FD Rel11 Part9 Interfaces and Networks PDF
FD Rel11 Part9 Interfaces and Networks PDF
Revision
Contents
1 Introduction.................................................................................................................... 1-1
1.1 About the RTU500 series Function Description...................................................1-1
1.2 Preface................................................................................................................1-1
1.3 References.......................................................................................................... 1-1
2 Interfaces........................................................................................................................2-1
2.1 Interface configuration.........................................................................................2-1
2.1.1 Interfaces........................................................................................... 2-1
2.1.2 Interface Configuration Rules and Restrictions................................... 2-3
2.2 Serial interfaces: Duplex communication.............................................................2-3
2.2.1 WT duplex link (no handshake).......................................................... 2-4
2.2.2 Direct link communication (only TxD / RxD)........................................2-4
2.2.3 Dial-up communication (external modem, DCD handshake)............... 2-5
2.3 Serial interfaces: Half-duplex communication...................................................... 2-7
2.3.1 WT half-duplex communication (RTS/CTS handshake)...................... 2-7
2.3.2 WT Link Half Duplex (RTS/DCD handshake)...................................... 2-8
2.4 Serial interfaces: Point-to-Point Protocol (PPP)................................................... 2-8
2.4.1 Setting up a PPP client connection....................................................2-9
2.4.2 Setting up a PPP server connection................................................ 2-15
2.5 Serial interfaces: Additional communication modes...........................................2-20
2.5.1 Loop switch unit DSTC 3002...........................................................2-20
2.5.2 Link with collision avoidance (DCD handshake)................................ 2-20
2.6 Ethernet interfaces: Configuration and Routing................................................. 2-21
2.7 USB RNDIS interface........................................................................................ 2-23
2.7.1 Introduction...................................................................................... 2-23
2.7.2 Configuration....................................................................................2-24
2.8 Protocol logging for communication interfaces..................................................2-24
2.8.1 Host communication protocols........................................................ 2-25
2.8.2 Sub-device communication protocols.............................................. 2-25
2.8.3 Configuration in CPTT......................................................................2-25
2.8.4 Configuration string in CPTT............................................................ 2-26
2.8.5 Examples......................................................................................... 2-28
3 Networks........................................................................................................................ 3-1
3.1 Network configuration......................................................................................... 3-1
3.2 Network configuration rules and restrictions....................................................... 3-1
3.2.1 Denial of Service................................................................................ 3-2
3.3 Virtual Private Network (VPN)..............................................................................3-2
3.3.1 Overview............................................................................................ 3-2
3.3.2 Supported Features........................................................................... 3-3
3.3.3 Pre-Shared Key (PSK)........................................................................3-4
3.3.4 Certificates......................................................................................... 3-5
3.3.5 Perfect Forward Secrecy (PFS).......................................................... 3-5
4 Glossary......................................................................................................................... 4-1
1 Introduction
1KGT 150 793 Part 1: Overview Overview of the RTU500 series and system
architecture
1KGT 150 794 Part 2: Rack mounted solutions Description of the RTU500 series rack solu-
tions
1KGT 150 795 Part 3: DIN rail solutions Description of the RTU500 series DIN rail so-
lutions
1KGT 150 796 Part 4: Hardware modules Overview of the RTU500 series rack and DIN
rail modules
1KGT 150 797 Part 5: SCADA functions Description of the RTU500 series SCADA
functions
1KGT 150 798 Part 6: RTU500 functions Description of the RTU500 series functions
1KGT 150 799 Part 7: Archive functions Description of the RTU500 series Archive
functions
1KGT 150 800 Part 8: Integrated HMI Description of the RTU500 series Integrated
HMI interface
1KGT 159 896 Part 9: Interfaces and Networks Description of the RTU500 series Interface
and Network functions
1.2 Preface
This document describes the following functions of the RTU500 series:
• Interfaces
• Networks
1.3 References
[1] 1KGT 150 801 RTUtil500 Users Describes the usage of engineering tool
Guide Release 11 RTUtil500 of the RTU500 series
[2] Individual Ident RTU500 series Description of the Sub and Host Communi-
Protocol Descriptions cation Protocols
[3] 1KGT 150 853 Interfaces and Proto- Description of the relationship of interfaces
cols Release 11 and protocols
2 Interfaces
2.1.1 Interfaces
The following communication units are available for the interfaces CP1, CP2 and CP3:
• 560CMU02
• 560CMU05
• 560CMG10
• 560CIG10
• 560CMD11
• 560CID11
• 560CMU01
• 520CMD01
• 511CIM01
The following parameters are available for the interfaces CP1, CP2 and CP3:
The following communication units are available for the interfaces CPA, CPB, and CPM:
• 560CMU02
• 560CMU05
• 560CMG10
• 560CIG10
• 560CMD11
• 560CID11
• 560CMU01
• 511CIM01
The following parameters are available for the interfaces CPA, CPB, and CPM:
Ethernet interfaces
• 560CMU02
• 560CMU05
• 560CMG10
• 560CIG10
• 560CMD11
• 560CID11
• 560CMU01
• 520CMD01
• 511CIM01
The communication units use the Ethernet interface for downloading configuration data and for di-
agnostic purposes. The default IP address of the Ethernet interface is 192.168.0.1. It is enabled and
can be temporarily set to a different value using an onboard jumper (not available on 520CMD01).
USB interfaces
• 520CMD01
• 511CIM01
These communication units work as USB RNDIS target device. RNDIS host is a Windows XP or
Windows 7 computer. RNDIS interface’s IP address on the RTU is 169.254.0.10. The USB RNDIS
Device running on Windows host can get IP settings assigned automatically from the "link local"
block 169.254.0.0/16.
