pcs7 Compendium Part F en-US en-US
pcs7 Compendium Part F en-US en-US
What's new? 2
Security strategies 3
SIMATIC
Network security 4
Process Control System PCS 7
Compendium Part F - 5
System hardening
Industrial Security (V8.1)
User Administration and
Operator Permissions 6
Configuration Manual
Patch management 7
Protection against malware
using virus scanners 8
Backing up and restoring
data 9
Remote access 10
03/2016
A5E35032082-AB
Legal information
Warning notice system
This manual contains notices you have to observe in order to ensure your personal safety, as well as to prevent
damage to property. The notices referring to your personal safety are highlighted in the manual by a safety alert
symbol, notices referring only to property damage have no safety alert symbol. These notices shown below are
graded according to the degree of danger.
DANGER
indicates that death or severe personal injury will result if proper precautions are not taken.
WARNING
indicates that death or severe personal injury may result if proper precautions are not taken.
CAUTION
indicates that minor personal injury can result if proper precautions are not taken.
NOTICE
indicates that property damage can result if proper precautions are not taken.
If more than one degree of danger is present, the warning notice representing the highest degree of danger will
be used. A notice warning of injury to persons with a safety alert symbol may also include a warning relating to
property damage.
Qualified Personnel
The product/system described in this documentation may be operated only by personnel qualified for the specific
task in accordance with the relevant documentation, in particular its warning notices and safety instructions.
Qualified personnel are those who, based on their training and experience, are capable of identifying risks and
avoiding potential hazards when working with these products/systems.
Proper use of Siemens products
Note the following:
WARNING
Siemens products may only be used for the applications described in the catalog and in the relevant technical
documentation. If products and components from other manufacturers are used, these must be recommended
or approved by Siemens. Proper transport, storage, installation, assembly, commissioning, operation and
maintenance are required to ensure that the products operate safely and without any problems. The permissible
ambient conditions must be complied with. The information in the relevant documentation must be observed.
Trademarks
All names identified by ® are registered trademarks of Siemens AG. The remaining trademarks in this publication
may be trademarks whose use by third parties for their own purposes could violate the rights of the owner.
Disclaimer of Liability
We have reviewed the contents of this publication to ensure consistency with the hardware and software
described. Since variance cannot be precluded entirely, we cannot guarantee full consistency. However, the
information in this publication is reviewed regularly and any necessary corrections are included in subsequent
editions.
1 Preface ................................................................................................................................................... 7
2 What's new? ......................................................................................................................................... 11
3 Security strategies ................................................................................................................................ 13
3.1 General information ................................................................................................................13
3.2 Concept of "defense in depth" ................................................................................................13
3.3 Example configuration ............................................................................................................15
4 Network security ................................................................................................................................... 17
4.1 Automation and security cells .................................................................................................17
4.2 Addressing and segmenting ...................................................................................................19
4.2.1 Example configuration: Division into subnets .........................................................................20
4.2.2 Example configuration: Setting of IP addresses and subnet mask ........................................24
4.3 Name resolution ......................................................................................................................27
4.4 Managing networks and network services ..............................................................................34
4.5 Access points to the security cells ..........................................................................................35
4.5.1 Overview .................................................................................................................................35
4.5.2 Automation Firewall Appliance ...............................................................................................36
4.5.3 Example configuration: Access rules ......................................................................................37
4.6 Secure communication between security cells .......................................................................44
4.6.1 Overview .................................................................................................................................44
4.6.2 Data exchange between automation systems ........................................................................44
4.6.2.1 Introduction .............................................................................................................................44
4.6.2.2 Example configuration: Establishing secure communication between security cells with
SCALANCE S .........................................................................................................................46
4.6.3 Data exchange for operating and monitoring with remote OS clients ....................................53
4.6.4 Quarantine station (file server) ...............................................................................................58
4.7 Configuration of the SCALANCE X network components ......................................................65
5 System hardening ................................................................................................................................. 69
5.1 Overview .................................................................................................................................69
5.2 Installing the operating system ...............................................................................................70
5.3 Security Controller ..................................................................................................................75
5.4 Windows Firewall ....................................................................................................................77
5.5 BIOS settings ..........................................................................................................................83
Validity
This manual incorporates the statements provided in the documentation for SIMATIC PCS 7
and specifically in the "Security Concept PCS 7 & WinCC". It can be used with SIMATIC
PCS 7 automation systems and projects.
The configuration guide is valid from SIMATIC PCS 7 V8.1.
Additional support
If you have any questions about using the products described in the manual, contact your
Siemens representative in the sales and service locations that are responsible for your
company.
You can locate your contact at http://www.siemens.com/automation/partner.
The guide that provides details of the technical documentation offered for the individual
SIMATIC products and systems is available at http://www.siemens.com/simatic-tech-doku-
portal.
The online catalog and online ordering system are available at
www.siemens.com/industrymall.
Training center
Siemens offers a number of training courses to familiarize you with the SIMATIC PCS 7
process control system. Contact your regional training center or the main training center
(http://www.sitrain.com) in 90327 Nuremberg, Germany.
Technical support
You can contact technical support for all Industry Automation and Drive Technology products
using the Support Request (http://www.siemens.com/automation/support-request) web form.
Additional information on our Technical Support is available on the Internet at
https://support.industry.siemens.com/sc/ww/en/sc/2554.
See also
Installing the operating system (Page 70)
The physical and organizational security measures are summarized under the heading
"Plant Security".
● Division into security cells
A sufficiently secured network architecture subdivides the instrumentation and control
network into different task levels.
Perimeter zone techniques should be employed. In this case, this means using exported
data and not data used directly for process control that are available on a system (data
memory database). The system is located between the main access point for data input
(front-end firewall) and the deeply embedded access point for data input (back-end
firewall), or the third network section of a triple-homed firewall (located in three networks).
● Securing access points to the security cells
A single access point to each security cell (should be a firewall system) for the
authentication of users, employed devices and applications, for the direction-based
access control and the assignment of access permissions as well as for detection of
break-in attempts.
The single access point functions as main access point to the network of a security cell
and serves as the first point of a control for access rights to network levels.
● Securing the communication between two security cells using an "unsecured" network
Certificate-based authenticated and encrypted communication should always be used
when the perimeter zone technique or standard application layer filtering technique is not
available. This can take place using tunneling protocols such as PPTP (Point-To-Point
Tunneling Protocol), L2TP (Layer Two Tunneling Protocol) or IPSec (IP Security) filtering
or even via channels that are also secured by server-based certificates, for example RDP
(Remote Desktop Protocol), a Windows Server terminal server securely published via
HTTPS or Windows Server Web server via the firewall using SSL (Secure Sockets Layer)
technology.
The measures concerning the security cells, such as forming security cells, securing access
points and the secure communication between different security cells, are summarized under
the heading "Network Security".
● System hardening
System settings of a computer that make it more resistant to attacks by malware.
● User management and role-based operator authorizations
Task-based operation and access authorizations (role-based access control)
● Patch management
Patch management is a regular procedure for installing patches on plant computers.
● Malware detection & prevention
Use of suitable and correctly configured virus scanners
Measures such as "system hardening", "user and patch management" as well as "malware
detection & prevention" are summarized under the heading "Integrity Protection or Endpoint
Protection".
Note
Note that the example configuration presented in this section depicts a plant configuration
without any safety measures. The example configuration shown above is a negative
example from a security point of view. This document presents a step-by-step description of
how this plant configuration can be made more secure by implementing security measures.
Example configuration
The measures presented in this compendium and configuration examples are illustrated
using the following example configuration:
The example configuration consists of a total of five S7 controllers that assume the
measuring and control tasks within the process-related system. Five OS servers (two
redundant pairs of servers and a single OS server) and four OS clients are planned for
controlling and monitoring. In addition, a Web server is envisaged for operator control and
monitoring via the corporate network and the Internet. For this, the terminal bus is connected
with the corporate network which, in turn, provides Internet access. An engineering station is
available for configuring the overall plant.
The industrial process plant is divided into two or more independent units. Three S7
controllers are used for the measuring and control tasks of Unit A, while two S7 controllers
are used for those of Unit B. The four OS clients should allow both units to be operated and
monitored. For this purpose, Unit A and B are each assigned a redundant OS server pair.
Unit A also features another OS server, which is not configured redundantly. An OS client is
to serve as a local operating station at a filling station.
The components of the production planning connection (SIMATIC IT), in turn, are combined
in a separate security cell (MES). This results in four different security cells (DCS1, DCS2,
MES and Perimeter) for the example configuration, which are shown in the following figure:
IP address
Note
The term "IP Address" is used in this document in the sense of an IPv4 address. The
opposite of this is an IPv6 address. This document does not deal with the IPv6 address.
An IP address consists of 32 bits. Usually, a notation is used with four decimal numbers
(from 0 to 255) delimited by periods (decimal point notation). Each decimal number, also
known as an octet, represents 8 bits (1 byte) of the 32-bit address:
IPv4 address
Binary 1100 0000 1010 1000 0000 0001 0000 1010
Hexadecimal C0 A8 01 0A
Decimal 192 168 1 10
Subnets
The strategy of a spatial and functional division of an automation plant must also be reflected
in the network configuration. This can be achieved by the selection of the IP address range
and the formation of subnets associated with it. Subnets are used to subdivide an existing
network into additional, smaller networks (PCN, CSN, MON, perimeter, etc.) without
requiring additional Class A, Class B or Class C IP addresses.
A subnet therefore refers to a network section for the Internet protocol (IP). The subnet
groups several sequential IP addresses by means of a subnet mask. Hence, the subnet
mask divides an IP address into a network part and a host part. It has the same structure as
an IP address (4 bytes). By definition, all bits of the network part must be set to TRUE = 1
and all bits of the host part to FALSE = 0.
