Beruflich Dokumente
Kultur Dokumente
Harsh operating
environments
Network availability
requirements are much
higher than enterprise IT Source:
http://www.strategiccompanies.com/pdfs/Assessing%20t
he%20Financial%20Impact%20of%20Downtime.pdf
Cost of downtime is
extremely high
Interoperability of industrial
devices/networks
Limited networking
expertise
Results of Poll #1
Network Configuration &
Commissioning
Tips, Tricks & Tools
Network Configuration & Commissioning
Typical steps
Root
Redundant
Technology
Backup Link
HMI
I/O PLC
Ethernet
Drive Switch
Network Configuration & Commissioning
Web Interface vs CLI
Redundancy Configuration 35
200 Group IP
sec
sec Configuration
*Mass 802.1Q VLAN Setting only for devices with the same model name
Fast Configuration Deployment
Copy Configuration
*Copy Configuration only for devices with the same model name
Configuration Check
Status Overview
Redundancy Setting
Overview
802.1Q VLAN Setting
Overview
Startup Troubleshooting
Compare a Single Device with Whole Network
Comparison
Benefit
Sample
Reduce Manual Setting Errors
Documentation
Export Configuration
Export mass
configurations by
preference name
Results of Poll #2
Network Management & Maintenance
Best Practices
Network Management & Maintenance
Network Management Software
Industrial NMS
Auto topology visualization
Remote device management
Real-time event management
Comprehensive performance
reporting
Network Management & Maintenance
Efficient Visual Monitoring
VLAN/IGMP
Visualization
Real-time Event
Network Management & Maintenance
Schedule Automatic Backups
CONFIGURATION CENTER
1-click for mass configuration backup and
firmware upgrade
Job scheduling for nightly configuration backup
Configuration change history
Network Management & Maintenance
Easy Field Backup & Recovery
One-click Backup
Only trigger Reset button on switch to copy configuration
and log files
Files Import & Backup
Configuration import & backup
Firmware upgrade
System log backup
Ref: Best practices in automation security by Murray McKay, Principal Application Engineer, Siemens Industry, Inc.
The Best Countermeasure against Cyber Threats
Create a Defense-in-Depth
Network Security Environment
Defend the Networks and Infrastructure Each of these mechanisms must present
(encryption and traffic flow security unique obstacles to the adversary.
measures to resist passive monitoring) Further, each should include both
Defend the Enclave Boundaries (deploy protection and detection measures
Firewalls and Intrusion Detection to resist
active network attacks)
Defend the Computing Environment
Layered Cyber Security Solution for Automation
Security Site
High-performance
500 Mbps
Security Zone
Best Cost/Performance
300Mbps
Security Cell
Best Integration
110 Mbps
Firmware Updates
Compare
Quickly Collect Switch InfoNetworks
(Take Network Snapshot)
Quickly Compare Switch Info
(Compare Network Snapshots)
Troubleshooting Tools
Network Snapshot Comparison Tools
EVENT PLAYBACK
Record network status in 30 days
Network playback on any time/any event
Play at 1x, 2x, or 4x speed
Device Quick Finding
Switch Locator LED
Speed up on-site device finding to quickly diagnosis
Recap
Various redundancy protocols allow network
stability and recovery
NMS tools allow quick device configuration and
simple mass deployment
Software allows you to visually troubleshoot
your network to determine fault areas
NMS software allows you to view and visually
maintain your network
Q&A
Thank You