• 560CMU05 R0002
• CP1 or CP2 of the 560CMU02 or 560CMU05
• I/O bus
• Bit protocols
• UART protocols
Mode types cannot be mixed. For instance, CPA cannot run in I/O bus mode while CPB runs in
Bit protocol mode.
Ethernet and TCP/IP-based protocols can be used with the Ethernet interface on all CMUs.
The USB interfaces can only be used to access the RTU500 series Web-Server
WT Duplex
4 Wire
NCC
WT
Tx Tx
RTU500
WT
Rx Rx
To communicate with WT modems of the type 23WT23 via 4-wire links, RTU500 series uses full-
duplex communication.
As with No hardware handshake, RTU500 uses full-duplex communication with TxD and RxD.
DTR and RTS are set to continuous ON. This switches the modem's carrier signal to ON state.
Transmission delay time can be used to slow down the display of messages. This has no effect on
the DTR or RTS control signals.
No control signals are used. CTS and DCD are not analyzed.
Transmission delay time can be used to slow down the display of messages. This works in RS232
and RS422.
The RTU and its communication partner device are linked via a direct connection. A communication
partner device may be a PC, another RTU, a PC modem, or a CS.
The DTR / DSR, RTS / CTS, and DCD control signals are used for flow control. This works only
in RS232 mode.
The RTU and its communication partner device are linked via a direct connection. A communication
partner device may be a PC, another RTU, a PC modem, or a CS.
NCC NCC
WT WT
RTU500
RTU500
Tx Tx Tx
Rx WT Rx WT Rx
RTU500
RTU500
Tx Tx Tx
Rx WT Rx WT Rx
• Receive: RTS is reset, DCD set. DSR and CTS are not analyzed.
• Send: RTS is set and transmission delay time is awaited. When CTS is set, data is sent, the
carrier trailing time is awaited before RTS is reset. Reception is released again upon reset of
RTS.
• Receive: RTS is reset, DCD set. DSR and CTS are not analyzed.
• Send: When RTS is set, CSTD (Carrier Setup Time Delay) is awaited (only with SCI IEC 101).
Then data is sent and CTTD (Carrier Trailing Time Delay) is awaited before RTS is reset. Recep-
tion is released again upon reset of RTS.
The RTU500 series supports a version of the PPP that complies with the standard for that protocol,
RFC 1661. The RTU is designed for links which transport packets between two peers. These links
provide full-duplex, simultaneous, bi-directional operation.
For each serial interface of the RTU, the type of peer used on either end of the PPP link can be
configured in one of the following ways:
• as an RTU PPP client to a remote network host over a dial-up line connection using a GSM/
GPRS modem
• as an RTU PPP server to a Microsoft® Windows® client connection over a null modem cable
Every serial interface of an RTU can be configured either as a PPP client or as a PPP server.
PPP is basically responsible for encapsulating and carrying IP datagrams across two endpoints of a
serial connection. PPP communication starts after a physical serial connection has been established.
However, before PPP can start carrying data, numerous negotiations take place between the peers
to configure, establish and monitor the connection.
Overview
The PPP Link Control Protocol is used to connect an RTU to a control system via the Internet over
any distance.
In order to use this feature, you need to equip the RTU either with an external GSM/GPRS modem
connected to a serial port (e.g. 560MDD10), or with an internal GSM/GPRS modem running on CPB
of the 560CMD11 R0011.
An Internet Service Provider (ISP) supporting network connections between a GPRS modem and
the Internet is required
Once a PPP connection has been established, the RTU can be accessed by a control system using
the IP address assigned by the ISP. All IP-based protocols (IEC 60870-5-104, DNP3, Modbus, etc.)
can be used with this connection.
With a PPP connection, the RTU can be configured and monitored remotely using a Web browser.
Configuration
The following section describes the steps required to set up a PPP client connection.
On a CMU module select Add item... and in the upcoming dialog select a serial interface and PPP
Client from dropdown list.
The RTU supports the PPP Client link configuration on all serial interfaces (CP1, CP2, CPA, CPB and
CPM) with the following exceptions: On 560CMU05 the PPP Client link configuration is supported
on CP1 and CP2, but not on CPA or CPB. On 511CMM01 the PPP Client link configuration is
supported on CP2 and CPM, but not on CP1.
Add DIN rail for DIN rail modules. From the Add node to DIN rail dropdown list select 560MDD10
– DIN rail modem.
On 560MDD10 select the serial communication port the modem will be connected to from the
Connected to interface dropdown list.
The COM speed 115200 bits/sec for external GSM/GPRS modem 560MDD10 is not displayed and
cannot be changed.
The COM speed 115200 bits/sec for internal GSM/GPRS modem running on CPB of a 560CMD11
R0011 is insensitive and cannot be changed.
For other external GSM/GPRS modems (e.g. INSYS) select the required baud rate from COM speed
dropdown list. The default value is 19200 bits/sec.
Modem control for external GSM/GPRS modem 560MDD10 is not displayed and cannot be
changed.
Modem control for internal GSM/GPRS modem running on CPB of a 560CMD11 R0011 is insensitive
and cannot be changed.
For other external GSM/GPRS modems (e.g. INSYS) select Dial-up (external modem DCD hand-
shake) from the Modem control dropdown list.
Activate the Dial up enabled option and click the Dial up parameters button to open the Modem
parameters configuration dialog.
Some ISPs use PIN protection to protect their SIM cards from unauthorized access. This protection
requires the user to provide a secret numeric password as an authentication before being able to
access the system. If your ISP uses this function enable the PIN configuration option and enter the
PIN. If no PIN protection is used leave this option disabled.
