 19.2 V ... 28.8 V DC 24 V DC 19.2 V ... 28.8 V DC 24 V DC 19.2 V ... 28.8 V DC 24 V DC 19.2 V ... 28.8 V DC Permissible ambient conditions Ambient temperature ■ during operation ■ during storage ■ during transportation Degree of protection -40 °C ... +60 °C -40 °C ... +80 °C -40 °C ... +80 °C IP20 -40 °C ... +60 °C -40 °C ... +80 °C -40 °C ... +80 °C IP20 -40 °C ... +60 °C -40 °C ... +80 °C -40 °C ... +80 °C IP20 -40 °C ... +60 °C -40 °C ... +70 °C -40 °C ... +70 °C IP20 Design, dimensions, and weight Design Width / height / depth Net weight Compact 60 mm / 125 mm / 124 mm 0.8 kg Compact 60 mm / 125 mm / 124 mm 0.8 kg Compact 60 mm / 125 mm / 124 mm 0.81 kg Compact 120 mm / 125 mm / 124 mm 1.3 kg Product function: Security Firewall configuration Product function in VPN connection Product function ■ Password protection ■ Restricted bandwidth ■ NAT/NAPT Encryption algorithms Authentication procedure Hashing algorithms Stateful inspection – Yes Yes Yes – – – Stateful Inspection IPSec Yes Yes Yes AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key, X.509v3 certificates MD5, SHA-1 Stateful inspection IPSec Yes Yes Yes AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key, X.509v3 certificates MD5, SHA-1 Stateful Inspection IPSec Yes Yes Yes AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key, X.509v3 certificates MD5, SHA-1 Technical data at a glance © Siemens AG 2014
  • 24. Security Integrated24 Product type designation SCALANCE M874-2/M874-3 SCALANCE M875 Article No. 6GK5874-2AA00-2AA2 6GK5874-3AA00-2AA2 6GK5875-0AA10-1AA2 Transmission rate 1 for Industrial Ethernet / 2 for Industrial Ethernet for GSM transmission for GPRS transmission for eGPRS transmission for UMTS transmission 10 Mbit/s / 100 Mbit/s – max. 42.8/85.6 kbit/s uplink/downlink max. 118/236.8 kbit/s uplink/downlink max. 5.76/14.4 Mbit/s uplink/downlink (for M874-3 only) 10 Mbit/s / 100 Mbit/s 9 600 bit/s max. 42.8/85.6 kbit/s uplink/downlink max. 118/236.8 kbit/s uplink/downlink max. 5.76/14.4 Mbit/s uplink/downlink Ports Electrical connection ■ for network components/terminal equipment ■ for external antenna(s) ■ for power supply RJ45 port (10/100 Mbit/s, TP, autocrossover) SMA antenna sockets (50 ohms) RJ45 port (10/100 Mbit/s, TP, autocrossover) SMA antenna sockets (50 ohms) Terminal strip Supply voltage, current consumption, power loss Supply voltage Range 12 V ... 28.8 V DC 12 V ... 30 V DC Permissible ambient conditions Ambient temperature ■ during operation ■ during storage Degree of protection -20 °C ... +60 °C -40 °C ... +85 °C IP20 -40 °C ... +75 °C -40 °C ... +85 °C IP20 Design, dimensions, and weight Design Width / height / depth Net weight Compact 35 mm / 147 mm / 127 mm – Compact 45 mm / 99 mm / 114 mm 280 g Product function: Security Firewall configuration Product function ■ Password protection ■ Packet filter Suitability for VPN use Product function in VPN connection Number of possible connections in the case of VPN connection Type of authentication for VPN PSK Protocol is supported, IPsec tunnel and transport mode Key length ■ for IPsec DES for VPN ■ 1 for IPsec AES for VPN ■ 2 for IPsec AES for VPN ■ 3 for IPsec AES for VPN Type of Internet key exchange for VPN main mode Key length for IPsec 3DES for VPN Type of Internet key exchange for VPN quick mode Type of packet authentication for VPN Stateful Inspection Yes Yes Yes Yes 10 Yes Yes 56 bit 128 bit 192 bit 256 bit Yes 168 bit Yes MD5, SHA-1 Stateful Inspection Yes Yes Yes Yes 10 Yes Yes 56 bit 128 bit 192 bit 256 bit Yes 168 bit Yes MD5, SHA-1 Security Integrated Technical data at a glance © Siemens AG 2014
  • 25. Security Integrated 25 Product type designation CP 1243-1 CP 1543-1 Article No. 6GK7243-1BX30-0XE0 6GK7543-1AX00-0XE0 Transmission rate ■ at interface 1 / 2 10 … 100 Mbit/s / – 10 … 1 000 Mbit/s / – Ports Electrical connection ■ to interface 1 according to IE ■ to interface 2 according to IE ■ for power supply C-PLUG swap media 1 x RJ45 port – – – 1 x RJ45 port – – – Supply voltage, current consumption, power loss Supply voltage ■ 1 from backplane bus ■ External 5 V DC – 15 V DC – Permissible ambient conditions Ambient temperature ■ during operation - when installed vertically - when installed horizontally ■ during storage ■ during transportation Degree of protection -20 °C +60 °C -20 °C … +70 °C -40 °C … +70 °C -40 °C … +70 °C IP20 0 °C … +40 °C 0 °C … +60 °C -40 °C … +70 °C -40 °C … +70 °C IP20 Design, dimensions, and weight Module format Width / height / depth Net weight Compact S7-1200, single width 30 mm / 110 mm / 75 mm 0.122 kg Compact S7-1500, single width 