Network classes
The address classes are defined by the Internet Assigned Numbers Authority (IANA) to
systematically assign address prefixes to networks of varying size. The class of addresses
indicates how many bits were used for the network ID and how many bits were used for the
host ID. The address classes also determine the number of networks possible and the
number of hosts per network. Of the five address classes, Class A, B and C are reserved for
IPv4 unicast addresses. Private IP address ranges have also been defined within these
three network classes. From a network security point of view, these private IP address
ranges have the advantage that they cannot be forwarded (routed) on the Internet. As a
result, a direct attack from the Internet on a system PC is already being prevented.
The routing between the various networks is performed by the two back-end firewalls in the
aforementioned configuration. This requires establishing an appropriate network rule within
the firewall used. The following figure shows an example of this rule in the Microsoft
Forefront TMG Management:
This network rule performs the routing between the PCN, MON and Perimeter networks in
the example configuration. The data traffic between the security cells of units A and B is
routed through the two back-end firewalls.
Procedure
The following procedure is described using the example of the "Windows 7" operating
system.
To set the IP address, subnet mask and default gateway, follow these steps:
1. Open the Network and Sharing Center with the command "Start > Control Panel >
Network and Sharing Center".
The "Network and Sharing Center" dialog box opens.
2. In the left navigation pane of the dialog, click on "Change adapter settings".
The "Network Connections" dialog box opens.
3. Open the status display of the corresponding network connection (Process Control
Network 1 or 2, Perimeter Network or Manufacturing Operations Network) by double-
clicking on the icon.
The status display dialog of the network connection opens.
4. Click the "Properties" button.
Enter the administrator password, if required. If you are logged on as an administrator,
confirm the execution of the application.
The "Local Security Policy" dialog box opens.
5. Select the "Internet Protocol Version 4(TCP/IPv4)" option and click on the "Properties"
button.
The properties dialog of the "Internet Protocol Version 4(TCP/IPv4)" option opens.
6. Select "Use the following IP address" option and enter the IP address of the
corresponding computer in the "IP address" box.
7. In the "Subnet mask" box, enter the subnet mask of the computer.
8. Confirm the changes with "OK".
Example
In the following figure, a computer located in Process Control Network 1 is addressed. The
OS server with the name "OSS1A" has a network connection to the Process Control Network
1. The subnet mask 255.255.255.192 was specified for this network by the division into
subnets. Hence, the IP addresses available within this network are the addresses from
192.168.2.65 to 192.168.2.126.
The IP address 192.168.2.101 was specified for the OS server "OSS1A" and inserted in the
"IP address" box of the properties dialog for "Internet Protocol Version 4(TCP/IPv4)". The
subnet mask 255.255.255.192 specified above was entered in the "Subnet mask" box.
Computer name
The computer name is used to uniquely identify a computer within a network. This is the
prerequisite for communication with the computer. The name has to be uniquely associated
with the computer. This ensures that a computer can be reliably located. Inadvertent double
allocation of computer names can cause unpredictable behavior during communication.
Since the NetBIOS name is derived from the computer name (see NetBIOS name) and the
NetBIOS name must be unique for NetBIOS name resolution, the computer name may not
be longer than 15 characters.
The computer name must be unique and should allow an inference to be made about the
function of the computer.
Note
You can learn about the rules for assigning the computer name in the installation manual
"SIMATIC Process Control System PCS 7 PC Configuration"
(http://support.automation.siemens.com/WW/view/en/90635791).
Refer also to the following documents:
• FAQ "Why is the underscore character not permitted in computer names in PCS 7?"
(http://support.automation.siemens.com/WW/view/en/67794552)
• Microsoft Support Center: "Naming conventions in Active Directory for computers,
domains, sites, and OUs" (http://support.microsoft.com/kb/909264/en)
You can find more naming conventions in the following documents:
• Manual "SIMATIC Process Control System PCS 7 Engineering System"
(http://support.automation.siemens.com/WW/view/en/90663380) section "Rules for
naming in the PH"
• Online help WinCC Information system "Working with projects > Appendix > Invalid
characters"
• "Projects.pdf" file. You can find this file in the installation folder of the SIMATIC product
range of Siemens AG.
NOTICE
The computer name may be changed only prior to the installation of SIMATIC PCS 7.
Procedure
The following procedure is described using the example of the "Windows 7" operating
system.
To change the computer name, follow these steps:
1. Select the command "Start > Control Panel > System".
The "System" dialog opens.
2. Click the "Change settings" link in the "Settings for computer name, domain and
workgroup" section.
If prompted, enter the administrator password as required. If you are already logged on
as an administrator, confirm the execution of the application.
The "System Properties" dialog box opens.
3. Click "Change" in the "Computer name" tab.
The "Computer Name/Domain Changes" dialog box opens.
NetBIOS name
Source: Microsoft Support Center "TCP/IP Fundamentals for Microsoft Windows"
A NetBIOS name is a 16-byte (16-character) name based on the computer name that
designates a NetBIOS application in the network. The service uses the first 15 characters of
the computer name plus the character 0x20 as the 16th character as the exact name. A
NetBIOS name is either a unique (exclusive) name or a (non-exclusive) group name. If a
NetBIOS application communicates with a specific NetBIOS application on a single
computer, unique names are used. If a NetBIOS process communicates with several
NetBIOS applications on different computers, a group name is used.
Method Description
NetBIOS name A local table stored in RAM that contains the NetBIOS names with the corre-
cache sponding IPv4 addresses recently resolved by the local computer.
NBNS A server that provides the NetBIOS names. For WINS, this is the Microsoft
implementation of an NBNS.
Local broadcast NetBIOS Name Query Request broadcast messages that are transmitted to
the local subnet.
Method Description
Lmhosts files Local text file in which NetBIOS names are assigned to their IPv4 addresses.
The Lmhosts file is used for NetBIOS applications that are executed on com-
puters in remote subnets.
Local host name Configured host name of the computer
DNS resolution Local RAM-based table that contains domain names and IPv4 address as-
cache signments from entries in the local HOSTS file as well as the names to be
resolved via DNS.
DNS server Server that manages databases with assignments of IPv4 addresses to host
names.
3. Configure all computers, including those located in the security cells "MES", "Perimeter",
"DCS1" and "DCS2".
4. Save the file with "Save As" and assign the name "Lmhosts" (without file extension) to the
file.
5. Copy the file from the computer where you have created it to all other computers in the
plant.
RADIUS
RADIUS (Remote Access Dial In User Service) is a network protocol that provides central
authentication, authorization and user account management. The central user authentication
of network components should preferably be performed using a central RADIUS server, e.g.
the Network Policy Server (NPS) as a part of the MS Active Directory. You can find
information on the configuration of RADIUS options for network devices in the manuals for
the SCALANCE X network devices.
DHCP
DHCP (Dynamic Host Configuration Protocol) allows client computers and other TCP/IP-
based network devices to be assigned valid IP addresses automatically. The additional
configuration parameters required by these clients and devices, for example, DNS server,
WINS server, default gateway, subnet mask can also be provided.
DHCP was developed with the following two application scenarios in mind:
● Large networks with frequently changing topology.
● Users who simply want to have "a network connection" and do not want to deal with the
network configuration in any detail.
Both of these application scenarios do not apply to an automation system. Using DHCP
involves several security risks that cannot be outweighed by the benefits of an automation
plant.
Note
Using a DHCP server
The use of a DHCP server for automatic network configuration (IPv4 address, subnet mask,
etc.) is not recommended for security reasons.
If a DHCP server is used, address reservations must be used.
4.5.1 Overview
One of the factors for designing the security cells is that they should only have one access
point. Any access to the security cell via this access point may occur only after verifying the
legitimacy (persons and devices have to be authenticated and authorized) and must be
logged. The access points should prevent unauthorized data traffic to the security cells while
allowing authorized and necessary traffic for smooth operation of the system.
The access point to a security cell can be designed differently depending on requirements of
the configuration and functionality.
You can find information about the various concepts in the manual "SIMATIC Process
Control System PCS 7 Security Concept PCS 7 & WinCC (Basic)"
(http://support.automation.siemens.com/WW/view/de/60119725/0/en).
Note
The current solution of the automation firewall is based on the Microsoft Forefront TMG
2010. As of December 2012, this Microsoft product ceased to be available. An alternative
firewall solution is currently being evaluated. However, a final result was not available at the
time of this document's publication.
For this reason, the required firewall rules have been neutrally formulated over the course of
development.
You can find the complete range of products for automation firewalls in the PCS 7 Add-on
catalog. You can download this catalog from the SIMATIC PCS 7 website
(https://www.automation.siemens.com/mcms/process-control-systems/en/simatic-pcs-
7/Pages/simatic-pcs-7.aspx).
Access rules
In the example configuration, the access points to the four security cells (DCS1, DCS2, MES
and Perimeter) are secured with firewalls. The result is a front-end/back-end firewall solution
(with two back-end firewalls).
To ensure unrestricted operation, a data exchange between the different security cells is
required. To ensure this data exchange, the corresponding access rules must be stored in
the firewalls that act as access point to the security cells.
The following table features the required cross-security cell data exchange:
Based on the table above, the following access rules apply to back-end firewalls 1 and 2:
● Example configuration: Access rules for back-end firewall 1
The example configuration contains only one engineering station in security cell DCS1 which
is also being used for the configuration of the OS servers OSS3A and OSS3B. To ensure the
configuration steps, specifically loading the OS, you also have to manually configure the
following access rules:
It should also be possible to operate and monitor the OS servers OSS3A and OSS3B from
the OS clients in the PCN. To ensure this, you need to configure the following access rules:
Example configuration: Web publishing of a PCS 7 web server at the front-end firewall
To access a Web server in the Perimeter network from an external network, it must be
published via the front-end firewall. The technique of Web publishing, which is supported by
the automation firewall and is used here, offers better security than the obsolete technique of
Web tunneling or Web forwarding. Opening port 80 or 443 and subsequently simply passing
the queries through the front-end firewall directly to the Web server, as called for in this
technique, should no longer be applied.