Enable the option APN and enter the Access Point Name of your service provider e.g. internet.t-
d1.de or mdex.ic.t-mobile. The APN is the name of the gateway between the GPRS mobile network
and the public internet.
Normally, the option Connect to fixed mobile network is not enabled. It is only necessary in very
rare cases to force the modem to connect exclusively to the specified PLMN (Public Land Mobile
Network) composed of MCC (Mobile Country Code) and MNC (Mobile Network Code).
Activate the Dial up enabled option and click the Dial up parameters button to open the Modem
parameters configuration dialog.
Configure the AT commands and command responses as required, using suitable values for the
modem used. The configuration settings are usually similar to the specification according to V.25ter.
The configured AT commands are sent to the modem during initialization time.
Some ISPs use PIN protection to protect their SIM cards from unauthorized access. This protection
requires the user to provide a secret numeric password as an authentication before being able to
access the system. If your ISP uses this function enable the option PIN Configuration string for
GSM modem. In the text field to the right, enter the full AT command for sending the PIN. Quotation
marks around the PIN are mandatory, e.g. AT+CPIN=”9178”. If no PIN protection is used, this option
can be disabled.
The Service Configuration string for GSM modem is sent to the modem immediately before the
configured telephone number is called. The string usually contains the name of the provider and
the service offered.
Example:
In the above figure, the internal modem AirPrime WISMO228 is used. More information can be found
on: http://www.sierrawireless.com.
The configuration of external modems, e.g., INSYS GSM/GPRS, is similar. More information can be
found on: http://www.insys-tec.de/en/en/insys-gsm.
Under Service configuration string for GSM modem, the AT command AT+CGDCONT=<PDP (Pack-
et Data Protocol) context> is used to specify the service. The configuration string in the following
example uses the provider mdex.
The following table outlines the parameters used in the configuration string.
Parameter Explanation
The ISP usually provides contract-specific data, which need to be provided as part of the PPP client
link.
• Send local IP address to provider: This option is usually disabled, because the local IP address
is assigned automatically from the provider during connection setup. Attention: If this option
will be enabled in very rare cases the local IP address will be sent to the peer and has to be ac-
knowledged positive from the provider during connection setup.
• User name
• Password
• Telephone number (not necessary for 560MDD10)
Enable routing setting for the PPP client interface. Use the remote network address (provided by
your provider). Define network and netmask. Gateway is handled automatically according to the
dial-in server of your provider.
Establishing a connection
When powering on the RTU, the AT commands configured for initialization are sent to the modem.
If these commands are answered correctly, the RTU starts a call to the telephone number specified
in the configuration data.
Once a connection is established, the connection string received, and the DCD signal activated,
control is handed over to the PPP Link Control Protocol (LCP). Note that the RTU does not provide
an IP address. The remote peer has to determine both addresses. The network address specified
in the above figure is used only for expansion of the internal routing table and should match the
address provided by the remote peer.
Overview
PPP is a symmetric peer-to-peer protocol. Each endpoint interacts with its peer in an identical man-
ner. The designations client and server are used only in the context of establishing a connection to
distinguish the endpoint initiating the connection (client) from the endpoint answering that request
(server). Once a physical serial connection has been established, this distinction is no longer relevant.
The RTU500 series provides a common solution for connections between an RTU PPP server and
Windows clients. The RTU's PPP server functionality provides a remote access server that is able
to answer connection requests from PPP clients. Microsoft® Windows® remote access software is
compliant with the PPP standard and can therefore be used to access the RTU over the network.
The RTU's PPP server also provides advanced features, such as authentication (optional), network
address compression, and control field compression.
Configuration
The following section describes the basic configuration steps required to set up an RTU's PPP server
and a Microsoft® Windows® PPP client.
On a CMU module select Add item... and in the upcoming dialog select a serial interface and PPP
Server from dropdown list.
The RTU supports the PPP Server link configuration on all serial interfaces (CP1, CP2, CPA, CPB and
CPM) with the following exceptions: On 560CMU05 the PPP Server link configuration is supported
on CP1 and CP2, but not on CPA or CPB. On 511CMM01 the PPP Server link configuration is
supported on CP2 and CPM, but not on CP1.
Configuring IP addresses
In RTUtil500, the IP addresses of the local system (server) and the remote system (client) are manda-
tory.
1. In the Server IP address field, enter the IP address of the PPP server in dotted decimal for-
mat.
2. In the Client IP address field, enter the IP address of the PPP client in dotted decimal format.
Configuring authentication
You can configure the PPP server with or without authentication. By default, authentication is dis-
abled, as displayed in the figure above.
The RTU supports a version of the CHAP (Challenge Handshake Authentication Protocol) that com-
plies with the standard for that protocol, RFC 1994. This protocol issues a random challenge. The
challenge is matched against a cryptographically hashed response generated from the challenge
and a secret key. Only a recipient of the challenge who also is in possession of the key can reliably
generate a valid response.
If the Authentication checkbox is enabled, the server expects the client to authenticate before being
granted access. As the server requires CHAP as its authentication method, the client must encrypt
the user name and password. The server verifies the user name and the password provided by
the client against its configured acceptable user name and password. If the provided name and
password cannot be verified, access is denied. If an authentication failure occurs while trying to
open a link, the link is closed and the client application that attempted to open the link is notified
of this event.
1. Configure both ends of the PPP link with the same connection speed used by the serial I/O
adapter. The default value of 38400 bits/s is usually an ideal match to the COM speed of the
peer and no additional configuration is necessary.
2. Verify the PPP connection. A Microsoft® Windows® client is required for the second end
point of the connection. For a detailed description of the configuration of a standard PPP
client – as installed on Microsoft® Windows® platforms by default – refer to [6]. Note that the
current section contains additional instructions that are not included in the Web Server User's
Guide.