35 mm / 142 mm / 129 mm 0.35 kg Product function: Security Firewall configuration Product function in VPN connection Type of encryption algorithms for VPN connection Type of authentication algorithms for VPN connection Type of hashing algorithms for VPN connection Number of possible connections in the case of VPN connection Product function ■ Password protection for Web applications ■ ACL – IP-based ■ ACL – IP-based for PLC/routing ■ Deactivation of non-required services ■ Blocking of communication via physical ports ■ Log file for unauthorized access Stateful Inspection IPSec AES-256, AES-192, AES-128, 3DES-168 Preshared key (PSK), X.509v3 certificates MD5, SHA-1 8 No No No Yes No No Stateful Inspection IPSec AES-256, AES-192, AES-128, 3DES-168, DES-5 Preshared key (PSK), X.509v3 Certificates MD5, SHA-1 16 No No No Yes No Yes © Siemens AG 2014
  • 26. Security Integrated26 Product type designation CP 343-1 Advanced CP 443-1 Advanced Article No. 6GK7343-1GX31-0XE0 6GK7443-1GX30-0XE0 Transmission rate ■ at interface 1 / 2 10 ... 1000 Mbit/s / 10 ... 100 Mbit/s 10 ... 1000 Mbit/s / 10 ... 100 Mbit/s Ports Electrical connection ■ to interface 1 according to IE ■ to interface 2 according to IE ■ for power supply C-PLUG swap media 1 x RJ45 port 2 x RJ45 ports 2-pole plug-in terminal strip Yes 1 x RJ45 port 4 x RJ45 ports – Yes Supply voltage, current consumption, power loss Supply voltage ■ 1 from backplane bus ■ External 5 V DC 24 V DC 5 V DC – Permissible ambient conditions Ambient temperature ■ during operation - when installed vertically - when installed horizontally ■ during storage ■ during transportation Degree of protection 0 °C … +40 °C 0 °C … +60 °C -40 °C ... +70 °C -40 °C ... +70 °C IP20 0 °C … +60 °C – – -40 °C ... +70 °C -40 °C ... +70 °C IP20 Design, dimensions, and weight Module format Width / height / depth Net weight Compact 80 mm / 125 mm / 120 mm 0.8 kg Compact S7-400, single width 25 mm / 290 mm / 210 mm 0.7 kg Product function: Security Firewall configuration Product function in VPN connection Type of encryption algorithms for VPN connection Type of authentication algorithms for VPN connection Type of hashing algorithms for VPN connection Number of possible connections in the case of VPN connection Product function ■ Password protection for Web applications ■ ACL – IP-based ■ ACL – IP-based for PLC/routing ■ Deactivation of non-required services ■ Blocking of communication via physical ports ■ Log file for unauthorized access Stateful Inspection IPSec AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key (PSK), X.509v3 certificates MD5, SHA-1 32 Yes Yes Yes Yes Yes No Stateful Inspection IPSec AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key (PSK), X.509v3 certificates MD5, SHA-1 32 Yes Yes Yes Yes Yes No Security Integrated Technical data at a glance © Siemens AG 2014
  • 27. Security Integrated 27 Product type designation CP 1628 SOFTNET Security Client Article No. 6GK1162-8AA00 6GK1704-1VW04-0AA0 Ports Electrical connection ■ to interface 1 according to IE ■ of the backplane bus ■ for power supply 2 x RJ45 port PCI Express x1 1 x 2-pole terminal block Supply voltage, current consumption, power loss Type of power supply voltage Optional external supply Supply voltage ■ 1 from backplane bus ■ 2 from backplane bus ■ external ■ range DC Yes 3.3 V 12 V 24 V 10.5 V ... 32 V Permissible ambient conditions Ambient temperature ■ during operation ■ during storage ■ during transportation +5 °C ... +55 °C -20 °C ... +60 °C -20 °C ... +60 °C Design, dimensions, and weight Module format Width / height / depth Net weight PCI Express x1 (half length) 18 mm / 111 mm / 167 mm 0.124 kg Product function: Security Firewall configuration Product function in VPN connection Type of encryption algorithms for VPN connection Type of authentication algorithms for VPN connection Type of hashing algorithms for VPN connection Number of possible connections in the case of VPN connection Maximum number of usable IP addresses on VPN connection Stateful Inspection IPSec AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key (PSK), X.509v3 certificates MD5, SHA-1 64 16 – IPSec AES-256, AES-192, AES-128, 3DES-168, DES-56 Preshared key (PSK), X.509v3 certificates MD5, SHA-1 Unlimited or depending on computer config- uration Depends on computer configuration © Siemens AG 2014