During Web publishing (see the following figures), the Web client does not directly access
the Web server from the external network. Instead, it directs its query to the automation
firewall (1). The automation firewall forwards this verified query to the Web server (2), and
receives the requested information in return (3). It then forwards this information to the Web
client (4).
Only HTTPS should be allowed between Web client and automation firewall. This ensures
the authenticity of the TMG via server certificate is guaranteed and encrypts the
communication between Web client and firewall, thereby protecting it against manipulation.
Depending on the desired internal security, either HTTP or HTTPS can be used for the
automation firewall access to the Web server.
If Web clients from an external network are to access the Web server, it must be published
at the front-end firewall. If Web clients from an MES network (MON) should be allowed
access, however, the publishing is performed at the back-end firewall.
Note
The steps for configuring the OS Web server and the settings of the Web client are
described in the manual "SIMATIC Process Control System PCS 7 Web Option"
(http://support.automation.siemens.com/WW/view/de/90682846).
Example configuration: Web publishing of a PCS 7 web server at the front-end firewall
In order to reach the PCS 7 Web server that is located in the Perimeter network from another
internal network, for example, from the Manufacturing Operations Network (MON) via a Web
client, the Web server must first be published at the back-end firewall 1.
Since this functionality is not implemented in the Industrial Wizard, you need to perform the
publishing rule using the Microsoft Forefront TMG Management Console in the back-end
firewall.
Additional information
You can find the complete range of products for automation firewalls in the PCS 7 Add-on
catalog. You can download this catalog from the SIMATIC PCS 7 website
(https://www.automation.siemens.com/mcms/process-control-systems/en/simatic-pcs-
7/Pages/simatic-pcs-7.aspx).
4.6.1 Overview
In many cases, data exchange between components located in different security cells is
required for the regular operation of a plant. The following variants have to be differentiated
here:
● Data exchange on the CSN level
Data exchange between automation systems in different security cells
● Data exchange on the PCN level
Data exchange for operating and monitoring with remote OS clients, which means OS
clients located in other security cells than the corresponding OS server(s).
4.6.2.1 Introduction
The data exchange between automation systems in different security cells should be
performed via VPN connection (IPSec). This communication can be established using two
SCALANCE S security modules.
The following figure shows an example of communication between automation systems in
different security cells:
In the internal networks protected by SCALANCE S, IPSec tunnels provide the node for a
secured data connection through the unsecured external network.
This gives the data exchange of the devices via the IPSec tunnels in the VPN the following
properties:
● The exchanged data are interception-proof so that the confidentiality of the data is
secured.
● The exchanged data are tamper-proof, which secures the integrity of the data.
● Authenticity
SCALANCE S uses the IPSec protocol for tunneling (tunnel mode of IPSec).
Note
You can find additional information on SCALANCE S in the manual "SIMATIC NET Industrial
Ethernet Security Basics and application"
(https://support.industry.siemens.com/cs/ww/en/view/67437017).
4.6.2.2 Example configuration: Establishing secure communication between security cells with
SCALANCE S
Introduction
In this example, the tunnel function is configured in the "Default mode" configuration view. In
this example, SCALANCE S Module 1 and SCALANCE S Module 2 form the two endpoints
of the tunnel for the secured tunnel connection.
The following figure shows an example of a VPN tunnel (IPSec tunnel with two SCALANCE
S modules):
The following figure shows an example of how the IPv4 address of the automation system is
set:
5. In the "Configuration" area, enter the MAC address in the specified format.
Note
The MAC address is printed on the front of the SCALANCE S module.
6. In the "Configuration" area, enter the external IP address (192.0.0.201) and the external
subnet mask (255.255.0.0) in the specified format and confirm your entries with "OK".
7. In the "Interface routing external/internal" area, select the entry "Routing mode" from the
drop-down list.
8. Enter the internal IP address 192.168.1.200 and the internal subnet mask 255.255.255.0
in the specified format and confirm the dialog with "OK".
2. Select the command "To all modules ..." in the "Transfer" menu.
3. Select both security module with "Select all".
4. Start the download process with "Start".
If the download process takes place without any errors, the security modules are
restarted automatically and the new configuration is activated.
Note
You can find more information about configurations and application possibilities of SIMATIC
security products under FAQ
(http://support.automation.siemens.com/WW/view/en/67329379) or in the Siemens Industry
Online Support Portal.
4.6.3 Data exchange for operating and monitoring with remote OS clients
Introduction
The data exchange between PCS 7 OS stations (PCS 7 OS servers and PCS 7 OS client(s))
located in different security cells (possibly spatially separated, i.e. in different buildings)
should be encrypted. Such encrypted communications may on the one hand can be
established by means of two SCALANCE S security modules, as shown and described in the
previous section (see figure Variant 1 below). On the other hand, such encrypted
communication can be configured directly at the relevant PCS 7 OS stations (see figure
Variant 2 below). This configuration is described in the following.
The two versions shown here have two major distinctions. One is the end point of the
encryption. With variant 1, the end point is always the SCALANCE S security module. With
version 2, the end point is the PCS 7 OS client on the one hand and the PCS 7 OS server on
the other. The second major difference is the scope of the encryption. In the first version, the
entire communication is encrypted by the encoded tunnel which exists between the
SCALANCE S security modules. In version 2, only the communication between PCS 7 OS
server and PCS 7 OS client is encrypted. Any other possible communication is not encrypted
in version 2.
Depending on the risk analysis, you can also use a combination of both versions.
Note
You can enable encrypted communication for the stations that actively engage in process
mode:
• Operator station
• Engineering station
• SIMATIC Route Control
• SIMATIC BATCH
Note
You can find additional information on migration mode in the "SIMATIC Process Control
System PCS 7 – PC Configuration"
(http://support.automation.siemens.com/WW/view/en/90635791) manual.
5. You can set the TCP/UDP port for communication in the range 1024 to 65535 in the
"Encrypted communication" area.
If port 8910 is used for example, communication specifically for the PCS 7 OS on this
station will run exclusively through TCP port 8910, UDP port 8910 and ICMP.
The migration mode is relevant for an upgrade scenario if the settings for encrypted
communication are to be changed during ongoing operation of the plant.
Note
Using SIMATIC NET Softnet IE-RNA in connection with WinCC Secure Communication
When using SIMATIC NET Softnet IE-RNA in PCS 7 V8.1, you must disable secure
communication (WinCC Secure Communication) option in SIMATIC Shell (see PCS 7
Readme").
Note
You also find information on this in the manual "SIMATIC Process Control System PCS 7 PC
Configuration" (http://support.automation.siemens.com/WW/view/en/90635791).
See also
PCS 7 Readme 1 (http://support.automation.siemens.com/WW/view/en/101094704)
Introduction
A quarantine station is a central data communication point in a plant. A quarantine station is
used to transfer data (for example, configuration or engineering data) to certain computers
within the automation system or from computers of the automation system to the quarantine
station.
The quarantine station is therefore important when the recommendations relating to system
hardening are implemented, particularly for blocking the USB ports in the automation system
(see section Working with mobile data media (Page 84)). As a central data communication
point, the quarantine station should be especially protected from a security point of view.
Therefore, the local security measures (for example, firewall, virus scanner, etc.) should be
configured more strictly for it.
As shown in the example configuration, the quarantine station should be positioned in the
Perimeter network. A corresponding rule must be stored in the back-end firewall(s) to ensure
communication between the quarantine station and the computers in security cells DCS1
and DCS2 via the back-end firewall(s).
Firewall rules
If the automation firewall is used as back-end firewall, the quarantine station (FTP server) at
the back-end firewall can be published for the security cells DCS1 and DCS2 (see Web
publishing of the PCS 7 Web server at the front-end firewall or Web publishing of the PCS 7
Web server at the back-end firewall). For this purpose, a corresponding publishing rule (FTP
forwarding) must be configured with the "Publish Non-Web Server Protocols" task in the
automation firewall (Microsoft Forefront TMG Management Console):
This FTP publication of the FTP server (quarantine station) achieves a higher security
compared to a pure port release.
Note
You can find the complete range of products for automation firewalls in the PCS 7 Add-on
catalog. You can download this catalog from the SIMATIC PCS 7 website
(https://www.automation.siemens.com/mcms/process-control-systems/en/simatic-pcs-
7/Pages/simatic-pcs-7.aspx).
If a firewall is used that does not offer the possibility of an FTP publication, the following
tables show the required firewall rules:
● Front-end firewall
The rules in the front-end firewall are only required if FTP data access from the ECN
(Enterprise Control Network) to the quarantine station is planned in the Perimeter network.
● Back-end firewall
4. Enable the "IIS Management Console" and "IIS Admin Service" features in the "Web
Management Tools" area.
3. To add an FTP site as the FTP root directory, create a new folder on the data partition
(D:\) with the name "Data Exchange" (D:\Data Exchange).
4. Right-click on the "Sites" icon. Select the "Add FTP Site" command from the shortcut
menu.
The "Add FTP Site" dialog opens.
5. In the "Add FTP Site" dialog, enter a name for the FTP site and the physical path to the
directory you have created (D:\Data Exchange).
6. Click "Next".
The "Binding and SSL Settings" dialog opens.
7. Make the following settings in the "Binding and SSL Settings" dialog:
– The "Binding" area, "IP address" box: Select "All Unassigned" in the drop-down list.
– SSL area: Enable the option "None".
8. Click "Next".
The "Authentication and Authorization Information" dialog opens.
9. Make the following settings in the "Authentication and Authorization Information" dialog:
– "Authorization > Access allowed for" area: Select the entry "Specific users" from the
drop-down list and enter the authorized users in the box below.
– "Permissions" area: Enable the check boxes "Read" and "Write".
Note
Read the operating instructions for the corresponding devices when configuring the
SCALANCE X Industrial Ethernet switches.
