nsa 100sx

Transcription

nsa 100sx
Communications Technology
Seminar
KEPCO Utility March 13, 2006
Presented by: Angelo Rizzo and
Roger Moore
Copyright RuggedCom Inc.
1
Morning Agenda
1. Introduction to RuggedCom
2. Environmental requirements for network
equipment in Substation
3. Ethernet Essentials
4. Fiber Optic Basics
5. Substation Communication Architectures
6. Advanced Layer 2 Networking (Managed
Switches)
7. RuggedSwitch™ & RuggedServer™ Product
Overview
Copyright RuggedCom Inc.
2
Afternoon Agenda
8. Overview of Layer 3 Networking (Routers)
9. Network Security Overview
10. Network Security NERC1300 and CIP
requirements
11. How Switches and Routers Provide Security
12. RuggedRouter™ Product Overview
13. ROS™ and ROX™ Security Features
14. Question and Answer Session
Copyright RuggedCom Inc.
3
Introduction to RuggedCom
Copyright RuggedCom Inc.
4
Corporate Background
A Brief History …
¾ Founded in March 2001 – Concord, Ontario, Canada
¾ Primary objective was to develop “Substation Hardened” Fiber Optical Ethernet
Switches and Routers
¾ Currently employ over 50 people: Engineering, Manufacturing, Sales and Support
¾ Key Utility Investors: Ontario Power Generation, EPCOR Utilities
Related Industry Background …
¾ Over 100 years of collective experience in the design of Protective
Relaying Systems, Industrial Automation and Substation Automation
technology
¾ Over 100 years of collective experience in the design of
Communications Systems and Networks
Leverage Our Combined Experience in Automation and
Communications to Get the Best of Both Worlds
Copyright RuggedCom Inc.
5
Facilities
Corporate Headquarters
¾ Woodbridge (Toronto), ON,
Canada
¾ R&D, Sales and Marketing, Final
Assembly, and 24 hr Burn-in
¾ Technical Support and Training
Center
Manufacturing
Customer Support Center
¾ Creation Technologies - Toronto
¾ Hollywood Florida
¾ Local contract manufacturer
¾ Staffed by Certified RuggedCom
Network Engineers
¾ New state-of-the-art SMT facility
¾ ISO9001 – 2000 certified
¾ Six-Sigma methodologies &
metrics
¾ Customer Support
¾ Equipment for Proof of Concept
¾ Technical Training
¾ Interoperability Testing
Copyright RuggedCom Inc.
6
Markets Served
Electric Power Utilities - Substation Automation
¾ “Substation Hardened” Ethernet is emerging trend for substation
automation (UCA, IEC 61850, IEEE1613)
¾ Critical element for a smart, self-healing, power grid
Industrial – Process Control & Plant Floor Automation
¾ “Industrially Hardened” Ethernet on the plant floor is new trend for
plant/process control.
¾ Over 6.0 Million Ethernet devices/year expected to be shipped by 2007
Intelligent Transportation Systems (ITS)
¾ “Field Hardened” Ethernet is new emerging trend for deployment of video
over IP & traffic control at major intersections.
¾Train control systems / light rail converting to Ethernet
Government/Military
¾ “Environmentally Hardened” Ethernet is new emerging trend for use in
military
¾ Homeland security, and government infrastructure (e.g. Pentagon)
Copyright RuggedCom Inc.
7
Leadership In The Industry
¾ 1st to implement Ethernet and UCA in a protective relay
- Company founders were pioneers in integrating Ethernet and UCA in protection relays
¾ 1st and only Ethernet switch to provide Zero-Packet-Loss™
- performance under high levels of electromagnetic interference
- IEC 61850-3 (2002) requirements for communications networks in substations
¾ 1st and only Ethernet switch qualified as an IEEE 1613 Class 2 error free communications
- for communications networks in electric power substations
- strong participation in the development of the IEEE 1613 (2003) standard
¾ 1st and only Ethernet switch to offer Enhanced RSTP (eRSTP)™
- for fault tolerant ring architectures with high-speed fault recovery of < 5ms per hop
¾ 1st and only Ethernet switch to achieve UL864 approval
- for use in fire control systems for the Pentagon.
¾ 1st and only Managed Ethernet switch that is IP65/IP67 rated
- Waterproof: IP65 (Water Jets) and IP67 (Water Immersion)
Building On Our Heritage as Innovators in Substation Automation
Copyright RuggedCom Inc.
8
Focus on Quality
Quality Management System (QMS)
¾ Quality manual, processes and auditing in
place
¾ Dedicated QA manager
¾ Formal quarterly metrics analysis and
management review.
¾ ISO9001:2000 certification
Six-Sigma Methodologies Employed
¾ Key manufacturing and engineering personnel
have 6-sigma background and training.
¾ DMAIC applied in manufacturing: FPY, Pareto,
Defect
Analysis
Copyright RuggedCom Inc.
9
Product Basket
RuggedRouter™ Routers
¾ RX1000 – Integrated Router, Firewall, and VPN
¾ RX1100 – RX1000 features plus IDS and BGP (coming soon)
Gigabit RuggedSwitch™ Ethernet Switches
¾ RSG2200 – 9-Port Managed Gigabit Ethernet Switch
¾ RSG2100 – 19-Port Modular Ethernet Switch with Gigabit Options
¾ RS900G – 10-Port Flexible Ethernet Switch with Gigabit Options
¾ RS969 – IP65/IP67 Rated 10-Port Ethernet Switch with Gigabit Options
RuggedSwitch™ Ethernet Switches
¾ RS900 – 9 Port Ethernet Switch with Fiber Optic Options
¾ RS1600 – 16 Port Ethernet Switch with Fiber Optic Options
¾ RS8000 – 8 Port Ethernet Switch with Fiber Optic Options
Serial Servers and Media Converters
¾ RS400 – 4 Port Serial Device Server with 4 Port Ethernet Switch
¾ RMC – Ethernet Media Converter (Copper to Fiber)
¾ RMC20 – Serial Media Converter (Copper to Fiber)
¾ RMC30 – 2 Port Serial to Ethernet Converter
¾ RMC40 – 4 Port Ethernet Media and Speed Converter
Most Complete Line of Substation Hardened Communications Devices
Copyright RuggedCom Inc.
10
Environmental Requirements for
Network Equipment in a Substation
Copyright RuggedCom Inc.
11
Substation Environment
Power Station
MV/HV Substation
EMI & Environmental Phenomena Typical of Substation Environments
• Electric and Magnetic Fields
• Electrostatic Discharge
• Conducted High Frequency Electrical Transients
• High Energy Power Surges
• Ground Potential Rise during ground faults
• Climactic Variation: Temperature & Humidity
• Seismic / Vibration
• Pollution: Dust, Metallic Particles, Condensation, Solar Radiation
Copyright RuggedCom Inc.
12
Substation EMI Phenomenom
Continuous
Phenomena
•• Radiated
Radiated RFI
RFI
•• Induced
Induced RFI
RFI
•• Power
Power freq.
freq. Magnetic
Magnetic Field
Field
•• Slow
Slow Voltage
Voltage Variations
Variations
•• Harmonics,
Harmonics, Interharmonics
Interharmonics
•• Ripple
Ripple on
on d.c.
d.c. power
power
supply
supply
•• Power
Power Frequency
Frequency Voltage
Voltage
Transient
Phenomena
(High Occurrence)
•• Electrostatic
Discharge
Electrostatic
Discharge
Transient
Phenomena
(LowFrequency
Occurrence)
•• Power
Power
Frequency
•• Voltage
Voltage Dips
Dips
•• Lightning
Lightning
•• HV
HV Switching
Switching by
by Isolators
Isolators
•• Reactive
Reactive Load
Load Switching
Switching
Variation
Variation
•• Power
Power System
System Faults
Faults
•• Short
Short Duration
Duration Power
Power
Freq.
Freq. Magnetic
Magnetic Fields
Fields
Devices in substation environments must deal with
a combination of EMI phenomena which are both
continuous and transient.
Copyright RuggedCom Inc.
13
Communication Standards
IEC 61850-3 (2002)
IEEE 1613 (2003)
“Communications networks and
systems in substations”
“Standard Environmental and Testing
Requirements for Communications
Networking Devices in Electric Power
Substations”
Copyright RuggedCom Inc.
14
IEC 61850-3: EMI Immunity
UTILITY IEC 61850-3 (61000-6-5) Communications Networks and Systems In Substations (Jan 2002)
Description
TEST
IEC 61000-4-2
ESD
IEC 61000-4-3
Radiated RFI
IEC 61000-4-4
Burst (Fast Transient)
IEC 61000-4-5
Surge
IEC 61000-4-6
Induced (Conducted) RFI
IEC 61000-4-8
Magnetic Field
IEC 61000-4-29
Voltage Dips & Interrupts
IEC 61000-4-11
IEC 61000-4-12
Damped Oscillatory
IEC 61000-4-16
Mains Frequency Voltage
IEC 61000-4-17
Ripple on D.C. Power Supply
Enclosure Contact
Enclosure Air
Enclosure ports
Signal ports
D.C. Power ports
A.C. Power ports
3
Earth ground ports
Signal ports
D.C. Power ports
A.C. Power ports
Signal ports
D.C Power ports
A.C. Power ports
3
Earth ground ports
Enclosure ports
D.C. Power ports
A.C. Power ports
Signal ports
D.C. Power ports
A.C. Power ports
Signal ports
D.C. Power ports
D.C. Power ports
Test Levels
Severity Levels
+/- 6kV
3
+/- 8kV
3
10 V/m
3
+/- 4kV @ 2.5kHz
x
+/- 4kV
4
+/- 4kV
4
+/- 4kV
4
+/- 4kV line-to-earth, +/- 2kV line-to-line
4
+/- 2kV line-to-earth, +/- 1kV line-to-line
3
+/- 4kV line-to-earth, +/- 2kV line-to-line
4
10V
3
10V
3
10V
3
10V
3
40 A/m continuous, 1000 A/m for 1 s
N/A
30% for 0.1s, 60% for 0.1s, 100% for 0.05s
N/A
30% for 1 period, 60% for 50 periods
N/A
2
100% for 5 periods, 100% for 50 periods
N/A
3
2.5kV common, 1kV differential mode @ 1MHz
2.5kV common, 1kV differential mode @ 1MHz
3
3
2.5kV common, 1kV differential mode @ 1MHz
30V Continous, 300V for 1s
4
30V Continous, 300V for 1s
4
10%
3
9 EMI Immunity Requirements based on Substation Environment
9 Higher EMI Immunity Levels than Industrial Environments
9 Similar type tests as per Protective Relaying IEDs
Copyright RuggedCom Inc.