  • 28. Industrial Security28 The merge of data systems in the production and office envi- ronments has made many processes faster and easier, while the use of the same data processing programs creates synergies. This development, however, also increases risks to security. Today it is no longer just the office environment that is under threat from viruses, trojans, hackers, etc., but production plants are also at risk of malfunctions and data loss. Many weak spots in security are not obvious at first glance. For this reason, it is advisable to check existing plants in regard to se- curity and to optimize them in order to maintain a higher level of plant availability. To enhance the security of a plant against cyber attacks, a multi-level service concept for Industrial Secu- rity is available from Siemens Industry. The first step involves "assessment" – the initial examination of the existing plant. This identifies weak spots or deviations from standards. The result of this examination is a detailed re- port about the actual status of the plant with a description of the weak points and an assessment of the risks. The report also contains suggested actions for improving the level of security. In the second stage of "implementation", the measures defined in the assessment are implemented, i.e.: • Training: Personnel are given specific training so that they under- stand what IT and infrastructure security means in the industrial environment. • Process improvement: Security-relevant regulations and guidelines relating to the existing plant requirements are drawn up and imple- mented. • Security technologies: Protective measures are implemented for hardware and software, as well as in the plant network, in addition longterm protection through monitoring is available. The measures defined and implemented in the first two phases are continuously developed in the third phase of "operation and management", i.e. monitoring the security status of the plant, checking the security level, redefining and optimizing ac- tions, as well as regular reports and functions such as updates, backup and restore. Even if changes are made to the plant net- work, the software environment or the administration of access rights for users and administrators, the services increase the se- curity level so that the corresponding data remains in the plant and attackers are given minimal opportunities to compromise the plant. The phases of implementation, operation and man- agement are tailored precisely to meet the existing needs. Industrial Security Industrial security services © Siemens AG 2014
  • 29. Industrial Security 29 Know your security posture and develop a security roadmap Step 1: Assess Provide continuous protection through proactive defense Step 3: Operate & Manage Engineering, design and implementation of a holistic cyber security program Step 2: Implement Cyber security training Development of security policies and procedures Implementation of security technology Global threat intelligence Incident detection and remediation Timely response to the changing threat landscape Vulnerability assessment Threat assessment Risk analysis G_IK10_XX_10376 Advantages at a glance ■ Determination of the security level and, based on this, drawing up a plan of action for reducing the risks ■ Specific training for building up technical knowledge ■ Tightened plant security through coordinated processes and specifications ■ Implementation of a comprehensive security solution for protecting the automation system ■ Connection to a Managed Service Center for continu- ous monitoring of the security status of the plant ■ Continuous monitoring of the security status of the plant ■ Detection of incidents and adaptation of the environ- ment to deal with threat situations ■ Plant kept state-of-the-art by means of updates (patterns, patches, signatures). © Siemens AG 2014
  • 30. Industrial Security30 Industrial Security Terms, definitions DDNS The Dynamic Domain Name System is an IT system that can update domain name entries. Demilitarized Zone (DMZ) A demilitarized zone or DMZ denotes a computer network with security monitoring of the ability to access the connected servers. The systems in the DMZ are shielded by one or more firewalls against other networks (such as Internet, LAN). This separation can allow access to publicly available services (e.g. email) while allowing the internal network (LAN) to be protected against unauthorized access. The point is to make computer network services available to both the WAN (Internet) and the LAN (intranet) on the most secure basis possible. A DMZ's protective action works by isolating a system from two or more networks. Firewalls Security modules that allow or block data communication be- tween interconnected networks according to specified securi- ty restrictions. Firewall