Part9 Interfaces and Networks Release 12 en
Part9 Interfaces and Networks Release 12 en
Contents
1 Introduction..............................................................................................................................3
1.1 About the RTU500 series Function Description............................................................ 3
1.2 Preface.................................................................................................................................... 3
1.3 References.............................................................................................................................. 3
2 Interfaces.................................................................................................................................. 5
2.1 Interface configuration....................................................................................................... 5
2.1.1 Interfaces.............................................................................................................. 5
2.1.2 Interface Configuration Rules and Restrictions........................................... 7
2.2 Serial interfaces: Duplex communication........................................................................8
2.2.1 Direct link (TxD/RxD only)................................................................................ 8
2.2.2 WT link full duplex (no handshake).................................................................9
2.2.3 Dial up (external modem DCD handshake)................................................. 10
2.3 Serial interfaces: Half-duplex communication..............................................................12
2.3.1 WT link half duplex (RTS/CTS handshake)...................................................12
2.3.2 WT link half duplex (RTS/DCD handshake)..................................................13
2.4 Serial interfaces: Point-to-Point Protocol (PPP)...........................................................14
2.4.1 Setting up a PPP client connection............................................................... 15
2.4.2 Setting up a PPP server connection..............................................................19
2.5 Serial interfaces: Additional communication modes..................................................23
2.5.1 Loop switch unit (DSTC 3002)....................................................................... 23
2.5.2 Link with collision avoidance (DCD handshake).........................................24
2.6 Ethernet interfaces: Configuration and Routing.........................................................24
2.7 USB RNDIS interface.......................................................................................................... 27
2.7.1 Introduction........................................................................................................27
2.7.2 Configuration..................................................................................................... 27
2.8 Protocol logging for communication interfaces......................................................... 28
2.8.1 Host communication protocols..................................................................... 28
2.8.2 Sub-device communication protocols..........................................................29
2.8.3 Configuration in CPTT..................................................................................... 29
2.8.4 Configuration string in CPTT.........................................................................30
2.8.5 Examples............................................................................................................. 31
3 Networks.................................................................................................................................33
3.1 Network configuration......................................................................................................33
3.2 Network configuration rules and restrictions..............................................................33
3.2.1 Denial of Service............................................................................................... 33
3.3 Virtual Private Network (VPN).........................................................................................34
3.3.1 Overview............................................................................................................. 34
3.3.2 Supported Features..........................................................................................35
3.3.3 Pre-Shared Key (PSK)....................................................................................... 36
3.3.4 Certificates.........................................................................................................36
3.3.5 Perfect Forward Secrecy (PFS).......................................................................37
3.3.6 Dead Peer Detection........................................................................................ 37
3.3.7 UDP Encapsulation and NAT-Traversal.........................................................38
4 Glossary.................................................................................................................................. 69
1 Introduction
1.2 Preface
Part 9: Interfaces and Networks contains information about:
• Interfaces of the CMU modules
• Network functionality of the RTU500 series
1.3 References
[1] 1KGT 150 950 RTUtil500 Users Describes the usage of engineering tool
Guide RTUtil500 of the RTU500 series
[2] Individual Ident RTU500 series Description of the Sub and Host
Communication Protocols
Protocol
Descriptions
[3] 1KGT 150 939 Interfaces and Description of the relationship of
Protocols interfaces and protocols
[4] RFC1157 A Simple Network
Management
Protocol (SNMP)
[5] RFC1213 Management
Information Base
for Network
Management of TCP/
IP-based internets:
MIB-II (second
version)
[6] 1KGT 150 924 RTU500 series Web
Server User's Guide
[7] IEC 62439-3 Industrial Part 3: Parallel Redundancy Protocol
Communication (PRP) and High-availability Seamless
Networks - Redundancy (HSR)
High Availability
Automation
Networks
2 Interfaces
The following communication units are available for the interfaces CP1... CPn:
• 560CMU05
• 560CMR01
• 560CMR02
• 540CMD01
• 540CID01
• 520CMD01
The following parameters are available for the interfaces CP1... CPn:
Value range:
• Direct link (TxD/RxD only)
• WT link full duplex (no handshake)
• WT link half duplex (RTS/CTS handshake)
• WT link half duplex (RTS/DCD handshake)
• Dial up (external modem DCD handshake)
• Loop switch unit (DSTC 3002), RP570/71 Host interface only
• Link with collision avoidance (DCD handshake), DNP 3 only
Usage of the controls for this interface.
Direct Link: No modem controls.
Loop Switch Unit: RP570/71 Host Interface only.
Collision Avoidance: DNP3.0 Host/Sub-Interface only
Transmit delay time disabled CMU - serial interfaces
If 'Transmit Delay Time' is enabled:
Delay time in Milliseconds. Value range: 1 to 10000 ms.
Recommended value for WT modems in half-duplex mode: 30 ms
The following communication units are available for the interfaces CPA, CPB:
• 560CMU05
The following parameters are available for the interfaces CPA, CPB:
Value range:
• Direct link (TxD/RxD only)
• WT link full duplex (no handshake)
• WT link half duplex (RTS/CTS handshake)
• WT link half duplex (RTS/DCD handshake)
• Dial up (external modem DCD handshake)
• Loop switch unit (DSTC 3002), RP570/71 Host interface only
• Link with collision avoidance (DCD handshake), DNP 3 only
Usage of the controls for this interface.
Direct Link: No modem controls.
Loop Switch Unit: RP570/71 Host Interface only.
Collision Avoidance: DNP3.0 Host/Sub-Interface only
Transmit delay time disabled CMU - serial interfaces
If 'Transmit Delay Time' is enabled:
Delay time in Milliseconds. Value range: 1 to 10000 ms.
Recommended value for WT modems in half-duplex mode: 30 ms
• 560CMU05
• 560CMR01
• 560CMR02
• 540CID01
• 540CMD01
• 520CMD01
The following parameters are available for Ethernet interfaces:
The communication units use the Ethernet interface for downloading configuration data
and for diagnostic purposes. The default IP address of the Ethernet interface is 192.168.0.1.
It is enabled and can be temporarily set to a different value using an onboard jumper (not
available on CMU modules with USB interface).
• 560CMR01
• 560CMR02
• 540CID01
• 540CMD01
• 520CMD01
These communication units work as USB RNDIS target device. RNDIS host is a Windows XP or
Windows 7 computer. RNDIS interface’s IP address on the RTU is 169.254.0.10. The USB RNDIS
Device running on Windows host can get IP settings assigned automatically from the "link
local" block 169.254.0.0/16.
The assignment of UART host protocols to serial interfaces is completely at the user's
disposal. There are no dependencies between different protocols run on a CMU.
Ethernet and TCP/IP-based protocols can be used with the Ethernet interface on all CMUss.
The Parallel Redundancy Protocol (PRP) can be used on CMUss with two Ethernet interfaces
only (e.g. 560CMR01).
