SlideShare a Scribd company logo
Tips for Commissioning,
Managing, and Troubleshooting
your Industrial Network
Moxa Technology Webinar Series
Richard Wood
Networking Infrastructure Manager
Agenda
Industrial Network Challenges
Network Configuration & Commissioning
Managing Industrial Networks
Troubleshooting to Minimize Downtime
Tips for Commissioning, Managing & Troubleshooting Your Industrial Network
Industrial Network Challenges
• Harsh operating
environments
• Network availability
requirements are much
higher than enterprise IT
• Cost of downtime is
extremely high
• Interoperability of industrial
devices/networks
• Limited networking
expertise
Typical challenges
Source:
http://www.strategiccompanies.com/pdfs/Assessing%20t
he%20Financial%20Impact%20of%20Downtime.pdf
Network Configuration &
Commissioning
Tips, Tricks & Tools
Network Configuration & Commisioning
Installation Configuration Troubleshooting Testing Commissioning
Typical steps
Unmanaged VS. Managed
HARDWARE
SOFTWARE
APPLICATION
Small Scale Network
P2P Communication
Mid to Large Scale Network
Mission Critical Network with
Remote Monitoring
Packet Switching:
• Entry Level Switch ASIC
Packet Switching + Network
Management:
• Advanced Switch ASIC +
• CPU + Flash / RAM
Simple Data Switching Powerful Performance for
Network Management
POSITION
Plug and Play
No Configuration Required
Web / CLI Setting
• Network Security
• Network Redundancy
• Network Management
• Traffic Prioritization
Unmanaged
Switch
Managed
Switch
Network Topology
Typical Enterprise Star Topology
• Single point of failure
• Long, costly wire/fiber runs
Network Configuration
Selecting the Right Topology for Your Needs
Redundant
Technology
Type Mesh STP RSTP Ring/Chain HSR/PRP
Feature
• Every node
connects to
each other
• IEEE
802.1D
• Loop-free
tree shape
topology
• IEEE 802.1w
• Loop-free
tree shape
topology
• Proprietary
technology
• Ring/Chain
Topology
• IEC 61850
• Dual Network (PRP)
• Dual Path (HSR)
Pros
• Highly
reliable
• Self-healing
• Open
Protocol
• Self-healing
• Open
Protocol
• Faster
recovery time:
~1 sec
• Low cost
• Self-healing
• Faster recovery
time (<20 ms)
• Open protocol
• Self-healing
• Zero recovery time
(0 ms)
Cons
• Too costly for
large network
deployment
• Recovery
time:
~15 sec
• Recovery
time not fast
enough
• Vendor specific
technology
• Prohibitively
expensive unless
absolutely needed
Backup Link
Root
Network Topology
Typical Industrial Ring Topology
• No single point of failure
• Reduced wiring costs
Industrial Protocols
• SCADA control / monitor PLC and field
devices via industrial protocols
Integration of SCADA & PLC Networks
Drive
I/O PLC
Ethernet
Switch
HMI
Network Configuration & Commissioning
• Two different methodologies for configuration of
network devices
• Many users from the industrial side prefer web
GUI
• Most users for commercial/enterprise side will
favor CLI
– Used by Cisco
Web Interface vs CLI
Device Configuration
Command Line Interface (CLI)
Device Configuration
Graphical User Interface
• Visual confirmation of current settings
• Menu based configuration
• Standard web browser interface
Network Management Tools
Easy Configuration @ Installation Stage
Efficient Monitoring @ Operation Stage
Easy Backup/recovery @ Maintenance Stage
Quick Troubleshooting @ Diagnostics Stage
Mass Configuration Tools
Up to 10X Productivity Boost
One by One Setting by Web Batch Configuration by MXconfig
Multiple Devices Wiring
in Series
Broadcast Search
Group IP
Configuration
Group Redundancy
Configuration
Finish
400
sec
20
sec
200
sec
100
sec
Total
12 min
Single Power Supply
Single Device Wiring
IP Configuration
Redundancy Configuration
Repeat
100 times
Finish
10
sec
30
sec
35
sec
Total
125 min
Fast Group Configuration
Network (IP address) Setting
Confidential
IP address setting for
mass devices
Fast Group Configuration
802.1Q VLAN Setting
Confidential
Quick Add Panel
for cloning setting
*Mass 802.1Q VLAN Setting only for devices with the same model name
Fast Configuration Deployment
Copy Configuration
Confidential
Quick configuration copy
from one specific setting
to mass devices
Support mass IP
address setting
*Copy Configuration only for devices with the same model name
Configuration Check
Status Overview
Confidential
Redundancy Setting
Overview
802.1Q VLAN Setting
Overview
Startup Troubleshooting
Confidential21
Compare a Single Device with Whole Network
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=101, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
VLAN
1: Access, PVID=1, Forb=200
2: Access, PVID=2, Forb=300
3: Trunk, PVID=100, Tag=1,2
4: Trunk, PVID=100, Tag=1,2
Comparison
Sample
Benefit
Reduce Manual Setting Errors
Documentation
Export Configuration
Confidential
Export mass
configurations by
preference name