If you use third-party switches to configure the various networks switches, follow the
corresponding manufacturer operating instructions when configuring these devices.
This dialog provides information about the current status of the port. In addition, various port
settings can be performed:
● Port: Shows the port number.
● Type: Shows the type of port.
● Mode: Shows the transmission rate (10 or 100 Mbps) and the transfer procedure (full-
duplex or half-duplex).
● Negotiation: Indicates whether auto-negotiation is enabled or disabled.
● Status: Indicates that the port is switched on.
● Link: Indicates the connection status to the network.
If a port is not used, the status of this port must be set to "Disabled".
System passwords
Change passwords for the users "Admin" and "User" in the "System Passwords" dialog. The
following passwords are preset in the factory state:
● "User" user: user
● "Admin" user: admin
You need to log on as the administrator to change the passwords. Click the "Set Value"
button to confirm your changes.
Specifying protocols
We recommend that you only specify the "HTTPS" protocol for accessing the IE switch. To
do this, disable all protocols (for example, FTP, TELNET, E-mail) in the "Agent
Configuration" dialog and select only the "HTTPS only" protocol.
Additional information
You can find more information in the following manuals:
● SIMATIC NET Industrial Ethernet Switches SCALANCE X-300 / X-400 Configuration
Manual (http://support.automation.siemens.com/WW/view/en/88213893)
● SIMATIC NET Industrial Ethernet Switches SCALANCE X-200 Configuration Manual
(http://support.automation.siemens.com/WW/view/en/102051772)
Support for realizing and implementing network security in your plant is available from the
Industrial Security Services. You can find additional information and the corresponding
contacts at (http://www.industry.siemens.com/topics/global/en/industrial-
security/services/Pages/Default.aspx) .
You can also send your query directly via e-mail to "[email protected]".
Introduction
The operating system and SIMATIC PCS 7 software are pre-installed on the SIMATIC PCS
7 Industrial Workstation (IPC).
Note
When performing a manual installation, you need to comply with the requirements and
procedures described in the following documents:
• PCS 7 Readme (http://support.automation.siemens.com/WW/view/en/101094704)
• Manual "SIMATIC Process Control System PCS 7 PC Configuration"
(http://support.automation.siemens.com/WW/view/en/90635791)
For a SIMATIC PCS 7 computer that fulfills a specific function in an automation plant (OS
server, OS client, engineering station, etc.), some programs installed during the installation
of the operating system may not be required. These programs should be removed. In most
cases, this involves "Windows components", such as Games, Calculator, Notepad,
WordPad, Paint, etc.
Disabling services
In accordance with the specifications for hardening a system, unneeded services should be
disabled in addition to the software packages that are not required for the operation of a
system.
The following services can be disabled:
If you select the "System hardening" option during the installation of SIMATIC PCS 7, the
services listed in the table service are disabled.
Procedure
To disable a service, follow these steps:
1. In the Windows Start menu, right-click on "Computer" and select the shortcut menu
command "Manage".
Enter the administrator password, if required. If you are already logged on as an
administrator, confirm the execution of the application.
The "Computer Management" dialog opens.
2. In the navigation pane, select "Services and Applications > Services".
The right pane of the dialog lists all available services . The "Status" column indicates
whether the service is currently running. The "Startup type" column shows how the
service is started, "Manual" or "Automatic", or if the service has not been started,
"Disabled".
3. In the right area, select the service to be disabled, and open the properties dialog of the
service by double-clicking on it.
4. Click "Stop" to stop the service.
5. Select "Disabled" as the startup type and confirm your changes with "OK".
See also
Microsoft Security Bulletin MS13-098 (https://technet.microsoft.com/en-
us/library/security/ms13-098.aspx)
Note
You can also find information on this in the manual "SIMATIC Process Control System PCS
7 PC Configuration" (http://support.automation.siemens.com/WW/view/en/90635791).
Introduction
As described in the "Security Controller" (Page 75) section, Security Controller (as of PCS 7
V8.0) or SIMATIC Security Control (<PCS 7 V8.0) makes setting relating to the Windows
Firewall. With respect to the example configuration in which communication of PCS 7
computers must be guaranteed among various subnets, the Windows Firewall needs to be
manually adapted.
4. Open the properties of an active file and printer sharing rule with a double-click.
The properties dialog of this rule opens.
6. In order to allow communication of OS server "OSS1A" to the OS Web server with the IP
address 192.168.2.203 in the subnet "Perimeter network", click the "Add" button in the
"Remote IP Address".
The configuration dialog opens.
7. Select the option "This IP address or subnet:" and enter the "IP address" of the
communication partner. If you configure the firewall rules on OS server "OSS1A", enter
the IP address of the OS Web server 192.168.2.203 in this dialog and confirm the entry
with the "OK" button.
Note
The settings for a specific computer depend on the installed BIOS (for example, the
manufacturer or version). The specific options of the setting can be found in the
corresponding system description.
5.6.1 Overview
Introduction
In addition to the definition and designation of mobile data media, this section provides
information about the settings to be performed with respect to mobile data media.
5.6.2 Blocking access to USB storage media using group policy in Windows 7 and
Windows Server 2008 R2
Procedure
1. Click "Start" and enter the string "gpedit.msc" in the "Search" box.
This action requires administrator rights. For this reason, log in as administrator or start
the group policy editor as administrator. Enter the administrator password, if required.
The group policy editor opens.
3. Select the folder "Computer Configuration > Administrative Templates > System>
Removable Storage Access".
4. Double-click the group policy "All Removable Storage classes: Deny all access".
The Group Policy properties dialog opens.
Note
Access to USB storage media can also be locked using a global group policy in a central
domain for all computers.
5.6.3 Regulating the use of USB storage media using group policy in Windows 7 and
Windows Server 2008 R2
To use a USB storage medium on a computer, the device must first be installed. This always
occurs automatically when the device is initially connected to a computer. This installation
can be influenced via group policies:
● The installation of explicitly defined devices by the user can be allowed (positive list)
● The installation of explicitly defined devices by the user can be disallowed (negative list)
● Read and write access to mobile data media, such as USB sticks, USB HDDs, diskettes,
CD/DVD burners, can be configured.
In order to influence the installation of a device using group policies as described in the
above-mentioned situations, you need to know the hardware ID of the device.
4. Select "Hardware IDs" from the drop-down list to display the hardware IDs of the device.
You need the hardware IDs to configure the respective group policies.
5. Select "Compatible IDs" from the drop-down list to display the compatible IDs of the
device.
You need the compatible IDs to configure the respective group policies.
The correlation of the above-mentioned group policies is shown in the following diagram:
To allow only very specific devices on a computer based on the above-mentioned group
policies, follow these steps:
1. Prevent the installation of all devices on the computer.
2. Explicitly allow a specific device to be installed.
To prevent the installation of all devices on the computer, proceed as follows:
1. Ensure that all devices are uninstalled in the Device Manager.
2. Open the Group Policy Editor and navigate to the folder "Computer Configuration >
Administrative Templates > System > Device Installation > Device Installation
Restrictions".
The group policies are displayed in the right pane of the editor.
3. Open the properties of the group policy "Prevent installation of devices not described by
other policy settings" by double-clicking on the policy.
The properties dialog of the group policy opens.
4. Enable the group policy using the "Enabled" option and confirm the setting by pressing
"OK".
The installation of all devices on the computer is prohibited.
In the next step, you have to allow the users with administrator rights to suspend the policies
under "Device installer compliance". This then allows administrators to install hardware
drivers on the computer using the Add Hardware Wizard when restricted device installation
is enabled. To enable this group policy, follow these steps:
1. Open the properties of the group policy "Prevent installation of devices not described by
other policy settings" by double-clicking on the policy.
The properties dialog of the group policy opens.
2. Enable the group policy by selecting the "Enabled" option and confirm your setting with
"OK".
In the next step, you have to explicitly permit the installation of certain devices (positive list).
Proceed as follows:
1. Open the properties of the group policy "Allow installation of devices that match any of
these device IDs" by double-clicking on the policy.
The properties dialog of the group policy opens.
2. Enable the group policy using the "Enabled" option.
3. Click the "Show" button to display the devices that are enabled on your computer for
installation.
The released devices are displayed in the "Show content" dialog.
4. To release additional devices for installation on your computer, enter the hardware IDs of
the devices in the dialog.
You can determine the hardware ID of the device using the Device Manager.
5. Confirm the settings with "OK".
The installation and use of the specified devices are allowed by the user on your
computer. The administrator is not subject to this restriction.
5.6.4 Disabling Windows Autorun / Autoplay for CD/DVD drives and USB storage
media
Source: http://support.microsoft.com/kb/967715/en
The main purpose of Autorun is to respond to hardware actions that are started on a
computer on the software side. Autorun offers the following features:
● Double-click
● Shortcut menu
● Autoplay
These features are typically called from removable media or network shares. With Autoplay,
a search is made for the "Autorun.inf" file on the medium and it is analyzed, if found. This file
specifies the commands to be executed by the system. Usually, this functionality is used to
start installation programs. However, this function can also be used to launch malicious
software such as Trojans.
5.6.4.1 Disabling the Autoplay function using group policy in Windows 7 and Windows Server
2008 R2
Procedure
To disable the Autoplay function, follow these steps:
1. Click "Start" and enter the string "gpedit.msc" in the "Search" box.
This action requires administrator rights. For this reason, log in as administrator or start
the group policy editor as administrator. Enter the administrator password, if required.
The group policy editor opens.
3. Select the folder "Computer Configuration > Administrative Templates > Windows
Components > Autoplay Policies".
The associated policies for the folder are displayed in the right pane of the editor.
6. In the "Turn off Autoplay on:" area select the "All drives" option from the drop-down list.
5.6.4.2 Disabling all Autorun functions using group policy in Windows 7 and Windows Server
2008 R2
Procedure
To disable the Autorun feature, follow these steps:
1. Click "Start" and enter the string "gpedit.msc" in the "Search" box.
This action requires administrator rights. For this reason, log in as administrator or start
the group policy editor as administrator. Enter the administrator password, if required.