The USB interfaces can only be used to access the RTU500 series Web-Server
WT Duplex
4 Wire
NCC
WT
Tx Tx
RTU500
WT
Rx Rx
For direct link communication, RTU500 series uses TxD and RxD via separate lines (duplex
transmission).
No control signals are used. CTS and DCD are not analyzed.
The RTU and its communication partner device are linked via a direct connection. A
communication partner device may be a PC, another RTU, a PC modem, or a CS.
DTR
RTS
TxD
RxD
To communicate with WT modems of the type 23WT25 via 4-wire links or 2 channels, RTU500
series uses full-duplex communication.
To communicate with WT modems of the type 23WT23 via 4-wire links, RTU500 series uses
full-duplex communication.
As with No hardware handshake, RTU500 uses full-duplex communication with TxD and RxD.
DTR and RTS are set to continuous ON. This switches the modem's carrier signal to ON state.
DTR
RTS
TxD
RxD
For dial-up communication through an external modem, RTU500 series uses TxD and RxD via
separate lines (duplex transmission).
The DTR / DSR, RTS / CTS, and DCD control signals are used for flow control. This works only
in RS232 mode.
The RTU and its communication partner device are linked via a direct connection. A
communication partner device may be a PC, another RTU, a PC modem, or a CS.
DTR
RTS
TxD
RxD
Hayes Modem
NCC NCC
WT WT
RTU500
RTU500
Tx Tx Tx
Rx WT Rx WT Rx
RTU500
RTU500
Tx Tx Tx
Rx WT Rx WT Rx
To communicate with WT modems of the type 23WT23 and 23WT25 via 2-wire links, RTU500
series uses half-duplex communication. The control signals are used to control the carrier on
the transmission line.
DTR
CTS Carrier is on
RxD
To communicate with WT modems of the type 23WT23 and 23WT25 via 2-wire links, RTU500
series uses half-duplex communication. The control signals are used to control the carrier on
the transmission line.
DTR
DSR
1) Transmit Delay Time
RTS
TxD
RxD
For each serial interface of the RTU, the type of peer used on either end of the PPP link can be
configured in one of the following ways:
• as an RTU PPP client to a remote network host over a dial-up line connection using a GSM/
GPRS modem
• as an RTU PPP server to a Microsoft® Windows® client connection over a null modem cable
Every serial interface of an RTU can be configured either as a PPP client or as a PPP server.
PPP is basically responsible for encapsulating and carrying IP datagrams across two
endpoints of a serial connection. PPP communication starts after a physical serial connection
has been established. However, before PPP can start carrying data, numerous negotiations
take place between the peers to configure, establish and monitor the connection.
The PPP Link Control Protocol is used to connect an RTU to a control system via the Internet
over any distance.
In order to use this feature, you need to equip the RTU with an external GSM/GPRS modem
connected to a serial port.
An Internet Service Provider (ISP) supporting network connections between a GPRS modem
and the Internet is required
Once a PPP connection has been established, the RTU can be accessed by a control system
using the IP address assigned by the ISP. All IP-based protocols (IEC 60870-5-104, DNP3,
Modbus, etc.) can be used with this connection.
With a PPP connection, the RTU can be configured and monitored remotely using a Web
browser.
2.4.1.2 Configuration
The following section describes the steps required to set up a PPP client connection.
On a CMU module select a serial interface tab and check Enable PPP box.
For other external GSM/GPRS modems (e.g. INSYS) select the required baud rate from COM
speed dropdown list. The default value is 19200 bits/sec.
For other external GSM/GPRS modems (e.g. INSYS) select Dial-up (external modem DCD
handshake) from the Modem control dropdown list.
Activate the Dial up enabled option and click the Dial up parameters button to open the
Modem parameters configuration dialog.
Configure the AT commands and command responses as required, using suitable values for
the modem used. The configuration settings are usually similar to the specification according
to V.25ter.
The configured AT commands are sent to the modem during initialization time.
Some ISPs use PIN protection to protect their SIM cards from unauthorized access. This
protection requires the user to provide a secret numeric password as an authentication
before being able to access the system. If your ISP uses this function enable the option PIN
Configuration string for GSM modem. In the text field to the right, enter the full AT command
for sending the PIN. Quotation marks around the PIN are mandatory, e.g. AT+CPIN=”9178”. If
no PIN protection is used, this option can be disabled.
The Service Configuration string for GSM modem is sent to the modem immediately before
the configured telephone number is called. The string usually contains the name of the
provider and the service offered.
Example:
In the above figure, the internal modem AirPrime WISMO228 is used. More information can be
found on: http://www.sierrawireless.com.
The configuration of external modems, e.g., INSYS GSM/GPRS, is similar. More information
can be found on: http://www.insys-tec.de/en/en/insys-gsm.
Under Service configuration string for GSM modem, the AT command AT+CGDCONT=<PDP
(Packet Data Protocol) context> is used to specify the service. The configuration string in the
following example uses the provider mdex.
The following table outlines the parameters used in the configuration string.
Parameter Explanation
1 PDP context id (definition stored in non-
volatile memory)
”IP” PDP type – Internet Protocol1
”mdex.ic.t-mobile” APN (Access Point Name)1
Table 2: Explanation of AT command example – String parameters
The ISP usually provides contract-specific data, which need to be provided as part of the PPP
client link.
• Send local IP address to provider: This option is usually disabled, because the local IP
address is assigned automatically from the provider during connection setup. Attention:
If this option will be enabled in very rare cases the local IP address will be sent to the peer
and has to be acknowledged positive from the provider during connection setup.
• User name
• Password
• Telephone number
Enable routing setting for the PPP client interface. Use the remote network address (provided
by your provider). Define network and netmask. Gateway is handled automatically according
to the dial-in server of your provider.
There are two supervision methods selectable from a dropdown list in RTUtil500:
a) Packets received
This is the default value (also for migration from older RTUtil500 versions).
Supervise received packets on PPP interface. If no packets will be received the PPP
interface will be restarted.
b) PING
Cyclic test if the configured host is reachable. If not the PPP interface will be restarted.
If PING is selected the following IP address field will be activated. This is the IP address of
the remote host to ping. Note: Has to be a host that is always reachable.
The default value '8.8.8.8' (primary DNS server) is reachable if connected to the public
internet.
Some providers offer a private ping-server only reachable inside their network e.g. mdex
(46.16.216.16).
When powering on the RTU, the AT commands configured for initialization are sent to the
modem. If these commands are answered correctly, the RTU starts a call to the telephone
number specified in the configuration data.
Once a connection is established, the connection string received, and the DCD signal
activated, control is handed over to the PPP Link Control Protocol (LCP). Note that the RTU
does not provide an IP address. The remote peer has to determine both addresses. The
network address specified in the above figure is used only for expansion of the internal
routing table and should match the address provided by the remote peer.
PPP is a symmetric peer-to-peer protocol. Each endpoint interacts with its peer in an identical
manner. The designations client and server are used only in the context of establishing a
connection to distinguish the endpoint initiating the connection (client) from the endpoint
answering that request (server). Once a physical serial connection has been established, this
distinction is no longer relevant.
