Factorytalk Policy Manager Results Guide
Factorytalk Policy Manager Results Guide
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property damage, or economic loss.
Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT Identifies information that is critical for successful application and understanding of the product.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may reach dangerous
temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential Arc Flash. Arc Flash
will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory requirements for safe work practices and
for Personal Protective Equipment (PPE).
Rockwell Automation recognizes that some of the terms that are currently used in our industry and in this publication are not in
alignment with the movement toward inclusive language in technology. We are proactively collaborating with industry peers to
find alternatives to such terms and making changes to our products and content. Please excuse the use of such terms in our
content while we implement these changes.
Chapter 1
Getting started FactoryTalk Policy Manager ....................................................................... 11
FactoryTalk System Services ................................................................ 11
CIP Security .......................................................................................... 12
Install FactoryTalk System Services and FactoryTalk Policy Manager .. 13
Start FactoryTalk System Services ............................................................ 14
Log on to FactoryTalk Policy Manager...................................................... 14
Read-only mode.................................................................................... 15
Security Groups .................................................................................... 15
Navigate FactoryTalk Policy Manager ...................................................... 17
Context menu ....................................................................................... 17
Filter table data.................................................................................... 20
Multiple row selection in tables .......................................................... 21
Keyboard use ....................................................................................... 22
Policy management capabilities............................................................... 24
CIP Bridging Control .......................................................................... 25
CIP Bridging Control operation .................................................. 25
CIP bridging settings hierarchy .................................................. 26
Automatic Policy Deployment............................................................ 28
Automatic Policy Deployment operation .................................... 28
Automatic Policy Deployment notifications................................ 33
Security Eventing ................................................................................. 37
FactoryTalk Policy Manager Global Settings............................................ 37
FactoryTalk Policy Manager component considerations ....................... 40
FactoryTalk Policy Manager planning ...................................................... 41
Authentication methods ........................................................................... 42
Auditing ...................................................................................................... 43
Chapter 2
Configure a security policy Zones ........................................................................................................... 45
model Add a zone............................................................................................. 45
Edit zone properties............................................................................. 46
Delete a zone........................................................................................ 46
Zone properties ....................................................................................47
Conduits ..................................................................................................... 49
Add a conduit....................................................................................... 50
Chapter 3
Deploy a security policy model Deployment ................................................................................................ 77
Deploy a security model ............................................................................ 77
Deployment options ...................................................................................79
Deployment results ................................................................................... 80
Deployment errors .............................................................................. 80
Deployment warnings ........................................................................ 83
Reload a security model ............................................................................ 84
Chapter 4
Backup and restore Backup and restore security models ........................................................ 85
Backup FactoryTalk System Services ....................................................... 85
Restore FactoryTalk System Services....................................................... 86
About this publication This Getting Results Guide provides information on installing and using
FactoryTalk® System Services and FactoryTalk Policy Manager.
Review this section for information about:
• Intended audience
• Where to find additional information
• Legal notices
Rockwell Automation recognizes that some of the terms that are currently
used in our industry and in this publication are not in alignment with the
movement toward inclusive language in technology. We are proactively
collaborating with industry peers to find alternatives to such terms and
making changes to our products and content. Please excuse the use of such
terms in our content while we implement these changes.
Intended audience This guide is intended for the system administrator and assumes familiarity
with:
• Microsoft® Windows® operating systems
• FactoryTalk Linx
• FactoryTalk Services Platform
• Allen-Bradley® programmable logic controllers (PLCs) and
programmable automation controllers (PACs)
• Rockwell Automation control system development software
Legal Notices Rockwell Automation publishes legal notices, such as privacy policies, license
agreements, trademark disclosures, and other terms and conditions on the
Legal Notices page of the Rockwell Automation website.
Additional information For additional information about security policy, consult the following
resources:
Resource name Description
System Security Design Guidelines Provide guidance in these areas:
• System security
• Networks and communications security
• Control system hardening
• User access management
• Control system monitoring
• Device disposal
Download from the Rockwell Automation Literature Library, System
Security Design Guidelines (publication SECURE-RM001)-
Online help The Help includes overview, procedural, screen, and reference
information for the product. The Help contains these basic components:
• Concepts
• Procedures
• Properties referenced
To view context-sensitive help in FactoryTalk Policy Manager, select the
Help [?] icon.
Getting started
FactoryTalk Policy Manager Use FactoryTalk® Policy Manager to configure, deploy, and view the system
communication security policies.
FactoryTalk Policy Manager divides the system security policy into different
components.
Use these components to design security models that control the permissions
and usage of devices within the system.
• Zones - groups of devices
• Devices - computers, controllers, modules, HMI panels, and drives
• Conduits - communication routes between components
FactoryTalk Policy Manager depends on FactoryTalk System Services for
certificate services, policy deployment, and authentication.
See also
FactoryTalk System Services on page 11
CIP Security on page 12
FactoryTalk System FactoryTalk System Services provide the policy authority, certificate
authority, identity services, and deployment services required to enforce
Services security policies configured using FactoryTalk Policy Manager that are based
on the ODVA™ CIP Security™ standard.
FactoryTalk System Services uses CouchDB for the creation and maintenance
of the policy databases. When FactoryTalk System Services is installed, it will
automatically install CouchDB, add and configure the required administrative
user and controls, and create the policy databases. If CouchDB is already
present on the computer, it will configure the administrative controls as
needed to help ensure system security.
IMPORTANT FactoryTalk System Services is dependent upon database services. Database services
can take up to 2 minutes to start after the computer is restarted. During that time,
FactoryTalk Policy Manager will be unable to connect to FactoryTalk System Services.
See also
CIP Security on page 12
CIP Security CIP Security helps protect an EtherNet/IP connected device from malicious
communications by:
• Applying authentication rules and rejecting messages sent by
untrusted people or untrusted devices
• Verifying that data has not been altered during transmission and
reject data that fails the integrity check
See also
FactoryTalk System Services on page 11
Install FactoryTalk System FactoryTalk System Services and FactoryTalk Policy Manager enable you to
manage CIP Security.
Services and FactoryTalk
IMPORTANT • FactoryTalk Policy Manager is dependent upon FactoryTalk System Services and
Policy Manager both components must be installed together on the network directory server.
• The FactoryTalk Policy Manager installation agent opens these Windows Firewall
ports: UDP 5353 and TCP 40014. To operate correctly, the Automatic Policy
Deployment functionality requires these ports to be open.
See also
Start FactoryTalk System Services on page 14
Start FactoryTalk System After installation, FactoryTalk System Services starts automatically after a
delay of a few minutes. Some situations may require manually starting the
Services services.
See also
Log on to FactoryTalk Policy Manager on page 14
Log on to FactoryTalk Logging on to FactoryTalk Policy Manager checks the credentials of your user
account to determine the access to resources and the ability to make changes
Policy Manager to security policy.
See also
Start FactoryTalk System Services on page 14
Read-only mode Read-only mode prevents modification of the security policy model. Policy
deployment and device replacement can be separated from policy creation,
which is useful if your organization has adopted role-based policy control.
If your account is a member of the Engineer or Maintenance group when you
log in to FactoryTalk Policy Manager a message appears under Login/Logout
on the main toolbar informing you that you are in read-only mode. The title
bar displays "[Read only]" in addition to the application name. In this
situation, the FactoryTalk Policy Manager user interface shows only accessible
functions.
When in read-only mode you can:
• View security policy model; including the configuration of zones,
devices, and conduits.
• View global settings.
• Display the Error pane.
• Display the Results pane.
• Deploy the security policy model.
• Replace a device.
See also
Security Groups on page 15
Security Groups FactoryTalk Services Platform includes these built-in security groups that are
used to define rights and privileges for users.
FactoryTalk Policy Manager users can be granted the following rights:
Right Group Permissions
View Administrator All security policy artifacts and global settings
Engineers are read-only.
Maintenance Login/Logout is active on the main toolbar.
Help is active on the main toolbar.
The controls available in FactoryTalk Policy Manager reflect the user rights
granted to the logged in user account.
Tip: If you are logged on using an Administrator account but FactoryTalk Policy Manager is only
permitting viewing of devices, zones, and conduits, verify that the FactoryTalk Directory services
are running and that the computer is connected to the FactoryTalk Directory.
See also
Read-only mode on page 15
Devices on page 58
Deployment on page 77
Navigate FactoryTalk Policy FactoryTalk Policy Manager displays different configurable items in the
security policy model. The FactoryTalk Policy Manager title bar displays the
Manager status of the model being configured. "Saved" models are local to the
FactoryTalk Policy Manager database. Once the models are deployed, the
status is not shown. If you change a deployed model, the "Saved" status
displays again until the changes are deployed.