15
IEC 61850-3: Performance
IEC 61000-6-5 Table 7 - Performance Criteria for the most relevant functions
(in descending order of criticality)
Functional requirements versus electromagnetic phenomena
Functions
Continous phenomena
Transient phenomena
with high occurance
Transient phenomena
with low occurance
Protection and teleprotection
On-line processing and
regulation
Metering
Short delay
Command and Control
Supervision
** No Delays or Data Loss **
Stop and reset
Man-machine interface
Alarm
Data transmission and
telecommunication
Temporary loss, self
recovered
Short delay, temporary wrong indication
No loss, possible bit
error rate degradation
Temporary loss
Temporary degradation
Data acquisition and storage
Temporary degradation, self recovered
Measurement
Off-line processing
Temporary degradation Temporary loss and reset
Passive monitoring
Temporary degradation
Temporary loss
Temporary loss, self recovered
Self-diagnosis
Copyright RuggedCom Inc.
16
IEC 61850-3 Climatic Specs
Four Classes of Locations:
1.Class A: air-conditioned locations (indoor)
2.Class B: heated or cooled enclosed conditions
3.Class C: sheltered locations
4.Class D: outdoor locations
Class C Operating Temperature Ranges:
1.Class C1: -5 to +45°C
2.Class C2: -25 to +55°C
3.Class C3: -40 to +70°C
4.Class Cx: Special (defined by mfg)
Copyright RuggedCom Inc.
17
IEEE 1613: EMI Immunity
IEEE P1613 ? Draft Standard Environmental Requirements for Communications Devices Installed in Electric
Power Substations
TEST
Description
IEEE C37.90.3
ESD
IEEE C37.90.2
Radiated RFI
IEEE C37.90.1
Fast Transient
IEEE C37.90.1
Oscillatory
IEEE C37.90
Dielectric Strength
Test Levels
Enclosure Contact
Enclosure Air
Enclosure ports
Signal ports
D.C. Power ports
A.C. Power ports
3
Earth ground ports
Signal ports
D.C. Power ports
A.C. Power ports
Signal ports
D.C. Power ports
A.C. Power ports
+/- 8kV
+/- 15kV
35 V/m
+/- 4kV @ 2.5kHz
+/- 4kV
+/- 4kV
+/- 4kV
2.5kV common mode @ 1MHz
2.5kV common & differential mode @ 1MHz
2.5kV common & differential mode @ 1MHz
2kVac
2kVac
2kVac
Severity Levels
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
N/A
9 Based on IEEE C37.90.x standards for Protective Relaying devices
9 Two Performance Classes of Device Operation
CLASS 1 – communications errors allowed during type tests
CLASS 2 - “error free” operation during type tests
9 No cooling fans allowed!
Copyright RuggedCom Inc.
18
IEEE 1613 Class 2 Performance
Power System
Current Waveform
Fault
Substation LAN
τ = 16.7ms
SWITCH
GOOSE
Message
SWITCH
Protective
Relaying IEDs
Fault period is a period of:
•
•
•
•
•
High levels of transient EMI phenomena!
Sub-cycle (i.e. ≤ 16.67ms) processing by IEDs
Substation LAN could be flooded with control traffic e.g.
GOOSE/GSSE messages for tripping/blocking!
LAN must perform without communications errors, or delays due to
EMI conditions caused during fault period!
IEEE 1613 Class 2 networking devices required for LAN!
Copyright RuggedCom Inc.
19
IEEE 1613 Climatic Specs
Device Operating Temperature Ranges
a) -40 to +70°C
b) -30 to +65°C
c) -20 to +55°C
d) Range defined by the manufacturer
IEEE 1613 also stipulates…No cooling fans allowed!
Copyright RuggedCom Inc.
20
Fiber vs. Copper: EPRI Study
EPRI - Study of copper Cable for UCA (1997)
• Looked at susceptibility of shielded and unshielded
CAT5 cable to electrical fast transients which are a
common EMI phenomenon in substations.
• Results indicated large communications frame loss
rates:
» 32% @ 1kV
» 66% @ 2kV
» 75% @ -2kV
Copyright RuggedCom Inc.
21
Fiber vs. Copper: Rockwell Study
Rockwell Automation - CMR of Copper Cable (2002)
• Induced RFI (IEC 61000-4-6) Applied to CAT5 cable
to test CMR (Common Mode Rejection)
• Common mode noise coupling will occur via
adjacent cabling
• Resultant Bit Error Rate:
» 22% @ 10Vrms (noise coupled)!
CONCLUSION
Fiber is required for real-time control applications
where communications errors cannot be tolerated.
Copyright RuggedCom Inc.
22
RuggedRated™ Specifications
¾ Rated for reliable operation in harsh electrical environments
- Electric utility substations: Meets IEEE 1613, Exceeds IEC 61850-3
- Variable speed drive systems: Exceeds IEEE 61800-3
- Generic industrial environments: Exceeds IEC 61000-6-2
- Traffic control equipment: Exceeds NEMA TS-2
¾ Rated for operation over a wide temperature range
- -40°C to +85°C (+185°F)
- Passive cooling – no fans
- CSA/UL 60950 safety approval to +85°C
¾ Rated for high availability
- Integrated single and dual redundant power supplies
- 24VDC, 48VDC, or 88-300VDC/85-264VAC
- Dual power supplies can be powered from different sources
¾ Rated for industrial installations
- 18 gauge galvanized steel enclosure for durability
- heavy duty 19” rack or din rail mount
- industrial terminal blocks for power and I/O connections
¾ 5-Year Warrantee
All RuggedCom Products are RuggedRated™
Copyright RuggedCom Inc.
23
Zero Packet Loss Technology
Transients Generator
IEC 61850, IEEE 1613
Ingoing packets
Outgoing packets
SmartBits
(Network Simulator/Analyzer)
RuggedCom Products Meet or Exceed the Most Extensive Set
of EMI Immunity Standards in the Industry
Copyright RuggedCom Inc.
24
Ethernet Essentials
Copyright RuggedCom Inc.
25
Ethernet History
•
•
•
•
Invented by Robert Metcalf at Xerox
Celebrated 30th birthday 2003
Dominant in office LAN
Survived where Token Ring, FDDI, Arcnet failed
Copyright RuggedCom Inc.
26
OSI Seven Layer Model
IEC61850(UCA2)
ProfiNet
Fieldbus HSE
Application
HTTP
EtherNet/IP
SMTP
DNP3/TCP
Modbus/TCP
FTP
…
Presentation
Session
Transport
TCP/UDP
Network
IP
Data Link
IEEE 802.1
Physical
IEEE 802.3
TCP/IP
Ethernet
Please Do Not Take Sausage Pizza Away!
Copyright RuggedCom Inc.
27
Communication Within OSI Model
Station 1
Station 2
Application
Application
Presentation
Presentation
Session
Session
Transport
Transport
Network
Network
Link
Link
Physical
10/100 BaseTx
Copyright RuggedCom Inc.
Physical
28
The Ethernet Frame
• Ethernet transmits data in a frame of size 64 to 1518
bytes except when VLAN tagged (more on that later)
• Frame overhead of 18 bytes (min) results in overhead
of 28% - ouch – for small data payloads
Copyright RuggedCom Inc.
29
Ethernet Addressing
• 48-bit number
– First three bytes assigned by IEEE (Organization Unique
Identifier – OUI)
– MSBit indicates unicast or multicast
– Broadcast address is 0xFFFFFF
• All ‘MAC addresses’ for all devices ever built have a
unique address
• Source address always the senders unique address
• Destination address can be one of:
– Unicast – station to one other station
– Multicast – station to multiple stations
– Broadcast – station to all other stations
Copyright RuggedCom Inc.
30
The Ethernet Repeater
• Also known as a hub
• Layer 1 only – does not understand Ethernet frame
• Repeats incoming signal all other ports with restored
timing and signal strength with negligible delay
• Requires CSMA/CD i.e. collisions & non-deterministic
• Half-duplex only
• Collision domain restricting network ‘diameter’ to 200m
Station 1
Station 2
Application
Presentation
Session
Transport
Network
Link
Physical
Application
Presentation
Session
Transport
Network
Link
Physical
Repeater
Physical
10/100 BaseT
Copyright RuggedCom Inc.
31
•
CSMA/CD is History!
Ethernet on a shared media requires CSMA/CD to
allow equitable use of the media
–
–
–
•
Operation of CSMA/CD
–
–
–
•
•
CS - Carrier Sense (Is someone already talking?)
MA – Multiple Access (I hear what you hear)
CD – Collision Detection (Hey, we’re both talking!)
If the medium is idle transmit anytime
If the medium is busy wait and transmit right after
If a collision is detected, backoff for a random time and repeat
Collisions have been the historical complaint against
Ethernet – not ‘deterministic’
A fully switched Ethernet network only has point-topoint connections: no CSMA/CD and no collisions
Copyright RuggedCom Inc.
32
The Ethernet Switch
•
•
•
•
•
•
•
Buffers frames before re-sending: “store and forward”
Checks frame integrity (CRC)
Allows full duplex links and speed conversion
No CSMA/CD – No Collisions - Deterministic
Supports flow control via PAUSE frames
Traffic queued at egress ports to eliminate collisions
Automatically learns the addresses of all end devices
Station 1
Application
Presentation
Session
Transport
Network
Link
Physical
Station 2
Switch
Link
Physical
Copyright RuggedCom Inc.
Application
Presentation
Session
Transport
Network
Link
Physical
33
Layer 2 Switch Basic Operation
1. Error check incoming frame
2. Teach MAC table source address and ingress
port relationship
3. Lookup destination address from MAC table
to determine egress port, VLAN membership,
and CoS weighting, …
4. Put frame onto egress port queue or ‘flood’
unknown address
5. Add or remove 802.1P/Q tag based on user
configuration
6. Transmit frame
Copyright RuggedCom Inc.
34
The Managed Switch
• Same as unmanaged but add:
– User interface via RS232, Telnet, SNMP, HTTP, …
– Status, statistics, and troubleshooting facilities
– Rapid Spanning Tree (IEEE 802.1w) for fault tolerant
loop architectures
– VLANs (802.1Q)
– Quality of Service-QOS (802.1p)
– SNMPv2, RMON Groups 1, 2, 3, 9
– IGMP(Internet Group Messaging Protocol) Snooping
– GMRP(Generic Multicast Registration Protocol)
– GVRP(Generic VLAN Registration Protocol)
– Link aggregation (IEEE 802.3ad)
– Port Mirroring
– And more …
Copyright RuggedCom Inc.