The RTU500 series provides a common solution for connections between an RTU PPP server
and Windows clients. The RTU's's PPP server functionality provides a remote access server
that is able to answer connection requests from PPP clients. Microsoft® Windows® remote
access software is compliant with the PPP standard and can therefore be used to access
the RTU over the network. The RTU's's PPP server also provides advanced features, such as
authentication (optional), network address compression, and control field compression.
2.4.2.2 Configuration
The following section describes the basic configuration steps required to set up an RTU's's
PPP server and a Microsoft® Windows® PPP client.
On a CMU module select a serial interface tab and check Enable PPP box.
In RTUtil500, the IP addresses of the local system (server) and the remote system (client) are
mandatory.
1. In the Local IP address field, enter the IP address of the PPP server in dotted decimal
format.
2. In the Remote IP address field, enter the IP address of the PPP client in dotted decimal
format.
You can configure the PPP server with or without authentication. By default, authentication is
disabled, as displayed in the figure above.
from the challenge and a secret key. Only a recipient of the challenge who also is in
possession of the key can reliably generate a valid response.
If the Authentication checkbox is enabled, the server expects the client to authenticate
before being granted access. As the server requires CHAP as its authentication method, the
client must encrypt the user name and password. The server verifies the user name and the
password provided by the client against its configured acceptable user name and password.
If the provided name and password cannot be verified, access is denied. If an authentication
failure occurs while trying to open a link, the link is closed and the client application that
attempted to open the link is notified of this event.
1. Configure both ends of the PPP link with the same connection speed used by the serial I/
O adapter. The default value of 38400 bits/s is usually an ideal match to the COM speed of
the peer and no additional configuration is necessary.
2. Verify the PPP connection. A Microsoft® Windows® client is required for the second end
point of the connection. For a detailed description of the configuration of a standard
PPP client – as installed on Microsoft® Windows® platforms by default – refer to [6]. The
Web Server Users Manual contains additional instructions for PPP server configuration on
Windows® operating systems.
3. If the RTU's's PPP server is configured with authentication, enable the following settings in
the configuration dialogs on the Microsoft® Windows® machine.
4. From the Microsoft® Windows® Control Panel, select Network Connections.
5. Right-click on PPP-RTU560 to open the Properties dialog.
6. On the Security tab, select the custom settings according following figure.
8. Use the same values for Maximum speed (bps) (e.g., 38400) on the Microsoft® Windows®
PPP client and for the COM speed of the PPP server in RTUtil500, as shown in the figures
COM speed configuration in RTUtil500 above and Modem Configuration dialog below.
The communication loop switch unit DSTC 3002 for redundant communication lines is
supported only by the RP570/71 host communication interface.
There are restrictions when enabling the option 'Allow IP address of interfaces in the same
subnet':
If the ethernet interfaces E1 and E2 are configured in the same subnet and one of the link
in is down the RTU can be reached via the other ethernet interface. This works in case of
communication of host interfaces. But if a sub interface is defined and the IED is configured
with two IP ports and same IP address for both ports, then the RTU can communicate from
E1 and from E2 to the IED, but only one communication line (one socket) can be active. One
link is online (communication is up) and the redundant link cannot be connected. A “connect”
must not be done and test link cannot be send on redundant line. That means only one socket
with port 2404 can be active. If this will work is depending from IED. IED needs to ignore a
connection from redundant link as long the active link is online.
The content of the internal routing table is configured on the 'IPv4 Routing' tab. There are the
following parameters:
For IPv4, a destination network is identified by an IPv4 address and a netmask value. The
netmask is normally contiguous makes it possible to specify as a prefix as well. For example,
the mask 255.255.255.0is equivalent to the prefix /24 since the 24 first bits (counting from
left) are set. The netmask is selected using a dropdown list:
RNDIS is a specification for network devices on dynamic Plug-and-Play I/O buses, such as
USB. It includes two components: a bus-independent message set, and a description of how
this message set is conveyed across a specific I/O bus on which it is supported.
Some communication unit of the RTU500 series embeds a USB device port that is compliant
with the Universal Serial Bus (USB) V2.0 full-speed device specification (12 Mbit/s). The RNDIS
protocol is used on top of USB, providing a virtual Ethernet link to a Microsoft® Windows® XP
or Microsoft® Windows® 7 operating system. The result is the same as creating two network
devices and assigning one to the 511CIM01 and the other one to the Microsoft® Windows®
machine. After installing and configuring the required RNDIS driver on the Microsoft®
Windows® system, the connection could be used for web server diagnostics, and for the
download of configuration data and firmware.
The USB V2.0 full-speed protocol provides communication services between Microsoft®
Windows® host and an attached USB device. The protocol provides a collection of
communication flows (pipes), each one associated to an endpoint, to the USB device.
Software on the Microsoft® Windows® host communicates with the USB device through a set
of communication flows.
The RTU communication unit provides the USB device used to transfer data with a Microsoft®
Windows® XP/7 USB host. The USB device is able to emulate a single Ethernet device as if it
were attached to a single USB host. The Ethernet device will be found both on the host side
and the target side, enabling the host, and the target, to communicate with each other using
the TCP/IP network protocol.
2.7.2 Configuration
The RTU500 series communication unit works as a USB RNDIS target device. A Microsoft®
Windows® XP/7 computer is used as the RNDIS host.
After connecting the 520CMD01 communication unit and the Microsoft® Windows® XP/7
machine via USB cable for the first time, the Microsoft® Windows® machine detects the new
USB RNDIS device, and prompts to install it.
This USB interface is used for web server access via the following URL: http://169.254.0.10.
For detailed information on installing and configuring the USB RNDIS driver on Microsoft®
Windows® XP/7, see the RTU500 series Web Server User's Guide.
This functionality is available on every CMU and called RIO server. The logged traffic is
displayed in CPTT, the communication protocol testing tool, which is provided by Real
Thoughts (www.realthoughts.com).
Protocol logging is possible for direct serial links, Ethernet links, TCP/IP communication via
PPP protocol and network communication through VPN tunnels.
For monitoring purposes, a network connection to the card used for serial or network
communication is required. Monitoring via backplane routing is not possible.
The following chapters describe the communication protocols supported by the RTU500
series, and the configuration options available in CPTT.
ADVICE
Protocol logging is not possible on Ethernet port E2, if 'Dedicated default gateway for E2
interface' or 'Allow IP address of interfaces in the same subnet' or both is selected.
• IEC 60870-5-101
• IEC 60870-5-104
• DNP3
• DNP3 LAN/WAN
• Modbus TCP
• Modbus ASCII/RTU
• IEC 60870-5-101
• IEC 60870-5-103
• IEC 60870-5-104
• DNP3
• DNP3 LAN/WAN
• SPAbus
• Modbus TCP
• Modbus ASCII/RTU
1. In the Protocol profile menu, configure all settings for the selected protocol in the usual
manner.
2. Ensure that the settings comply with the configuration of your system, and that the
settings correspond to a master or slave simulation.