3. If the RTU's PPP server is configured with authentication, enable the following settings in the
configuration dialogs on the Microsoft® Windows® machine.
4. From the Microsoft® Windows® Control Panel, select Network Connections.
5. Right-click on PPP-RTU560 to open the Properties dialog.
6. On the Security tab, under Security options, select the Advanced (custom settings) option.
8. Use the same values for Maximum speed (bps) (e.g., 38400) on the Microsoft® Windows®
PPP client and for the COM speed of the PPP server in RTUtil500, as shown in the figures
COM speed configuration in RTUtil500 above and Modem Configuration dialog below.
If there are both ethernet interfaces 'E1' and 'E2' present on selected CMU module the following
additional options are available:
• Switch default routing between interfaces (Check whether the routing must be switched be-
tween the two ethernet interfaces depending on the link status.)
• Allow IP address of interfaces in the same subnet (Both ethernet interfaces have to be in the
same physical network.)
There are restrictions when enabling the option 'Allow IP address of interfaces in the same subnet ':
If the ethernet interfaces E1 and E2 are configured in the same subnet and link on E1 is down, then
the RTU do switch over the gateway from E1 to E2. This works in case of communication of host
interfaces. But if a sub interface is defined and the IED is configured with two IP ports and same IP
address for both ports, then the RTU can communicate from E1 and from E2 to the IED, but only
one communication line (one socket) can be active. One link is online (communication is up) and
the redundant link cannot be connected. A “connect” must not be done and test link cannot be
send on redundant line. That means only one socket with port 2404 can be active. If this will work
is depending from IED. IED needs to ignore a connection from redundant link as long the active
link is online.
The RTU offers routing support for up to 10 destination networks. It is possible to configure network
routes on ethernet interfaces (E1 and if present E2) including netmask of routing destination and
interface.
The page 'Network Interfaces' contains an 'IPv4 Routing' tab. The content of the internal routing
table is configured on this tab. There are the following parameters:
Routing to destination networks is allowed also with breaking the IANA rules by explicit entering the
netmask for each routing configuration.
For IPv4, a destination network is identified by an IPv4 address and a netmask value. The net-
mask is normally contiguous makes it possible to specify as a prefix as well. For example, the mask
255.255.255.0 is equivalent to the prefix /24 since the 24 first bits (counting from left) are set. The
netmask is selected using a dropdown list:
2.7.1 Introduction
The Remote Network Driver Interface Specification (RNDIS) is a Microsoft® Windows® proprietary
protocol. It provides a virtual Ethernet link to most versions of the Microsoft® Windows® operating
systems. A partial RNDIS specification is available from Microsoft®. The protocol is tightly bound
to programming interfaces and models from Microsoft®, most notably the Network Driver Interface
Specification (NDIS).
RNDIS is a specification for network devices on dynamic Plug-and-Play I/O buses, such as USB. It
includes two components: a bus-independent message set, and a description of how this message
set is conveyed across a specific I/O bus on which it is supported.
Some communication unit of the RTU500 series embeds a USB device port that is compliant with
the Universal Serial Bus (USB) V2.0 full-speed device specification (12 Mbit/s). The RNDIS protocol
is used on top of USB, providing a virtual Ethernet link to a Microsoft® Windows® XP or Microsoft®
Windows® 7 operating system. The result is the same as creating two network devices and assign-
ing one to the 511CIM01 and the other one to the Microsoft® Windows® machine. After installing
and configuring the required RNDIS driver on the Microsoft® Windows® system, the connection
could be used for web server diagnostics, and for the download of configuration data and firmware.
The USB V2.0 full-speed protocol provides communication services between Microsoft® Win-
dows® host and an attached USB device. The protocol provides a collection of communication
flows (pipes), each one associated to an endpoint, to the USB device. Software on the Microsoft®
Windows® host communicates with the USB device through a set of communication flows.
Table 3: Endpoints
The RTU communication unit provides the USB device used to transfer data with a Microsoft®
Windows® XP/7 USB host. The USB device is able to emulate a single Ethernet device as if it were
attached to a single USB host. The Ethernet device will be found both on the host side and the
target side, enabling the host, and the target, to communicate with each other using the TCP/IP
network protocol.
2.7.2 Configuration
The RTU500 series communication unit works as a USB RNDIS target device. A Microsoft® Win-
dows® XP/7 computer is used as the RNDIS host.
After connecting the 511CIM01, 520CMD01 communication unit and the Microsoft® Windows®
XP/7 machine via USB cable for the first time, the Microsoft® Windows® machine detects the new
USB RNDIS device, and prompts to install it.
This USB interface is used for web server access via the following URL: http://169.254.0.10. For
detailed information on installing and configuring the USB RNDIS driver on Microsoft® Windows®
XP/7, see the RTU500 series Web Server User's Guide.
This functionality is available on every CMU and called RIO server. The logged traffic is dis-
played in CPTT, the communication protocol testing tool, which is provided by Real Thoughts
(www.realthoughts.com).
Protocol logging is possible for direct serial links, Ethernet links and TCP/IP communication via PPP
protocol. Protocol logging is not possible for VPN communication.
For monitoring purposes, a network connection to the card used for serial or network communication
is required. Monitoring via backplane routing is not possible.
The following chapters describe the communication protocols supported by the RTU500 series, and
the configuration options available in CPTT.