35
Switches Add Latency
• Latency is the time is takes a frame to get from
source to destination
• Store and forward introduces a minimum
latency of one frame time per switch ‘hop’
• Frame latency ranges from 5 to 120 us per
switch at 100Mbps - proportional to frame size
• Switch also introduces a processing latency on
the order of 5us
• To get absolute worst case multiply by
maximum queue size at busy port
• QoS pushes important traffic to front to queue
to reduce latency
Copyright RuggedCom Inc.
36
Auto Crossover, Sensing, and
Negotiation
• Auto-crossover auto-detects Rx/Tx pairs
eliminating need for crossover cables
– Doesn’t work on fiber links
• Auto-sensing auto-configures link speed
– Only works for 10/100 UTP links
– Cannot configure duplex
• Auto-negotiation auto-configures speed, duplex,
and flow control
– Doesn’t work on fiber links (except 100SX)
– Duplex mismatch problem can occur when both
sides don’t negotiate
Copyright RuggedCom Inc.
37
Fiber Optic Basics
Copyright RuggedCom Inc.
38
Fiber Optics Overview
•
•
•
•
•
•
•
•
Immense bandwidth
Long distances possible
Immune to electromagnetic interference
Increased security (resistance to
eavesdropping)
Future proof
Lightweight
Higher pull strength then typical copper cabling
Cost continues to drop
Copyright RuggedCom Inc.
39
Fiber Optical Cable
• Consists of three layers:
– Core - Very thin strand of glass that carries the data
– Cladding - Another layer of glass with a different refraction
index to either keep light in or out of the core
– Buffer - protective layer
• Two types: ‘multi mode’ and ‘single mode’
• Data transmitted with a single frequency of light
Copyright RuggedCom Inc.
40
Multimode vs. Singlemode
• Multi-mode:
– Uses graded index cladding to reflect
light back into core
– 62.5/125mm or 50/125mm
– 850/1300 nm light
– Lowest cost
– Distance limited by modal dispersion
• Single mode:
– 8/125mm or 9/125mm
– 1310/1550 nm light
– Distance limited by attenuation and
chromatic dispersion
Copyright RuggedCom Inc.
41
Fiber Optic Connectors
•
•
•
•
ST “Stick and Twist” and SC “Stick and Click” historically popular
LC becoming prevalent especially for Gigabit because small form
factor (SFF) allows greater port density
GBIC are pluggable SC transceivers using SC connectors
SFP are ‘Small Form Factor Pluggable” using LC connectors
ST
LC
SC
MTRJ
Copyright RuggedCom Inc.
42
IEEE Fiber Standards
Standard
Wavelength
Data Rate
Distance*
Notes
10Base-FL
850nm
10 Mbps
2 km (MM)
15 km (SM)
Fiber optic end stations
100Base-Fx
1300nm
100 Mbps
2km (MM)
15km (SM)
Typical Fast Ethernet
100Base-SX
850nm
10/100 Mbps
300m (MM)
Negotiates speed
Not popular
1000Base-SX
850nm
10/100/1000
Mbps
220m (62.5 MM)
550m (50 MM)
Negotiates speed
Not popular
1000Base-LX
1310nm
1000 Mbps
550m (MM)
5km (SM)
Typical GigE
1000Base-Bx
1310 /
1550 nm
1000 Mbps
5km (SM)
Bi-directional single fiber
strand optics
1000Base-LH
1550nm
1000 Mbps
70 km (SM)
Long-haul backbones
*Distances can be increased when using higher grade cable and high power transmitters.
Copyright RuggedCom Inc.
43
Fiber Power Budget
Net Power Budget = Launch Power – Receiver Sensitivity – Signal Loss
Signal Loss = Attenuation of Fiber + Splice + Connector(s)
• Optical power measured in dBm – referenced
to 1mW
• Launch power and receiver sensitivity vary from
vendor to vendor
• Fiber attenuation ranges from 3dB/km for
850nm MM to 0.2 dB/km for 1550nm SM
• Splice attenuation approx 0.1 dB
• Connector attenuation approx 1.0 dB
Copyright RuggedCom Inc.
44
Fiber Distance Limitations
• Maximum distance allowed with multi-mode
fiber is limited primarily by modal dispersion
– Modal dispersion caused by light traveling different
paths through the fiber resulting in signal ‘smudge’
– Cables rated in MHz/km
• Single-mode fiber limited by attenuation and
chromatic dispersion
– Attenuation due to impurities in the glass fiber –
measured in dM/km
– Chromatic dispersion caused by transmitter emitting
spectrum of frequencies resulting in signal ‘smudge’
– Long distances possible (>100km) with high quality
cable and high power transmitters
Copyright RuggedCom Inc.
45
Fiber Do’s and Don’t’s
• DO Keep your fiber clean. Use an airgun or
alcohol swab to clean the ends
• DO Keep fiber cables capped when not in use
to prevent dust and scratches
• DO Keep fiber ports on devices capped when
not in use to prevent dust.
• DON’T Let the fiber bend more than a 10cm
radius. Fiber is glass and breaks. Bending also
adds attenuation.
• DON’T Look into a fiber! Use an optical power
meter.
Copyright RuggedCom Inc.
46
Substation
Communication Architectures
Copyright RuggedCom Inc.
47
Brief History
•
Driven by Utilities and EPRI during 90’s
•
Developed UCA2.0 – Utility Communications Architecture
specification in an attempt to provide one common protocol
and architecture for utility communications.
•
UCA2.0 profile specified Ethernet (IEEE 802.3)
•
Adoption by ALL major IED Vendors in late 90’s
•
UCA2.0 specification becomes IEC 61850 – issued 2002/3/4.
•
Other popular protocols Ethernet: DNP3, Modbus, Profibus,
DeviceNet…
Copyright RuggedCom Inc.
48
Typical Ethernet Substation
Substation LAN
IEDs
HV Wiring
C
A
Breaker
Source Source
CTs
VTs
Power System
B
The Substation LAN provides a high-speed communications bus between
a variety of IEDs (e.g. Relays, RTUs, Meters, etc…)
Copyright RuggedCom Inc.
49
IEC 61850 Substation
“Station Bus” LAN
IEC 61850-8-1
“Process Bus” LAN
IEC 61850-9-2
IEDs
Digital
CT/VT
IEDs
C
Intelligent
Breaker
A
Power System
B
The “Digital Substation”: both power system data and control over the LAN.
Copyright RuggedCom Inc.
50
Cascading Bus Architecture
2
1
IED IED
IED
IED IED
IED
IED
3
IED IED
IED
IED
4
IED IED
IED
N
IED
IED IED
IED
IED
IED
• Cost-effective bus architecture – messages cascade
from switch to switch.
• Maximum number of “hops” (N) is determined by
worst case latency requirements
Copyright RuggedCom Inc.
51
Star Architecture
IED IED
IED
IED IED
IED
IED IED
IED
IED
IED
IED IED
IED
IED
IED
• Low-Latency Architecture – Any IED to IED
communications requires only two ‘hops’.
• “Home run” cabling often more expensive or prohibitive
to implement
Copyright RuggedCom Inc.
52
Ring Architecture
PATH
1
IED IED
IED
Fault
Fault
IED IED
IED
IED
IED IED
IED IED
IED
IED
IED
PATH
2
IED
IED IED
IED
IED
IED IED
IED
IED
IED
• N+1 Fault Tolerant Ring Architecture
• Automatic Reconfiguration via RSTP
Copyright RuggedCom Inc.
53
RuggedCom Substation Network
Copyright RuggedCom Inc.
54
Advanced Layer 2 Networking
(Managed Switches)
RSTP, VLAN, CoS, IGMP, 802.1x,
SNMP, RMON, …
Copyright RuggedCom Inc.
55
Spanning Tree Protocol (802.1d)
• Allows for redundant connections by preventing loops in
the LAN*
• Automatically determines the best fit tree that spans the
entire physical LAN
• Provides fault tolerance by using redundant links as
backups
• Has low overhead, is reproducible
• Minimal configuration required (if any)
• Is an industry standard with vendor interoperability
• 30 second failover times
* The presence of ‘loops’ in an Ethernet LAN results in a
broadcast storm which renders the network useless.
Copyright RuggedCom Inc.
56
Rapid Spanning Tree (802.1W) RSTP
•
•
•
•
•
•
•
Builds on the features of STP
Backwards compatible with STP
Introduces Link State Failover for fast recovery
Very fast failover times under 50 ms
Slow link recovery times up to 2 seconds
Ring size limited to 20 switches
Requires managed switches with RSTP
capability to capitalize on fast failover
Copyright RuggedCom Inc.
57
RSTP Roles and States
• Switch states:
– Root bridge: the logical center of the network
– Designated bridge: not the root bridge
• Port states:
– Discarding: no address learning nor frame forwarding
– Learning: addresses learned but no frame forwarding
– Forwarding: learning and forwarding
• Port Roles:
– Root: best root to the root bridge – can only have one
– Designated: best port for servicing the LAN segment to which is
is connected
– Alternate: an alternate to the current root port
– Backup: backup for a designated port
Copyright RuggedCom Inc.
58
RSTP Example: Steady State
L2
SW
Root bridge
1
Root Port
L2
SW
2
3
4
5
Ethernet Switches
A,B,C,D
A
6
Alternate Port
1
2
3
4
5
x
6
B
y
L2
SW
1
2
3
4
5
6
C
Backup Port
Designated Port
L2
SW
Traffic from x to y must go
through root bridge A instead
of the more direct path
1
z
Copyright RuggedCom Inc.
2
3
4
5
6
D
Designated Port
59
RSTP Example: After Failover
L2
SW
Failed Link
L2
SW
1
2
3
4
5
x
6
1
B
2
3
4
5
Alternate link is activated
thus providing a path
back to root bridge.
A
6
L2
SW
1
2
3
4
5
6
C
L2
SW
1
2
3
4
5
6
D
y
Traffic from x to y now takes
the more direct path after the
root port failure.
z
Copyright RuggedCom Inc.