3. In the General Preferences dialog, in the Address field of the Remote I/O Server section,
enter the IP address of the CMU to be monitored.
The default value for the network port (1793) must not be changed. An example is shown in
the following figure:
In the General Preferences dialog, in the Configuration string field in the Remote I/O Server
section, enter a string that specifies the interface, or line, to be monitored.
The format of the configuration string is described below. The format excludes certain
characters from being used in the configuration string. The configuration string is case
sensitive.
Some special characters are reserved for syntax representation, and must not be used in the
configuration string:
The names of interfaces to be used in the configuration string depend on the communication
unit for which the configuration string is defined:
Communication unit Serial inter- Ethernet inter- PPP links VPN tunnel
face names face names
560CMU05 cp1, cp2, cpA, cpB E1, E2, PRP PPP1, PPP2 VPN1, VPN2
560CMR01 cp1, cp2 E1, E2, PRP PPP1, PPP2 VPN1, VPN2
560CMR02 cp1, cp2, cp3, cp4, E1, E2, PRP PPP1, PPP2, PPP3, VPN1, VPN2
cp5, cp6 PPP4, PPP5, PPP6
540CID01, 540CMD01 cp1, cp2, cp3, cp4 E1, E2, PRP PPP1, PPP2, PPP3, VPN1, VPN2
PPP4
520CMD01 cp1, cp2, cp3 E1 PPP1 VPN1
Table 5: CPTT – Interface naming
Parameter Explanation
<Interface name> Serial interface name
Table 6: Serial communication variables
ABBRTU560-net:{E1 | E2 | PRP | PPP1 | PPP2 | PPP3 | PPP4 | PPP5 | PPP6 | VPN1 | VPN2}[:{iec104
| dnp | modbus | <port number>}];remote:<IP address>[/<metric>][:{iec104 | dnp | modbus |
<port number>}][;protocol:{tcp | udp}]
Parameter Explanation
<Port number> Network port of the protocol to monitor
<IP address> IP address of the communication partner
device
<Metric> Number of relevant bits of the IP address (left
to right).
Range: 8 to 32
Default value: 32
Table 7: Network communication variables
2.8.5 Examples
1 ABBRTU560-srl:cp2
Serial interface CP2
2 ABBRTU560-srl:cpA
Serial interface CPA on CMU01, CMU02 or CMU10
3 ABBRTU560-net:E1:iec104;remote:192.168.1.100
Network interface E1, IEC 60870-5-104 host communication line, host IP address
192.168.1.100
4 ABBRTU560-net:E1:iec104;remote:192.168.1.100/24
Network interface E1, IEC 60870-5-104 host communication line, all host IP addresses are
part of the network 192.168.1.0
5 ABBRTU560-net:E2;remote:192.168.1.100:dnp
Network interface E2, DNP3 LAN/WAN subdevice communication line, IED IP address
192.168.1.100, network protocol TCP
6 ABBRTU560-net:E2;remote:192.168.1.100:dnp;protocol:udp
Network interface E2, DNP3 LAN/WAN subdevice communication line, IED IP address
192.168.1.100, network protocol UDP
7 ABBRTU560-net:E1:1234;remote:192.168.1.100;protocol:tcp
Network interface E1, host communication line with network port 1234, host IP address
192.168.1.100, network protocol TCP address
8 ABBRTU560-net:E1;remote:192.168.1.100:1234;protocol:udp
Network interface E1, subdevice communication line with network port 1234, IED IP
address 192.168.1.100, network protocol UDP
9 ABBRTU560-net:PRP:iec104;remote:192.168.1.100
Redundant PRP network interface PRP, IEC 60870-5-104 host communication line, host IP
address 192.168.1.100
10 ABBRTU560-net:PPP1:iec104;remote:192.21.89.38
IEC 60870-5-104 host communication line via PPP on interface PPP1, host IP address
192.21.89.38
11 ABBRTU560-net:VPN1:iec104;remote:192.168.1.100/24
IEC 60870-5-104 host communication line via VPN tunnel 1, all host IP addresses are part of
network 192.168.1.0.
12 ABBRTU560-net:VPN1:dnp;protocol:udp
DNP3 LAN/WAN host communication line via VPN tunnel 1, all host IP addresses, network
protocol UDP
3 Networks
The denial of service function is designed to limit the CPU load that can be produced by
the Ethernet network traffic to the RTU. The communication facilities must not be allowed
to compromise the primary functionality of the RTU. All inbound network traffic is quota
controlled, so that a too heavy network load can be controlled. Heavy network load might for
instance be the result of malfunctioning equipment connected to the network. In case the
limit is exceeding external rate limiters shall be used.
The denial of service function measures the traffic from an Ethernet port and, if necessary,
limits it from jeopardizing the RTU's's functionality due to a high CPU load.
• Following internal message is displayed in the RTU system diagnosis if the limit is exceed:
CMU x: Rate monitor interface Exchange to polling mode (Count=n)
• Following internal message is displayed in the RTU system diagnosis the traffic is again
below the limit: CMU x: Rate monitor interface Exchange to interrupt mode (Count=n)
How does the function create the diagnosis message:
• If the state is different than 2 seconds before, the function creates 1 diagnosis message
indicating the state change. Any additional state changes in the last 2 seconds are not
indicated.
• If the state is the same as 2 seconds before but has changed in between, the function
creates 2 diagnosis messages indicating the back and forth state change. In this case both
messages get the same time stamp.
• The last diagnosis message shows the actual state. If there are no further messages the
rate monitor remains in the last indicated state.
Confidentiality is keeping the data secret from the unintended listeners on the network.
Integrity is ensuring that the received data is the data was actually sent.
Authenticity is providing the identity of the endpoint to ensure that the end point is the
intended entity to communicate with.
3.3.1 Overview
With the help of VPN a RTU can be connected to control system via the public internet. The
data exchange is secured via the VPN connection. From the user point of view it looks like the
RTU resides within the NCC network.
NCC
RTU560 Internet
Network
IP sec router
RTU540
The RTU establishes a VPN connection to the IPsec Router. The VPN tunnel (red line) connects
the virtual RTU network with the NCC network. Therefore a network-to-network connection is
established. This connection is transparent and secured.
If a connection is established, the RTU can be accessed by a control system using the internal
virtual IP address. All IP based protocols can run on this connection.
The RTU can be remote configured and supervised using a web browser.