• IEC 60870-5-101
• IEC 60870-5-104
• DNP3
• DNP3 LAN/WAN
• Modbus TCP
• Modbus ASCII/RTU
• IEC 60870-5-101
• IEC 60870-5-103
• IEC 60870-5-104
• DNP3
• DNP3 LAN/WAN
• SPAbus
• Modbus TCP
• Modbus ASCII/RTU
The default value for the network port (1793) must not be changed. An example is shown in the
following figure:
To prevent unintended filtering use default masks in the protocol profile dialog for Ethernet protocols.
An example is shown in the following figure:
The format of the configuration string is described below. The format excludes certain characters
from being used in the configuration string. The configuration string is case sensitive.
Some special characters are reserved for syntax representation, and must not be used in the con-
figuration string:
The names of interfaces to be used in the configuration string depend on the communication unit
for which the configuration string is defined:
Communication unit Serial interface names Ethernet interface names PPP links
560CMG10, 560CIG10, cp1, cp2, cpA, cpB E1, E2 PPP1, PPP2, (PPP3, PPP4)
560CMD11, 560CID11
Serial communication
Network communication
Parameter Explanation
• The first list of protocols (iec104 | dnp | modbus) defines host communication protocols
• The second list of protocols (iec104 | dnp | modbus ) describe the sub-device communication
protocol
• A port number or protocol type needs to be specified, using either the local interface or the re-
mote IP address.
• A port number or protocol type using the local interface refers to a host interface.
• A port number or protocol type using the remote IP address refers to a subdevice interface.
• The default network protocol type is tcp.
• Using the prefix ABBRTU560- eliminates the need of a CPTT Remote I/O Client license. If the
prefix is not included in the configuration string, CPTT will output an error message.
2.8.5 Examples
1 ABBRTU560-srl:cp2
Serial interface CP2
2 ABBRTU560-srl:cpA
Serial interface CPA on CMU01, CMU02 or CMU10
3 ABBRTU560-net:E1:iec104;remote:192.168.1.100
Network interface E1, IEC 60870-5-104 host communication line, host IP address
192.168.1.100
4 ABBRTU560-net:E1:iec104;remote:192.168.1.100/24
Network interface E1, IEC 60870-5-104 host communication line, all host IP addresses are part
of the network 192.168.1.0
5 ABBRTU560-net:E2;remote:192.168.1.100:dnp
Network interface E2, DNP3 LAN/WAN subdevice communication line, IED IP address
192.168.1.100, network protocol TCP
6 ABBRTU560-net:E2;remote:192.168.1.100:dnp;protocol:udp
Network interface E2, DNP3 LAN/WAN subdevice communication line, IED IP address
192.168.1.100, network protocol UDP
7 ABBRTU560-net:E1:1234;remote:192.168.1.100;protocol:tcp
Network interface E1, host communication line with network port 1234, Host IP address
192.168.1.100, network protocol TCP address
8 ABBRTU560-net:E1;remote:192.168.1.100:1234;protocol:udp
Network interface E1, subdevice communication line with network port 1234, IED IP address
192.168.1.100, network protocol UDP
9 ABBRTU560-net:PPP1:iec104;remote:192.21.89.38
IEC 60870-5-104 host communication line via PPP on interface PPP1, host IP address
192.21.89.38
3 Networks
The entire station network, including router RTUs, sub-RTUs, and IEDs, is configured in the RTU-
til500 software. Configuration of the station network topology is configured in the Network Tree of
RTUtil500. The starting point in this tree is the router RTU of the station network. For detailed infor-
mation on how to build the Network Tree, refer to [1].
The actual restrictions may differ depending on the communication speed of the station network,
the communication protocols used and the amount of process data points connected to an RTU.
The denial of service function measures the traffic from an Ethernet port and, if necessary, limits it
from jeopardizing the RTU's functionality due to a high CPU load.
• Following internal message is displayed in the RTU system diagnosis if the limit is exceed: CMU
x: Rate monitor interface Exchange to polling mode (Count=n)
• Following internal message is displayed in the RTU system diagnosis the traffic is again below
the limit: CMU x: Rate monitor interface Exchange to interrupt mode (Count=n)
Confidentiality is keeping the data secret from the unintended listeners on the network.
Integrity is ensuring that the received data is the data was actually sent.
Authenticity is providing the identity of the endpoint to ensure that the end point is the intended
entity to communicate with.
3.3.1 Overview
With the help of VPN a RTU can be connected to control system via the public internet. The data
exchange is secured via the VPN connection. From the user point of view it looks like the RTU500
resides within the NCC network.
NCC
RTU560 Internet
Network
IP sec router
RTU540
The RTU establishes a VPN connection to the IPsec Router. The VPN tunnel (red line) connects the
virtual RTU network with the NCC network. Therefore a network-to-network connection is estab-
lished. This connection is transparent and secured.
If a connection is established, the RTU can be accessed by a control system using the internal virtual
IP address. All IP based protocols can run on this connection.
The RTU can be remote configured and supervised using a web browser.
The Internet Security Protocol (IPsec) is implemented according to the requirements of:
For Phase 1, the IKE supports the following hash algorithms (integrity protection and authenticity):
• AES 128
• MD5
• SHA1
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms:
For Phase 2 (IPsec), the IKE supports the following cryptographic algorithms (integrity protection
and authenticity):
• AES 128
• MD5
• SHA1
For Phase 2 (IPsec), the IKE supports the following Diffie-Hellmann group:
For peer authentication Pre-Shared Key (PSK) and certificates are supported.
Protocol versions IKEv1 and IKEv2 are supported. IKEv2, the second version of the IKE protocol,
uses the same techniques as IKEv1, but improves upon IKEv1 in the following ways:
3.3.4 Certificates
The RTU supports authentication method Certificates. Network peers can establish trust in each
other through the exchange of X.509 certificates. A certificate binds a peer’s public key to the peer’s
identity. In order to be trusted, the certificate must itself be signed by a trusted Certificate Authority
(CA) or by a member of a chain of trust that ends at such an authority.