See also
FactoryTalk Policy Manager Global Settings on page 37
Context menu Use the context menu to perform operations on the zones list, or on a row in
Zones list
You can open the context menu for each zone on the list.
Command Description
View Properties Opens the properties of the selected zone.
Copy Copies the properties of the selected zone.
Paste Creates a zone with the same properties as the last
copied zone. The new zone has the same name as the
original and adds a number in parentheses.
The conduits and devices do not transfer from the
original zone.
Delete Deletes the selected zone.
Conduits table
Command Description
View Properties Opens the properties pane of the selected conduit.
Copy Copies the properties of the selected conduit.
Paste Creates a conduit with the same properties as the copied
conduit. The new conduit has the same name as the
original and adds a number in parentheses.
To complete the process, select endpoints for the new
conduit.
If one of the endpoints is not compatible with the CIP
Security standard, the CIP Security Communication
properties are not copied.
Delete Deletes the selected conduit.
Device table
Command Description
Device Properties Displays the properties pane of the device
Port Properties Displays the port properties of the selected device.
Cut Removes the device from the selected zone. You can
Paste this device to a different zone.
Copy Copies the properties of the selected device.
Paste • If you used Cut: Pastes the cut device to the selected
zone.
• If you used Copy: Creates a device with the same
properties as the copied device. The new device has
the same name as the original and adds a number in
parentheses.
Go to Zone Opens the device table of the zone that has the selected
device is assigned.
Discovery pane
The commands available in this menu depend on the selected item in the
topology.
Command Description
Add Adds new devices to the selected zone.
Add Anchor Anchors a topology node to the root so that it can be
easily accessed without browsing the topology tree.
Driver Configuration Opens Configure Driver properties window.
View Property Opens a list of all properties of the selected device.
Refresh Refreshes the network topology.
Delete Deletes the item from the topology.
See also
Add a zone on page 45
Add a conduit on page 50
Discovery pane on page 53
Filter table data Use the filter function in tables and lists to search for a particular object or to
display only the objects that fit the chosen criteria.
When using filters, be aware of these functional details:
• Filter text can contain alphanumeric characters and can be full words,
compound expressions, fragments of a word, or a single letter or
number.
• Clear the search text to return to the default view of the table or
window.
• Filter includes predefined search categories.
The filter function examines the text and presents all items that match
the search criteria.
2. (optional) Select a filter category by clicking the filter icon to narrow
the search results to keywords associated with the selected table
column or item parameter.
3. (optional) Use operators between keywords to refine the search results
using a logical statement:
• AND to search for two or more keywords.
• OR to search for several keywords.
Tip: An example of using operators between keywords to refine search results is
Device: 1756-L OR Device: 1768-L
This search locates both ControlLogix and CompactLogix controllers.
4. The table or window displays results within a few seconds, regardless
of pressing Enter.
See also
Perform a search from the Discovery pane on page 55
Multiple row selection in Select multiple rows in a table to perform actions on multiple items.
tables To select a row, select a cell in the first column of a row. This cell is called the
reference cell.
Use these methods to select multiple rows:
Key Description
Ctrl + mouse button Adds the row to the current selection.
Shift + Up arrow key Continues selection upward. If the selection moves over a
previously selected row, it deselects that row.
Shift + Down arrow key Continues selection downward. If the selection moves
over a previously selected row, it deselects that row.
Shift + mouse button Selects all rows between the previously selected row and
the last selected row.
See also
Zones on page 45
Conduits on page 49
Devices on page 58
Keyboard use The following tables contain the description of keyboard keys and their
combinations in different user interface elements.
Drop-down list
Key Description
Esc Discards all changes, the cell remains selected.
F2 Submits changes, displays the list.
Tab Submits changes and moves to the next cell. Used on the
last cell in the row moves to the first cell of the next row.
Shift + Tab Submits changes and moves to the previous cell. Used on
the first cell in the row moves to the last cell of the
previous row.
Space Submits changes, the cell remains selected.
Enter Submits changes and moves to the cell below.
Shift + Enter Submits changes and moves to the cell above.
Page Up Discards all changes, moves up 10 cells.
Page Down Discards all changes, moves down 10 cells.
Popup window
Key Description
Esc Discards all changes, the cell remains selected.
F2 Submits changes.
Tab Submits changes and moves to the next cell. Used on the
last cell in the row moves to the first cell of the next row.
Shift + Tab Submits changes and moves to the previous cell. Used on
the first cell in the row moves to the last cell of the
previous row.
Enter Submits changes and moves to the cell below.
Description field
Key Description
Esc Discards all changes, the cell remains selected.
F2 Submits changes.
Tab Moves focus to the next field or interface element.
Shift + Tab Moves focus to the previous field or interface element.
Enter Submits changes and moves to the field below.
Shift + Enter Breaks the line inside the field.
Filter field
Key Description
Esc Cancels filtering, deletes all characters from the field.
Tab Moves focus to the next field or interface element.
Shift + Tab Moves focus to the previous field or interface element.
Enter Starts the search.
Ctrl + Up arrow Moves cursor to the first character.
Ctrl + Down arrow Moves cursor to the last character.
Ctrl + Left arrow Moves cursor to the first character.
Ctrl + Right arrow Moves cursor to the last character.
See also
Navigate FactoryTalk Policy Manager on page 17
Multiple row selection in tables on page 21
Policy management FactoryTalk Policy Manager enables you to configure and manage industrial
control system policies from various domains, including: security,
capabilities communication, and eventing.
See also
CIP Bridging Control on page 25
Automatic Policy Deployment on page 28
Security Eventing on page 37
CIP Bridging Control CIP Bridging Control enables you to control the traffic flow between physical
communication interfaces and backplanes.
Devices within an Industrial Control System (ICS) may involve multiple
network interfaces. The use of Common Industrial Protocol (CIP) on the
backplanes and communication ports of Rockwell Automation devices can
facilitate physical network segmentation. For EtherNet/IP interfaces, you can
provide data bridging between two separate physical Ethernet networks by
using CIP.
The CIP Security communication modules and embedded EtherNet/IP
interfaces can analyze and then allow or deny network traffic according to
device-specific policies. You can use CIP Bridging Control to help prevent
unintended data flows from occurring, especially data flows originating from
unsecured parts of the system to secure parts of the system.
The following device families support CIP Bridging Control:
• CompactLogix 5380
• ControlLogix 5580
• ControlLogix 1756 EN4TR
See also
Policy management capabilities on page 24
CIP Bridging Control operation on page 25
CIP bridging settings hierarchy on page 26
CIP Bridging Control In FactoryTalk Policy Manager, you can configure endpoint-specific rules for
bridging between:
operation
• EtherNet/IP interface and backplane
• USB interface and backplane
Due to the architectural differences between devices, endpoint-specific
settings can take various forms. For enhanced fidelity, policy definition
capabilities often specify the traffic direction property.
Tip: By default, the bridged traffic flows without any restrictions like in a CIP-based device that
does not support CIP Security.
See also
CIP Bridging Control on page 25
CIP bridging settings The CIP Bridging Control settings can be global or specific to a port, device,
or zone.
hierarchy
Settings levels
The following list outlines the CIP bridging settings levels (from the lowest
level to the highest level):
1. Port-level settings
2. Device-level settings
3. Zone-level settings
4. Global settings
The CIP Bridging Control settings follow these conventions:
• Lower-level settings must be compliant with higher-level settings
• Lower-level settings can be stricter than higher-level settings
• If lower-level settings are less strict than higher-level settings, the
higher-level settings overwrite the lower-level settings
Port-level settings
These settings apply to EtherNet/IP interfaces and provide the distinction
between secure and Trusted IP (permitted) traffic.
Tip: During the initial policy deployment, FactoryTalk Policy Manager attempts to identify the
modules that occupy chassis slots.
Device-level settings
These settings enable or disable the communication bridging between the
USB port of a device and a backplane or other physical ports.
Zone-level settings
These settings ensure compliance for all port-level and device-level settings.
The port-level and device-level settings can be stricter than zone-level settings.
The following table shows examples of zone-level settings paired with
port-level settings:
Zone settings Port settings Description
Global settings
Global policy ensures compliance for all zones in the model. The zone-level
settings can be stricter than global settings.
The following table shows examples of global settings paired with zone-level
settings:
Global settings Zone settings Description
Inbound CIP bridging Inbound CIP bridging Allowed configuration.
