Security planning
1.3
Impact of the system lifecycle to the device lifecycle
17
UM Security BRS-2A
Release
8.7
05/2022
1.3
Impact of the system lifecycle to the device lifecycle
A network device is a component in a superordinate system. Therefore, the system lifecycle
determines parts of the device lifecycle. A system lifecycle involves a planning phase. The
decisions taken in the planning phase affect the device lifecycle directly or indirectly.
Typical decisions during system planning include:
The physical position of the device, for example, its installation location and environment
The logical position of the device, for example, the security zone
The requirements of the system for defense in depth
1.3.1
VLAN plan
VLANs are a software-configurable concept to segregate a LAN (layer 1) into separate Virtual
LANs (VLANs) on layer 2. Advantages include the separation of data packets belonging to different
VLANs. The separation also applies to flooded multicast, broadcast, and unknown unicast frames.
This helps confidentiality besides helping reduce the network load on layer 1.
A VLAN plan is a prerequisite for a secure configuration of the device itself and in turn for the
security and availability of your system. Create a VLAN plan that segregates your network on
layer 2. A dedicated management VLAN can be a barrier component in the strategy "Defense in
depth".
For simple networks, a VLAN plan and the configuration of VLANs may be considered unnecessary
from a functional perspective. However, VLANs are recommended from a security perspective.
Note:
The redundancy protocols HIPER Ring and Ring/Network Coupling employ the fixed VLAN
ID 1 for their protocol packets. Using the VLAN ID 1 exclusively for these redundancy protocols can
help enhance network availability
(see on page 21 “VLAN plan considerations depending on
.
Note:
For your network, additional planning and implementation steps may be necessary. For
example, you may need an L3 network plan (outside the scope of this document) in addition to the
VLAN plan.
Summary of Contents for HIRSCHMANN HiOS-2A
Page 6: ...Contents 6 UM Security BRS 2A Release 8 7 05 2022 ...
Page 8: ...Document History 8 UM Security BRS 2A Release 8 7 05 2022 ...
Page 10: ...Safety instructions 10 UM Security BRS 2A Release 8 7 05 2022 ...
Page 54: ...Network security support 3 11 Configure logging 54 UM Security BRS 2A Release 8 7 05 2022 ...
Page 62: ...Index 62 UM Security BRS 2A Release 8 7 05 2022 ...
Page 66: ......