Configuration
4.9 Security
CP 1243-1
Operating Instructions, 04/2017, C79000-G8976-C365-03
75
Properties
●
VPN forms a logical subnet that is embedded in a neighboring (assigned) network. VPN
uses the usual addressing mechanisms of the assigned network, however in terms of the
data, it transports its own frames and therefore operates independent of the rest of this
network.
●
VPN allows communication of the VPN partners with the assigned network.
●
VPN is based on tunnel technology and can be individually configured.
●
Communication between the VPN partners is protected from eavesdropping or
manipulation by using passwords, public keys or a digital certificate (authentication).
Areas of application
●
Local area networks can be connected together securely via the Internet ("site-to-site"
connection).
●
Secure access to a company network ("end-to-site" connection)
●
Secure access to a server ("end-to-end" connection)
●
Communication between two servers without being accessible to third parties (end-to-end
or host-to-host connection)
●
Ensuring information security in networked automation systems
●
Securing the computer systems including the associated data communication within an
automation network or secure remote access via the Internet
●
Secure remote access from a PC/programming device to automation devices or networks
protected by security modules via public networks.
Cell protection concept
With Industrial Ethernet Security, individual devices or network segments of an Ethernet
network can be protected:
●
Access to individual devices and network segments protected by security modules is
allowed.
●
Secure connections via non-secure network structures becomes possible.
Due to the combination of different security measures such as firewall, NAT/NAPT routers
and VPN via IPsec tunnels, security modules protect against the following:
●
Data espionage
●
Data manipulation
●
Unwanted access