The group policy editor opens.
3. Select the folder "Computer Configuration > Administrative Templates > Windows
Components > Autoplay Policies".
The associated policies for the folder are displayed in the right pane of the editor.
6. From the drop-down list in the "Default Autorun Behavior" area, select the "Do not
execute any autorun commands" option.
5.7 Whitelisting
Introduction
The approach of whitelisting is that only applications deemed as trustworthy are allowed to
run on the computer system. These applications are maintained in a positive list (whitelist).
Since whitelisting is based on a positive list, there is no need for continuous updates to
combat new malware threats.
Additional information
The whitelist solution from McAfee Application Control has been approved for different
SIMATIC PCS 7 versions. You can find details about the compatibility with SIMATIC PCS 7
under Hotspot-Text (http://support.automation.siemens.com/WW/view/en/64847781).
You can find a description of the recommended procedure with McAfee Application Control
under Hotspot-Text (http://support.automation.siemens.com/WW/view/en/88653385).
In addition to the system hardening options described above, there are options that relate to
topics such as device hardening (of network devices and automation systems). They are part
of the industrial security services. You can find additional information and the corresponding
contacts at Hotspot-Text (http://www.industry.siemens.com/topics/global/en/industrial-
security/Pages/default.aspx).
You can also send your query directly via e-mail to "[email protected]".
IP access protection
The Industrial Ethernet CPs (CP 443-1) let you configure IP access protection by means of
ACL. Depending on the CP type, access can be configured for the following options:
● Web server
● FTP server
● Access protection for IP communication
This options lets you restrict access to the local S7 station to partners with specific IP
addresses. This means unauthorized partners do not have access to the S7 station.
You can find additional information on Security for SIMATIC NET in the "Industrial Ethernet
Security - Setting up security"
(http://support.automation.siemens.com/WW/view/en/60166939) manual.
Note
A fault-tolerant DHCP is only possible with a DHCP server based on Windows Server
2008 R2 (or later).
● The following requirements apply for a certificate server based on Active Directory
services:
– Secure Web services with encrypted communication via Secure Socket Layer (SSL)
– Signatures for applications and documents
– Authentication
– Certificate-based IP security communication and tunneling protocols such as the
Layer Two Tunneling Protocol (L2TP).
Implementation
An automation system features stations/computers that must be permanently operational
and are used by several persons. An example is the operator control and monitoring device
(OS client). This station is permanently used by different operators for process control.
Using "non-personalized" device-specific user accounts for the user accounts of these
permanently used operator control and monitoring devices is recommended. Recommended
accounts for this purpose are those that allow establishing a reference to the respective
computer (e.g. OSClient_5). When using "Autologon" for logging onto the operating system,
this account must be used. For an engineering station that is not permanently in operation
but is used by different users/engineers for configuration, person-based user accounts are
recommended for each user/engineer.
Note
Membership in the Administrators group is only relevant for the installation of PCS 7 and the
configuration of the computer.
SIMATIC WinCC
During the installation of SIMATIC WinCC, the following three new user groups are created
for project shares and project file accesses:
● SIMATIC HMI
The members of this group may create, edit, start and remotely access local projects. By
default, the user who is carrying out the installation and the local administrator are
automatically added to this group. Additional users must be added manually by an
administrator of this group.
● SIMATIC HMI CS
The members of this group may only perform configurations; they may not make direct
changes to the runtime components. This group is empty by default and is reserved for
later use.
● SIMATIC HMI VIEWER
The members of this group may access configuration and runtime data only in read-only
mode. This group is primarily used for the accounts of Web publishing services, e.g. IIS
(Internet Information Services) for operating the WinCC Web navigator.
The first time a project is opened, a project share is automatically created and assigned the
required share permissions and security settings. The project shares and project file
accesses are managed automatically by the SIMATIC software.
SIMATIC NET
During the installation of SIMATIC NET via the frame setup of SIMATIC PCS 7, the following
local user group is added to the user and group administration:
● SIMATIC NET
All users working with PCS 7, PCS 7 OS or Route Control projects must be members of
this group.
SIMATIC BATCH
For SIMATIC BATCH, the following new user group is created during the installation:
● SIMATIC BATCH
The members of this group have full access to the SIMATIC BATCH directories "sbdata"
and "sbdata_backup". All user accounts working with SIMATIC BATCH must be a
member of this group.
The following shares are created:
● BATCH
The administration of share permissions occurs during installation. Add the "SIMATIC
BATCH" user group with full access permission in the security settings for shares (NTFS
permissions). The batch files are later created in these shares.
Example configuration
The following figure shows the example configuration:
For the example configuration, the following users are created according to the above-
mentioned recommendations in this section:
User Description
ENG1 PCS 7 Engineer 1
• Works on the engineering station (ES) with the SIMATIC Manager, HW Config, NetPro, CFC,
SFC and WinCC
• Loads the automation systems and the OS server from the ES
• Also performs operations on the OS clients
ENG2 PCS 7 Engineer 2
In addition to ENG1, this user is the administrator of the system
OSC1 Local Windows user who is generally permanently logged on OS client "OSC1" (device-specific,
"non-personalized").
Logon to the operating system performed using Windows Autologon.
OSC2 Local Windows user who is generally permanently logged on OS client "OSC2" (device-specific,
"non-personalized").
Logon to the operating system performed using Windows Autologon.
OSC3 Local Windows user who is generally permanently logged on OS client "OSC3" (device-specific,
"non-personalized").
Logon to the operating system performed using Windows Autologon.
OSC4 Local Windows user who is generally permanently logged on OS client "OSC4" (device-specific,
"non-personalized").
Logon to the operating system performed using Windows Autologon.
OSS1A Local Windows user who is generally permanently logged on OS server "OSS1A" (device-
specific, "non-personalized").
Logon to the operating system performed using Windows Autologon.
OSS1B Local Windows user who is generally permanently logged on OS server "OSS1B" (device-
specific, "non-personalized").
Logon to the operating system performed using Windows Autologon.
OSS2 Local Windows user who is generally permanently logged on OS server "OSS2" (device-specific,
"non-personalized").
Logon to the operating system performed using Windows Autologon.
OSS3A Local Windows user who is generally permanently logged on OS server "OSS3A" (device-
specific, "non-personalized").
Logon to the operating system performed using Windows Autologon.
OSS3B Local Windows user who is generally permanently logged on OS server "OSS3B" (device-
specific, "non-personalized").
Logon to the operating system performed using Windows Autologon.
The following table shows to which different user groups the above users must be assigned:
Computer/ ES1 OSC1 OSC2 OSC3 OSC4 OSS1A OSS1B OSS2 OSS3A OSS3B
Local group
Administrators ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2
User ENG1 OSC1 OSC2 OSC3 OSC4 OSS1A OSS1B OSS2 OSS3A OSS3B
ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1
SIMATIC HMI ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1 ENG1
ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2 ENG2
OSC1 OSC2 OSC3 OSC4 OSS1A OSS1B OSS2 OSS3A OSS3B
OSS1A OSS1A OSS1A OSS1A OSS1B OSS1A OSC1 OSS3B OSS3A
OSS1B OSS1B OSS1B OSS1B OSC1 OSC1 OSC2 OSC1 OSC1
OSS2 OSS2 OSS2 OSS2 OSC2 OSC2 OSC3 OSC2 OSC2
OSS3A OSS3A OSS3A OSS3A OSC3 OSC3 OSC4 OSC3 OSC3
OSS3B OSS3B OSS3B OSS3B OSC4 OSC4 OSC4 OSC4
SIMATIC BATCH1) ENG1 OSC1 OSC1 OSC3 OSC4 OSS1A OSS1B OSS2 OSS3A1 OSS3B1
ENG2 ) )
The following figure shows an example of the local management of users and groups on the
server "OSS1A":
Additional information
You can find additional information about computer and user management in the document
"SIMATIC Process Control System PCS 7 Security Concept PCS 7 & WinCC (Basic)"
(http://support.automation.siemens.com/WW/view/en/60119725).
You can also find information on this in the manual "SIMATIC Process Control System PCS
7 PC Configuration" (http://support.automation.siemens.com/WW/view/en/90635791).
You can find addition information on user rights for SIMATIC Route Control, especially
regarding the assignment of users to the user groups RC_OPERATOR_L1/L"/L3, in the
programming and operating manual "SIMATIC Process Control System PCS 7 SIMATIC
Route Control" (http://support.automation.siemens.com/WW/view/en/90682959).
Introduction
Source: https://www.bsi.bund.de
Poorly chosen passwords are still one of the most common deficiencies for security. Often,
the user chooses character combinations that are too short or too simple.
To find passwords, for example, hackers use so-called brute-force attacks that automatically
try a variety of possible character combinations or test entire dictionaries. To prevent such
attacks, a password should meet certain quality requirements.
This is why care should be taken in defining and implementing a password policy in the
automation plant. Such a password policy should take the following points into consideration:
● Password aging
Passwords should to be changed at regular intervals (every 6 months at the latest).
● Minimum complexity
A password should have a minimum complexity, which means it should meet the
following requirements:
– Minimum length of 8 characters
– Contain at least 2 alphanumeric characters and at least 1 number, possibly a special
character
● Password history
A new password must differ significantly from the previous (old) password (by at least 3
characters).
Procedure
The following procedure is described using the example of the "Windows 7" operating
system.
To implement the password policies, follow these steps:
1. Open the Windows Start menu and type "secpol.msc" in the search box.
The "secpol.msc" application is displayed in the results.
2. Click on the "secpol.msc" application in the results.
Enter the administrator password, if required. If you are already logged on as an
administrator, confirm the execution of the application.
The "Local Security Policy" dialog opens.
3. Select "Account Policies> Password Policy" in the left navigation pane of the "Local
Security Policy" dialog.