Network Management & Maintenance
Best Practices
Network Management & Maintenance
• Industrial NMS
– Auto topology visualization
– Remote device management
– Real-time event management
– Comprehensive performance
reporting
Network Management Software
Confidential
Network Management & Maintenance
Efficient Visual Monitoring
Virtual Device Panel
Real-time Event
VLAN/IGMP
Visualization
CONFIGURATION CENTER
 1-click for mass configuration backup and
firmware upgrade
 Job scheduling for nightly configuration backup
 Configuration change history
Network Management & Maintenance
Schedule Automatic Backups
• One-click Backup
– Only trigger ‘Reset’ button on switch to copy configuration and log
files to ABC-02-USB
• Files Import & Backup
– Configuration import & backup
– Firmware upgrade
– System log backup
Confidential
Rotate blinking under backup
Network Management & Maintenance
Easy Field Backup & Recovery
Potential Cyber Security Threats in Automation
• Operations disrupted by huge number of nuisance messages on
network, slowing or blocking legitimate network traffic
Denial of service
• Causes computer to run attacker’s programStorage modification
• Replaces pieces of running program with attacker’s program
Memory modification /Memory
Injection / SQL injection
• Attacker impersonates trusted computer, inserting itself as a
middleman between trusted partner computers, modifying the
messages between them to accomplish the attacker’s goals
Man-in-the-Middle
• Watches messages between computers to gain information about
systemNetwork monitoring
• Gives attacker administrative privileges on systemEscalation of privilege
• Convincing users to unknowingly install malware by clicking on links,
bypassing outward-directed firewallsPhishing attacks
• Attackers exploit trusting, helpful impulses of plant personnel to
gain information used to bypass defenses and physical modification
or sabotage of control equipment
Social engineering
Past Control
network security
• Physical perimeter
security
• Air-gapping
• Security through
obscurity
Maximize system
availability
• Remote access portals
were added by plant
engineering and
vendor personnel
• Often without the
acknowledge or
approval by IT people
The security threat
environment has
substantially changed
• Nearly all systems are directly or
indirectly connected to public
networks
• Attackers are now aware of the
possibilities of attacking control
systems
Cyber Security Trend of Automation Network
Ref: Best practices in automation security by Murray McKay, Principal Application Engineer, Siemens Industry, Inc.
Create a Defense-in-Depth
Network Security Environment
Defense in Multiple Places
• Defend the Networks and Infrastructure
(encryption and traffic flow security
measures to resist passive monitoring)
• Defend the Enclave Boundaries (deploy
Firewalls and Intrusion Detection to resist
active network attacks)
• Defend the Computing Environment
Layered Defenses
• Each of these mechanisms must present
unique obstacles to the adversary.
• Further, each should include both
“protection” and “detection” measures
Confidential
The Best Countermeasure against Cyber Threats
Layered Cyber Security Solution for Automation
Security Site
• High-performance
• 500 Mbps
Security Zone
• Best Cost/Performance
• 300Mbps
Security Cell
• Best Integration
• 110 Mbps
Firmware updates
• FW updates are critical to ensuring your devices
are always up to date with the latest technology
– Includes both technology and security updates
• Many manufacturers offer free FW upgrades to
ensure their customers have longevity with the
products they have purhcased
Network Troubleshooting
Minimizing Downtime
Alerts on Unmanaged Switches
• While unmanaged switches
generally cannot communicate
status over the network, they
can be simply configured to
provide relay outputs for
alarms such as:
– Power Supply Failure
– Port Break Alarms
Monitoring System Changes
Alerts & Event Logs
Monitoring System Changes
Predictive Monitoring & Alerts
Comprehensive Fiber Status Monitoring and Warnings
Fiber Status Monitoring – Fiber
Temperature, Working Voltage,
Tx /Rx Powers
Auto Event Warning – SNMP
trap, Relay, Email, Event log
(DDM: Digital Diagnostics Monitoring)
SC ST SFP
All Fiber should be monitored
for fault prevention
Troubleshooting Tools
Network “Snapshot” Comparison Tools
• Quickly Collect Switch Info
(Take Network Snapshot)
• Quickly Compare Switch Info
(Compare Network Snapshots)
Troubleshooting Tools
Event Playback
EVENT PLAYBACK
 Record network status in 30 days
 Network playback on any time/any event
 Play at 1x, 2x, or 4x speed
Troubleshooting Tools
• Speed up on-site device finding to quickly diagnosis
Switch Finder
Confidential
Troubleshooting Tools
Network Protocol Analyzer
Q&A
Thank You