60
eRSTP Technology
Port unblocks and
allows new path
New
Network Traffic
Path(s)
Enhanced Rapid Spanning Tree
Protocol (eRSTP™)
¾ Enhanced IEEE 802.1w RSTP
¾ High-Speed Fault Tolerant Ring Architectures
¾ Fast Fault Recovery: < 5ms/hop fault recovery
¾ Large Rings Configurations: up to 80 switches
¾ Compatible with RSTP (IEEE 802.1w)
FAULT
¾ Available on RuggedSwitch™ devices only
eRSTP™ Fastest Network Fault Recovery in the Industry …
<5ms/hop vs. 300ms of competitors
Copyright RuggedCom Inc.
61
VLAN (802.1Q)
•
•
•
•
•
Virtual LAN: an independent Ethernet network that shares cabling
infrastructure with other networks
Allows multiple end-stations at different physical location to act as
one logical group
Each VLAN has a separate “broadcast domain”
IEEE 802.1Q standard defines ‘tagged’ frame format allowing
multiple VLANs to be carried on a ‘trunk’
‘Bridging traffic between VLANs requires a router
1
2
3
4
Ethernet Switch
192
Copyright RuggedCom Inc.
62
VLAN: Tagged vs. Untagged
• Untagged’ frames are standard 802.1d frames
– Most end devices (PC, PLC, IED, …) send and receive
untagged traffic on what is termed an access port
• ‘Tagged’ frames contain 802.1P/Q extension
– Tagged traffic is typically only found on trunk ports in the ‘core’
of the network interconnecting switches and routers
– VLAN ID ranges from 1 to 4095; priority from 0 to 7
– Ether-type TPID field always 0x8100
6 bytes
6 bytes
2 bytes
Variable
Dest.
Src.
Length / Type
Data
6 bytes
6 bytes
2 bytes 2 bytes
Dest.
Src.
TPID
TCI
3 bits
Standard
Frame
2 bytes
Variable
Length / Type
Data
1 bit
Priority CFI
12 bits
VID
Copyright RuggedCom Inc.
Tagged
Frame
63
VLAN: Example Network
L3
1
RT
Three VLANs:
Red, Green,
and Blue
L2
SW
1
2
3
4
5
2
3
4
R
Router or L3 Switch
needed to traverse
R,G,and B VLANS
A
6
802.1Q Trunk
Tagged Frames
L2
SW
1
2
3
4
5
6
B
L2
SW
1
2
3
4
5
6
Ethernet Switches
A,B,C,D
C
L2
SW
End Device
PC, PLC, IED, …
1
2
3
4
5
6
D
Access/Edge Port
Untagged Frames
Copyright RuggedCom Inc.
64
VLANs: Why Bother?
• Lots of broadcast traffic wastes bandwidth
– VLANs reduce this traffic since it only goes where needed
• Isolate stations with critical real-time traffic
– Such devices won’t have the processing overhead for unrelated
traffic
• Isolate stations with excessive traffic output
– Video surveillance equipment will generate prodigious amounts
of traffic – VLANs keep it separated
• Security
– VLANs restrict traffic to required stations – can’t sniff
• Typically each VLAN given its own IP subnet
Copyright RuggedCom Inc.
65
GVRP: Generic VLAN Registration
• An industry standard protocol for
propagating VLAN info across the LAN
• Simplifies VLAN administration in the
network core
• Allows for VLAN pruning which can save
network bandwidth
• If all end devices supported GVRP there
would be no need to statically configure
switches!
Copyright RuggedCom Inc.
66
VLAN Without Pruning
L3
1
RT
L2
SW
1
2
3
4
L2
SW
1
2
5
6
B
3
4
5
3
4
R
A
6
L2
SW
2
1
2
3
4
5
6
C
L2
SW
1
2
3
4
5
6
D
Without GVRP pruning all trunks port carry
all VLANs all the time potentially wasting
bandwidth. Switches C and D have no need
for Green traffic at all but they still get it.
Copyright RuggedCom Inc.
67
VLAN with GVRP Pruning
L3
1
RT
L2
SW
1
2
3
4
L2
SW
1
2
5
6
B
3
4
5
3
4
R
A
6
L2
SW
2
1
2
3
4
5
6
C
L2
SW
1
2
3
4
5
6
D
With GVRP pruning the green VLAN traffic
is restricted to switches A and B and the red
VLAN is restricted to A,C, and D. The blue
would still be carried on all the trunks.
Copyright RuggedCom Inc.
68
Cos vs. QoS
• CoS (Class of Service) = Prioritization
– Supported by IEEE 802.1p standard
– Provides priority queuing of data packets from
source to destination
– Best effort service
• QoS (Quality of Service) = Consistency
–
–
–
–
Provide CBR-like (constant bit rate) service
Predictable latency
Bandwidth Reservation
RSVP = bandwidth reservation protocol
Copyright RuggedCom Inc.
69
IEEE 802.1p Prioritization
•
Switch
1 2
2 1
2 2
•
2 1 1 •
•
•
Multiple egress traffic queues to that
higher priority traffic can be sent first
Time-sensitive traffic (like voice /
GOOSE) can have reduced jitter and
latency
User configurable policy for ‘weighting’
scheme that determines how egress
queues are emptied
Managed switches have ability to
classify and tag incoming untagged
traffic based on port number, address,
or DiffServ
Shares tag header with 802.1Q VLAN
Copyright RuggedCom Inc.
70
Multicast vs. Unicast vs.
Broadcast
• Multiple unicasts are slow & inefficient
• Broadcasts span entire network: too much
processing, wasted bandwidth
• Multicasts are controllable
Clients
Video Server
Copyright RuggedCom Inc.
71
Benefits of Multicasting
• Supports one-to-many and many-to-many
delivery
• Bandwidth savings
• Reduces processing load on hosts with no
interest in the application
• Critical for conserving expensive WAN
bandwidth
• Use IGMP or GVRP to optimize network traffic
flows
Copyright RuggedCom Inc.
72
IGMP Snooping
• Internet Group Management Protocol ensures multicast
traffic is directed only to desired recipient.
• Producer -> consumer model
• Used by IP hosts to report their host group
memberships to multicast routers. As hosts join and
leave specific multicast groups, streams of traffic are
directed to or withheld from that host.
• IGMP protocol operates between multicast routers and
IP hosts.
• IGMP snooping protocol defined for managed switches
to perform just like an IGMP router
• A layer 3 protocol in a layer 2 switch
Copyright RuggedCom Inc.
73
Network Before IGMP
c1
c1
Consumer of IP group
eg. Display/decoder
L2
SW
1
2
3
4
L3
1
RT
L2
SW
1
2
5
6
B
3
4
5
3
4
1
2
R
Without pruning, all stations
see the IP group traffic
eg. Z1 and z2 see the traffic
A
6
L2
SW
2
3
4
z1
5
6
C
L2
SW
1
2
3
4
5
6
D
p
Producer of IP group traffic
eg. Camera/encoder
z2
Copyright RuggedCom Inc.
74
Network After IGMP
c1
c1
Consumer of IP group
eg. Display/decoder
L2
SW
1
2
3
4
L3
1
RT
L2
SW
1
2
5
6
B
3
4
5
3
4
R
With pruning,
only the desired
recipients see
the traffic
A
6
L2
SW
2
1
2
3
4
z1
5
6
C
L2
SW
1
2
3
4
5
6
D
p
Producer of IP group traffic
eg. Camera/encoder
z2
Copyright RuggedCom Inc.
75
GMRP: Generic Multicast Routing
• Same goal as IGMP – multicast pruning
• Layer 2 protocol i.e.can be done for payloads
other than TCP/IP
• IGMP predominates due to installed base
• Could find a following for real-time, industrial
protocols that are not over IP
• Shares GARP protocol with GVRP for
exchanging data between switches
Copyright RuggedCom Inc.
76
Link Aggregation 802.1ad
• Aggregates several inter-switch links into a single
logical link
– Increases bandwidth incrementally
– Redundant connection – independent from STP
– Automatically shares load between links
• Traffic is distributed between links by ‘conversation’
using a simple algorithm involving the source and
destination addresses
• EtherChannel is Cisco’s proprietary equivalent
Copyright RuggedCom Inc.
77
SNMP
• Simple Network Management Protocol
– Not that simple!
• Can get/set all switch parameters
• Traps very useful – event driven notification of
problems – can turn into emails, pages, etc. via
NMS (network management software)
• Uses MIBs (Management Information Database)
to define available data
• Many standard MIBs result in consistent data
API between vendors
Copyright RuggedCom Inc.
78
RMON
• Remote Monitoring (RMON) is a standard monitoring
specification that enables various network monitors and
console systems to exchange network-monitoring data.
• RFC 2819 – RMON MIB
• RMON Monitoring Groups:
– Statistics: Contains statistics measured by the probe for each
monitored interface on this device.
– History: Records periodic statistical samples from a network
and stores them for later retrieval.
– Alarm: Periodically takes statistical samples from variables in
the probe and compares them with previously configured
thresholds. If the monitored variable crosses a threshold, an
event is generated.
– Event: Controls the generation and notification of events from
this device.
Copyright RuggedCom Inc.
79
Networking Legacy Serial Devices
•
•
•
•
•
What to do about existing IEDs, RTUs, etc. that use serial
communications (e.g. RS232, RS422, RS485)?
Create an IP (UDP or TCP) “tunnel” through the Ethernet network
What comes in one end of the tunnel goes out the other end
Often called a “Serial Device Server”
Smart serial device servers also translate protocols
– eg. Modbus RTU -> Modbus TCP
•
Allows legacy devices to be accessed using Ethernet infrastructure
Serial IED
Ethernet SCADA
RS485
IP Network
Serial Device Server
Serial Device Server
Copyright RuggedCom Inc.
Serial SCADA
80
RuggedSwitch™ & RuggedServer™
Product Overview
Copyright RuggedCom Inc.
81
Rugged Operating System (ROS™)
¾ Zero Collisions: IEEE 802.3x Full Duplex Operation
¾ Priority Queuing: IEEE 802.1p for high priority real-time control
¾ VLAN: IEEE 802.1q for isolating real-time traffic
¾ Enhanced IEEE 802.1w Rapid Spanning Tree for fast fault
recovery
¾ IGMP Snooping for multicast filtering and management
¾ Network management: including SNMP, RMON, Port Mirroring
¾ Rich set of diagnostic tools
¾ Common firmware across all managed switches
¾ Simple firmware upgrade as new features become available
Fully Managed Switch Designed for Real-Time Control
Copyright RuggedCom Inc.