If PFS is enabled, Phase 2 performs a new Diffie-Hellman computation of key material. This operation
significantly slows down the exchange but ensures that the Phase 2 traffic will still be protected even
if an attacker breaks the Phase 1 exchange. If PFS is not enabled, Phase 2 uses the key material
generated in Phase 1 to establish keys for the transforms to be used by IPsec.
RTU IKE implementation supports dead peer detection, based upon RFC 3706: A Traffic-Based
Method of Detecting Dead Internet Key Exchange (IKE) Peers.
When two peers communicate using IPsec and IKE, a situation may arise in which connectivity
between the two goes down unexpectedly; for example, because of routing problems or if one of
the hosts reboots. In such cases, there is often no way for IPsec and IKE to detect the loss of
connectivity. SAs may remain in existence (until their lifetimes naturally expire), resulting in a “black
hole” situation where packets are tunneled to oblivion. It is desirable to recognize black holes as
soon as possible so that a host can quickly fail over to a different peer. Likewise, detecting black
holes enables the recovery of lost resources.
There is an alternative feature to detect dead peers with ping utility. That alternative requires a host
IP address and an interval time to be configured. The RTU sends a ping to the configured Host
IP address when the Interval time expires. The RTU waits 5 seconds for a ping answer. The RTU
repeats this up to five times. The connection is broken if no answer received. The VPN connection is
torn down and a new connection is established. The configured Host IP address must reside within
the remote network IP address range.
Setting up an IPsec connection starts with IKE Phase 1 and is the initial negotiation of a bi-direc-
tional connection between two crypto peers, referred to as main mode. IKE Phase 1 begins with an
authentication in which each crypto peer verifies their identity with each other (Certificates or PSK).
When authenticated, the crypto peers agree upon the encryption algorithm, hash method and other
parameters (e.g. IKE SA lifetime). The negotiated SA information is stored locally in the SA database
of each crypto peer.
In IKE Phase 2, the IPsec SAs are negotiated by the IKE process using the bi-directional SA, referred
as quick mode.
The IPsec SAs are uni-directional in nature, causing separate key exchange for data flowing in each
direction. One of the advantages is to double the amount of work required by an eavesdropper to
successfully recover both sides of a conversation.
During IKE Phase 2 the crypto peers agree upon the encryption algorithm, authentication (hash)
methods and other parameters (e.g. IPsec SA lifetime).
The local IP address is taken from the interface configuration and can’t be modified. Set the Remote
IP address (public IP address of the IPsec server).
First configure the local virtual network. Set the desired Local virtual IP address. This address can
be used to access the RTU from the NCC. Also set the Local virtual network and the Local virtual
netmask. A typical value is 255.255.255.0 because only one IP address of the address space is
used.
Second configure the remote network. Set the Remote network. It is the network reachable through
the VPN tunnel. Also set the network mask of this network.
Select the used IKE protocol version allowed for tunnel negotiation and establishment. IKEv1 and
IKEv2 means the RTU tries to connect with v1 and accepts both v1 and v2.
Select Certificates or Pre-shared key (PSK). The PSK is an ASCII character string up to 64 characters.
This key must be the same on the RTU and the IPsec server.
Example: “dh34E2k_iew9j823H&,spwDkd43Hez23”
Configure the security policies for the IKE authentication. Specify the encryption algorithm, authen-
tication algorithm and Diffie-Hellmann group.
It is also possible to modify the IKE SA Lifetime. After 75% of this time the SA is renewed. It isn’t
possible until the SA Lifetime expires the SA is deleted and the connection is turned down.
The SA Lifetime may be changed when the server uses the strict policy option. In this case a con-
nection setup is only successful if the SA lifetimes are the same.
The used values have to be matched the settings of the IPsec server otherwise no connection can
be established.
Configure the security policies for the IPsec connection (Phase 2). These parameters are typically
the same as in IKE Phase 1. But it is also possible to use different values.
For advanced user it is also possible to modify the IPsec SA Lifetime. After 75% of this time the
SA is renewed. It isn’t possible until the SA Lifetime expires the SA is deleted and the connection
is torn down.
The SA Lifetime may be changed when the server uses the strict policy option. In this case a con-
nection setup is only successful if the SA Lifetimes are the same.
To detect a dead VPN connection, select between two methods DPD and PING.
3.4.1 Preliminaries
Definition:
• Local virtual network is on RTU site. This must be different to IP address range for E1 inter-
face. Under this IP address RTU is reachable from control system.
• VPN Remote network is on Control System site.
• Fixed public IP address is on Control System site.
For RTU local virtual network only one IP address for RTU is required. This results in a small subnet
for each VPN connection (/30), with 64 subnets in a range of one class C network.
Here is an example for Local virtual network with starting subnet 192.168.0.0:
………
64
The VPN remote network needs to be in a different subnet (different to Local virtual network and
E1 network).
Define encryption policy for VPN connection between RTUs and VPN server.
IKE Version
X IKEv1
IKEv2
ISAKMP Parameter
MD5
SHA1
IKE DH group
group 5: MODP 1536-bit
group 1
Authentication
Preshared Key
RSA Key
9600 sec
3600 sec
IPsec SA Parameter
X ESP
AES 128
AES 256
SHA1
MD5
9600 sec
3600 sec
IPSec PFS
A valid policy @Sophos UTM need to be defined or selected. Naming could be RTU_GPRS
Generate X509 certificate for each RTU via web interface @Sophos UTM
“Certificate Management”
The field Name, VPN ID and Common Name should be the same. In this example
RTU520.RTUName is used. Replace RTU520 with your device and RTUName with the Station Name
of your RTU. The dot in the name is required.