• Allow secure traffic • Allow secure traffic The port-level settings (lower-level settings) and zone-level settings (higher-level
Outbound CIP bridging Outbound CIP bridging settings) match.
• Allow all traffic • Allow all traffic
Inbound CIP bridging Inbound CIP bridging Allowed configuration.
• Allow secure traffic • Allow secure traffic The zone-level settings (lower-level settings) are stricter than the global settings
Outbound CIP bridging Outbound CIP bridging (higher-level settings).
• Allow all traffic • Block all traffic
Inbound CIP bridging Inbound CIP bridging Disallowed configuration.
• Allow secure traffic • Allow all traffic The zone-level settings (lower-level settings) are less strict than the global settings
Outbound CIP bridging Outbound CIP bridging (higher-level settings).
• Allow all traffic • Allow all traffic
See also
CIP Bridging Control on page 25
Port properties on page 64
Device properties on page 67
Zone properties on page 47
FactoryTalk Policy Manager Global Settings on page 37
Automatic Policy Automatic Policy Deployment leverages the ODVA CIP Security pull model
that enables the EtherNet/IP endpoints (for example, field devices) to initiate
Deployment the deployment of policies defined on a system server.
During the onboarding process, the devices are discovered, identified, and
provisioned with identities and temporary polices. The onboarded devices can
be then merged into the security model and have their policies deployed
automatically.
By using Automatic Policy Deployment, you can improve the system:
• Operational readiness level
• Uptime
• Security (by provisioning security policies to field devices as soon as
they power up)
Automatic Policy Deployment supports the following devices:
• ControlLogix 5580 controllers (version 34)
• GuardLogix 5580 controllers (version 34)
• CompactLogix 5380 controllers (version 34)
• Compact GuardLogix 5380 controllers (version 34)
• EtherNet/IP communication modules (1756-EN4TR, version 4.001)
Automatic Policy Deployment requires a system server with FactoryTalk
Policy Manager installed and FactoryTalk System Services running.
Tip: After the FactoryTalk Policy Manager installation, FactoryTalk System Services start
automatically with Windows and run independently from FactoryTalk Policy Manager. FactoryTalk
System Services operate in the background even if the FactoryTalk Policy Manager application is
closed.
See also
Policy management capabilities on page 24
Automatic Policy Deployment operation on page 28
Automatic Policy Deployment notifications on page 33
Automatic Policy Automatic Policy Deployment discovers the devices in the network that you
can add to the security model.
Deployment operation
IMPORTANT Automatic Policy Deployment can onboard and merge only a single EtherNet/IP
interface of a device.
This applies to CompactLogix 5380 controllers operating in the Dual IP mode.
IMPORTANT Automatic Policy Deployment uses the Enrollment over Secure Transport (EST)
service. If your machine has multiple network interfaces, the EST service uses a
random network interface by default. To specify the network interface for the EST
service, see Specify the network interface for the EST service on page 32.
See also
Onboarding on page 29
Merging on page 30
Secured device replacement on page 32
FactoryTalk Policy Manager Global Settings on page 37
You can manually move the devices from the Onboarding Area into the
security model.
IMPORTANT When you move a device from the Onboarding Area to a zone or make the device
unassigned, you cannot assign the device to the Onboarding Area again.
See also
Automatic Policy Deployment operation on page 28
FactoryTalk Policy Manager Global Settings on page 37
Merging Depending on the security model and the devices available in the network, the
merging process can be automatic or manual.
Automatic merging
The merging process is automatic if the onboarding device has the same IP
address as the matching device in the security model.
The onboarding device does not need to be identical with the matching device
in the security model. During the merging process, the newer device
properties overwrite the older device properties.
IMPORTANT The following properties are never overwritten by the automatic merging process:
• IP address
• Device name
• Device description
The following tables illustrate the examples on how the automatic merging
process operates in different scenarios.
Scenario 1 - Device replacement (policy erased)
Onboarding device Device in the security model (Zone 1) Merged device (Zone 1) Description
IP Address: 192.168.1.68 IP Address: 192.168.1.68 IP Address: 192.168.1.68 All device parameters match:
Name: 1756-L81E Name: Line Controller Name: Line Controller • Device name (retained)
Description: 1756-L81E Description: Main controller for assembly line Description: Main controller for • Device description (retained)
Product type: 14 Product type: 14 assembly line The device malfunctioned and was
Product code: 164 Product code: 164 Product type: 14 reset to factory defaults.
Firmware major revision: 34 Firmware major revision: 34 Product code: 164
Firmware minor revision: 001 Firmware minor revision: 001 Firmware major revision: 34
Serial number: SN12345 Serial number: SN12345 Firmware minor revision: 001
Serial number: SN12345
Manual merging
The merging process is manual if the onboarding device cannot be associated
with any device in the security model.
An administrator can manually move the discovered device from the
Onboarding Area to the security model.
See also
Automatic Policy Deployment operation on page 28
FactoryTalk Policy Manager Global Settings on page 37
Secured device The secured device replacement process identifies onboarded devices against
existing entries in the security model based on the specific criteria and
replacement deploys the policies automatically.
The onboarding device match with the device in the security model if the
following properties are the same:
• IP address
• Vendor
• Product type
• Product code
• Major firmware revision (the same or higher)
IMPORTANT The vendor certificate of a device determines the vendor property. Currently,
FactoryTalk Policy Manager supports only Rockwell Automation vendor
certificates.
See also
Automatic Policy Deployment operation on page 28
FactoryTalk Policy Manager Global Settings on page 37
Specify the network Automatic Policy Deployment uses the Enrollment over Secure Transport
(EST) service. If your machine has multiple network interfaces, the EST
interface for the EST service uses a random network interface by default. You can select a specific
service network interface by editing the appConfiguration.json file.
IMPORTANT You must be a Windows administrator and have a FactoryTalk Directory administrator
account to specify the network interface for the EST service.
New devices
Discovered devices without references in the security model that Automatic
Policy Deployment adds to the Onboarding Area.
Message Description
The device {name} ({IP address}) is enrolled. The device is added to Onboarding The discovered device had no reference in the security model and was added to
Area. the Onboarding Area.
The Secure Onboarding Policy for device {name} ({IP address}) was not applied. Automatic Policy Deployment failed to deploy the policy to the discovered device.
The device does not support this policy. Verify if the device supports the policy.
The Secure Onboarding Policy for device {name} ({IP address}) was not applied Automatic Policy Deployment failed to deploy the policy to the discovered device.
because a valid FactoryTalk Linx Driver was not found. Verify if the correct EtherNet/IP driver is assigned to the discovered device. If the
driver does not exists, add the driver with FactoryTalk Linx.
The device {name} ({IP address}) is enrolled. The device is added to Onboarding The Automatic Policy Deployment process starts. The discovered device is added
Area. Initiating secure onboarding. to the Onboarding Area.
Establishing a connection between the discovered device and FactoryTalk Policy
Manager or other devices in the security model.
The deployment process completion time depends on the number of discovered
devices.
The device {name} ({IP address}) is enrolled. The device is added to Onboarding Automatic Policy Deployment added the device to the Onboarding Area and the
Area. The Secure Onboarding Policy was applied. deployment process completed.
Established a connection between the device added to the Onboarding Area and
FactoryTalk Policy Manager or other devices in the security model.
You can move the device from the Onboarding Area to the security model.
Discovered devices with not deployed references in the security model that
Automatic Policy Deployment merges into the security model.
Message Description
The device {name} ({IP address}) is enrolled and qualified to merge with existing The automatic secured device replacement process starts. The discovered device
{name} ({Zone name}) device in the model. All entries are merged. is merged with the matching device in the security model.
The deployment process completion time depends on the number of discovered
devices.
The secure onboarding policy for {name} ({IP address}) was not applied. The The automatic secured device replacement process failed deploy the policy to
device does not support this policy. the discovered device.
Verify if the device supports the policy.
The secure onboarding policy for {name} ({IP address}) was not applied because The automatic secured device replacement process failed to deploy the policy to
a valid FactoryTalk Linx Driver was not found. the discovered device.
Verify if the correct EtherNet/IP driver is assigned to the discovered device. If the
driver does not exists, add the driver with FactoryTalk Linx.
The device {name} ({IP address}) is enrolled and qualified to merge with existing The automatic secured device replacement process starts. The discovered device
{name} ({Zone name}) device in the model. All entries are merged. Initiating is merged with the matching device in the security model.
secure onboarding. Established a connection between the merged device and FactoryTalk Policy
Manager or other devices in the security model.
The deployment process completion time depends on the number of discovered
devices.