82
RuggedSwitch™ RS900
Industrially Hardened – Managed Ethernet Switch
¾ up to 9 Ports
Optional Ports:
• Up to 3 Ports
• Fast 10/100BaseTx
• Fiber Optical (MMF/SMF)
• SC, ST, LC and MTRJ
• Bi-directional (single strand)
• Distances up to 90km
- Copper and Fiber combinations
¾ RuggedRated™ - Industrially Hardened
- EMI Immunity (IEC 61850-3, IEEE 1613),
- Operating Temperature (-40 to +85°C)
¾ ROS™ (Rugged Operating System)
- Advanced Layer 2 and 3 Network
Management
Fast Ethernet Ports:
• 6 - Fast Ethernet Ports
(10/100BaseTX)
¾ eRSTP™ for high speed (<5ms) network
fault recovery and redundancy
¾ Port rate limiting (128, 256, 512, 4000,
8000 kbps) for network traffic management
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
¾ Hazardous Location Certification:
- Class 1 Division 2
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Copyright RuggedCom Inc.
83
RuggedSwitch™ RS900G
Industrially Hardened – Gigabit Managed Ethernet Switch
¾ Gigabit – Dual fiber optical 1000BaseX
ports allow for high-speed Gigabit
backbone (up to 70km).
Dual Gigabit Ports:
• Fiber Optical (MMF/SMF)
• Pluggable Optics (SFP)
• SC, ST, LC and MTRJ
• Bi-directional (single strand)
• Distances up to 70km
¾ RuggedRated™ - Industrially Hardened
- EMI Immunity (IEC 61850-3, IEEE 1613),
- Operating Temperature (-40 to +85°C)
¾ ROS™ (Rugged Operating System)
Fast Ethernet Ports:
• 8 - Fast Ethernet Ports
(10/100BaseTX)
- Advanced Layer 2 and 3 Network
Management
¾ eRSTP™ for high speed (<5ms) network
fault recovery and redundancy
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
¾ Port rate limiting (128, 256, 512, 4000,
8000 kbps) for network traffic management
¾ Hazardous Location Certification:
- Class 1 Division 2
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Copyright RuggedCom Inc.
84
RuggedSwitch™ RSG2100
“Modularity plus Gigabit Ethernet”
¾ Modularity – 3 Gigabit Ports, 16 Fast Ethernet Ports (virtually any mix of fiber or copper desired)
¾ RuggedRated™ “Industrially Hardened”: IEC 61850-3, IEEE 1613, (-40 to +85°C)
¾ Integrated Dual Redundant Power Supplies 24Vdc, 48Vdc, or (88 – 300Vdc / 85 – 264Vac)
¾ Zero-Packet-Loss™ Technology for immunity to high levels of EMI
¾ ROS™ (Rugged Operating System) Advanced Layer 2 and 3 Management
¾ eRSTP™ for high speed (<5ms) network fault recovery and redundancy
¾ Port rate limiting (128, 256, 512, 4000, 8000 kbps) for network traffic management
Copyright RuggedCom Inc.
85
RuggedSwitch™ RSG2100
Gigabit Ports:
• up to 3 Gigabit Ethernet Ports
• 10/100/1000 TX RJ45
• 1000SX Multimode
• 1000LX Singlemode
• Pluggable Optics (SFP)
• SC, ST, LC and MTRJ
3 Gigabit Ports
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
• Dual Redundant (Optional)
• Parallel Load Sharing
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Modularity (8x2)
Modular HMI:
• Front or Rear Mount
Mounting Options
• Panel/Din Rail
• 19” Rack Mount
Fast Ethernet Ports:
• up to 16 Fast Ethernet Ports
• virtually any mix of fiber or copper desired
• 10/100TX RJ45
• 10FL Multi- and Singlemode
• 100FX Multi- and Singlemode
Copyright RuggedCom Inc.
86
RuggedSwitch™ RSG2200
“9 Port Modular Managed Gigabit Ethernet Switch”
¾ Modularity – 9 Gigabit Ports (virtually any mix of fiber or copper desired)
¾ RuggedRated™ “Industrially Hardened”: IEC 61850-3, IEEE 1613, (-40 to +85°C)
¾ Zero-Packet-Loss™ Technology for immunity to high levels of EMI
¾ Integrated Dual Redundant Power Supplies 24Vdc, 48Vdc, or (88 – 300Vdc / 85 – 264Vac)
¾ ROS™ (Rugged Operating System) Advanced Layer 2 and 3 Management
¾ eRSTP™ for high speed (<5ms) network fault recovery and redundancy
¾ Port rate limiting (128, 256, 512, 4000, 8000 kbps) for network traffic management
Copyright RuggedCom Inc.
87
RuggedSwitch™ RSG2200
Gigabit Ports:
• up to 3 Gigabit Ethernet Ports
• 10/100/1000 TX RJ45
• 1000SX Multimode
• 1000LX Singlemode
• Pluggable Optics (SFP)
• SC, ST, LC and MTRJ
9 Gigabit Ports
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
• Dual Redundant (Optional)
• Parallel Load Sharing
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Mounting Options
• Panel/Din Rail
• 19” Rack Mount
Modular HMI:
• Front or Rear Mount
Modularity:
• 5 available slots
• up to 9 ports
Copyright RuggedCom Inc.
88
RSG2200/2100 Mounting
Front Mounting
HMI
Power
All communications ports out the front, power port from the rear
Rear Mounting
HMI
Power
Both power and communications ports from the rear, HMI port from front
Copyright RuggedCom Inc.
89
RuggedSwitch™ RS969
“The World’s First IP65/IP67 Rated, Fully Managed, Industrial Ethernet
Switch with Gigabit”
¾ Waterproof: IP65 (Water Jets) and IP67 (Immersion)
¾ Industrial Operating Temperature: -40 to +85C
¾ High Immunity to EMI: Meets or exceeds IEC 61850-3, IEEE 1613, NEMA TS-2 and more ...
¾ Integrated Power Supplies: Low and high voltage ranges with true (N+1) redundancy option
¾ High Speed Fault Recovery: eRSTP™ delivers < 5ms per hop fault recovery performance
¾ Fully Managed: ROS™ delivers advanced networking and management features
¾ Gigabit: 2-Gigabit fiber optical waterproof ports for high-bandwidth applications
Copyright RuggedCom Inc.
90
RS969 (M12 Connectors)
Fast Ethernet Ports:
• 8 - Fast Ethernet Ports (10/100BaseTX)
• M12 Connectors
• High EMI immunity
• Transient and Surge protected
LED Indicators
• Link Activity per port
• Power and Alarm
Console Port:
• RS232 programming port
Water-proof Enclosure
• IP65 Rated (Water-Jet)
• IP67 Rated (Immersed)
• DIN Rail or Flush Mount
• Aluminum
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
• M12 Connector
Fiber Optical Gigabit Ethernet Ports
• 2 - Fiber Optical Gigabit Ethernet
Ports (1000BaseX)
• Fiber Optical (up to 25km)
• Waterproof covers when not in use
Copyright RuggedCom Inc.
91
RS969 (RJ45 Connectors)
Fast Ethernet Ports:
• 8 - Fast Ethernet Ports (10/100BaseTX)
• IP67 Rated RJ45 Connectors
• High EMI immunity
• Transient and Surge protected
LED Indicators
• Link Activity per port
• Power and Alarm
Console Port:
• RS232 programming port
Water-proof Enclosure
• IP65 Rated (Water-Jet)
• IP67 Rated (Immersed)
• DIN Rail or Flush Mount
• Aluminum
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Fiber Optical Gigabit Ethernet Ports
• 2 - Fiber Optical Gigabit Ethernet
Ports (1000BaseX)
• Fiber Optical (up to 25km)
• Waterproof covers when not in use
Copyright RuggedCom Inc.
Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
• M23 Connector
• Dual-Redundant (option)
• Parallel Load Sharing
• Can be different sources!
92
RuggedServer™ RS400
Serial to Ethernet
“Industrially Hardened Serial Device
Server”
¾ Highly Integrated Device
¾ RuggedRated™ for Harsh Environments
- 4 isolated serial ports, a 4-port Managed Ethernet
Switch (fiber and copper options), V.90 Modem
¾ Multifunctional Operation
- Serial ports have 2kV of galvanic isolation to protect
against ground potential rise during ground faults
¾ Integrated Power Supplies
- serial-to-ethernet, remote access server, and router
functionality
¾ Managed Ethernet Switch
- Low and high voltage ranges
¾ Wide Operating Temperature Range
- -40 to +85C
- advanced networking features for fault-tolerant
networks suitable for real-time control
¾ High Immunity to EMI
- Meets or exceeds IEC 61850-3, IEEE 1613, NEMA TS-2
IEC 61000-6-2, IEC 61800-3
¾ Advanced Serial Functionality
- supports Modbus and DNP 3.0 protocols
- serial encapsulation; COM port redirection with serial IP
Copyright RuggedCom Inc.
93
RuggedServer™ RS400
Serial to Ethernet
Serial Ports
• 4 - RS485/RS232 Ports
• 3kV Isolation per Port
Ethernet Ports
• 4-Port Ethernet Switch
• Fiber & Copper Ports
Mounting Options
• Panel/Din Rail
• 19” Rack Mount
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
Failsafe Output Relay
• (220 VDC / 250 VAC)
Integrated V.90 Modem
• 56 kbps
Copyright RuggedCom Inc.
94
RuggedMC™ Media Converters
RMC: Ethernet Media Converter
RMC40: Ethernet Speed/Media Converter
Speed/Media Conversion:
• 10/100TX to 100FX (MMF/SMF)
• 10TÅÆ 100TX
• Dual 100FX Ports for optical Rings
or Port Redundancy
Media Conversion:
• 10T to 10FL (MMF/SMF**)
• 100TX to 100FX (MMF/SMF)
Field Hardened:
• IEC 61000-6-2, IEC 61800-3,
NEMA TS2, IEC61850, IEEE1613
• Integrated Power Supply: 24, 48 or
88 to 300Vdc / 85 to 264Vac
• -40 to 85°C Operating Temp.
RMC20: Serial Media Converter
4-Port Unmanaged
Switch
Field Hardened:
• IEC 61000-6-2, IEC 61800-3,
NEMA TS2, IEC61850, IEEE1613
• Integrated Power Supply: 24, 48 or
88 to 300Vdc / 85 to 264Vac
• -40 to 85°C Operating Temp.