Select as VPN ID Type: Hostname. Fill the other values with your information.
Export as “PKCS#12” certificate and enter transport password in Export password field, repeat and
click “Download” again.
Save this to your local disc. This certificate is required later on RTU web server. The password as well.
Certificate Password
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
RTU-……………….
Add New Remote Network definition (if not available) via ”+” button:
N for Network
NG for NetworkGroup
H for Host
HG for Hostgroup
Location_N_NetworkAddress
Host_H_IPAddress
Gateway type is Respond only, because IP address of RTU via GPRS is always the same.
Use a useful name, like reuse defined VPN Network information and Station name:
e.g. RTU-Station_192.168.0.0/30===CS_172.16.100.0/24
In the hardware tree select the CMU and switch to tab “Network Interfaces”.
Switch to “PPPx” tab and fill in User name and Password for GPRS communication.
Enable routing setting for PPP interface. Define network and netmask. Gateway is handled auto-
matically according to the dial-in server of your provider.
To upload certificate, click “Browse…” button and select certificate file from your local drive:
Enter transport password for certificate in the field: “Certificate file password”. Then click “Upload
certificate” and wait until the following message comes up:
After successful loaded certificate more details about the certificate will be displayed.
3.5 Templates
Policies
IKE Version
IKEv1
IKEv2
Authentication
Preshared Key
RSA Key (certificates) RSA key with FQDN (Fully Qualified Domain Name)
BLOWFISH
DES 56 CBC
SHA1
MD5
IKE DH group
group 1: MODP 768 bit
9600 sec
3600 sec
X ESP
BLOWFISH
DES 56 CBC
NULL
SHA1
MD5
IPSec DH group
X group 2: MODP 1024 bit
9600 sec
3600 sec
/32 255.255.255.255 1 1
/30 255.255.255.252 4 2
/29 255.255.255.248 8 6
/28 255.255.255.240 16 14
/27 255.255.255.224 32 30
/26 255.255.255.192 64 62
3.6.1 Overview
The Parallel Redundancy Protocol (PRP) provides a standard method to obtain redundancy in net-
works, using doubly attached nodes obeying to PRP (DANPs). PRP implements redundancy func-
tions in the end nodes rather than in network elements.
A doubly attached node DANP is attached to two independent Local Area Networks (LANs) of similar
topology, named LAN_A and LAN_B, which operate in parallel. A source DANP sends the same
frame over both LANs and a destination DANP receives it from both LANs within a certain time,
consumes the first frame and discards the duplicate.
The following figure shows a redundant network consisting of two LANs, each of which can have
any topology, e.g. tree, ring or meshed.
Source
SAN DANP DANP
A1
B- frame
A- frame
B ridge B ridge
Bridged Local Area
Bridged Local Area Network (tree)
Network (ring) LAN_B
LAN_A
SAN
A2 RedBox SAN SAN
B1 B2
A- frame B- frame
Figure 31: PRP network consisting of two LANs with different topology
The two LANs have no connection between them and are assumed to be fail-independent. Redun-
dancy can be defeated by single points of failure, such as a common power supply or a direct con-
nection whose failure brings both networks down.
Additional to DANPs the networks can contain singly attached nodes (SANs). These nodes can be
attached in two ways:
– SANs can be attached directly to one LAN only. Such SANs can only communicate with other
SANs on the same LAN. For instance, in the figure above, SAN A1 can communicate with SAN
A2, but not with SAN B1 or SAN B2. SANs can communicate (not redundantly) with all DANPs.
– SANs can be attached over a RedBox (redundancy box) to both LANs, as the figure shows
for SAN R1 and SAN R2. Such SANs can communicate with all DANP and SANs, for instance
SAN A1 and SAN R1 can communicate. These kind of SANs are named virtual doubly at-
tached node VANP too.
For further, detailed information see PRP standard documentation IEC 62439-3 [7].
RedBox RedBox
RedBox
RedBox
The PRP implementation for the RTU500 series is defined by the following basic points:
– The RTU500 series supports the newer PRP-1 protocol (PRP 2012, IEC 62439-3 (2012)) only.
The older PRP-0 protocol is not supported by the RTU500 series.
– PRP is supported on CMUs with two Ethernet interfaces (e.g. 560CMU05, 560CID11,
560CMD11) only.
– Up to 8 CMUs with PRP configuration are supported within a RTU560 rack system.
– The RTU500 series supports communication with other DANPs and SANs according to the
network restrictions.
– All network host and subdevice communication protocols can be used with PRP. There is no
restriction to certain protocols like IEC 61850.
– Other network functionality like web server, HMI or SNTP time synchronization works via PRP
as well. There is no restriction to certain network functionalities.
– The IPv4 routing of the network interfaces is not restricted when using PRP.
– The PRP connection status can be supervised by system events. See chapter “PRP supervi-
sion” for more information.
– Protocol logging via CPTT is possible with PRP. See chapter “Protocol logging for communica-
tion interfaces” for detailed information.
– The RTU500 series CMU redundancy can be used together with PRP. In this case a CMU
switch over is possible when both networks links of a CMU fail.
Enable PRP for Ethernet interfaces Disabled CMU parameter - Network interfaces
Unique PRP interface number within an RTU. Value range from 1 to 8. Select from list.
The notes below have to be considered for the PRP CMU configuration parameters:
Additional to the main, specific PRP parameters are available. These parameters are set in a separate
dialog, shown when selecting the button ‘Configuration’ besides the PRP interface number. An
example is shown in the figure below.