The device {name} ({IP address}) is enrolled and qualified to merge with existing The automatic secured device replacement process starts. The discovered device
{name} ({Zone name}) device in the model. All entries are merged. The secure is merged with the matching device in the security model.
onboarding policy was applied. Established a connection between the merged device and FactoryTalk Policy
Manager or other devices in the security model.
The deployment process completion time depends on the number of discovered
devices.
The secure onboarding policy for {name} ({IP address}) was not applied. Check The automatic secured device replacement process failed.
event log for more details. Failed to establish a connection between the merged device and FactoryTalk
Policy Manager or other devices in the security model.
For more information, see the FactoryTalk Diagnostics logs.
Discovered devices with not deployed references in the security model that
Automatic Policy Deployment merged into the security model.
Message Description
The device {name} ({IP address}) is enrolled and qualified to merge with existing The Automatic Policy Deployment process starts. The discovered device is
{name} ({Zone name}) device in the model. All entries are merged. merged with the matching device in the security model.
The secure onboarding policy for ({name} ({IP address}) was not applied. The The Automatic Policy Deployment process failed to deploy the policy to the
device does not support this policy. discovered device. Verify if the device supports the policy.
The secure onboarding policy for {name} ({IP address}) was not applied because The Automatic Policy Deployment process failed to deploy the policy to the
a valid FactoryTalk Linx Driver was not found. Perform manual merge in a discovered device.
destination zone. Verify if the correct EtherNet/IP driver is assigned to the discovered device. If the
driver does not exists, add the driver with FactoryTalk Linx.
The device {name} ({IP address}) is enrolled and qualified to merge with existing The discovered device is merged with the matching device in the security model.
{name} ({Zone name}) device in the model. All entries are merged. Initiating The secure onboarding process starts.
secure onboarding. Establishing a connection between the device added to the security model and
FactoryTalk Policy Manager or other devices in the model.
The deployment process completion time depends on the number of discovered
devices.
The device {name} ({IP address}) is enrolled and qualified to merge with existing The Automatic Policy Deployment process added the device to the security model
{name} ({Zone name}) device in the model. All entries are merged. The secure and the deployment process completed.
onboarding policy was applied. Established a connection between the device added to the security model and
FactoryTalk Policy Manager or other devices in the model.
See also
Automatic Policy Deployment on page 28
Replace a device on page 68
Security Eventing Use Security Eventing to configure the logging of messages that are sent
between devices.
The Security Eventing service requires a Syslog server to operate. The Security
Eventing policy is applied to every device in the security model that supports
Security Eventing.
Configure Security Eventing Settings in FactoryTalk Policy Manager Global
Settings.
The Security Eventing service uses these communication protocols to log
messages:
• UDP: a protocol that gives good performance for a high volume of
messages, however, it can lose data during network issues.
• TCP: a reliable protocol that is best suited for high-priority messaging.
See also:
Policy management capabilities on page 24
FactoryTalk Policy Manager Global Settings on page 37
Global Settings • In the FactoryTalk Policy Manager navigation bar, select Global
Settings.
Use Global Settings to define the settings that are applied to all devices
contained in the model. FactoryTalk Policy Manager sends the information
along with your certificate information to identify different components and
establish the trust relationships.
Tip: It is recommended to complete the Global Settings information before using the certificate
authentication method.
IMPORTANT Changes to the Automatic Policy Deployment settings take immediate effect. To avoid
onboarding devices with unintended settings, you can edit the Automatic Policy
Deployment settings:
• With the FactoryTalk System Services server disconnected from the network.
• When you do not expect any devices to be onboarded.
• Message Settings Specify which details to include in the event log message.
• Sequence ID - Uniquely identify the type and purpose of the message.
• Time quality (sync info, time zone accuracy) - Describes the system time
mechanism used by the message originator.
Changes to the settings described in the previous table are saved when you
press ENTER or select another field.
See also
Policy management capabilities on page 24
FactoryTalk Policy Manager component considerations on page 40
FactoryTalk Policy Manager planning on page 41
Authentication methods on page 42
FactoryTalk Policy Manager When designing a security model using FactoryTalk Policy Manager, consider
these items.
component considerations
• Devices.
Identify which devices are included in the security model.
• Conduits.
Identifies the communication pathways in the security model.
Determine whether the pathways are zone-to-zone, zone-to-device, or
device-to-device.
• Zones.
Identifies a group of logical or physical devices to which security
settings are applied.
Devices within a zone trust each other.
• Pre-shared keys (PSK).
A key based on a shared secret that is provided to devices to establish
trust.
• Certificates.
Used to establish a devices identity by providing information about
ownership of a public key.
• Security options
When a certificate is used as the authentication method additional
security, checks are available to be used with messaging and I/O data.
• Integrity Only
Checks whether data was altered and whether the data was sent by a
trusted entity. Altered and/or untrusted data is rejected.
See also
Zones on page 45
Conduits on page 49
Devices on page 58
FactoryTalk Policy Manager Implementing a CIP Security policy requires preparation and planning before
deployment. At a minimum, gather this information:
planning
• Number of zones.
• Security requirements for each zone.
• Devices assigned to each zone.
• Required trust relationships:
• Zones and devices
• Devices to devices
• IP addresses of all devices to be included in the policy.
This diagram depicts a simple deployment consisting of three zones
• The PC Zone that contains mobile devices, servers, and administrative
computers.
• Zone 1 that contains a switch, controller system, and administrative
computer.
• Zone 2 that contains a switch, monitoring panel, controller system,
programming system, and maintenance computer.
Item Description
Items with a lock are CIP Security capable.
Items with a list are not CIP Security capable and are trusted by their IP address.
Conduits connect the security zones enable secure communication between devices in different
zones.
The zones are represented by different blocks. Each device within the block trusts the other
devices in the block and can communicate with devices in zones that are connected by conduits.
See also
Zones on page 45
Conduits on page 49
Devices on page 58
Ingress/Egress rules
The Ingress/Egress Object is a set of rules that govern which network nodes
can communicate to the device and through the device:
• Ingress Rules determine which other nodes can communicate with
this device.
• Egress rules determine how the device can communicate with other
nodes.
To learn more about the Ingress/Egress rules, visit the ODVA website.
See also
Zone properties on page 47
Conduit properties on page 52
Device properties on page 67
Zones Zones are security policy groups to which devices are assigned. Once a device
is assigned to a zone, the device uses the policy default settings of that zone.
Zones establish the rules for data integrity, data privacy, and the
authentication method used to authenticate trusted devices. When
configuring a zone, use the CIP Security Communication settings within the
zone properties to establish these controls:
• Authentication method
• I/O data security
• Messaging security
• Port usage
See also
Add a zone on page 45
Edit zone properties on page 46
Delete a zone on page 46
Zone properties on page 47
Configure port properties on page 63
Add a zone Add zones to establish areas of security policy. Devices assigned to the zone
trust each other. Edit the zone properties to enable CIP Security and
configure the related settings. CIP Security is not enabled by default.
To add a zone
1. In the FactoryTalk Policy Manager navigation bar, select Zones.
2. On the toolbar next to ZONES, select Add [+].
Adds a new zone to the list with these default values:
• Name - Zone #
• Description - None
• Enable CIP Security - Not selected by default.
Select to enable configuration of CIP Security related settings.
See also
Zone properties on page 47
Edit zone properties on page 46
Delete a zone on page 46
Edit zone properties Edit the properties of a zone to specify a name, description, and enable CIP
Security settings.
Tips:
• Selecting a zone in the ZONES explorer displays the last device selected in the zone and the port
properties of that device.
• Select an active cell in the table to directly edit a property.
See also
Zone properties on page 47
Add a zone on page 45
Delete a zone on page 46
To delete a zone
1. In the FactoryTalk Policy Manager navigation bar, select Zones.
2. Either:
• In the ZONES column, next to the zone name, select the Delete
icon.
• In the Overview table, select the zone name, then select the Delete
icon from the toolbar.
3. A confirmation message displays, displaying the items that are going
to be deleted when the zone is deleted. To continue deleting the zone,
select DELETE.
The zone is deleted from the zone list and is no longer part of the
security model.
See also
Add a zone on page 45
Edit zone properties on page 46
Edit device properties on page 66
Zone properties Use zone properties to define the security settings to apply to devices that are
assigned to this zone.
The zone properties are:
Property Description
General The settings in this area differentiate this zone from other zones.
• Name The name for the zone.
• Description A description for the zone.
CIP Security Communication The settings in this area relate to how the devices in the zone
communicate with other devices.