The Internet Key Exchange (IKE) is implemented according to the requirements of:
• RFC 2407: The Internet IP Security Domain of Interpretation for ISAKMP
• RFC 2408: Internet Security Association and Key Management Protocol (ISAKMP)
• RFC 2409: The Internet Key Exchange Protocol (IKE)
• RFC 3706: A Traffic-Based Method of Detecting Dead Internet Key Exchange (IKE) Peers
• RFC 3947: Negotiation of NAT-Traversal in the IKE
• RFC 4306: Internet Key Exchange (IKEv2) Protocol
The Internet Security Protocol (IPsec) is implemented according to the requirements of:
• RFC 2401: Security Architecture for the Internet Protocol
• RFC 2406: IP Encapsulation Security Payload (ESP)
For Phase 1, the IKE supports the following cryptographic algorithms:
• 3DES 168 CBC
• AES 128 CBC
• AES 192 CBC
• AES 256 CBC
• BLOWFISH
• DES 56 CBC
For Phase 1, the IKE supports the following hash algorithms (integrity protection and
authenticity):
• AES128
• MD5
• SHA1
• SHA256
• SHA384
• SHA512
For Phase 1, the IKE supports the following Diffie-Hellmann groups:
• MODP group 1 (768 bit)
• MODP group 2 (1024 bit)
• MODP group 5 (1536 bit)
• MODP group 14 (2048 bit)
• MODP group 15 (3072 bit)
• MODP group 16 (4096 bit)
• MODP group 17 (6144 bit)
• MODP group 18 (8192 bit)
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms:
• 3DES 168 CBC
• AES 128 CBC
• AES 192 CBC
• AES 256 CBC
• BLOWFISH
• DES 56 CBC
• NULL
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms (integrity
protection and authenticity):
• AES128
• MD5
• SHA1
• SHA256
• SHA384
• SHA512
For Phase 2 (IPsec), the IKE supports the following Diffie-Hellmann groups:
• MODP group 1 (768 bit)
• MODP group 2 (1024 bit)
• MODP group 5 (1536 bit)
• MODP group 14 (2048 bit)
• MODP group 15 (3072 bit)
• MODP group 16 (4096 bit)
• MODP group 17 (6144 bit)
• MODP group 18 (8192 bit)
If Perfect Forward Secrecy (PFS) is enabled, Phase 2 performs a new Diffie-Hellman
computation of key material using the same Diffie-Hellman group as configured for Phase 1.
If Perfect Forward Secrecy (PFS) is not enabled, Phase 2 uses the key material generated in
Phase 1 to establish keys for the transforms to be used by IPsec.
For peer authentication Pre-Shared Key (PSK) and certificates are supported.
Protocol versions IKEv1 and IKEv2 are supported. IKEv2, the second version of the IKE
protocol, uses the same techniques as IKEv1, but improves upon IKEv1 in the following ways:
• simpler message exchange
• fewer cryptographic mechanisms
• greater reliability through state management
• better resistance to denial-of-service attacks
The maximum number of supported VPN tunnels per CMU is one. A VPN tunnel could be
established also in redundant configurations.
The RTU supports authentication method Pre-shared key. Network peers can establish trust
in each other through the use of a pre-shared key (also called a pre-shared secret). At the
start of negotiation, the peers compare their stored key values. If the keys do not match,
authentication and negotiation fail.
3.3.4 Certificates
The RTU supports authentication method Certificates. Network peers can establish trust in
each other through the exchange of X.509 certificates. A certificate binds a peer’s public key
to the peer’s identity. In order to be trusted, the certificate must itself be signed by a trusted
Certificate Authority (CA) or by a member of a chain of trust that ends at such an authority.
Using the certificate management page of the RTU500 series web server, the certificate for
VPN functionality has to be uploaded. A private key certificate of the following characteristics
is required. The certificate contains an end-entity certificate with public/private key pair and
the whole certificate chain. For the upload the passphrase of the private key is required. The
private key certificate must in PKCS#12 format and the file extension must be "*.p12".
The RTU supports Perfect Forward Secrecy. RFC 2409: The Internet Key Exchange (IKE), states
the principle of PFS: the key used to protect a transmission of data must not be used to
derive any additional keys, and if the key used to protect a transmission of data was derived
from some other keying material, that material must not be used to derive any more keys.
If PFS is enabled, Phase 2 performs a new Diffie-Hellman computation of key material. This
operation significantly slows down the exchange but ensures that the Phase 2 traffic will still
be protected even if an attacker breaks the Phase 1 exchange. If PFS is not enabled, Phase 2
uses the key material generated in Phase 1 to establish keys for the transforms to be used by
IPsec.
When two peers communicate using IPsec and IKE, a situation may arise in which connectivity
between the two goes down unexpectedly; for example, because of routing problems or if
one of the hosts reboots. In such cases, there is often no way for IPsec and IKE to detect
the loss of connectivity. SAs may remain in existence (until their lifetimes naturally expire),
resulting in a “black hole” situation where packets are tunneled to oblivion. It is desirable to
recognize black holes as soon as possible so that a host can quickly fail over to a different
peer. Likewise, detecting black holes enables the recovery of lost resources.
There is an alternative feature to detect dead peers with ping utility. That alternative
requires a host IP address and an interval time to be configured. The RTU sends a ping to
the configured Host IP address when the Interval time expires. The RTU waits 5 seconds
for a ping answer. The RTU repeats this up to five times. The connection is broken if no
answer received. The VPN connection is torn down and a new connection is established. The
configured Host IP address must reside within the remote network IP address range.
Dead peer detection - Keep alive method DPD CMU - Network Interfaces
Ping: Enable the Ping Dead peer detection. The keep alive daemon sends a ping message to the configured host IP every
configured ping interval to check if the connection is still available.
DPD: Enable the Dead peer detection of IKE protocol. The IKE daemon initiates DPD if no packets have been received since the
last poll of the IPsec SA and the time since the last received packets is greater than or equal to the liveness parameter.
Value range:
• DPD
• PING
Dead peer detection - Host IP address 0.0.0.0 CMU - Network Interfaces
IP address of the host used for sending keep alive messages.
Dead peer detection - Interval time 30 sec CMU - Network Interfaces
Time between the two tests to detect if the peer is reachable or not.
Value range: 10.. 3600 sec
Dead peer detection - Liveness time 30 sec CMU - Network Interfaces
Time with an absence of incoming traffic the IKE SA accepts before sending a DPD message. The IKE SAs are checked every 10
seconds. Therefore this is the interval to detect the absence of incoming traffic.
Value range: 10.. 3600 sec
The RTU supports NAT-Traversal. IPsec NAT-T introduces support for crypto peers to travel
through NAT or PAT devices in the network by encapsulating crypto packets in a UDP wrapper,
which allows packets to traverse NAT device. NAT-T is auto-negotiated between the two
crypto peers during ISAKMP negotiation with a destination UDP port 4500 instead of 500.
NAT-T is defined in RFC 3947: Negotiation of NAT-Traversal in the IKE.
The IPsec connection setup is divided in two phases. IPsec connections are based on Security
Associations (SA). The SAs are created from the IKE protocol during connection setup.
Setting up an IPsec connection starts with IKE Phase 1 and is the initial negotiation of a bi-
directional connection between two crypto peers, referred to as main mode. IKE Phase 1
begins with an authentication in which each crypto peer verifies their identity with each
other (Certificates or PSK). When authenticated, the crypto peers agree upon the encryption
algorithm, hash method and other parameters (e.g. IKE SA lifetime). The negotiated SA
information is stored locally in the SA database of each crypto peer.