RMC30: Serial-to-Ethernet Media Converter
Media Conversion:
• RS232/485/422 to Fibre Optical
• RS232ÅÆRS485 Å ÆRS422
• Point-to-Point or “Optical Loop”
configurations supported
Field Hardened:
• IEC 61000-6-2, IEC 61800-3,
NEMA TS2, IEC61850, IEEE1613
• Integrated Power Supply: 24, 48 or
88 to 300Vdc / 85 to 264Vac
• -40 to 85°C Operating Temp.
Media Conversion:
• RS232/485/422 to 10/100BaseTX
• 300bps - 230kbps serial speeds
2-Port Serial Device
Server
Copyright RuggedCom Inc.
Field Hardened:
• IEC 61000-6-2, IEC 61800-3,
NEMA TS2, IEC61850, IEEE1613
• Integrated Power Supply: 24, 48 or
88 to 300Vdc / 85 to 264Vac
• -40 to 85°C Operating Temp.
95
Industrial Power Supply
Power Supply 1
Power Supply 2
(Optional)
¾ Fully integrated power supply (no external adaptors)
¾ Dual redundant power supply option
¾ Universal high-voltage range:
88-300VDC or 85-264VAC
¾ Parallel load sharing with true N+1 redundancy
¾ Popular low voltage DC ranges:
24VDC, 48VDC
¾ Can be powered from different sources:
- e.g. PS 1 from 110VAC and PS 2 from 48VDC
- e.g. PS 1 from 125VDC and PS 2 from 220VAC
¾ CSA/UL 60950 safety approved to +85°C
- e.g. PS 1 24VDC and PS 2 from 125VDC
- Any combination!
Copyright RuggedCom Inc.
96
Lunch break.
Copyright RuggedCom Inc.
97
Overview of Layer 3 Networking
(Routers)
Copyright RuggedCom Inc.
98
Router / Layer 3 Switch
•
Used to link a local network to a remote network
– Wide Area Network (WAN) such as Frame Relay
– Local Area Network (LAN) generally a Layer 3 Switch
– Metropolitan Area Network (MAN)
•
•
Works at the Network Layer (Layer 3)
Router which is connected to LAN is generally used as
default gateway for all devices on this network
• Routers make decisions on where to send data based
on source and destination IP addresses
• Routers can offer redundant paths when used with
multiple WAN interfaces
Copyright RuggedCom Inc.
99
Networking Terminology
• LAN – Local Area Network
A local area network (LAN) is a computer network covering a local
area, like a Substation.
• MAN – Metropolitan Area Network
A Communications network that covers a geographical area such
as a County. MAN’s might be considered a LAN that spans a large
area such as multiple substations. Switches are generally used for
this type of Topology.
• WAN – Wide Area Network
A larger network, usually consisting of a collection of LANs that
spans a large geographical area. An example of a WAN would be
the Internet. Routers are generally used for this type of Topology
Copyright RuggedCom Inc.
100
WAN Interfaces
• T1 1.544 MBPS
–
–
–
–
Channelized (24 X 64KBPS channels)
Unchannelized (Full T1 1.544 MBPS)
Digital
North America
• E1 2.016 Mbps
– Channelized (32 x 64kbps channels)
– Europe
• 56K DDS
– Analog
– Low speed (often used for Substation SCADA)
Copyright RuggedCom Inc.
101
WAN Interfaces (cont)
• DSL
– ADSL – Asymmetric DSL (higher bandwidth
downstream than upstream I.E. 800 / 200)
– SDSL – Symmetric DSL (same bandwidth up/down)
• Modem / Low speed serial
– Used for Dial Backup or very low speed
communications
• Ethernet
– Used in MAN type design
– High speed
– Requires Fiber
Copyright RuggedCom Inc.
102
WAN / MAN Interface Protocols
•
•
•
•
•
Point to Point Protocol (PPP)
Frame Relay
Dial Up (v.90 modem over PPP)
Ethernet
MPLS
Copyright RuggedCom Inc.
103
Frame Relay
• Used to define PVCs (Private Virtual
Circuits)
A
Frame Relay Network
Access Links
C
B
C
Copyright RuggedCom Inc.
104
Dial on Demand Routing
• Inexpensive backup for other WAN interfaces
PSTN
BRI/
PRI
A
Private
Network
X
Copyright RuggedCom Inc.
BRI/
PRI
B
105
WAN Topology Choices
Point-to-Point
PPP, Cisco HDLC, ISDN
MP-to-Cloud
Frame Relay, ATM
Point-to-Cloud
Internet VPN
Internet
IPSec
MPLS-VPN
Copyright RuggedCom Inc.
106
Router Function
•
Determine optimum routing paths through a network
• Lowest delay
• Highest reliability
•
Transport packets through the network
• Examines destination address in packet
• Makes a decision on which port to forward the packet
through
• Decision is based on the Routing Table
•
•
Interconnected Routers exchange routing tables in
order to maintain a clear picture of the network
In a large network, the routing table updates can
consume a lot of bandwidth
• a protocol for route updates is required (I.E. RIP, OSPF)
Copyright RuggedCom Inc.
107
Basic IP Routing
• PC2 sends a packet to router B
• Router B matches the destination IP
address (162.11.5.1) to routing table
• Router B forwards packet out S0 to
Router A
162.11.5.0
1
A
S0
S1
162.11.5.1
Routing Table
Destination
Subnet
162.11.8.0
162.11.9.0
Next
Router
S0
S0
S1
162.11.6.0
S1
C
B
Router B
2
162.11.10.0
Outgoing
Interference
162.11.7.0
Copyright RuggedCom Inc.
162.11.7.0
162.11.8.0
162.11.5.0
162.11.6.0
162.11.9.0
162.11.10.0
E0
S0
S0
S1
S0
S1
--------------162.11.8.1
-------162.11.8.1
162.11.6.3
108
Building the Routing Table
RIP Routing Update
162.11.10.0
162.11.5.0
162.11.9.0
162.11.5.0
1
A
S0
2
1
1
S1
162.11.5.1
Variety of IP Routing Protocols:
ƒRIP
ƒOSPF
ƒEIGRP
ƒIGRP
ƒIS-IS
S1
Routing Table
Destination
Subnet
162.11.8.0
162.11.9.0
Outgoing
Interference
Next
Router
S0
S0
S1
162.11.6.0
S1
C
162.11.10.0
162.11.9.0
162.11.5.0
B
Router B
1
1
2
162.11.10.0
162.11.7.0
162.11.7.0
162.11.8.0
162.11.5.0
162.11.6.0
162.11.9.0
162.11.10.0
E0
S0
S0
S1
S0
S1
--------------162.11.8.1
-------162.11.8.1
162.11.6.3
RIP Routing Update
Copyright RuggedCom Inc.
109
Routing Protocols Classes
Transit Network B
( Internet )
Network A
Network C
Exterior
Border Gateway Interior Gateway
Protocol
Protocol
(RIP, OSPF)
(BGP)
Interior Gateway
Protocol
(RIP, OSPF)
Copyright RuggedCom Inc.
110
RIP v1 & v2
•
•
•
•
•
•
Routing Information Protocol
Very chatty (Consumes bandwidth)
Distance vector protocol
Useful for small subnets
Easy to install
Distributed
Copyright RuggedCom Inc.
111
OSPF
• Common link-state protocol
• Decreases use areas by dividing each
area to smaller sub-areas and setting a
hierarchy.
• Uses Dijkstra’s Algorithm
• Centralized
• The preferred interior routing protocol on
the Internet.
Copyright RuggedCom Inc.
112
BGP
•
•
•
•
Border Gateway Protocol
Path-vector
Scales well
Preferred Exterior Routing Protocol for
the Internet
• Complex to set up
Copyright RuggedCom Inc.
113
VRRP
• Virtual Router Redundancy Protocol RFC 2338
• Provides layer 3 resiliency by allowing 2 or
more routers to act as a single “virtual router”.
– One becomes “Master”, others are “Backup”.
– “Clients” don’t need to know that they are talking to
a virtual router.
• Master uses special MAC address (VRMAC)
assigned from IANA -00-00-5E-00-01-{VRID}
– {VRID} is the VRRP Virtual Router Identifier
allowing up to 255 VRRP routers on a LAN.
Copyright RuggedCom Inc.
114
Topology with VRRP
WAN
A
B
• WAN Interfaces can
be different
technologies (eg.
T1 and DSL)
Private
Network
Copyright RuggedCom Inc.
115
Network Security Overview
Copyright RuggedCom Inc.
116
Some History on Cyber
Security
¾ As stated in a 1990 report by the National Research
Council, "Tomorrow's terrorist may be able to do
more damage with a keyboard than with a bomb."
¾ The first widespread worm attack through
networked computers occurred in 1988 when
Robert Morris, Jr., a Cornell University student and
the son of a prominent NSA scientist, developed a
program that crippled approximately 6,200
computers and caused over $98 million in damage
in approximately 48 hours.
Copyright RuggedCom Inc.
117
Security Statistics
Statistics from a variety of sources also support the notion that the cyber
threat faced by nations is growing in magnitude and consequence:
•
•
•
•
•
•
27 million Americans have suffered identity theft since 1999 (this includes
credit card, Social Security, and personal data). (Source: Federal Trade
Commission)
Over $222 billion in losses were sustained by the global economy as a result of
ID theft. (Source: Aberdeen Group June 2003 Report on the Economic Impact
of ID Theft)
4,700 Suspicious Activity Reports per Computer Intrusion were reported in
2003—a 100% increase. (Source: FINCEN, U.S. Treasury)
3600% increase in U.S. computer crime since 1997. FBI Director named Cybercrime the nation’s number one criminal problem. (Source: ITAA book "Long
Campaign”)
Between 1999 and 2003 in the U.S., attacks on computer servers increased by
over 530% to over 140,000 incidents for 2003.
The number of new vulnerabilities discovered in software is growing at 140%
per year and is now in excess of 4,000 per year. (Source: CERT/CC)
Copyright RuggedCom Inc.