More Related Content

What's hot

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
Narinrit Prem-apiwathanokul
 
Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IP
Panduit
 
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsIntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
Panduit
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
Inductive Automation
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Panduit
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
Westermo Network Technologies
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation Infrastructure
Panduit
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process Control
Inductive Automation
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
sequi_inc
 
Ap6522 ss
Ap6522 ssAp6522 ss
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
Advantec Distribution
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
Red Hat India Pvt. Ltd.
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
Aruba, a Hewlett Packard Enterprise company
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
Nikandrov Maxim
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
ali raza
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
PROFIBUS and PROFINET InternationaI - PI UK
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
Jiunn-Jer Sun
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
TI Safe
 
ICP DAS USA Products Presentation
ICP DAS USA Products PresentationICP DAS USA Products Presentation
ICP DAS USA Products Presentation
Colin McLeod
 

What's hot (20)

Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
Plant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IPPlant Wide Benefits of Ethernet IP
Plant Wide Benefits of Ethernet IP
 
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet ApplicationsIntraVUE: Providing advanced analytics for Industrial Ethernet Applications
IntraVUE: Providing advanced analytics for Industrial Ethernet Applications
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
Managing the Impact and Cost of the IOT Data Explosion - Data Centre Converge...
 
Build Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-SegmentationBuild Redundant and Resilient Networks with Micro-Segmentation
Build Redundant and Resilient Networks with Micro-Segmentation
 
Industrial Automation Infrastructure
Industrial Automation InfrastructureIndustrial Automation Infrastructure
Industrial Automation Infrastructure
 
Affordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process ControlAffordably Refreshing Your Water District’s Process Control
Affordably Refreshing Your Water District’s Process Control
 
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
Industrial Control Systems Security - A Perspective on Product Design (Sequi,...
 
Ap6522 ss
Ap6522 ssAp6522 ss
Ap6522 ss
 
AP6522 Specification Sheet
AP6522 Specification SheetAP6522 Specification Sheet
AP6522 Specification Sheet
 
Evolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business AgilityEvolving Infrastructure and Management for Business Agility
Evolving Infrastructure and Management for Business Agility
 
Airheads vail 2011 pci 2.0 compliance
Airheads vail 2011   pci 2.0 complianceAirheads vail 2011   pci 2.0 compliance
Airheads vail 2011 pci 2.0 compliance
 
Classification cyber security threats of modern substation
Classification cyber security threats of modern substationClassification cyber security threats of modern substation
Classification cyber security threats of modern substation
 
Chapter 1 overview
Chapter 1 overviewChapter 1 overview
Chapter 1 overview
 
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...Profinet and the Industrial Internet of Things (IIoT) -  Peter Thomas - Sept ...
Profinet and the Industrial Internet of Things (IIoT) - Peter Thomas - Sept ...
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017A better connected world - Beijer Sales Kit 2017
A better connected world - Beijer Sales Kit 2017
 
[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda[CLASS 2014] Palestra Técnica - Ilan Barda
[CLASS 2014] Palestra Técnica - Ilan Barda
 
ICP DAS USA Products Presentation
ICP DAS USA Products PresentationICP DAS USA Products Presentation
ICP DAS USA Products Presentation
 

Viewers also liked

THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014 THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014
Saad El Zein
 
Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
Rai University
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
Bibekananada Jena
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
Zubair Nabi
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
Hem Pokhrel
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
Gunjan Mathur
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1
Olivier Bonaventure
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
Harman Grewal
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
Shovan Mandal
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
Ashita Agrawal
 

Viewers also liked (10)

THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014 THE NETWORK Communication Group credentials jan 2014
THE NETWORK Communication Group credentials jan 2014
 
Mba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and networkMba i-ifm-u-4-data communication and network
Mba i-ifm-u-4-data communication and network
 
6421 b Module-09
6421 b Module-096421 b Module-09
6421 b Module-09
 
AOS Lab 12: Network Communication
AOS Lab 12: Network CommunicationAOS Lab 12: Network Communication
AOS Lab 12: Network Communication
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1Computer Networking : Principles, Protocols and Practice - lesson 1
Computer Networking : Principles, Protocols and Practice - lesson 1
 
Communication & network devices
Communication & network devicesCommunication & network devices
Communication & network devices
 
Networking ppt
Networking ppt Networking ppt
Networking ppt
 
Introduction to computer network
Introduction to computer networkIntroduction to computer network
Introduction to computer network
 

Similar to Commissioning, Managing &amp; Troubleshooting Industrial Networks

2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network
Jose Juan Santiago Gomez
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
Sandesh Sonar
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Honeywell
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
Anne Starr
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
Ahmad El Tawil
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
ali raza
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
Lino Quivén
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
5nine
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
Mac An
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
Cisco Canada
 
LAN Security
LAN Security LAN Security
LAN Security
Syed Ubaid Ali Jafri
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
Precisely
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
Cisco Canada
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
Rohit Kumar
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
niravmahida
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
Chiradeep Vittal
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
Gerardo Pardo-Castellote
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 

Similar to Commissioning, Managing &amp; Troubleshooting Industrial Networks (20)

2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network2015 02 antaira quarterly webinar optimizing a robust automation network
2015 02 antaira quarterly webinar optimizing a robust automation network
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
eMagic-Data Center Management System
eMagic-Data Center Management SystemeMagic-Data Center Management System
eMagic-Data Center Management System
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity SolutionsSchneider-Electric & NextNine – Comparing Remote Connectivity Solutions
Schneider-Electric & NextNine – Comparing Remote Connectivity Solutions
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
AAA Implementation
AAA ImplementationAAA Implementation
AAA Implementation
 
Chapter 6 overview
Chapter 6 overviewChapter 6 overview
Chapter 6 overview
 
Sem cis ise
Sem cis iseSem cis ise
Sem cis ise
 
Simplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public CloudsSimplifying SDN Networking Across Private and Public Clouds
Simplifying SDN Networking Across Private and Public Clouds
 
Brkcrt 2214
Brkcrt 2214Brkcrt 2214
Brkcrt 2214
 
Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop Cisco Cloud Networking Workshop
Cisco Cloud Networking Workshop
 
LAN Security
LAN Security LAN Security
LAN Security
 
Controlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and DataControlling Access to IBM i Systems and Data
Controlling Access to IBM i Systems and Data
 
The right Wireless Architecture for you
The right Wireless Architecture for youThe right Wireless Architecture for you
The right Wireless Architecture for you
 
Tatanet Corporate Presentation
Tatanet Corporate PresentationTatanet Corporate Presentation
Tatanet Corporate Presentation
 
Wifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wiWifi Security for SOHOs: Cyberoam UTM CR15wi
Wifi Security for SOHOs: Cyberoam UTM CR15wi
 
Private cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austinPrivate cloud networking_cloudstack_days_austin
Private cloud networking_cloudstack_days_austin
 
Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)Using DDS to Secure the Industrial Internet of Things (IIoT)
Using DDS to Secure the Industrial Internet of Things (IIoT)
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 

Recently uploaded

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 

Recently uploaded (20)

GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 

Commissioning, Managing &amp; Troubleshooting Industrial Networks

  • 1. Tips for Commissioning, Managing, and Troubleshooting your Industrial Network Moxa Technology Webinar Series Richard Wood Networking Infrastructure Manager
  • 2. Agenda Industrial Network Challenges Network Configuration & Commissioning Managing Industrial Networks Troubleshooting to Minimize Downtime Tips for Commissioning, Managing & Troubleshooting Your Industrial Network
  • 3. Industrial Network Challenges • Harsh operating environments • Network availability requirements are much higher than enterprise IT • Cost of downtime is extremely high • Interoperability of industrial devices/networks • Limited networking expertise Typical challenges Source: http://www.strategiccompanies.com/pdfs/Assessing%20t he%20Financial%20Impact%20of%20Downtime.pdf
  • 5. Network Configuration & Commisioning Installation Configuration Troubleshooting Testing Commissioning Typical steps
  • 6. Unmanaged VS. Managed HARDWARE SOFTWARE APPLICATION Small Scale Network P2P Communication Mid to Large Scale Network Mission Critical Network with Remote Monitoring Packet Switching: • Entry Level Switch ASIC Packet Switching + Network Management: • Advanced Switch ASIC + • CPU + Flash / RAM Simple Data Switching Powerful Performance for Network Management POSITION Plug and Play No Configuration Required Web / CLI Setting • Network Security • Network Redundancy • Network Management • Traffic Prioritization Unmanaged Switch Managed Switch
  • 7. Network Topology Typical Enterprise Star Topology • Single point of failure • Long, costly wire/fiber runs
  • 8. Network Configuration Selecting the Right Topology for Your Needs Redundant Technology Type Mesh STP RSTP Ring/Chain HSR/PRP Feature • Every node connects to each other • IEEE 802.1D • Loop-free tree shape topology • IEEE 802.1w • Loop-free tree shape topology • Proprietary technology • Ring/Chain Topology • IEC 61850 • Dual Network (PRP) • Dual Path (HSR) Pros • Highly reliable • Self-healing • Open Protocol • Self-healing • Open Protocol • Faster recovery time: ~1 sec • Low cost • Self-healing • Faster recovery time (<20 ms) • Open protocol • Self-healing • Zero recovery time (0 ms) Cons • Too costly for large network deployment • Recovery time: ~15 sec • Recovery time not fast enough • Vendor specific technology • Prohibitively expensive unless absolutely needed Backup Link Root
  • 9. Network Topology Typical Industrial Ring Topology • No single point of failure • Reduced wiring costs
  • 10. Industrial Protocols • SCADA control / monitor PLC and field devices via industrial protocols Integration of SCADA & PLC Networks Drive I/O PLC Ethernet Switch HMI
  • 11. Network Configuration & Commissioning • Two different methodologies for configuration of network devices • Many users from the industrial side prefer web GUI • Most users for commercial/enterprise side will favor CLI – Used by Cisco Web Interface vs CLI
  • 13. Device Configuration Graphical User Interface • Visual confirmation of current settings • Menu based configuration • Standard web browser interface
  • 14. Network Management Tools Easy Configuration @ Installation Stage Efficient Monitoring @ Operation Stage Easy Backup/recovery @ Maintenance Stage Quick Troubleshooting @ Diagnostics Stage
  • 15. Mass Configuration Tools Up to 10X Productivity Boost One by One Setting by Web Batch Configuration by MXconfig Multiple Devices Wiring in Series Broadcast Search Group IP Configuration Group Redundancy Configuration Finish 400 sec 20 sec 200 sec 100 sec Total 12 min Single Power Supply Single Device Wiring IP Configuration Redundancy Configuration Repeat 100 times Finish 10 sec 30 sec 35 sec Total 125 min
  • 16. Fast Group Configuration Network (IP address) Setting Confidential IP address setting for mass devices
  • 17. Fast Group Configuration 802.1Q VLAN Setting Confidential Quick Add Panel for cloning setting *Mass 802.1Q VLAN Setting only for devices with the same model name
  • 18. Fast Configuration Deployment Copy Configuration Confidential Quick configuration copy from one specific setting to mass devices Support mass IP address setting *Copy Configuration only for devices with the same model name
  • 19. Configuration Check Status Overview Confidential Redundancy Setting Overview 802.1Q VLAN Setting Overview
  • 20. Startup Troubleshooting Confidential21 Compare a Single Device with Whole Network VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=101, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 VLAN 1: Access, PVID=1, Forb=200 2: Access, PVID=2, Forb=300 3: Trunk, PVID=100, Tag=1,2 4: Trunk, PVID=100, Tag=1,2 Comparison Sample Benefit Reduce Manual Setting Errors