In IKE Phase 2, the IPsec SAs are negotiated by the IKE process using the bi-directional SA,
referred as quick mode.
The IPsec SAs are uni-directional in nature, causing separate key exchange for data flowing
in each direction. One of the advantages is to double the amount of work required by an
eavesdropper to successfully recover both sides of a conversation.
During IKE Phase 2 the crypto peers agree upon the encryption algorithm, authentication
(hash) methods and other parameters (e.g. IPsec SA lifetime).
Step 1: Configure the used IP interface (Ethernet or PPP). Enable VPN on this IP interface.
The local IP address is taken from the interface configuration and can’t be modified. Set the
Remote IP address (public IP address of the IPsec server).
First configure the local virtual network. Set the desired Local virtual IP address. This address
can be used to access the RTU from the NCC. Also set the Local virtual network and the Local
virtual netmask. A typical value is 255.255.255.0 because only one IP address of the address
space is used.
Second configure the remote network. Set the Remote network. It is the network reachable
through the VPN tunnel. Also set the network mask of this network.
Select the used IKE protocol version allowed for tunnel negotiation and establishment. IKEv1
and IKEv2 means the RTU tries to connect with v1 and accepts both v1 and v2.
Value range:
• IKEv1
• IKEv1 and IKEv2
• IKEv2
Select Certificates or Pre-shared key (PSK). The PSK is an ASCII character string up to 64
characters. This key must be the same on the RTU and the IPsec server.
Example: “dh34E2k_iew9j823H&,spwDkd43Hez23”
Value range:
• Pre-shared key
• Certificates
Pre-shared key CMU - Network Interfaces
Shared Secret for authentication.
Should be as long as possible and complex. The maximum length are 64 characters.
Configure the security policies for the IKE authentication. Specify the encryption algorithm,
authentication algorithm and Diffie-Hellmann group.
It is also possible to modify the IKE SA Lifetime. After 75% of this time the SA is renewed. It
isn’t possible until the SA Lifetime expires. In that case, the SA is deleted and the connection
is turned down.
The SA Lifetime may be changed when the server uses the strict policy option. In this case a
connection setup is only successful if the SA lifetimes are the same.
The used values have to be matched the settings of the IPsec server otherwise no connection
can be established.
For Phase 1, the IKE supports the following hash algorithms (integrity protection and
authenticity):
• AES128
• MD5
• SHA1
• SHA256
• SHA384
• SHA512
IKE Diffie-Hellmann group MODP group 2 (1024 CMU - Network Interfaces
bit)
Group used for Diffie-Hellman negotiations.
Configure the security policies for the IPsec connection (Phase 2). These parameters are
typically the same as in IKE Phase 1. But it is also possible to use different values.
For advanced user it is also possible to modify the IPsec SA Lifetime. After 75% of this time
the SA is renewed. It isn’t possible until the SA Lifetime expires. In that case, the SA is deleted
and the connection is turned down.
The SA Lifetime may be changed when the server uses the strict policy option. In this case a
connection setup is only successful if the SA Lifetimes are the same.
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms:
• 3DES 168 CBC
• AES 128 CBC
• AES 192 CBC
• AES 256 CBC
• BLOWFISH
• DES 56 CBC
• NULL
IPsec integrity algorithm SHA1 CMU - Network Interfaces
Integrity algorithm to be used to protect IPsec data packets.
IKEv1 does not make use of an integrity algorithm for the IKE traffic; IKEv2 does. A configured integrity algorithm in the IKE SA
proposal will be ignored if IKEv1 is used.
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms (integrity
protection and authenticity):
• AES128
• MD5
• SHA1
• SHA256
• SHA384
• SHA512
IPsec Diffie-Hellmann group MODP group 2 (1024 CMU - Network Interfaces
bit)
Group used for Diffie-Hellman negotiations.
For Phase 2 (IPsec), the IKE supports the following Diffie-Hellmann groups:
• MODP group 1 (768 bit)
• MODP group 2 (1024 bit)
• MODP group 5 (1536 bit)
• MODP group 14 (2048 bit)
• MODP group 15 (3072 bit)
• MODP group 16 (4096 bit)
• MODP group 17 (6144 bit)
• MODP group 18 (8192 bit)
IPsec SA lifetime 28800 sec CMU - Network Interfaces
To detect a dead VPN connection, select between two methods DPD and PING.
Dead peer detection - Keep alive method DPD CMU - Network Interfaces
Ping: Enable the Ping Dead peer detection. The keep alive daemon sends a ping message to the configured host IP every
configured ping interval to check if the connection is still available.
DPD: Enable the Dead peer detection of IKE protocol. The IKE daemon initiates DPD if no packets have been received since the
last poll of the IPsec SA and the time since the last received packets is greater than or equal to the liveness parameter.
Value range:
• DPD
• PING
Dead peer detection - Host IP address 0.0.0.0 CMU - Network Interfaces
IP address of the host used for sending keep alive messages.
Dead peer detection - Interval time 30 sec CMU - Network Interfaces
Time between the two tests to detect if the peer is reachable or not.
Value range: 10.. 3600 sec
Dead peer detection - Liveness time 30 sec CMU - Network Interfaces
Time with an absence of incoming traffic the IKE SA accepts before sending a DPD message. The IKE SAs are checked every 10
seconds. Therefore this is the interval to detect the absence of incoming traffic.
Value range: 10.. 3600 sec
3.4.1 Preliminaries
Definition:
• Local virtual network is on RTU site. This must be different to IP address range for E1
interface. Under this IP address RTU is reachable from control system.
• VPN Remote network is on Control System site.
• Fixed public IP address is on Control System site.
For RTU local virtual network only one IP address for RTU is required. This results in a small
subnet for each VPN connection (/30), with 64 subnets in a range of one class C network.
Here is an example for Local virtual network with starting subnet 192.168.0.0:
The VPN remote network needs to be in a different subnet (different to Local virtual network
and E1 network).
IKEv2
MD5
SHA1
SHA256
SHA384
SHA512
IKE DH group
group 5: MODP 1536-bit
group 1
Authentication
Preshared Key
RSA Key
RSA Key RSA key with FQDN:
IKE SA lifetime (Phase 1)
28800 sec
9600 sec
3600 sec
IPsec SA Parameter
X ESP
IPSec encryption algorithm
3DES
AES 128
AES 256
IPSec authentication algorithm
AES128
MD5
SHA1
SHA256
SHA384
SHA512
9600 sec
3600 sec
IPSec PFS
A valid policy @Sophos UTM need to be defined or selected. Naming could be RTU_GPRS
Sophos UTM bring all infrastructure with the device that is required for certificate based
authentication via IPSec VPN.
3.4.2.1 Generate X509 certificate for each RTU via web interface @Sophos UTM
“Certificate Management”
The field Name, VPN ID and Common Name should be the same. In this example
RTU520.RTUName is used. Replace RTU520 with your device and RTUName with the Station
Name of your RTU. The dot in the name is required.
Select as VPN ID Type: Hostname. Fill the other values with your information.