118
Potential Risk to Power Industry
•
An analysis of the North American electrical blackout of August 2003
provides more useful information: the CRS Report on Economic Impact of
Cyber Attacks indicated the power failure cost between $6 billion and $10
billion, disrupted production, affected earnings and profits, spoiled food
supplies, and increased first responder costs for some communities. Like a
cyber attack, there was little, if any, destruction of physical capital. (Source:
December 2004 Report of the Activities and Findings by the Chairman and
Ranking Member Subcommittee on Cybersecurity, Science, and Research &
Development of the U. S. House of Representatives Select Committee on
Homeland Security)
•
"Patrick H. Wood III, the chairman of the Federal Energy Regulatory Commission,
warned top electric company officials in a private meeting in January that they need
to focus more heavily on cyber security. Wood also has raised the issue at several
public appearances. Officials will not say whether new intelligence points to a
potential terrorist strike, but Wood stepped up his campaign after officials at the
Energy Department's Idaho National Laboratory showed him how a skilled hacker
could cause serious problems. . . . Describing his reaction to the demonstration,
Wood said: 'I wished I'd had a diaper on.'“ (reported by: Washington Post)
Copyright RuggedCom Inc.
119
Network Security is Serious
Business
¾ 58 percent of companies surveyed reported authorized
users and employees as the source of a security breach
(1)
¾ Total annual cost of security breaches to corporations
$15B (2)
(1)
(2)
Source: DataMonitor PLC, New York
Source: PricewaterhouseCoopers survey
Copyright RuggedCom Inc.
120
Vulnerabilities on the Rise
Copyright RuggedCom Inc.
121
Network Vulnerabilities
•
Spoofing is pretending to be someone else in communications.
Spoofing is very simple in non-cryptographic protocols. IP spoofing
attack is manipulation of IP source address to present oneself as
the trusted party in the communication.
•
Denial of Service (DOS) includes extensive service requests to be
denied. Even just pinging a device extensively can disable the
appliance by keeping it busy with the service denial.
•
Replay Attacks are attacks when someone replays an old
message. An encrypted message cannot be read, but if the
moment is right the replay attack can be dangerous especially if it
is related to authentication.
Copyright RuggedCom Inc.
122
Host Vulnerabilities
•
Virus - A virus is a manmade program or piece of code that
causes an unexpected, usually negative, event. Viruses are often
disguised games or images with clever marketing titles such as
“Viagra." Example: Netsky
•
Worm - Computer Worms are viruses that reside in the active
memory of a computer and duplicate themselves. They may send
copies of themselves to other computers, such as through email or
Internet Relay Chat (IRC). Example: Bagle, MyDoom
•
Trojan Horse - A Trojan horse program is a malicious program
that pretends to be a benign application; a Trojan horse program
purposefully does something the user does not expect. Trojans are
not viruses since they do not replicate, but Trojan horse programs
can be just as destructive. Example: Backdoor
Copyright RuggedCom Inc.
123
Physical Vulnerabilities
• Network and host vulnerabilities can lead to
physical vulnerabilities:
–
–
–
–
Disabling network equipment and/or IEDs
Reconfiguring network equipment and/or IEDs
Gaining unauthorized access
Disabling access control and video surveillance
equipment
Copyright RuggedCom Inc.
124
Network Zones
• Trusted – most secure section of the Network. Often called
the Inside.
• Untrusted – Least secure section of the Network. Generally
exposed to the public Internet
• DMZ (Demilitarized Zone) – A neutral zone which sits
between the trusted and untrusted zones of the network. The
DMZ is generally used to provide protection to Web and FTP
Servers.
• Perimeter – The border of a Network. Generally the
Boundary between the Untrusted section of a Network and the
Public Internet.
Copyright RuggedCom Inc.
125
Security Strategy
Network Security Strategy of the Future
should include the following:
¾ Host based security
¾ Layered Security
- Firewall
- 802.1x Authentication / Authorization
- IDP
- Mac Filtering
- Email scanning
¾Strong Security Policy
- Antivirus
- VPN
- Password policy (key to success)
¾ Security Administration
- Email Policy
- Monitoring of Security Devices
-Strong configuration
¾ Physical Security
- Access Policy
- Use and Abuse Policy
- Program Change
Copyright RuggedCom Inc.
126
Network Security NERC1300 and CIP
requirements
Copyright RuggedCom Inc.
127
NERC Standards
CIP-002 to CIP-009 Standards as compared to sections
in Draft Standard 1300 – Draft 1
¾ NERC Cyber Security Goal:
“ensure that all entities responsible for the reliability
of the bulk electric systems of North America
identify and protect critical cyber assets that control
or could impact the reliability of the bulk electric
systems”
¾ Urgent action NERC 1200 cyber security
standard was initially adopted in August 2003
¾ Urgent action NERC 1200 renewed for a
second year in August 2004
¾ A permanent cyber security standard has
been under development and is expected to
be submitted to ballot later in 2006
(originally end of 2005)
¾ New standard was going to be called NERC
1300 but has changed to 8 separate
standards: CIP-002 to CIP-009
New Std #
Topic
Old Section
#
CIP-002-1
Critical Cyber Assets
1302
CIP-003-1
Security Management Controls
1301
CIP-004-1
Personnel and Training
1303
CIP-005-1
Electronic Security
1304
CIP-006-1
Physical Security
1305
CIP-007-1
Systems Security
Management
1306
CIP-008-1
Incident Reporting and
Response Planning
1307
CIP-009-1
Recovery Plans
1308
Copyright RuggedCom Inc.
128
NERC Definitions
Critical Asset: Those facilities, systems, and equipment which, if destroyed, damaged, degraded, or
otherwise rendered unavailable, would have a significant impact on the ability to serve large quantities of
customers for an extended period of time, would have a detrimental impact on the reliability or operability
of the electric grid, or would cause significant risk to public health and safety.
Critical Cyber Assets: Those Cyber Assets essential to the reliable operation of Critical Assets.
Cyber Assets: Those programmable electronic devices and communication networks including hardware,
software, and data associated with bulk electric system assets.
Cyber Security Incident: Any malicious act or suspicious event that:
- Compromises, or was an attempt to compromise, the electronic or Physical Security Perimeter
of a Critical Cyber Asset, or,
- Disrupts or was an attempt to disrupt the operation of a Critical Cyber Asset.
Electronic Security Perimeter: The logical border surrounding the network or group of sub-networks (the
“secure network”) to which the Critical Cyber Assets are connected, and for which access is
Physical Security Perimeter: The physical border surrounding computer rooms, telecommunications
rooms, operations centers, and other locations in which Critical Cyber Assets are housed and for which
Copyright RuggedCom Inc.
129
CIP-003 Security Management
Control
Identify and Document Policies and Procedures for
Security Management
¾ R5 – Access Control
- Logical and Physical Access by authorized personnel only
Copyright RuggedCom Inc.
130
CIP-005 Electronic Security
Identify the Perimeter and How it Will be Defended
¾ R1 - Electronic Security Perimeter
- Identify the electronic security perimeter
- Identify access points
- All cyber assets inside the perimeter to be protected
- Critical assets are those that control/monitor the perimeter
- Specific case for dial-up access
¾ R2 – Electronic Access Control
- Enable only necessary ports and services
- Secure dial-up access
- Identify access controls and authentication methods
Copyright RuggedCom Inc.
131
CIP-005 Electronic Security
¾ R3 – Monitoring Electronic Access Controls
- Log authorized access
- Detect unauthorized access attempts
- 24x7 monitoring
- Periodic review of logs
¾ R4 – Cyber Vulnerability Assessment
- Only necessary ports and services are enabled
- Discovery of modems
- Review of default accounts, default passwords, community strings
- Documentation of test results and action/remediation plan
¾ R5 – Documentation Review and Maintenance
- Annual review
Copyright RuggedCom Inc.
132
CIP-007 System Security
Management
Monitor and Protect Critical Assets from Failure
¾ R3 – Ports and Services
- Only necessary ports and services are enabled
R6 – Account Management
- User accounts
- Remove or minimize shared accounts
- Audit trails
- Password management
¾ R7 – Security Status Monitoring
- Automated tools and processes to monitor
- Alerts for detected Cyber Security incidents
- Maintain logs to allow for root-cause analysis
Copyright RuggedCom Inc.
133
CIP-009 Recovery Plans for
Critical Cyber Assets
Policies and Procedures for Business Continuity and
Disaster Recovery
¾ R4 – Backup and Restore
- Processes and procedures for backup and secure storage of information
Copyright RuggedCom Inc.
134
RuggedCom NERC CIP
Compliance
Security Category
RuggedSwitch (ROS) and RuggedRouter
(ROX) Features
CIP Requirement
Passwords
User passwords
Multi-level passwords
CIP-003-1: R5.1.1
CIP-005-1: R2.1, R2.4
CIP-007-1: R6.1, R6.2.2, R6.3.1, R6.3.2
Network Management Security
SSH/SSL
Radius
SNMPv3
SNMP IP Restriction
CIP-003-1: R5.1.1
CIP-005-1: R2.1, R2.4
Network Security
Enable/Disable Ethernet Ports
Enable/Disable Services (Router)
MAC Based Port Security (ROS)
802.1x Port Security (ROS, Router - future)
802.1Q VLAN (ROS, Router - future)
CIP-005-1: R2.1, R2.1.1
CIP-007-1: R3
Routing Security
Firewall (Router)
VPN (Router)
IP Access Control
Intrusion Detection System (future)
CIP-003-1: R5.1.1
CIP-005-1: R2.1, R2.4
Logfiles, Traps, Alarms
System Logs
SNMP Traps
RMON
Alarms
Extensive Logging Capabilities (Router)
Remote Logging (Router)
CIP-005-1: R2.5, R3
CIP-007-1: R6.1, R6.1.3,
R7, R7.2, R7.3, R7.4
Configuration and Patch
Management
RS TFTP
RuggedVue
CIP-007-1: R4
CIP-009-1: R4
Copyright RuggedCom Inc.
135
How Switches and Routers Provide
Security
Copyright RuggedCom Inc.
136
Firewall
•
Helps to keep undesirable traffic out of your network
–
–
–
•
Examines source and destination address and blocks traffic
which does not meet predefined criteria
Block undesirable ports / services such as FTP, TFTP, File Sharing
First line of defense in protecting your network
–
–
–
–
Generally used on network perimeter
May protect multiple networks
Often provides Network Address Translation (NAT) to allow Trusted
users to access the Untrusted side of the network
•
Operates on Rules which are created by Network administrator
•
Other possible functions (select Firewall Manufacturers)
–
–
–
–
Virtual Private Network (VPN) terminating device
Intrusion Detection (IDS) or Intrusion Prevention (IDP) device
Antivirus Gateway (AV)
Email Scanner
Copyright RuggedCom Inc.