rules can be configured for this. It is thus possible to specify that only a particular PC may access a given controller, for example. Port security The access control function allows individual ports to be blocked for unknown nodes. If the access control function is enabled on a port, packets arriving from unknown MAC ad- dresses are discarded immediately. Only packets arriving from known nodes are accepted. RADIUS: External authentication server The concept of RADIUS is based on an external authentication server. An end device can only access the network after the In- dustrial Ethernet switch has verified the logon data of the de- vice with the authentication server. Both the end device and the authentication server must support the Extensive Authen- tication Protocol (EAP). System hardening The system hardening package closes interfaces and ports that are not required, thereby reducing the vulnerability of the network to external and internal attacks. Every level of an au- tomation system is considered: the control system, network components, PC-based systems, and programmable logic con- trollers. Virtual private networks (VPN) A "VPN tunnel" connects two or more network stations (e.g. security modules) and the network segments behind them. En- crypting the data within this tunnel makes it impossible for third parties to listen in on or falsify the data when it is transmitted over an insecure network (e.g. the Internet). Virtual LANs (VLAN) The special feature of a VLAN: Devices can be assigned by con- figuration to a device group, irrespective of their physical loca- tion. In doing so, several of these device groups share a single physical network infrastructure. The result is several "virtual networks" on the same physical network. Data communica- tion takes place only within a VLAN. Whitelisting Whether it's for individuals, companies, or programs: A whitelist– or positive list – refers to a collection of identical elements that are consideredtrustworthy. WhitelistingforPCs en- suresthatonlythoseprograms that are actu- allyrequiredcanbeexecuted. © Siemens AG 2014
  • 31. 31 Follow us on: twitter.com/siemensindustry youtube.com/siemens Industrial Security – take a look! Get the full Industrial Security experience: ■ An overview of our security products and services ■ The latest innovations from the field of Industrial Security © Siemens AG 2014
  • 32. Get more information Information material available for downloading: www.siemens.com/automation/infocenter Service & Support: www.siemens.com/automation/servive&support SIMATIC NET contacts: www.siemens.com/automation/partner Industry Mall for electronic ordering: www.siemens.com/industrymall The information provided in this brochure contains merely general descriptions or characteristics of performance which in case of actual use do not always apply as described or which may change as a result of further development of the products. An obligation to provide the respective characteristics shall only exist if expressly agreed in the terms of contract. Availability and technical specifications are subject to change without notice. All product designations may be trademarks or product names of Siemens AG or supplier companies whose use by third parties for their own purposes could violate the rights of the owners. Siemens AG Industry Sector Industrial Automation Systems Postfach 48 48 90026 NÜRNBERG GERMANY Subject to change without notice Article No.: 6ZB5530-1AP02-0BA3 DR.PN.SC.14.XXBR.95.31 / Dispo 26000 BR 0314 2. PES 32 En Printed in Germany © Siemens AG 2014 www.siemens.com/automation Security information Siemens provides products and solutions with industrial security functions that support the secure operation of plants, solutions, machines, equipment and/or networks. They are important components in a holistic industrial security concept. With this in mind, Siemens’ products and solutions undergo continuous development. Siemens recommends strongly that you regularly check for product updates. For the secure operation of Siemens products and solutions, it is necessary to take suitable preventive action (e.g. cell protection concept) and integrate each component into a holistic, state-of-the-art industrial security concept. Third- party products that may be in use should also be considered. For more information about industrial security, visit: http://www.siemens.com/industrialsecurity To stay informed about product updates as they occur, sign up for a product-specific newsletter. For more information, visit: http://support.automation.siemens.com © Siemens AG 2014