  • 22. Network Management & Maintenance Best Practices
  • 23. Network Management & Maintenance • Industrial NMS – Auto topology visualization – Remote device management – Real-time event management – Comprehensive performance reporting Network Management Software Confidential
  • 24. Network Management & Maintenance Efficient Visual Monitoring Virtual Device Panel Real-time Event VLAN/IGMP Visualization
  • 25. CONFIGURATION CENTER  1-click for mass configuration backup and firmware upgrade  Job scheduling for nightly configuration backup  Configuration change history Network Management & Maintenance Schedule Automatic Backups
  • 26. • One-click Backup – Only trigger ‘Reset’ button on switch to copy configuration and log files to ABC-02-USB • Files Import & Backup – Configuration import & backup – Firmware upgrade – System log backup Confidential Rotate blinking under backup Network Management & Maintenance Easy Field Backup & Recovery
  • 27. Potential Cyber Security Threats in Automation • Operations disrupted by huge number of nuisance messages on network, slowing or blocking legitimate network traffic Denial of service • Causes computer to run attacker’s programStorage modification • Replaces pieces of running program with attacker’s program Memory modification /Memory Injection / SQL injection • Attacker impersonates trusted computer, inserting itself as a middleman between trusted partner computers, modifying the messages between them to accomplish the attacker’s goals Man-in-the-Middle • Watches messages between computers to gain information about systemNetwork monitoring • Gives attacker administrative privileges on systemEscalation of privilege • Convincing users to unknowingly install malware by clicking on links, bypassing outward-directed firewallsPhishing attacks • Attackers exploit trusting, helpful impulses of plant personnel to gain information used to bypass defenses and physical modification or sabotage of control equipment Social engineering
  • 28. Past Control network security • Physical perimeter security • Air-gapping • Security through obscurity Maximize system availability • Remote access portals were added by plant engineering and vendor personnel • Often without the acknowledge or approval by IT people The security threat environment has substantially changed • Nearly all systems are directly or indirectly connected to public networks • Attackers are now aware of the possibilities of attacking control systems Cyber Security Trend of Automation Network Ref: Best practices in automation security by Murray McKay, Principal Application Engineer, Siemens Industry, Inc.
  • 29. Create a Defense-in-Depth Network Security Environment Defense in Multiple Places • Defend the Networks and Infrastructure (encryption and traffic flow security measures to resist passive monitoring) • Defend the Enclave Boundaries (deploy Firewalls and Intrusion Detection to resist active network attacks) • Defend the Computing Environment Layered Defenses • Each of these mechanisms must present unique obstacles to the adversary. • Further, each should include both “protection” and “detection” measures Confidential The Best Countermeasure against Cyber Threats
  • 30. Layered Cyber Security Solution for Automation Security Site • High-performance • 500 Mbps Security Zone • Best Cost/Performance • 300Mbps Security Cell • Best Integration • 110 Mbps
  • 31. Firmware updates • FW updates are critical to ensuring your devices are always up to date with the latest technology – Includes both technology and security updates • Many manufacturers offer free FW upgrades to ensure their customers have longevity with the products they have purhcased
  • 33. Alerts on Unmanaged Switches • While unmanaged switches generally cannot communicate status over the network, they can be simply configured to provide relay outputs for alarms such as: – Power Supply Failure – Port Break Alarms Monitoring System Changes
  • 34. Alerts & Event Logs Monitoring System Changes
  • 35. Predictive Monitoring & Alerts Comprehensive Fiber Status Monitoring and Warnings Fiber Status Monitoring – Fiber Temperature, Working Voltage, Tx /Rx Powers Auto Event Warning – SNMP trap, Relay, Email, Event log (DDM: Digital Diagnostics Monitoring) SC ST SFP All Fiber should be monitored for fault prevention
  • 36. Troubleshooting Tools Network “Snapshot” Comparison Tools • Quickly Collect Switch Info (Take Network Snapshot) • Quickly Compare Switch Info (Compare Network Snapshots)
  • 37. Troubleshooting Tools Event Playback EVENT PLAYBACK  Record network status in 30 days  Network playback on any time/any event  Play at 1x, 2x, or 4x speed
  • 38. Troubleshooting Tools • Speed up on-site device finding to quickly diagnosis Switch Finder Confidential
  • 40. Q&A