137
Intrusion Detection (IDS) /
Prevention System (IPS)
•
Intrusion Detection / Prevention systems
analyze data in more detail than the
traditional Firewall
•
Uses a database of known signatures to take
action
– IDS will notify System Administrator
– IDP can be used to block suspect traffic
•
Can be integrated into Firewall solution
Copyright RuggedCom Inc.
138
Virtual Private Network (VPN)
• VPN’s allow secure communication of data
between networks across the Internet or other
unsecured networks
•
Many different encryption schemes
• DES 56 bit encryption (Oldest least secure)
• 3DES 168 bit encryption (Most common today)
• AES up to 256 bit encryption Advanced Encryption
Standard
• (latest technology)
•
Can be used for RAS or Site to Site
communication
Copyright RuggedCom Inc.
139
Management Security
¾ Password – Secures switch via password against
unauthorized configuration
¾ SSH / SSL – Extends capability of password protection
to add encryption of passwords and data as they cross
the network *
¾ Radius - Provides centralized password management
for Management passwords
Copyright RuggedCom Inc.
140
Port Security
¾ Enable / Disable ports – Capability to disable ports so that traffic can
not pass
¾ 802.1Q VLAN – Provides the ability to logically segregate traffic
between predefined ports on switches
¾ Port based security – The ability to secure ports on a switch so only
specific Devices / MAC addresses can communicate via that port
¾ 802.1x – The ability to lock down ports on a switch so that only
authorized clients can communicate via this port. This generally
requires a user name / password be provided via software client on PC
or IED that communicates with the switch. A Radius server needs to
be present on the network to authenticate the user name and
password passed from the client to the switch.
2
Switch attempts to authenticate client
Client
3
1
ials
credent
wledges
r ack no
e
v
r
e
s
Radius
PC attempts to communicate with
network / Sends user name and
password
4
Secured Network
authenticated users are allowed access
Copyright RuggedCom Inc.
141
RuggedRouter™ and RuggedVue™
Product Overview
Copyright RuggedCom Inc.
142
RuggedRouter™ RX1000
“Industrially Hardened Cyber Security Appliance”
¾ Rugged Operating System on Linux (ROX™)
¾ Integrated Router/Firewall/VPN
¾ Wide Operating Temperature Range: -40 to +85C
¾ High Immunity to EMI: Meets or exceeds IEC 61850-3, IEEE 1613, NEMA TS-2 and more ...
¾ Integrated Power Supplies: Low and high voltage ranges with true (N+1) redundancy option
¾ RuggedRated™ for Harsh Environments
¾ Modular: Various Types and Configuration of Interface Ports
¾ 5 Year Warrantee
Copyright RuggedCom Inc.
143
RX1000 Physical Features
Multiple Ethernet Ports:
• Quad 10/100 Mbps
• Fiber or Copper
• LC, ST, MTRJ, SC
V.90 Modem (Optional)
• 56 kbps
Multiple WAN ports
• Quad T1/E1
• Dual DSL
• Dual DDS 56/64kbps Activity
GPS/IRIG Ports
• Built-in GPS, Antenna Input
• Multiple IRIG-B Outputs
• Manchester, AM, Baseband,
IRIG-B Types
Copyright RuggedCom Inc.
Modular HMI:
• Front or Rear Mount
Mounting Options
• Panel/Din Rail
• 19” Rack Mount
144
RX1000 Physical Features
Integrated Power Supply
• Universal high-voltage range:
88-300VDC or 85 - 264VAC
• Popular low voltage DC ranges:
24VDC, 48VDC
• Dual Redundant (Optional)
• Parallel Load Sharing
Failsafe Output Relay
• Form-C contact output
• 1A@30VDC
Enclosure
• IP40
• 18 AWG Galvanized Steel
Operating Temperature
• -40C to +85C
• No Fans
EMI Immunity
• Meets IEEE 1613 (electric power substations)
• Exceeds IEC 61850-3 (electric utility substations)
• Exceeds IEEE 61800-3 (variable speed drive system)
• Exceeds IEC 61000-6-2 (generic industrial environment)
• Exceeds NEMA TS-2 (traffic control equipment)
Copyright RuggedCom Inc.
145
RX1000 Key Features
Security Appliance Functions
¾ Integrated Router/Firewall/VPN
¾ Stateful Firewall with NAT
¾ Full IPSec Virtual Private Networking
¾ VPN with 3DES, DES, AES
¾ IDS (coming soon)
Protocols
¾ WAN: Frame Relay, PPP, PAP, CHAP Authentication, PPPoE (coming soon)
¾ IP: Routing, RIP/RIPII, OSPF, DHCP Agent
¾ Traffic shaping and policing
Management Tools
¾ Web Based GUI, SSH, CLI (command line interface)
¾ SNMP v2/v3
¾ Remote Syslog
¾ Rich set of diagnostics with logging and alarming
Copyright RuggedCom Inc.
146
RuggedVue™ - Network
Management Software
Layer 3 IP View
Connectivity
Status
Hyperbolic
Tree
Device
Properties
Copyright RuggedCom Inc.
147
RuggedVue™ - Network
Management Software
¾Graphic Visualization
“The exact network layout is represented with a hyperbolic tree
structure for ease of use, overview and tracking on a single page.”
¾Dynamic Discovery
“RuggedVue™ and its inherent dynamic nature will discover and
track all fixed devices in real time.”
¾Real Time Monitoring
“All devices and their connection, including wireless, in the
network are constantly monitored for their potential status.”
¾Documenting System
“RuggedVue™ allows linking to all types of documentation in
different web accessible locations.”
¾Client Server Architecture
“RuggedVue™ is a server based software that will deliver the
network data to all browsers on the network without any
specialized client software.
Copyright RuggedCom Inc.
148
ROS™ and ROX™
Security Features
ROS™ = Rugged Operating System
ROX™ = Rugged Operating System On Linux
Copyright RuggedCom Inc.
149
ROS™ Security Features
¾ Multilevel User Passwords
– Secures switch against unauthorized configuration
¾ SSH / SSL Encryption
– Encryption of passwords and data as they cross the network
¾ Enable / Disable ports
RuggedCom’s Embedded OS
for Networking Device
- Disable ports so that traffic can not pass
¾ 802.1Q VLAN (Virtual Local Area Network)
- Logically segregate traffic between predefined ports on switches
¾ MAC Based Port Security
- Secure ports so only specific Devices/MAC addresses can
communicate via that port
¾ 802.1x Port Based Network Access Control
- Lock ports to allow only authorized clients to communicate via the port
¾ Radius
- Centralized password management
¾ SNMPv3
- Encrypted authentication and access security
Copyright RuggedCom Inc.
150
ROS™ Multilevel User Passwords
¾ Three password levels:
Admin:
Ability to change configuration, execute commands and view data.
Operator: Ability to execute commands and view data.
Guest:
Ability to view data only.
¾ Passwords can be up to 15 alphanumeric or special characters
¾ Radius back end can be used for centralized password management
Copyright RuggedCom Inc.
151
ROS™ SSL Web Server Security
¾ Secure Sockets Layer (SSL) encrypts all http traffic from
client to and from server
¾ Prevents snooping of management session and
harvesting of passwords
¾ Supports by all commercial Web browsers
¾ SSL MD5 and DES
Copyright RuggedCom Inc.
152
ROS™ SSH Command Line Security
¾ Secure Shell (SSH) provides a secure alternative to Telnet
¾ sftp for secure file transfers
¾ slogin for secure CLI automation
¾ MD5 authentication and DES encryption
¾ PuTTY is a free SSH client
Copyright RuggedCom Inc.
153
ROS™ Physical Port Security
¾ ROS™ allows disabling of unused physical Ethernet
ports
¾ Disabling a port stops all traffic flow
¾ You can’t be any more secure that that!
Copyright RuggedCom Inc.
154
ROS™ Port Security & 802.1x
¾ MAC based port security can restrict access to a single Ethernet device
- Innovative auto-learn feature makes it easy to use MAC security
¾ 802.1x port security uses standards based authentication mechanism with
Radius server backend
¾ Any unauthorized access attempt generates an alarm and SNMP traps; portt
can be subsequently locked out to prevent repeated access attempts
Copyright RuggedCom Inc.
155
ROS™ VLAN Security
¾ 802.1Q based VLANs restrict the broadcast domain of a network
¾ Can be used to isolate hyper-secure network devices from general traffic
¾ VLAN is equivalent to a physically separate network from a security standpoint
¾ A router is required to bridge between VLANs
¾ ROS™ supports both port based VLANs and GVRP
Copyright RuggedCom Inc.
156
ROS™ SNMP v3
¾ SNMP v3 provides secure management of ROS™
¾ ROS™ uses standards based MIBs to ensure compatibility with
wide variety of SNMP based NMS software packages
¾ Users are classified into groups; different groups can have different
access to MIB information
¾ Backwards compatible with v1 and v2c SNMP users
Copyright RuggedCom Inc.
157
ROX™ Firewall Security
¾ Based on Linux Netfilter, Iptables, and Shorewall
¾ Stateful IP firewall, IP Masquerading(NAT), Port
Forwarding(DMZ),
Copyright RuggedCom Inc.
158
ROX™ Firewall Rules
¾ Interfaces grouped into zones
¾ Default policies determine overall behavior of zones
¾ Rules define behavior for specific source IP address
and port number
Copyright RuggedCom Inc.
159
ROX™ IPSec VPN
¾ IPSec allows secure tunnels through untrusted networks
¾ Supports network-network or network-host VPNs
¾ Allows either pre-shared or public key cryptography
¾ DES, 3DES, AES encryption protocols supported
Copyright RuggedCom Inc.
160
??? Questions ???
Copyright RuggedCom Inc.
161
Thank you.
Angelo Rizzo – International Sales Director
Roger Moore – Vice President Engineering
Copyright RuggedCom Inc.
162

Similar documents

RuggedRouter™ RX1000 - Signal Control Products, Inc.

RuggedRouter™ RX1000 - Signal Control Products, Inc. Serial Device Server RuggedServer™ - RS400 10/100/1000Mbps Ethernet (Copper or Fiber) RS232, RS485/422 Serial

More information

RX1000/RX1100 Installation Guide

RX1000/RX1100 Installation Guide option for integrated dual redundant power supplies, each capable of accommodating a wide range of input voltages for worldwide operability. Also unique is the ability to have each power supply fed...

More information

GIGABIT ABIT

GIGABIT ABIT Simple plug and play operation - automatic learning, galvanized steel enclosure with industrial grade DIN, panel, or negotiation, and crossover detection 19” rack-mount mounting options.

More information