
Security SIMATIC NET
V2.0, Entry ID: 27043887
Copyright Siemens AG 2013 All rights reserved
Table of Contents
Warranty and Liability ................................................................................................. 4
Preface .......................................................................................................................... 5
Table of Contents ......................................................................................................... 6
1 Overview of Important Terms and Technologies ........................................... 8
1.1 Address assignment ............................................................................. 8
1.2 Transmission protocols ........................................................................ 9
1.3 Firewalling ............................................................................................ 9
1.4 Encoding .............................................................................................. 9
2 Risk Reduction through Security ................................................................... 10
2.1 Problem description ............................................................................ 10
2.2 Conditions and requirements ............................................................. 10
2.3 The Siemens protection concept: “Defense in Depth” ....................... 11
2.3.1 The Siemens solution for plant security ............................................. 11
2.3.2 The Siemens solution for network security ........................................ 12
2.3.3 The Siemens solution for system integrity ......................................... 14
3 Possible Scenarios for Data Protection ........................................................ 15
3.1 Node restriction on S7 controls .......................................................... 15
3.1.1 Protection in the end device ............................................................... 16
3.1.2 Protection through a firewall ............................................................... 17
3.1.3 Protection through “segmentation” ..................................................... 19
3.1.4 Protection through authentication ...................................................... 20
3.2 Communication restrictions for plants / single devices ...................... 21
3.3 Bandwidth restriction .......................................................................... 23
3.4 Secure remote access via Internet ..................................................... 24
3.4.1 Access to a system with DSL broadband connection ........................ 26
3.4.2 Access to a system accessible via the mobile phone network .......... 28
3.5 Secure data communication between system components ............... 29
3.5.1 Data communication via Internet ........................................................ 29
3.5.2 Data communication via LAN ............................................................. 32
3.6 WLAN scenarios with SCALANCE W ................................................ 37
3.7 WLAN scenario with non-secure components ................................... 39
4 Basics and Principles...................................................................................... 41
4.1 Basics of Ethernet and the IP protocol suite ...................................... 41
4.1.1 OSI model (7-layer model) ................................................................. 41
4.1.2 System addressing (MAC and IP address) ........................................ 42
4.1.3 Address resolution with ARP .............................................................. 43
4.1.4 Structure of a data packet .................................................................. 45
4.1.5 Formation of subnets and routing ...................................................... 46
4.1.6 The TCP protocol ............................................................................... 47
4.1.7 The UDP protocol ............................................................................... 48
4.1.8 Port addressing .................................................................................. 48
4.2 Basic principles of wireless data transmission ................................... 49
4.2.1 Wireless LAN radio technology .......................................................... 49
4.2.2 Radio systems GPRS and EDGE ...................................................... 50
4.2.3 The UMTS (3G) radio technology ...................................................... 51
4.3 Security mechanisms for wireless LAN .............................................. 52
4.3.1 WEP (Wired Equivalent Privacy) ........................................................ 52
4.3.2 WPA (Wi-Fi Protected Access) .......................................................... 52
4.3.3 WPA2 und AES (Advanced Encryption Standard) ............................. 53
4.3.4 EAP (Extensible Authentication Protocol) .......................................... 53
4.3.5 MAC Filter .......................................................................................... 53