PRP protocol type. Not changeable and set to the fix value PRP-1.
A connected PRP node is considered not reachable when the time elapsed since reception of a frame from that node over
both LANs exceeds the node forget time. The PRP node forget time is set in seconds. Value range from 10 to 320 seconds.
Every life check interval a PRP node sends a supervision frame (see below). The PRP life check interval is set in seconds.
Value range from 2 to 60 seconds.
Every PRP node sends a supervision frame every life check interval to this multicast address. According to the standard, the
first 5 octets of this MAC address must match 01:15:4E:00:01. The last token of the supervision MAC address can be set
here. Value range from 0x00 to 0xfd.
CMU redundancy switch over in case of link Disabled CMU parameter - Network interfaces
failure
Enables CMU switch over in case both PRP links of a CMU fails. Only visible if CMU has redundancy mode active or standby.
The notes below have to be considered for the specific PRP configuration parameters:
– The node forget time must be greater than the life check interval. It shall be set at least two
times the life check interval.
– The parameters supervision MAC address and life check interval must be set to the same value
for every PRP node in the network.
– The life check interval requires receiving and processing of a supervision frame from each node
in the network within the time interval. For performance considerations the interval time shall
not be set below 10 seconds (especially in large PRP configurations).
The RTU500 PRP implementation supports the system events summarized in the following table:
PRP interface n: Network interface E1 link up Signalize link status of interface 'E1' using #277 - #284
PRP interface n to the next network de-
vice (e.g. switch)
PRP interface n: Network interface E2 link up Signalize link status of interface 'E2' using #285 - #292
PRP interface n to the next network de-
vice (e.g. switch)
Device reachable on redundant line 1 Signalize communication status to the re- #180
ferring subordinated PRP device (node)
via network interface 'E1'
Device reachable on redundant line 2 Signalize communication status to the re- #181
ferring subordinated PRP device (node)
via network interface 'E2'
The system events ‘SEV#277 - #292 PRP interface n: Network interface Ex link up’ are located at
the system data interface of the CMU. The system event ‘SEV#180 - #181 Device reachable on
redundant line x’ are located at the system data interface of the subordinated PRP devices.
The meaning of the system event values are as defined in the table below:
PRP interface n: Network interface Ex link up On Link of interface 'Ex' using PRP interface n to the
next network device is up
Device reachable on redundant line x On Subordinated PRP device reachable via network
interface ‘Ex’
– In case the system events ‘SEV#277 - #292 PRP interface n: Network interface Ex link up’ are
missing in PRP configurations, the affected system events are written to the configuration file
nevertheless. As result the system events are available in the system diagnosis in any case.
– The system events ‘Device reachable on redundant line x’ are available only, if a PRP interfaces
is used with a SCI activity.
– The system events ‘Device reachable on redundant line x’ are set by the PRP implementation
independent from the used communication protocol. It doesn’t represent the connection sta-
tus of the protocol. The protocol status is signalized by the system event ‘Device inoperable’.
Both system events shall show in normal situations the same status. But due to different time-
outs the status can differ when a device just connects or disconnects.
– PRP doesn’t provide a supervision of SAN devices (nodes). These devices must be supervised
by other system events like ‘Device inoperable’.
4 Glossary
CMU Communication and Data Processing Unit
CS Control System
SPB Serial Peripherial Bus is the RTU I/O bus used with RS485 or fibre optical media
Note:
The specifications, data, design or other information contained in this document (the “Brochure”)
- together: the “Information” - shall only be for information purposes and shall in no respect be
binding. The Brochure does not claim to be exhaustive. Technical data in the Information are only
approximate figures. We reserve the right at any time to make technical changes or modify the
contents of this document without prior notice. The user shall be solely responsible for the use of
any application example or information described within this document. The described examples
and solutions are examples only and do not represent any comprehensive or complete solution. The
user shall determine at its sole discretion, or as the case may be, customize, program or add value
to the ABB products including software by creating solutions for the end customer and to assess
whether and to what extent the products are suitable and need to be adjusted or customized.
This product is designed to be connected to and to communicate information and data via a network
interface. It is the users sole responsibility to provide and continuously ensure a secure connection
between the product and users or end customers network or any other network (as the case may
be). The user shall establish and maintain any appropriate measures (such as but not limited to
the installation of firewalls, application of authentication measures, encryption of data, installation of
anti-virus programs, etc) to protect the product, the network, its system and the interface against any
kind of security breaches, unauthorized access, interference, intrusion, leakage and/or theft of data
or information. ABB AG is not liable for any damages and/or losses related to such security breaches,
any unauthorized access, interference, intrusion, leakage and/or theft of data or information.
ABB AG shall be under no warranty whatsoever whether express or implied and assumes no re-
sponsibility for the information contained in this document or for any errors that may appear in this
document. ABB AG's liability under or in connection with this Brochure or the files included within
the Brochure, irrespective of the legal ground towards any person or entity, to which the Brochure
has been made available, in view of any damages including costs or losses shall be excluded. In
particular ABB AG shall in no event be liable for any indirect, consequential or special damages,
such as – but not limited to – loss of profit, loss of production, loss of revenue, loss of data, loss
of use, loss of earnings, cost of capital or cost connected with an interruption of business or oper-
ation, third party claims. The exclusion of liability shall not apply in the case of intention or gross
negligence. The present declaration shall be governed by and construed in accordance with the
laws of Switzerland under exclusion of its conflict of laws rules and of the Vienna Convention on the
International Sale of Goods (CISG).
ABB AG reserves all rights in particular copyrights and other intellectual property rights. Any repro-
duction, disclosure to third parties or utilization of its contents - in whole or in part - is not permitted
without the prior written consent of ABB AG.