The password rules are displayed.
Policy Purpose
Enforce password history Prevents users from creating a new password that is the same as their current password
or one recently used. The value "1", for example, means that only the last password is
prevented as a new password. The value "5", for example, means that only the last five
passwords are prevented as a new password.
Maximum password age Specifies the maximum lifetime of passwords in days. After this number of days has
expired, the user must change the password.
Minimum password age Specifies after how many days a user can change their password at the earliest.
Minimum password length Specifies the minimum number of characters that make up a password.
Password must meet complexi- Requires that a password meets the following minimum requirements:
ty requirements
• At least 6 characters.
• It must consist of uppercase and lowercase letters, numbers and special characters.
• It may not contain the user name.
Introduction
For reasons of availability, it is recommended that a domain controller be configured
redundantly.
Furthermore, a redundant domain controller pair should be implemented in each subnet or in
every security cell.
The example configuration with thus contain the following change:
A redundant pair of domain controllers is implemented in each of the security cells DCS1,
DCS2, MES and perimeter.
Preparations
A computer with one of the following operating systems can be used as a domain controller:
● Windows Server 2008 R2 SP1 Standard Edition)
● Windows Server 2012 (Standard Edition)
The use of a PCS 7 computer (for example, the PCS 7 OS server, PCS 7 ES station, etc.)
is not permitted.
The installation/configuration of a computer as a domain controller is divided into the
following steps:
1. Network configuration
Configuration of the host name and network (IP address).
2. Installing/configuration of Active Directory Domain Services
3. Installation/configuration of the DNS server
4. Configuration of user and user groups
When a bundle is used as the hardware, the A1 Image (Restore DVD) of a server bundle
must be used for the operating system installation.
Procedure
The following points must be observed:
● The installation of the domain controller should be performed at the beginning of the
overall setup of PCS 7.
● The installation should be performed with the actual settings (in regard to host name, IP
address, subnet mask, etc.).
● The entire installation and configuration of the domain should be performed before the
first PCS 7 computer is entered in the domain.
● The first computer should only be entered 24 hours after installation and configuration of
the domain, to allow all domain controllers to fully synchronize. The event logs should be
checked prior to entering the first PCS 7 computer in the new domain. If problems are
detected, the errors should be resolved beforehand.
Static IP address
The domain controllers are given a static (fixed) IP address. Follow the procedure described
in the section Example configuration: Setting of IP addresses and subnet mask (Page 24).
In the dialog in which the IP address and subnet mask are set, the IP address of the
"Preferred DNS
Servers" must be set. Enter the same IP address that you set as a static IP address for the
domain controller.
The following table summarizes the addresses for both domain controllers for the DCS1
security cell:
Note
The procedure described uses Windows Server 2008 R2 the operating system as an
example. You can find information about Windows Server 2012 under
https://technet.microsoft.com/de-de/library/hh831809.aspx (https://technet.microsoft.com/en-
us/library/hh831809.aspx).
4. In the "Select Server Roles" dialog, select the "Active Directory Domain Services" option
and click "Next".
5. Use the "Next" button to navigate through other settings of the wizard. No special settings
have to be made for PCS 7. The default settings can be used.
6. Click "Install" to install the role.
2. Select the "Use advanced mode installation" option and click "Next".
3. Select the "Create a new domain in a new forest" option and click "Next".
4. In the "FQDN of the forest root domain:" text box, enter the fully qualified domain name
(FQDN) (for example, production1.enterprise.local.) and click "Next".
The entry is checked for plausibility. In some cases, the wizard may suggest a new
domain NetBIOS name. You can use or modify it if necessary. Then click "Next".
5. Select your operating system from the drop-down list in the "Set Forest Functional Level"
dialog.
This makes it possible for stations (computers) with older operating systems to logon to
the domain. You can find additional information on this in the PCS 7 Readme
(http://support.automation.siemens.com/WW/view/en/101094704).
Note
The functional levels can be subsequently adapted or incremented in Active Directory.
You can find information on this at http://support.microsoft.com/kb/322692
(http://support.microsoft.com/kb/322692).
6. Click "Next".
The "Additional Domain Controller Options" dialog opens.
7. Select the "DNS server" option to install the DNS server and click "Next".
8. Use the "Next" button to navigate through other settings of the wizard. No special settings
have to be made for PCS 7. The default settings can be used.
9. In the "Directory Services Restore Mode Administrator Password" dialog, set the
password for the administrator (DSRM) when the domain controller is started in Directory
Services Restore Mode.
10.Use the "Next" button to navigate through other settings of the wizard. No special settings
have to be made for PCS 7. The default settings can be used. The installation is then
initiated.
The Domain Name System (DNS) enables the name resolution to work correctly.
See section Name resolution (Page 27) for more on this.
It is therefore important that both the Forward Lookup Zone and the Reverse Lookup Zone
be configured correctly.
The Forward Lookup Zone resolves the host name in an IP address and the Reverse Lookup
Zone resolves an IP address in a host name.
3. Right-click on the Forward Lookup Zone that you created by entering FQDN when you
installed the DNS server (in this example: production1.enterprise.local) and select the
"Properties" command in the shortcut menu.
4. Select the "Secure only" option under the menu command "Dynamic updates" in the
"General" tab.
The updates that do not conform to the Microsoft standard are classified as non-secure
updates. This can sometimes happen during internal domain updates (for example,
internal software, profile updates, etc.). That is why this option should be selected.
5. Click "OK".
4. Click "Next".
5. In the "Zone Type" dialog, select the "Primary zone" option and configure your entry with
"Next".
6. In the "Reverse Lookup Zone Name" dialog, select the "Network ID" option and enter an
appropriate IP address (192.168.2 in this example). Click "Next".
7. Select the "Allow both nonsecure and secure dynamic updates" option (see Forward
Lookup Zone) in the "Dynamic Update" dialog and confirm the entry with the "Next"
button.
The new Reverse Lookup Zone is displayed in the Server Manager.
The response to the "nslookup" command indicates that the server is attempting to
resolve the DNS name via the TCP/IPv6 protocol.
2. To change the DNS name resolution to the TCP/IPv4 protocol, open the properties of the
Internet Protocol Version 6 (TCP/IPv6). In this
properties dialog, select the "Obtain DNS server address automatically" option and
confirm your entry with "OK".
When the address (127.0.0.1 = localhost) appears, you can see that the DNS name
resolution is now using the TCP/IPv4 protocol.
When you enter the IP address of the primary domain controller (192.168.2.125), the host
name (svw2k8r2stdba7.production1.enterprise.local) and the IP address
appear.
If you enter the host name, the host name and IP address also appear.
3. In the "Select Features" dialog, select the "WINS Server" feature and click "Next".
2. Select the "Internet Protocol Version 4 (TCP/IPv4)" from the list and click the "Properties"
button.
3. In the Properties dialog, click "Advanced…" to open the advanced TCP/IP settings.
4. In the "Advanced TCP/IP Settings" dialog, select the "WINS" tab.
5. Click "Add...".
6. Add the IP address of the installed WINS server and close the properties dialog with
"OK".
Name release packages are sent to WINS and the update is started.
2. Open the WINS Management console with "Start > Administrative Tools > WINS".
3. In the left pane, right-click "Active Registrations" and select the menu item "Display
Records …" from the shortcut menu.
4. Select the check box "Filter records matching this Name pattern:" .
5. Enter the computer name of the server (the first characters, here "SVW") and click "Find
Now".
The search result is displayed in the WINS Management console.
5. Select the added WINS replication partner in the right pane, and select "Properties" from
the shortcut menu.
6. Adapt the properties of the WINS replication partner according to your replication plan.
Note
Keep in mind that you have to make this setting in each of the replication partners.
2. Select the "Internet Protocol Version 4 (TCP/IPv4)" from the list and click the "Properties"
button.
3. In the Properties dialog, click "Advanced…" to open the advanced TCP/IP settings.
Introduction
FSMO is an acronym for Flexible Single Master Operations. While you can use any number
of domain controllers which can largely operate redundantly independent of one another,
each forest contains five operations master roles. Although these roles can be assign to
individual domain controllers, each can only exist once as a role.
The forest contains five master roles and the global catalog:
1. Schema master
Works within the forest and monitors or configures the schema of the Active Directory (for
example, user, computer, or resources, as well as the attributes that can be assigned to
individual objects).
2. Domain Naming Master
Works within the forest and monitors and controls the addition or removal of domains in
the forest.
3. RID master
Works within a domain and assigns unique IDs or SIDs to objects within an Active
Directory.
4. Infrastructure master
Works within a domain and manages the object references of its domain and compares
them to other domains. It updates the global catalogs of other domain controllers.
5. PDC emulator
Works within a domain and emulates a domain controller (DC1) to ensure the downlevel
ability (for old Windows versions). It is also the domain master browser and handles
password changes.
6. Global Catalog
The global catalog is a copy of all Active Directory objects from its own and parts of the
Active Directory information from other domains.
NOTICE
Global catalog and infrastructure master
The global catalog cannot be performed with the "Infrastructure master" role on a
domain controller because this service can be disabled and thus cause serious
replication errors (exception: All domain controllers of a given domain contain the global
catalog).
This malfunction is indicated by error messages 1419 in the event log.
It is recommended that the five master roles be assigned to the two domain controllers (DC1
and DC2) as follows:
DC1 DC2
Schema master Infrastructure master
Domain Naming Master RID master
PDC emulator
Global catalog
Note
The server role assignment (operations master) can be displayed using the command
"netdom query fsmo".
4. Select "Active Directory Schema" snap-in from the left wind and click the "Add>" button.
Confirm the entry with "OK".
The "Active Directory Schema" snap-in is integrated into the Management Console.
5. Right-click on the "Active Directory Schema" item in the Management Console and select
the "Change Active Directory Domain Controller" command from the shortcut menu.