• Enable CIP Security Enable CIP Security options for the zone. When selected, additional
configuration options are available.
Non-CIP Security capable devices can be added to a zone with CIP
Security enabled. These devices will have an information icon
displayed stating Incompatible with zone configuration. These
devices won’t receive CIP Security policy themselves, but devices in
this zone that are CIP Security capable will add the IP address of the
non-CIP Security capable device to their Trusted IP list so that
communication between the devices can occur.
See also
Add a zone on page 45
Edit zone properties on page 46
Zones on page 45
Devices on page 58
Configure port properties on page 63
CIP Bridging Control on page 25
See also
Add a conduit on page 50
Edit conduit properties on page 51
Delete a conduit
Conduit properties on page 52
Add a conduit Add a conduit to connect two endpoints. Endpoints can be either a device or a
zone.
Conduits must adhere to these rules:
• Each combination of endpoints must be unique.
• Duplicate conduits are not permitted.
• One of the endpoints must be CIP Security capable.
• If one endpoint is a zone, the other endpoint cannot be a device within
that zone.
To add a conduit
1. In the FactoryTalk Policy Manager navigation bar, select Conduits.
2. On the toolbar, select Add [+].
CONDUIT PROPERTIES pane opens.
3. In Endpoint 1, next to Select an endpoint select Browse for Endpoint
[...]. Select Endpoint opens.
4. Choose a zone or device to assign as the first endpoint of the conduit.
Tip: In Filter, type part of the name to list only endpoints that match that criteria.
See also
Conduit properties on page 52
Edit conduit properties on page 51
Delete a conduit
Edit conduit properties Conduits allow trusted communication outside of zones. Conduits require
two endpoints defined in Conduit properties. An endpoint is a zone or device.
Edit the properties of a conduit if the type of security used on the conduit
needs to be updated or if you want to change an endpoint.
Tips:
• CONDUIT PROPERTIES is automatically opened to the most recently configured conduit.
• Select an active cell in the table to directly edit a property.
See also
Conduit properties on page 52
To delete a conduit
1. In the FactoryTalk Policy Manager navigation bar, select Conduits.
2. In the table, select the conduit name from the list, then select the
Delete icon from the toolbar.
3. A confirmation message displays, select DELETE.
The conduit is deleted from the conduit list and is no longer part of the
security model.
See also
Add a conduit on page 50
Edit conduit properties on page 51
Conduit properties Use conduit properties to define the endpoints and security settings to apply
to communications over this conduit. Endpoints are either a zone, a device, or
a port of a device. Each conduit must be a unique combination of endpoints.
The conduit properties are:
Property Description
Endpoint 1 The first endpoint of the conduit. The list is composed of the zones
and devices that are identified in FactoryTalk Policy Manager.
Endpoint 2 The second endpoint of the conduit.
Name Type a name for the conduit.
Description Type a description for the conduit
Authentication Method Determines how the conduit verifies the identity of the assigned
devices and/or zones.
• Trusted IP
Devices and zones are trusted for communications based on
their IP address. No additional security checks are performed.
• Certificate
Devices and zones are trusted by presenting a certificate that
establishes their identity.
With this setting selected, configure the I/O Data Security and
Messaging Security settings.
See also
Add a conduit on page 50
Edit conduit properties on page 51
Discovery Use Discovery to traverse your system and find devices. Devices found in
discovery can be added to the device list and assigned to zones. Discovery can
be useful for populating a list of devices or for checking that the devices added
to the list manually are accurately identified.
See also
Discovery pane on page 53
Discover devices on page 54
Navigate the Discovery pane on page 55
Perform a search from the Discovery pane on page 55
Add drivers from the Discovery pane on page 56
See also
Discovery on page 53
Discover devices Use Discovery to traverse your system and find devices. Devices found in
discovery can be added to the device list and assigned to zones.
Tip: Discovery can show multiple child devices under one CIP Proxy device. This can occur when a
security policy is not yet deployed to the CIP Proxy device. After security policy deployment,
Discovery will show only the proxied device as a child.
To discover devices
1. In the right toolbar, select Discovery.
2. The Discovery pane opens displaying the FactoryTalk Linx network
tree.
3. (optional) Turn on the CIP Security indicator by clicking the shield
icon on the toolbar.
With the indicator enabled CIP Security capable devices available on
the network will be indicated:
• means that the device supports CIP Security and no
configuration action has been taken yet.
• means that the device is in the CIP Security configuration
process.
• means that the device is successfully configured with CIP
Security.
• means that the device is not recognized.
4. Select the device to add to the model and then select ADD to add the
device to the opened Zone table and the Device table.
Multiple devices can be selected and added at once.
Tip: To add a device, you can also:
• Drag a device from Discovery to the device table.
• Drag a device from Discovery to Canvas.
• Use the Add command from the context menu in Discovery.
See also
Ports on page 62
Add a range on page 70
Edit device properties on page 66
Navigate the Discovery Use the Discovery pane to browse the network and display information.
Resize the Discovery pane to see more or less of a network topology.
pane
The Discovery pane includes these items:
Item Description
See also
Discover devices on page 54
Perform a search from the Use the Discovery pane to search for a device to determine its location. After
the initial discovery of the network topology, you can use filters to limit the
Discovery pane scope of the search.
When using filters, be aware of these functional details:
• Filter only examines devices detected or viewed by the browser.
Initiating a search will not cause the browser to discover a new device.
The Discovery pane examines the text and presents all known devices
in the network topology tree that match the search criteria.
2. (optional) Select a search filter by clicking the filter icon to narrow the
search results to keywords associated with the selected device
parameter:
• Device. The name of the device. Example: 1756-L
• OnlineName. The online name of the device. Example: Packaging
line
• Path. The communications path used for the device: Example:
AB-Eth
• Address. The IP address or a portion of the IP address of the device:
Example: 10.122.155
3. (optional) Use operators between keywords to refine the search results
using a logical statement:
• AND to search for two or more keywords.
• OR to search for several keywords.
Tip: An example of using operators between keywords to refine search results is
Device: 1756-L OR Device: 1768-L
This search locates both ControlLogix and CompactLogix controllers.
4. The Discovery pane displays results within a few seconds, regardless of
pressing Enter.
See also
Devices on page 58
Add drivers from the A driver is the software interface to the computer or workstation hardware
that allows the computer to communicate with a network to detect and
Discovery pane communicate with a control system device. If a device is not detected in the
Discovery pane, select the Drivers icon to add or modify a driver
configuration.
See also
Discover devices on page 54
Configure Settings from the Configure Settings to control the discovery behavior and create bridges
across networks. Once a network is bridged a conduit can be created between
Discovery pane the networks.
See also
Conduits on page 49
Devices Devices are the modules, drives, controllers, HMI panels, computers, CIP
Proxy devices, and servers that work together to create a FactoryTalk system.
Add devices that share security requirements and that should trust each other
to a zone. A device can have one or more ports that are added to the security
model. Devices can be added manually or discovered by querying the network
for devices.
Devices are connected to other devices or zones by conduits.
See also
Discovery on page 53
Add a device to a zone on page 60
Add a device to the device table on page 61
Configure port properties on page 63
Remove the security policy from a device on page 69
CIP Proxy devices The CIP Proxy device is CIP-Security capable and can be communicated to
securely. It is placed on the communication path to a non-CIP Security
capable device and allows for secure communication to that device.
IMPORTANT CIP Proxy devices cannot be used as proxies for controllers or HMI devices.
When first installed, the proxy device allows all communication to pass
through. Once the proxy is configured to represent a device, then it only
allows communication to that one device. The proxy can only represent a
device that does not yet exist in the security policy model. To configure a
device as a proxied device after it has been added to the security policy model,
delete the device and add it again as a proxied device. After you deploy the
security policy model, you cannot change which device is proxied until you
delete the proxy and the proxy device, and add them again.
The CIP Proxy device has the same device properties as other devices when
configured using FactoryTalk Policy Manager:
• Vendor
• Firmware Revision
• CIP Security capable
• Ports
CIP Proxy devices have only a single port. That port is used to proxy the port of
another device. The device being proxied is identified using the Port Proxied
setting.
The CIP Proxy device can be placed in a different zone than its proxied device.
When you move a CIP Proxy device to a different zone in the model, the
proxied device is not affected, it stays assigned to the same zone.
Tip: If you used the EDS file or Discovery to add the CIP Proxy device and associate a proxied
device, the properties settings are automatically configured.
If you are working with a Generic device, you must configure the proxy manually.