3.4.2.2 Download X509 certificate and define transport password @Sophos UTM
Export as “PKCS#12” certificate and enter transport password in Export password field,
repeat and click “Download” again.
Save this to your local disc. This certificate is required later on RTU web server. The password
as well.
Certificate Password
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
Add New Remote Network definition (if not available) via ”+” button:
N for Network
NG for NetworkGroup
H for Host
HG for Hostgroup
Location_N_NetworkAddress
Host_H_IPAddress
Gateway type is Respond only, because IP address of RTU via GPRS is always the same.
Use a useful name, like reuse defined VPN Network information and Station name:
e.g. RTU-Station_192.168.0.0/30===CS_172.16.100.0/24
In the hardware tree select the CMU and switch to the tab where PPPx is enabled.
Switch to the Ethernet interface tab, enable the VPN checkbox and click Configuration::
Enable routing setting for PPP interface. Define network and netmask. Gateway is handled
automatically according to the dial-in server of your provider.
To upload certificate, click “Browse…” button and select certificate file from your local drive:
Enter transport password for certificate in the field: “Certificate file password”. Then click
“Upload certificate” and wait until the following message comes up:
After successful loaded certificate more details about the certificate will be displayed.
To establish communication restart RTU and check that the following System Diagnosis
events are displayed:
ADVICE
When authentication using exchange of X.509 certificates is configured and authentication
will fail please check the validity period of the certificate, consisting of a not-before date
and a not-after date. The system time on the RTU500 must fall within the validity dates
of that certificate. If required a valid system time on the RTU500 within the period of the
certificate could be set once locally by synchronization using web server.
3.5 Templates
3.5.1 VPN IPSec encryption template
Policies
IKE Version
IKEv1
IKEv2
BLOWFISH
DES 56 CBC
IKE authentication algorithm
AES128
MD5
SHA1
SHA256
SHA384
SHA512
IKE DH group
group 1: MODP 768 bit
9600 sec
3600 sec
X ESP
IPSec encryption algorithm
3DES 168 CBC
BLOWFISH
DES 56 CBC
NULL
IPSec authentication algo-
rithm AES128
MD5
SHA1
SHA256
SHA384
SHA512
IPSec DH group X group 2: MODP 1024 bit
IPSec SA lifetime (Phase 2)
28800 sec
9600 sec
3600 sec
IPSec PFS (perfect forward
secrecy)
Compression not supported
The Parallel Redundancy Protocol (PRP) provides a standard method to obtain redundancy
in networks, using doubly attached nodes obeying to PRP (DANPss). PRP implements
redundancy functions in the end nodes rather than in network elements.
A doubly attached node DANP is attached to two independent Local Area Networks (LANss)
of similar topology, named LAN_A and LAN_B, which operate in parallel. A source DANP sends
the same frame over both LANss and a destination DANP receives it from both LANss within a
certain time, consumes the first frame and discards the duplicate.
The following figure shows a redundant network consisting of two LANss, each of which can
have any topology, e.g. tree, ring or meshed.
Source
SAN DANP DANP
A1
B- frame
A- frame
B ridge B ridge
Bridged Local Area
Bridged Local Area Network (tree)
Network (ring) LAN_B
LAN_A
SAN
A2 RedBox SAN SAN
B1 B2
A- frame B- frame
Figure 28: PRP network consisting of two LANss with different topology
The two LANss have no connection between them and are assumed to be fail-independent.
Redundancy can be defeated by single points of failure, such as a common power supply or a
direct connection whose failure brings both networks down.
Additional to DANPss the networks can contain singly attached nodes (SANss). These nodes
can be attached in two ways:
• SANss can be attached directly to one LAN only. Such SANss can only communicate with
other SANss on the same LAN. For instance, in the figure above, SAN A1 can communicate
with SAN A2, but not with SAN B1 or SAN B2. SANss can communicate (not redundantly)
with all DANPss.
• SANss can be attached over a RedBox (redundancy box) to both LANss, as the figure
shows for SAN R1 and SAN R2. Such SANss can communicate with all DANP and SANss,
for instance SAN A1 and SAN R1 can communicate. These kind of SANss are named virtual
doubly attached node VANP too.
For further, detailed information see PRP standard documentation IEC 62439-3 [7].
The RTU500 series supports PRP in different ways. As singly attached node SAN each RTU500
series CMU that provides at least one Ethernet interface can be used. As doubly attached
nodes only RTU500 series CMUss with two Ethernet interfaces can be used. The figure below
shows a simple RTU500 series PRP setup with SCI IEC 61850.
RedBox RedBox
RedBox
RedBox
• The RTU500 series supports communication with other DANPss and SANss according to
the network restrictions.
• All network host and subdevice communication protocols can be used with PRP. There is
no restriction to certain protocols like IEC 61850.
• Other network functionality like web server, HMI or SNTP time synchronization works via
PRP as well. There is no restriction to certain network functionalities.
• The IPv4 routing of the network interfaces is not restricted when using PRP.
• The PRP connection status can be supervised by system events. See chapter “PRP
supervision” for more information.
• Protocol logging via CPTT is possible with PRP. See chapter “Protocol logging for
communication interfaces” for detailed information.
• The RTU500 series CMU redundancy can be used together with PRP. In this case a CMU
switch over is possible when both networks links of a CMU fail.
The following restrictions apply if using PRP on an RTU500 series CMU:
• In PRP configurations the RTU500 series CMU uses the same IP and MAC address on both
Ethernet interfaces. Therefore the connected LAN must have no connection between
them.
• PRP cannot be used together with VPN.
• PRP cannot be used via PPP or USB RNDIS.
The PRP configuration can be found in RTUtil500 at the ‘E1’ tab of a CMU. The following figure
shows an example for a RTU560 with 560CMR01 and enabled PRP.
Enable PRP for Ethernet interfaces E1 and E2 disabled CMU - Network Interfaces
If enabled:
PRP for Ethernet interfaces.
PRP interface number 1 CMU - Network Interfaces
PRP interface number.
Value range: 1 to 8.
The notes below have to be considered for the PRP CMU configuration parameters:
• When enabling PRP a confirmation dialog is shown to acknowledge the usage.
• When enabling PRP the network interface tab ‘E2’ will be disabled. Network parameters
like IP address and subnet mask are configured on tab 'E1' for the PRP interface .
Additional to the main, specific PRP parameters are available. These parameters are set in a
separate dialog, shown when selecting the button ‘Configuration’ besides the PRP interface
number. An example is shown in the figure below.
The notes below have to be considered for the specific PRP configuration parameters:
• The node forget time must be greater than the life check interval. It shall be set at least
two times the life check interval.
• The parameters supervision MAC address and life check interval must be set to the same
value for every PRP node in the network.
• The life check interval requires receiving and processing of a supervision frame from each
node in the network within the time interval. For performance considerations the interval
time shall not be set below 10 seconds (especially in large PRP configurations).
The PRP connection status of a CMU and the PRP communication status of all connected
DANP nodes (devices) are supervised. The actual status can be derived from system events
provided by the RTU500.
