Table Of Contents - GE PACSystems RX3i Secure Deployment Manual

Profinet io devices
Hide thumbs Also See for PACSystems RX3i:
Table of Contents

Advertisement

Table of Contents

PACSystems* PROFINET IO Devices Secure Deployment Guide GFK-2904D
Table of Contents ............................................................................................................................................................. i
Table of Figures ............................................................................................................................................................... iii
About this Guide ....................................................................................................................................... 1
Revisions in this Manual .......................................................................................................................... 2
1.1
PACSystems Documentation................................................................................................................. 3
1.2
Introduction ............................................................................................................................................... 5
Security ....................................................................................................................................................... 5
2.1
Firewall ........................................................................................................................................................ 5
2.2
Defense in Depth ....................................................................................................................................... 5
2.3
General Recommendations .................................................................................................................... 6
2.4
Checklist ...................................................................................................................................................... 6
2.5
Communication Requirements.............................................................................................................. 7
Supported Protocols ................................................................................................................................ 8
3.1
ETHERNET Protocols ......................................................................................................................................... 8
Serial Protocols .................................................................................................................................................... 8
Service Requests ....................................................................................................................................... 9
3.2
SNP ........................................................................................................................................................................... 9
PROFINET .................................................................................................................................................. 10
3.3
Installing an I/O Device .................................................................................................................................. 10
Network Discovery and Device Identification ...................................................................................... 10
Using an I/O Device ......................................................................................................................................... 11
Ethernet Firewall Configuration ......................................................................................................... 12
3.4
Lower-Level Protocols ................................................................................................................................... 12
Application Layer Protocols ......................................................................................................................... 13
Security Capabilities .............................................................................................................................. 15
Capabilities by Product ......................................................................................................................... 15
4.1
Access Control and Authorization ..................................................................................................... 15
4.2
Authorization Framework ............................................................................................................................ 15
Specifying Access Rights ............................................................................................................................... 16
GFK-2904D
July 2018
i

Advertisement

Table of Contents
loading

Table of Contents