See also
Discovery on page 53
Configure port properties on page 63
Add a device to a zone Add a device to a zone to include it in the FactoryTalk Policy Manager security
model. Alternatively, use discovery to find devices on the network.
To add a device
1. In the FactoryTalk Policy Manager navigation bar, select:
• Zones and then select a zone in the Zones table to add a device to
the selected zone's device list.
• Devices to add a device. By default the device is unassigned.
2. On the toolbar, select:
• Add Device [+] to manually add a device to the current device table
by selecting its catalog number or to add a generic device.
• Discovery to select and add devices [+] found on the network to the
current device table.
Tips:
• To add a device, you can also:
• Drag a device from Discovery to the device table.
• Use the Add command from the context menu in Discovery.
• When you add a proxy device, you are prompted to select a proxied device.
DEVICE PROPERTIES opens.
3. (optional) In Device Name, type a name for the device. Generic devices
are automatically named Device <number>. Devices selected by catalog
number or discovered are already named.
4. (optional) In Description, type a description of the device. The
description of generic devices is empty by default. Devices selected by
catalog number or discovered may have an existing description.
5. For generic devices, in Catalog Number, select the ellipsis [...] and
choose the catalog number for the device from the list.
Tip: Filter the list of catalog numbers by typing a portion of the catalog number in the space
provided.
6. (optional) In Vendor, type the name of the device manufacturer. If a
Rockwell Automation/Allen-Bradley catalog number was provided, this
setting is completed by default and cannot be modified.
7. In Firmware Revision, choose the applicable firmware revision. This
setting is required to apply CIP Security settings to the device ports.
FactoryTalk Policy Manager automatically assigns the latest firmware
version to devices added using a catalog number or using Discovery.
8. (optional) Enable CIP Security capable if the device supports CIP
Security. It is not possible to change this setting after deploying the
security policy model.
CIP Security is associated with the Catalog Number and Firmware
Revision properties. When both values are known the CIP Security
capable setting is automatically enabled or disabled and is not editable.
9. Under Ports select the pencil icon next to the port to configure
port properties, such as the port name, description, EtherNet driver
name, IP address, and protocols used by the device.
Tip: For devices added from the Catalog, the default EtherNet driver name is Ethernet.
Change this value to reflect the appropriate FactoryTalk Linx driver.
See also
Configure port properties on page 63
Edit device properties on page 66
Delete a deployed device on page 66
Device properties on page 67
Add a device to the device Add a device to the device list to create a pool of devices that can then be
organized into zones. Alternatively, use discovery to find devices on the
table network.
See also
Configure port properties on page 63
Edit device properties on page 66
Delete a deployed device on page 66
Device properties on page 67
Add ports to Generic Devices to add them to the security policy model.
See also
Add a port on page 62
Configure port properties on page 63
Port properties on page 64
Add a port Generic devices can have ports added to them to match their configuration.
To add a port
1. In the FactoryTalk Policy Manager navigation bar, select Devices to
and then select a generic device from the FactoryTalk Policy Manager
device list.
2. In the PORT PROPERTIES pane, select the pencil icon next to the
device name to open the DEVICE PROPERTIES pane.
3. Under Ports select the plus [+] icon.
A new port adds to the Ports list.
4. Select the pencil icon next to the port number to configure port
properties, such as the port name, description, EtherNet driver, IP
address, and protocols used by the device.
See also
Configure port properties on page 63
Port properties on page 64
Configure port properties Devices have ports that are associated with IP addresses, ports, and protocols.
Devices that have a specific catalog number have a predefined number of
ports with assigned protocols. If a device does not have a catalog number,
FactoryTalk Policy Manager adds it as a Generic Device. When a security
policy model includes generic devices, configure the number of ports on the
device.
6. In the Policies area, configure the security policies for the device.
• In Zone, assign the device to the appropriate security zone.
• If the device is CIP Security capable and the port was assigned to a
CIP Security enabled zone, you can select Disable port HTTP (80)
further control communications activity on the device.
See also
Device properties on page 67
Discovery on page 53
Device This area displays information about the device on which the port is
present.
• Device name The name of the device. Select the pencil icon next to the device
name to open the device properties.
• Device description Read-only information that describes the device function.
• Device catalog number Read-only information that provides the catalog number of the device.
General Use this area to configure the port on the device.
• Name The name for the port.
• Description The description for the port.
• EtherNet Drive name A drop-down list of the available EtherNet drivers used for
communication.
If the list does not contain a driver, add the driver with FactoryTalk®
Linx™.
This property is only available for the devices that support CIP Security.
• IP Address The IP address of the Ethernet port, for example: 10.88.11.11.
You cannot edit the IP address if you:
• Deployed the security policy to the device.
• Moved a device from the Onboarding Area to the security model.
Port Proxied Appears only for proxy devices. Shows the name and the IP address of
the device secured by this proxy device.
Select the pencil icon next to the device name to open the port
properties.
Proxy Device Appears only for proxied devices. Shows the name and the IP address of
the device securing this proxy device.
Select the pencil icon next to the device name to open the device
properties.
Policies Use this area to select the security zone and communication settings for
the port.
• Zone The name of the zone to which the port is assigned.
If Automatic Policy Deployment is enabled, the Onboarding Area displays
in the list of zones.
• Disable port HTTP (80) For CIP Security capable devices.
• When a device is CIP Security capable and placed in a zone using the
certificate authentication method, the HTTP Port usage can be
disabled.
When viewing the device list, the Disabled TCP Port column reflects
whether HTTP port 80 has been disabled.
• CIP Bridging This functionality applies only to CIP Security capable devices.
• Inbound CIP Bridging Allow all traffic
Allows bridging of secure and trusted IP traffic from the EtherNet/IP
interface to backplane and other physical ports (for example: Ethernet,
USB).
Note: Physical ports support is dependent on the hardware platform.
Allow secure traffic
Allows bridging of only secure traffic from the secured EtherNet/IP
interface to backplane and other physical ports (for example: Ethernet,
USB).
Note: Physical ports support is dependent on the hardware platform.
Block all traffic
Blocks bridging of any traffic from the secured EtherNet/IP interface.
• Outbound CIP Bridging Chassis size
Displays the number of slots in a chassis. The default number of slots
for manually added devices is 10. Change this value to reflect the
chassis capacity.
Slot 1 - 10
Select chassis slots for which to disable CIP Bridging.
See also
Add a port on page 62
Configure port properties on page 63
CIP Bridging Control on page 25
Automatic Policy Deployment on page 28
Edit device properties Edit the device properties to change the device information, to enable CIP
Security options, or modify the port configuration. The properties changes
are applied the next time the security policy model is deployed.
Tips:
• When navigating to either zones or devices the PORT PROPERTIES pane opens automatically to
the last item configured.
• Select an active cell in the table to directly edit a property.
See also
Device properties on page 67
Add a device to a zone on page 60
Delete a deployed device on page 66
Delete a deployed device Delete a deployed device that is no longer needed. After a device is deleted,
the device name appears grayed-out and struck through in the device table.
Deleting a device also removes its security configuration. When you delete a
device from the proxy-proxied pair, both devices are deleted. The deleted
device remains in the Device table until the next time the model is deployed.
The properties of deleted devices are read-only.
IMPORTANT If a device has multiple ports, the additional ports must be deleted to delete the
device. These devices are shown in the device table with the port name appended
after the device name; for example, Device3:Port2.
To delete a device
1. In the FactoryTalk Policy Manager navigation bar, select Devices.
2. In the table, select the device name from the list, then select the Delete
icon from the toolbar.
3. A confirmation message is displayed, select DELETE.
The device name is struck-through on the device table. The device is
removed from the security model upon deployment.
See also
Add a device to a zone on page 60
Add a device to the device table on page 61
Edit device properties on page 66
Replace a device on page 68
Remove the security policy from a device on page 69
Device properties Use device properties to define the device information, security, and network
settings for a device. Device properties defined using the electronic data sheet
(EDS) for the device cannot be modified. A device can have one or more ports
that are added to the security model.
Some of the following properties may be read-only for:
• The devices added to the Onboarding Area by Automatic Policy
Deployment.
• The devices that are not added to a secure zone.
Property Description
General The settings that provide the identification parameters of the
device.
• Name The name of the device. The name is required and must be unique.
• Description (optional) A description for the device.
• Catalog Number (optional) If defined using device discovery, the catalog number
cannot be changed. Otherwise, choose a catalog number from the
list. Choosing a Rockwell Automation catalog number automatically
completes the Vendor information.
A device without a catalog number is listed as a Generic Device.
• Vendor (optional) The name of the device's vendor.