The RTU500 PRP implementation supports the system events summarized in the following
table:
The system events ‘SEV#277 - #292 PRP interface n: Network interface Ex link up’ are located
at the system data interface of the CMU. The system event ‘SEV#180 - #181 Device reachable
on redundant line x’ are located at the system data interface of the subordinated PRP devices.
The meaning of the system event values are as defined in the table below:
• In case the system events ‘SEV#277 - #292 PRP interface n: Network interface Ex link up’ are
missing in PRP configurations, the affected system events are written to the configuration
file nevertheless. As result the system events are available in the system diagnosis in any
case.
• The system events ‘Device reachable on redundant line x’ are available only, if a PRP
interfaces is used with a SCI activity.
• The system events ‘Device reachable on redundant line x’ are set by the PRP
implementation independent from the used communication protocol. It doesn’t represent
the connection status of the protocol. The protocol status is signalized by the system
event ‘Device inoperable’. Both system events shall show in normal situations the same
status. But due to different timeouts the status can differ when a device just connects or
disconnects.
• PRP doesn’t provide a supervision of SAN devices (nodes). These devices must be
supervised by other system events like ‘Device inoperable’.
IEEE 802.1X is a security standard for port-based network access control that secures wired
networks against unauthorized access by requiring authentication with a central server
before network access and data transmission are allowed.
A port is a point of attachment to a network. IEEE 802.1X provides port-based network access
control that allows network access decisions made at the port, on a per-port basis using the
EAPOL (Extensible Authentication Protocol Over LAN). For a wired network, a port could be
where the MAC (Media Access Control) physically attaches to the network, such as a switch
port.
The purpose of IEEE 802.1X is authentication of Ethernet network equipment. Equipment that
is not authenticated will not even receive link. Only equipment that is authenticated should
get network access when connected to an Ethernet switch.
There is a client implementation of IEEE 802.1X in RTU500. That means RTU500 provides IEEE
802.1X supplicant role on Ethernet interface E1 and if present on E2 of a CMU module. The
RTU500 sends authentication information in the form of a X.509 certificate or username/
password to the authenticator and requests access to the network.
The supplicant uses EAPOL that uses data link layer (Layer 2) for communication with the
authenticator. The authenticator is the switch in the substation that controls access to the
network. The authenticator forwards authentication requests from the supplicant to the
authentication server. When the authenticator receives an EAPOL packet from the supplicant
it packets them in a radius format and then forwards them to the authentication server. The
authentication server checks if the supplicant should be allowed network access and reports
this back to the authenticator.
Before the RTU500 has allowed access the authenticator puts the access port in unauthorized
mode. In this mode only EAPOL traffic is allowed on the port. As soon as the RTU500 has
allowed access the port changes to authorized mode and other traffic is allowed.
IEEE 802.1X uses EAP to define how messages used for authentication are sent between
devices. EAP is using layer 2 (data link) and can therefore send information without valid IP
address.
EAP-TLS (Transport Layer Security) is an IETF (Internet Engineering Task Force) open
standard that uses the TLS protocol, and is well-supported among vendors. RTU500 EAP
complies with the IETF RFC 5216: The EAP-TLS Authentication Protocol. EAP-TLS is an EAP
type that make use of TLS to perform mutual authentication between the client and server.
TLS exploits the properties of asymmetric cryptography by means of certificate exchange
between peers. EAP-TLS requires that both server-side and client-side certificates are
deployed. EAP-TLS uses PKI (Public Key Infrastructure) to secure communication to a RADIUS
(Remote Authentication Dial-In User Service) authentication server.
EAP-PEAPv0 (Protected EAP) uses server-side public key certificates to authenticate the
server. It then creates an encrypted TLS tunnel between the client and the authentication
server. The ensuing exchange of authentication information to authenticate the client is then
encrypted and user credentials are safe from eavesdropping. EAP-MSCHAPv2 (Microsoft-
Challenge-Handshake Authentication Protocol version 2) is tunneled through TLS as inner
authentication type for EAP-PEAPv0.
The configuration parameters for IEEE 802.1X Port-based Network Access Control are defined
for each Ethernet interface within an RTU.
The following parameters are configured in a separate dialog accessible via "Configuration"
button.
A digital certificate is used to prove that someone is who they say they are. In an 802.1X
negotiation, the authentication server uses certificates to prove its identity to the supplicant.
The certificates used by the authentication server are called server certificates. The
certificates used by the supplicant are called client certificates. Server certificates are
required for EAP-TLS and EAP-PEAPv0. EAP-TLS requires that the RTU500 prove its identity
with a client certificate as well.
EAP-TLS requires an uploaded external certificate stored in the certificate store of the CMU
module. The web pages for certificate configuration require secure HTTPSS web server
access. It is not possible to open the web pages with standard HTTP access. For uploading
the generated certificate must be stored in PKCS#12 format.
The upload of an external generated certificate is done via the RTU500 Web server. In the Web
server menu the link "Certificate Management" is the entry point for the certificate upload.
This link can be found under the menu item "Management".
4 Glossary
AES Advanced Encryption Standard
CS Control System
Max Maximum
ms Millisecond
PC Personal Computer
Note:
The specifications, data, design or other information contained in this document (the
“Brochure”) - together: the “Information” - shall only be for information purposes and shall in
no respect be binding. The Brochure does not claim to be exhaustive. Technical data in the
Information are only approximate figures. We reserve the right at any time to make technical
changes or modify the contents of this document without prior notice. The user shall be
solely responsible for the use of any application example or information described within this
document. The described examples and solutions are examples only and do not represent any
comprehensive or complete solution. The user shall determine at its sole discretion, or as the
case may be, customize, program or add value to the ABB Power Grids Germany AG products
including software by creating solutions for the end customer and to assess whether and to
what extent the products are suitable and need to be adjusted or customized.
ABB Power Grids Germany AG shall be under no warranty whatsoever whether express or
implied and assumes no responsibility for the information contained in this document or for
any errors that may appear in this document. ABB Power Grids Germany AG's liability under
or in connection with this Brochure or the files included within the Brochure, irrespective
of the legal ground towards any person or entity, to which the Brochure has been made
available, in view of any damages including costs or losses shall be excluded. In particular ABB
Power Grids Germany AG shall in no event be liable for any indirect, consequential or special
damages, such as – but not limited to – loss of profit, loss of production, loss of revenue, loss
of data, loss of use, loss of earnings, cost of capital or cost connected with an interruption of
business or operation, third party claims. The exclusion of liability shall not apply in the case
of intention or gross negligence. The present declaration shall be governed by and construed
in accordance with the laws of Switzerland under exclusion of its conflict of laws rules and of
the Vienna Convention on the International Sale of Goods (CISG).
ABB Power Grids Germany AG reserves all rights in particular copyrights and other intellectual
property rights. Any reproduction, disclosure to third parties or utilization of its contents -
in whole or in part - is not permitted without the prior written consent of ABB Power Grids
Germany AG.
www.abb.com/remote-terminal-units