6. In the "Change Directory Server" dialog, select the "This Domain Controller or AD LDS
instance" option and the corresponding domain controller from the list. Confirm the entry
with "OK".
7. Right-click on the "Active Directory Schema" item in the Management Console and select
the "Operations Master" command from the shortcut menu.
8. Click on the "Change" button in the "Change Schema Master" dialog. Confirm the transfer
of the role to the other domain controller with "OK".
9. Close the transfer the of the schema master role using the "Close" button.
3. In the "Change Directory Server" dialog, select the domain controller to which the role is
to be transferred and click "OK".
4. Right-click on the "Active Directory Domains and Trusts" item in the Management
Console and select the "Operations Master" command.
5. The remaining procedure is similar to the "Schema Master Role".
Note
Server roles can also be transferred using the "NTDSUTIL" command.
5. In the "Change Directory Server" dialog, select the domain controller to which the role is
to be transferred and click "OK".
6. Right-click on the "Active Directory Users and Computers" item Management Console
and select the "All Tasks" command from the shortcut menu and then the "Operations
Master" command.
The "Operations Masters" dialog contains a tab for the infrastructure master, RID master and
PDC emulator roles; here you can switch the domain controller by clicking "Change ...".
Note
Server roles can also be transferred using the "NTDSUTIL" command.
Global catalog
1. Open the Microsoft Management Console.
2. Click "File > Add/Remove Snap-in ..." to open the "Active Directory Users and
Computers" snap-in.
3. Select the "Domain Controllers" folder in the tree view. Right-click on the domain
controller in the global catalog and select the "Property" command from the shortcut
menu.
4. Click on the "NTDS Settings" button in the "General" tab of the properties dialog.
Introduction
We recommend that you protect your projects and libraries against unwelcome access and
that you log all access actions. This functionality requires that SIMATIC Logon is installed.
The SIMATIC Logon software defines user roles for the engineering system and their
assignment to the defined Windows users/groups.
These access-protected projects and libraries can then only be opened and edited by
Windows users with one of the following user roles:
● Project administrator
● Project editor
● Any user who authenticates himself/herself using the project password
The user with the "Project administrator" role defines the users for the "Project editor" roles
and the project password. He/she is entitled to activate and deactivate access protection.
The project administrator can assign Windows users to one of the two user roles.
The following figure shows the SIMATIC Logon Editor for role management:
To enable access protection for projects/libraries and to change the password, follow these
steps:
1. Select the project/library in the SIMATIC Manager.
2. Select the menu command "Options > Access Protection > Enable".
3. Enter the password and confirm it in the "Activate Access Protection" dialog.
4. Click on "OK".
The selected project/library is now protected by a password and can only be opened for
editing by authorized users.
To disable the access protection for projects/libraries, follow these steps:
1. Select the project/library in the SIMATIC Manager.
2. Select the menu command "Options > Access Protection > Disable".
3. Enter the password and confirm it in the "Deactivate Access Protection" dialog.
4. Click "OK".
The selected project or library is no longer protected by a password and can be opened
by any user for editing.
Additional information
You can find additional information on this in the configuration manual "SIMATIC Process
Control System PCS 7 Engineering System
(http://support.automation.siemens.com/WW/view/en/90663380)".
Introduction
The change log documents the user, time, CPU, changes made, and the reason for the
changes.
Requirement
The following requirements must be met:
● The SIMATIC Logon Service is installed.
● The access protection is activated.
Procedure
To activate the change log for a folder in the SIMATIC Manager, follow these steps:
1. In the component view of the SIMATIC Manager, select the folder for which you want to
activate the change log.
2. Select the menu command "Options > Change log > Enable".
The change log for the selected folder is enabled.
The following is documented in the change log:
● Enabling/disabling/configuration of access protection and change log
● Opening/closing projects and libraries
● Downloading to the target system (system data)
● Selected operations for downloading and copying blocks
● Activities for changing the operating state
● CPU memory reset
Introduction
The ES log documents the user, time, CPU, changes made, and the reason for the changes.
If you activate the "ES log active" option, the actions for downloading and the current time
stamps are logged in addition to the protected actions in CFC/SFC (objects of the chart
folder).
Requirement
The following requirements must be met:
● The SIMATIC Logon Service is installed.
● The change log is activated.
Procedure
To activate the ES log, follow these steps:
1. In the component view of the SIMATIC Manager, select the chart folder for which you
want to activate the ES log.
2. Select the menu command "Edit > Object Properties".
The "Chart Folder Properties" dialog box opens.
3. Switch to the "Advanced" tab.
4. Select the "ES log active" option.
5. Click "OK".
Protection level 1
Depending on the CPU, this protection level can have different names.
For standard CPUs, protection level 1 is called "No protection". A password entry is not
possible. Password protection can be set up with protection level 2 (CPU configuration via
HW Config).
For F-CPUs or H-CPUs, protection level 1 is called "Access protection for F-CPU or Key
switch position". By default, no security program can be loaded. Only after assigning a
password and with the option "CPU contains security program" is it possible to load security
modules in the CPU.
Note
Protection against unauthorized access
The use of protection level 3, "Write/read protection", to protect against unauthorized access
to the automation system (CPU) is recommended.
Additional information
You can find additional information on the security level concept in the manual "SIMATIC
Process Control System PCS 7 Engineering System"
(http://support.automation.siemens.com/WW/view/en/90663380).
WSUS server
In accordance with the rules for dividing the components into security cells, the WSUS
server must be singled out in a separate network (Perimeter network / DMZ). All solutions
relating to securing access points to the security cells, such as front-end/back-end firewall or
triple-homed firewall, can be used for the patch management or the WSUS server. The
WSUS must be configured in the Perimeter network using the Industrial Wizard for
configuring the access rules for the back-end firewall or the triple-homed firewall.
Update source
For the WSUS server, either an existing WSUS in a higher-level external network, such as
the plant network or corporate network, or Microsoft Update on the Internet can be
configured for synchronization. The decision not only affects the configuration of the firewall
(frontend firewall or triple-homed firewall), but also the configuration of the WSUS server.
The corresponding update source must be configured in the WSUS configuration:
7.2.1 Recommended procedure for patch management using the Microsoft Windows
Server Update Service (WSUS)
Requirement
A WSUS is set up for your PCS 7 plant.
Configuring WSUS
To configure the WSUS, follow these steps:
1. Open the WSUS Administration Console and click "Options".
2. Under "Products and Classifications", select all Microsoft products relevant to the plant in
the "Products" tab.
Note
You can find information about the permitted Microsoft patches in the following FAQ:
Which Microsoft Security Patches ("Security Patches" and "Critical Patches") have been
tested for compatibility with SIMATIC PCS 7?
(http://support.automation.siemens.com/WW/view/en/18490004)
3. Select the "Critical Patches" and "Security Patches" under "Products and Classifications"
in the "Classifications" tab.
Note
When using an Industrial Automation Firewall 200/1000 or Microsoft Forefront Threat
Management Gateway (TMG) the "Definition updates" must also be selected under
"Products and Classifications".
4. Create project-specific groups for the distribution of updates in the plant according to the
redundancy concept, and assign the individual computer systems to these computer
groups.
For example, the OS servers "OSS1A", "OSS2" and "OSS3A" and the OS clients "OSC1"
and "OSC3" can be assigned to computer group "PCS 7 Group 1" and the OS servers
"OSS1B" and "OSS3B" and the OS client "OSC2" can be assigned to computer group
"PCS 7 Group 2".
In order to assign the computers directly to the correct computer groups, the following
option must be selected, regardless of whether the administration is performed using
Windows workgroups or domains.
WSUS administration
1. Select all available updates in the "Critical Patches" and "Security Patches" categories
and release them for installation in the created groups.
2. Use an administrative account to log on to the clients connected with the WSUS (the
clients have been configured accordingly to receive the updates from the WSUS).
3. Run the updates offered.
● "No auto-restart with logged on users for scheduled automatic update installations" policy
This group policy must be enabled.
The following firewall rules are required for access of the WSUS server in the Perimeter
network to the external network for downloading the security and critical updates via the
front-end firewall or triple-homed firewall:
● Access rules for firewall rule for updating via the Microsoft pages
Note
You can find the complete range of products for automation firewalls in the PCS 7 Add-on
catalog. You can download this catalog from the SIMATIC PCS 7 website
(https://www.automation.siemens.com/mcms/process-control-systems/en/distributed-control-
system-simatic-pcs-7/Pages/).
Note
This guideline is valid only as of PCS 7 V6.1 SP1
The procedure described above does not apply to new Microsoft Service Packs, the use of
which is still subject to an explicit release. If the updates require a later version of the
Microsoft software, read the PCS 7 Readme
(http://support.automation.siemens.com/WW/view/en/101094704)or the usecompatibility tool
(http://support.automation.siemens.com/WW/view/en/64847781) to ensure that these later
software versions or service packs have been approved for SIMATIC PCS 7.
Introduction
This section focuses on protecting the automation system or the computers of the
automation system against malicious software. Malicious software and malicious programs
(malware) refers to computer programs that were developed to execute undesirable and
possible damaging functions. The following types are differentiated:
● Computer viruses
● Computer worm
● Trojan horse
● Other potentially dangerous programs, for example:
– Backdoor
– Spyware
– Adware
– Scareware
– Grayware
A virus scanner or antivirus program is a software that detects, blocks and, if necessary,
removes malware.
The use of a virus scanner on the computers of an automation plant must not interfere with
the process mode of a plant. The following two examples illustrate the problems that arise in
automation through the use of virus scanners:
● Even when infected with malware, a computer may not be switched off by a virus scanner
if this would lead to a loss of control of the production system (e.g. for an OS server).
● A project file "infected" by malware (e.g. a database archive) may not be automatically
moved to quarantine, blocked or deleted.