• Firmware Revision The firmware revision number of a device.
Required to enable CIP Security for a device.
• CIP Security Capable Identifies whether a device can use the security settings of the
zone.
Select to configure additional CIP Security settings for a generic
device.
Note: The Catalog Number and firmware revision determine the
CIP Security capability of a device automatically.
See also
Add a device to a zone on page 60
CIP Bridging Control on page 25
Automatic Policy Deployment on page 28
Replace a device Replacing a device is used when a device that has already been configured and
enabled for CIP Security has failed or needs to be rotated out for
maintenance. Device replacement enables the identity and the security
configuration of the previous device to be assigned to the replacement device.
The communications port on a device must be reset after replacement to
apply the security policy settings.
To replace a device
1. In the FactoryTalk Policy Manager navigation bar, select:
• Zones and then select a zone in the Zones table to replace a device
on the selected zone's device table.
• Devices to replace any device on the FactoryTalk Policy Manager
device list.
2. In the device table, select the name of the device to replace.
The selected device properties display in DEVICE PROPERTIES.
3. On the FactoryTalk Policy Manager toolbar, select Replace Device.
Deploy Configuration to Replace Device displays.
4. In Deploy Configuration to Replace Device choose when to reset the
communication ports on the device:
See also
Deployment results on page 80
Remove the security policy If the security model has been deployed and the device communications have
been reset the device is constrained by the security policy. Even if FactoryTalk
from a device Policy Manager and FactoryTalk System Services are uninstalled the security
policy configured for the device is still in effect.
Use these steps to remove the security policy if necessary.
See also
Edit device properties on page 66
Delete a deployed device on page 66
Deploy a security model on page 77
Ranges If there are groups of devices that are not CIP Security capable, they can be
incorporated into the security model using a trusted IP range.
See also
Add a range on page 70
Authentication methods on page 42
Add a range Add a range to define a set of IP addresses to assign to a zone. A device range
is useful for devices that do not support CIP Security, but that need to be part
of the security policy model.
To add a range
1. In the FactoryTalk Policy Manager navigation bar, select:
• Zones and then select a zone in the Zones list to add a device range
to the selected zone's device list.
• Devices to add an unassigned device range to the FactoryTalk Policy
Manager device list.
2. On the toolbar, select Add Range. The RANGE PROPERTIES pane
opens.
3. In Name, type a name for the range.
4. (optional) In Description, type a description of the range.
5. In Start IP Address, type the first IP address in the range being
defined.
6. In End IP Address, type the last IP address in the range being defined.
7. (optional) In Zone, select the security zone to assign to this range. If
adding a range from within the Zone list, the range is automatically
assigned to the currently selected zone.
See also
Discovery on page 53
Add a zone on page 45
Range properties on page 70
Range properties Use range properties to define the IP address range. Devices in a range
cannot apply security configuration settings of a zone. In a zone where CIP
See also
Add a range on page 70
Add a zone on page 45
Authentication methods on page 42
Canvas The Canvas view visualizes the security model in the form of a diagram and as
a tree. You can modify the security model visualization by rearranging and
resizing its components. You can also automatically lay out the security model
components and save the diagram to a graphic file.
Canvas includes information about zones, conduits, and devices.
In the Canvas view, the devices can either be in:
• A Zone container
• The Unassigned container
• The Onboarding Area container (the devices discovered by Automatic
Policy Deployment)
From the Canvas view, you can modify the properties of the security model
components by using the Properties pane. You can also drag devices between
containers, but you cannot set the properties of components directly on the
canvas. You can also browse, manage, and add the devices available in the
FactoryTalk Linx network to the security model by using the Discovery pane.
See also
Navigate Canvas on page 72
Search Canvas on page 73
Graphical Explorer pane on page 73
Move a device on page 74
Automatic Policy Deployment on page 28
Navigate Canvas Use Canvas to visualize the security model in the form of a customizable
diagram.
The Canvas toolbar includes these items:
Item Description
Global View Shows or hides a mini map of the security model
visualization in the bottom-right corner of the model.
You can use Global View to navigate complex security
models and adjust the zoom level of the security model.
Straight Lines Shows conduits as straight lines.
Curved Lines Shows conduits as curved lines.
Auto Layout Automatically lays out the security model visualization.
Save Saves the security model visualization to a graphic file.
Zoom Out Zooms out the security model visualization.
Zoom In Zooms in the security model visualization.
Zoom Displays the current zoom level of the security model
visualization. Enables you to select or enter a custom
zoom level value.
Tip: You can also zoom in and zoom out the security
model visualization by using the mouse wheel.
Search Highlights security model components based on the
specified criteria.
See also
Canvas on page 71
Navigate the Graphical Explorer pane on page 73
Search Canvas Use Search to find zones, conduits, devices, and other components on the
visualized security model. The search results are highlighted in yellow and
can be filtered.
To search canvas
1. In the FactoryTalk Policy Manager navigation bar, select Canvas.
2. On the toolbar, fill in the Search field.
Tip: You can press Ctrl+F to place the cursor in the Search field.
3. (optional) Restrict the search results by selecting the Filters to add to
search field icon and selecting: Zones, Conduits, or Devices.
4. (optional) Cycle through the search results by selecting the Go to next
search result icon or Go to previous search result icon.
5. (optional) Clear the search results by selecting the Clear search
icon.
See also
Canvas on page 71
Filter the security model tree on page 74
Graphical Explorer pane The Graphical Explorer pane is a part of the Canvas view that displays the
security model in the form of a tree. Depending on your needs, the Graphical
Explorer pane can be collapsed or expanded.
See also
Canvas on page 71
Navigate the Graphical Explorer pane on page 73
Filter the security model tree on page 74
Navigate the Graphical Use the Graphical Explorer pane to browse the zones, devices, and conduits
tree. You can filter, collapse, and expand the tree nodes.
Explorer pane
Tip: Selecting a component in the Graphical Explorer tree focuses the security model visualization
on that component.
Selecting a component in the security model visualization, focuses the tree on that component.
See also
Graphical Explorer pane on page 73
Navigate Canvas on page 72
Filter the security model Use Filter to find zones, conduits, and devices in the security model tree.
tree
To filter the security model tree:
1. In the FactoryTalk Policy Manager navigation bar, select Canvas.
2. On the left, ensure that the Graphical Explorer pane is expanded.
3. Fill in the Filter field.
4. (optional) Restrict the filtering scope by selecting the Quick filter
icon and selecting: Zones, Conduits, or Devices.
5. (optional) Discard filters by selecting the Clear view icon.
See also
Graphical Explorer pane on page 73
Search Canvas on page 73
Move a device In the Canvas security model visualization and in the Graphical Explorer
tree, you can move devices between these containers:
• Zones
• Unassigned
• Onboarding Area
IMPORTANT When you move a device from the Onboarding Area to a Zone or to the
Unassigned container, the device cannot be moved to the Onboarding Area
container again.
See also
Canvas on page 71
Discover devices on page 54
Deployment After the zones, conduits, and devices have been configured, the security
policy model can be deployed.
Making changes to the security policy of an item requires that the
communications channel be reset, which results in a short loss of
connectivity. During deployment, there is the option of resetting the
communication as part of deployment, or deploying the changes without
resetting the communication channel so that the reset can occur at a different
time than the deployment process.
If changes are made the policy after it is deployed, an asterisk (*) will appear
next to the device, indicating that the configured policy has not been deployed
to that device.
After the initial deployment, a differential deployment can be done to deploy
just items changed since the last deployment. Differential deployment
includes any changes made in the model or made to the physical device in the
field such as in the event of device replacement.
See also
Deploy a security model on page 77
Deployment options on page 79
Deployment results on page 80
Deploy a security model After the zones, conduits, and devices have been configured, the security
policy model can be deployed.
Before a deployed security policy becomes active, communications must be
reset to all configured devices, resulting in a short loss of connectivity. During
deployment, there is the option of resetting the communication as part of
deployment, or deploying the changes without resetting the communication
channel so that the reset can occur at a different time than the deployment
process.
If you choose to reset the communication after deployment, the security
policy may be applied to the devices at different times, depending on the
device type, function and state of the control system.
Once the model is deployed and communications reset on the device, the
device will only accept communications from other devices in the same zone
See also
Devices on page 58
Conduits on page 49
Zones on page 45
Deployment results on page 80
Deployment options Choose how to deploy the security policy configuration defined in the security
policy model.
• In Deployment scope, choose whether to perform a full deployment or
a differential deployment.
• Select Changed device communication ports only for differential
deployment.
• Select All device communication ports in the model for full
deployment.
• In Devices and ports updated review the list of devices that will be
configured when this model is deployed. Scroll down or select More
details to see the entire list. If the list contains unexpected devices,
select CANCEL and then change the model as needed.
• Under Choose when to reset device communication ports included in
this model select either:
• During policy deployment
When this option is selected, the communication port will be closed
and reopened on the device during the deployment process. Similar
to resetting the network card on a computer, the device stays
functional but is disconnected from the network for a few
moments. Using this option applies the new policy to the device at
the same time that the policy is deployed.
See also
Deployment errors on page 80
Deployment warnings on page 83
Deployment results Depending on the size of your system, the deployment process can take a
while. As assets are deployed, the Results tab updates with the result of the
deployment on each item in the model. The possible results are:
• Configuration complete. No issues identified.
• Configuration complete. Warnings identified.
• Configuration not complete. Error identified.
At any point in the deployment process, the process can be stopped. If
deployment is stopped, assets that have been configured, remain configured.
Stopping the deployment process does not roll back the changes that have
occurred.
IMPORTANT If the deployment process is stopped during deploy, this can leave the system in an
unexpected state. Communications between devices could be permanently
interrupted requiring module reset.
See also
Deployment errors on page 80
Deployment warnings on page 83
Deployment errors This table provides a reference of the possible errors encountered during
deployment. Items in brackets are placeholders for specific items that are
General troubleshooting
If you encounter one of the messages from the table, first check the
description for a possible solution. If the same error message still appears
next deploy, or there is no solution provided, try one or more of the below
actions.
• Check the network.
• Check the physical connection of the device.
• Cycle power to the device.
• Retry deployment.
• Perform the factory reset of the device.
• Update the firmware of the device.
IMPORTANT CIP Security is supported with the 1756-EN4TR, however, it is not yet supported when
the 1756-EN4TR is in redundant adapter mode.
If a 1756-EN4TR is installed and using CIP Security, and it is reconfigured to be part of
a redundant adapter pair, the module will lose its CIP Security configuration. When
this occurs, the I/O chassis will lose communication with the controller.
At this point, the CIP Security policy must be redeployed.
Error Description
Cannot read the state of the CIP Security Object for <device name> The system cannot obtain information if the device is CIP Security capable.
<endpoint name>.
Unable to retrieve the list of administered ports for <device name> The system cannot obtain information on device ports. The device may not support
<endpoint name>. ports or CIP Security.
<device name> does not support configuration for the port. The device is in a zone that has disabled communication over the specified port. The
device does not support individual port configuration.
Make sure that the device is CIP Security capable.
Cannot obtain the list of available encryption methods for <device The system cannot determine if the device supports any encryption methods.
name> <endpoint name>. Check the device specifications.
Unable to retrieve the list of supported encryption methods for The system cannot retrieve information on which encryption methods supported by the
<endpoint name>. device.
Check the device specifications.
Unable to set encryption method for <endpoint name>. The system cannot set which encryption method is used by the device.
Update the device firmware.
Unable to retrieve the pre-shared key from <endpoint name>. The device does not support pre-shared key authentication, the device lost data, or the
device replacement procedure was not followed.
Go to the specified zone, generate a new pre-shared key and redeploy the security
policy model.
For more information, see Zone properties chapter.
Cannot set Trusted Devices. The system could not set the list of Trusted Devices for the device.
Cannot obtain a list of Certificate Management Objects for <device The system could not retrieve a list of certificates from the device.
name> <endpoint name>.
Unable to obtain required file object list on <device name> <endpoint The system encountered a problem communicating with the device.
name>.
Unable to obtain required file object on <device name> <endpoint The system encountered a problem communicating with the device.
name>.
Endpoint <path> does not support configuring state of: <protocol> <port The device does not support the mentioned communication protocol or port.
number>. Check if the device supports the protocol or port.
Cannot read device IE setting from <device name>. The system encountered a problem with the Ingress/Egress rules on the device. The
device may not support this feature.
For more information, see Authentication methods chapter.
Cannot verify IE rules on <device name>. The system encountered a problem with the Ingress/Egress rules on the device. The
device may not support this feature.
For more information, see Authentication methods chapter.
Unable to obtain the max instance for <endpoint name>. The system encountered a problem with the Ingress/Egress rules on the device. The
device may not support this feature.
For more information, see Authentication methods chapter.
Cannot read device IE rules from <device name>. The system encountered a problem with the Ingress/Egress rules on the device. The
device may not support this feature.
For more information, see Authentication methods chapter.
Cannot read device IE rules size from <device name>. The system encountered a problem with the Ingress/Egress rules on the device. The
device may not support this feature.
For more information, see Authentication methods chapter.
See also
Deployment results on page 80
Deployment warnings This table provides a reference of the possible warnings encountered during
deployment. Items in brackets are placeholders for specific items that are
identified as appropriate for the environment.
Warning Description
Cannot read the Device Identity for the <device name> <endpoint name> The system is unable to read a CIP Security object containing device identifiers.
Make sure that the device is CIP Security capable, cycle power to the device, check
physical connection to the device, update device firmware.
<device name> does not support configuration for port. The device has been placed in a zone that has disabled communication over the
specified port, but the device does not support individual port configuration.
Make sure that the device is CIP Security capable, update device firmware.
Device does not support configuration of the DTLS Timeout setting. Check if the device supports the DTLS Timeout setting, update device firmware, or
disable the DTLS Timeout setting.
For more information, see Global Settings chapter.
Device <device name> cannot configure Trusted IP lists. Trusted IP Lists are a feature specific to Rockwell Automation/Allen-Bradley devices.
Check the device specifications.
Device <device name> does not support Trusted IP lists. Trusted IP Lists are a feature specific to Rockwell Automation/Allen-Bradley devices.
Check the device specifications.
Cannot set IE rules on <device name>. The system encountered a problem with the Ingress/Egress rules on the device.
Cycle power to the device, retry deployment,or replace the device.
For more information, see Authentication methods chapter.
Unable to obtain the IE rules for <endpoint name>. The system encountered a problem with the Ingress/Egress rules on the device.
Cycle power to the device, retry deployment,or replace the device.
For more information, see Authentication methods chapter.
Unable to obtain converted IE rules for <endpoint name>. The system encountered a problem with the Ingress/Egress rules on the device.
Cycle power to the device, retry deployment,or replace the device.
For more information, see Authentication methods chapter.
See also
Deployment results on page 80
Reload a security model Reloading the model synchronizes FactoryTalk Policy Manager and
FactoryTalk System Services and refreshes the display of possible conflicts so
that they can be addressed before deployment.
See also
Conduits on page 49
Devices on page 58
Backup and restore Create backup files to preserve and restore the security models for your
system in case of a systems failure.
security models
These are the considerations related to using backup and restore with
FactoryTalk Policy Manager:
• The FactoryTalk Policy Manager security model is stored by
FactoryTalk System Services in a policy database.
• Create a backup after a policy deployment to keep the backup files
synchronized with the current security policy.
See also
FactoryTalk System Services on page 11
Deploy a security model on page 77
Backup FactoryTalk System Backup FactoryTalk System Services to save copy of the security model and its
associated certificates. After it has been created the FactoryTalk System
Services Services backup file is included with the FactoryTalk Services Platform
backup when it is performed.
IMPORTANT Backing up FactoryTalk System Services requires administrator privileges.
See also
Backup and restore security models on page 85
Restore FactoryTalk System Services on page 86
Restore FactoryTalk Restore FactoryTalk System Services to return the FactoryTalk System
Services databases to a known good state.
System Services
IMPORTANT Restoring FactoryTalk System Services requires administrator privileges.
See also
Backup and restore security models on page 85
Literature Library Find installation instructions, manuals, brochures, and technical data publications. rok.auto/literature
Product Compatibility and Download Center Get help determining how products interact, check features and capabilities, and rok.auto/pcdc
(PCDC) find associated firmware.
Documentation feedback
Your comments help us serve your documentation needs better. If you have any suggestions on how to improve our content, complete the form at
rok.auto/docfeedback.
Rockwell Automation maintains current product environmental information on its website at rok.auto/pec.
Allen-Bradley, expanding human possibility, Logix, Rockwell Automation, and Rockwell Software are trademarks of Rockwell Automation, Inc.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Rockwell Otomayson Ticaret A.Ş. Kar Plaza İş Merkezi E Blok Kat:6 34752, İçerenkÖy, İstanbul, Tel: +90 (216) 5698400 EEE YÖnetmeliğine Uygundur