The following virus scanner architecture is recommended for implementing this requirement:
The virus scanner server is a computer which centrally manages virus scan clients, loads
virus signature files (virus patterns) over the Internet from the virus scanner vendor and
distributes them to the virus scanner clients. The virus scanner client is a computer that is
checked for malware and managed by the virus scanner server. This means the PCS 7 OS
server and OS clients as well as batch servers and batch clients are also virus scanner
clients just like engineering stations or even maintenance servers.
In accordance with the rules for dividing the components into security cells, the virus scanner
server must be singled out in a separate network (Perimeter network / DMZ). For the virus
scanner server, all solutions relating to securing access points to the security cells, such as
front-end/back-end firewall or triple-homed firewall, can be used. The virus scanner server
must be configured in the Perimeter network using the Industrial Wizard to configure the rule
set for the back-end firewall or the triple-homed firewall.
Update source
For the virus scanner server, either an existing virus scanner server in a higher-level external
network, such as the plant network or corporate network, or the URL of the virus scanner
server vendor on the Internet can be configured for synchronization. The decision not only
affects the configuration of the firewall (front-end firewall or triple-homed firewall), but also
the configuration of the virus scanner server.
Firewall rules
For the virus scanner server in the Perimeter network to access the virus scanner clients in
the PCN via the back-end firewall or triple-homed firewall, the following firewall rules apply.
● Example of firewall rules between a virus scan server and a virus scan client:
For the virus scan server in the Perimeter network to access the external network for
downloading the virus signature files via the front-end firewall or triple-homed firewall, the
following firewall rules are required:
● Example of firewall rules for updating the virus signature files via URL from the provider
● Example of firewall rule for updating the virus signature files from a higher-level virus
scan server
Note
You can find the complete range of products for automation firewalls in the PCS 7 Add-on
catalog. You can download this catalog from the SIMATIC PCS 7 website
(https://www.automation.siemens.com/mcms/process-control-systems/en/simatic-pcs-
7/Pages/simatic-pcs-7.aspx).
Additional information
You can find information about the topic "Protection against malware using virus scanners"
in the following documents:
● Manual "SIMATIC Process Control System PCS 7 Managing virus scanners
(http://support.automation.siemens.com/WW/view/en/38625951)"
● FAQ "With what are SIMATIC PCS 7 V8.x, V7.x, V 6.x, V5.x and V4.x compatible?
(http://support.automation.siemens.com/WW/view/en/64847781)"
In the Industry Online Portal, you can also find configuration descriptions for the various virus
scanners:
● McAfee VirusScan Enterprise 8.8 Configuration
(http://support.automation.siemens.com/WW/view/en/66475606)
● Configuration Trend Micro OfficeScan 11.0
(http://support.automation.siemens.com/WW/view/en/103630611)
● Configuration Symantec Endpoint Protection 12.1
(http://support.automation.siemens.com/WW/view/en/71874887)
Introduction
No general procedure can be recommended in the event of a virus infection. If such an
infection occurs, the procedure for removing or cleaning the affected components must be
planned individually.
In principle, a complete re-installation (operating system and application software) of the
infected components is recommended. An existing, up-to-date hard disk image (system
backup) can also be used for this purpose.
Before loading an image, you should first check whether the storage location of the image is
not infected as well. An image of an infected storage location should not be used because it
cannot be excluded that the image has also been manipulated.
The following points affect the cleaning procedure and should be included in the
considerations and planning:
● Status of the plant documentation (including the network topology, addresses, accounts,
etc.)
● Cleaning during ongoing operation or during a shutdown phase
● Continuous or batch process
● Redundancy concept
● Type of malware
● Number of infected computers
● Infection route
Procedure
Note
Note that the procedure described here is an example list of possible steps that may be
performed for cleaning a plant. This list does not claim to be complete. Each of the steps
listed must be planned in detail and implemented accordingly.
The procedure after a viral infection may include the following steps:
● Setup/installation/implementation of the required additional infrastructure for the cleaning,
for example:
– A separate quarantine network
– A secure file server with up-to-date virus scanner (perhaps different antivirus
solutions) for distributing data
– Internet access via separate workstation with up-to-date virus scanner (perhaps
different antivirus solutions)
● Listing of all network nodes and their tasks
Backup of all the current data (engineering data, archives, backups, etc.) for each node.
● Import, scan, clean and archive the current data for each network node on the file server
● Planning the required redundancies (when cleaning during ongoing operation)
● Identify standby components; create a memory dump; analyze and examine the memory
dump with the purpose of identifying the malware as well as its spreading mechanism
● Reinstall the component either from the system backup (if available and not harmful with
respect to infection) or via original data medium (operating system recovery CD and
automation components)
● Recommission the cleaned, reinstalled components in the quarantine network as the new
master
● Transfer "clean" data (engineering data, archives, backups, etc.) from the file server to
the cleaned, reinstalled component in the quarantine network
● Verify and adapt the security design of the plant
● Verify and adapt the security design in the "Quarantine" network
● Step-by-step "rebuilding" of the plant in the "Quarantine" network with cleaned, reinstalled
components
● Expand the "Quarantine" network to the new automation network with the adapted
measures of the security concept
● Step-by-step implementation of the measures from the security design in the
"Quarantine" network
Additional information
Support for implementing a virus protection in form of virus scanners in your plant is
available from the Industrial Security Services. You can find additional information and the
corresponding contacts at http://www.industry.siemens.com/topics/global/en/industrial-
security/pages/default.aspx (http://www.industry.siemens.com/topics/global/en/industrial-
security/Pages/default.aspx).
You can also send your query directly via e-mail to "[email protected]".
Project backup
The project backup includes the entire project data. This means all data that belongs to a
SIMATIC PCS 7 project. These data and the PCS 7 project (multi-project including all
individual projects it contains) can be archived using the SIMATIC Manager. Depending on
the default archiving program, this process creates a ZIP archive containing all the
configuration data.
Note
The steps for creating a project backup and the procedure in the SIMATIC Manager is
available in the manual "SIMATIC Process Control System PCS 7 Compendium Part A -
Configuration Guidelines".
System backup
The system backup contains all system data for a specific system component, for example,
an OS server, an OS client or an engineering station. These system data include:
● The operating system, which means all data of the operating system (Windows 7,
Windows Server 2008 R2)
● All installed programs, for example SIMATIC Manager and WinCC
● All required device-specific drivers, for example, for graphics, network
All these data are usually located on the system partition (C: \). A system backup therefore
involves backing up the entire system partition (C: \).
Project backup
The project backup contains the configuration data and for this reason becomes outdated if a
configuration change has been made. The cycle to create a project backup therefore
depends on the frequency of changes and should be set accordingly.
System backup
The system backup contains the system data of a system component. These data are
generally only very rarely changed during operation. One possible scenario for a change
would be the installation of an additional program or required driver. However, these are
administrative activities that are not generally performed on a daily basis. For this reason,
the frequency for system backup depends on such administrative interventions in a system
component.
Patch management represents a special situation. If, for example, new software (e.g. a
security update or a major update) is installed on a system component, a new system
backup must be created for this system component.
Note
The product "Symantec System Recovery" has been tested for compatibility with SIMATIC
PCS 7.
9.3 Archiving
Backups, especially project backups should be archived. The requirements for archiving
backups must be determined individually by the operator within the context of the
organizational security (IT Security Management Plan).
Note
You can find information about the topic "Backing up and restoring data" in the following
documents:
• Manual "SIMATIC Process Control System PCS 7; Service Support and Diagnostics"
(http://support.automation.siemens.com/WW/view/en/90682682), section "Data backup"
• Manual "SIMATIC Process Control System PCS 7 Compendium Part D – Operation and
Maintenance" (http://support.automation.siemens.com/WW/view/en/10806846/133300)
• FAQ "How do you create a backup of the OS systems during operation?"
(http://support.automation.siemens.com/WW/view/en/56897157).
Introduction
Optimal proactive, system-specific support for the automation system from remote locations:
This is the idea behind the SIEMENS Remote Services (SRS) platform. Thanks to its
modular design, SIMATIC Remote Services can be optimally adapted to actual
requirements. The available modules not only include those for remote infrastructure, but
support and maintenance are possible as well.
Since the SIMATIC Remote Services are based on the SIEMENS Remote Service (SRS)
platform, plant operators work with a safe, high-performance, and fault-tolerant platform for
remote access to their SIMATIC automation systems.
The platform
The SIMATIC Remote Support Services are based on the Siemens Remote Service
platform. This provides a secure, high-performance, and fault-tolerant remote connection.
● Tiered security and access concept
● Collaboration & Customer Web Portal
● Central monitoring, logging and reporting
● E-mail notification
● Transparent access at any time
● Hard authentication
● Encrypted communication using SSL and VPN
The following figure shows the architecture of the SIEMENS Remote Service platform:
The Siemens Remote Service platform provides a central infrastructure. The systems for
remote maintenance only need to be connected. There are various access solutions
available for this.
Abbreviation/acronym Explanation
AD Active Directory: Directory service of Microsoft Windows Server
CSN Control System Network (plant bus)
DC Domain Controller
DMZ Demilitarized Zone
DNS Domain Name System
DSRM Directory Services Restore Mode
ECN Enterprise Control Network
ERP Enterprise Resource Planning
ES PCS 7 Engineering Station
FMSO Flexible Single Master Operations
IANA Internet Assigned Numbers Authority
MES Manufacturing Execution System
MON Manufacturing Operations Network
MS Microsoft
OS Client PCS 7 Operator Station; client design
OS server PCS 7 Operator Station; server design
PDC Primary Domain Controller
PCN Process Control Network (terminal bus)
PCN1 Production cell 1
PCN2 Production cell 2
PCS 7 Process Control System from SIEMENS AG
PN Perimeter Network
RID Relative ID
SC Security Controller
SCT Security Configuration Tool
SSC SIMATIC Security Control
TMG Microsoft Forefront Threat Management Gateway
WINS Windows Internet Naming Service
WSUS Windows Server Update Services