WP Iiot and 5g With Purdue Model
WP Iiot and 5g With Purdue Model
Securing OT in the
Face of IIoT and 5G
Table of Content
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Asset Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Signaling Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Introduction
Until recently, most operational technology (OT) processes ran on isolated networks with specific protocols. This
tended to make security a simple matter of physical protection. The separation of the OT network from everything
else—the so-called air gap—made it easy to ignore the major cybersecurity headaches being faced in data centers
and business networks.
Over the last decade, OT protocols have increasingly been encapsulated into internet-based routable protocols (e.g.,
Transmission Control Protocol [TCP]/Internet Protocol [IP]). Industrial networks are now converging with the IT network as
well. To use Purdue model terminology, while the physical process, operations, and control zones are still segregated from
the business and logistics zone, as the traditional air gap is vanishing. A demilitarized zone with a network firewall is put in
place to keep them apart. However, an ever-increasing amount of information now needs to pass between these zones. As
ingress and egress data flows to OT systems increase, threat exposure also increases.
In parallel to these developments, there have been other technological shifts such as miniaturization of sensors and
controls as well as applied artificial intelligence (AI) to help make sense of huge amounts of data supplied by OT systems.
Perhaps most significant from the standpoint of security is wireless connectivity, which can allow direct connection to
the internet, bypassing traditional OT network connections. Many industrial tools and devices now have built-in wireless
connectivity, allowing process data and telemetry to be directly uploaded to business information systems or to supply
maintenance data directly to the manufacturer of the system. This connectivity of many different types of devices via the
internet is known as the Internet of Things (IoT). When IoT devices run within the perimeter of an OT environment, they are
usually referred to as the Industrial Internet of Things (IIoT).
Regardless of the technological similarities and differences between IoT and IIoT, both infrastructures must be protected
from cyber risks and should have minimum baseline security implementations following industry standards and best
practices. This paper will investigate the implications of IIoT, including Wi-Fi and 5G, and other trends for the protection of
production infrastructures. After illustrating several typical use cases of IIoT wireless connectivity, this paper will define
an appropriate technology architecture for securing these devices. This architecture provides a foundation for making
specific recommendations for the strategies and tactics necessary to ensure appropriate cybersecurity in a modern OT
infrastructure with hybrid wired and wireless interconnections. Further, the paper will also illustrate these tactics with
examples from the Fortinet portfolio of products.
IIoT, wireless, 5G, and other trends have implications for OT environments that are frequently built on the Purdue Enterprise
Reference Architecture (PERA). This model describes a hierarchical set of levels for applications and controls. Levels 0, 1,
and 2 (the process control zone) define physical processes, sensors, actuators, and related instrumentation as well as the
systems that supervise these implementations. Level 3 (the operations and control zone) describes overall manufacturing
operations across multiple processes. Together, these levels comprise an OT environment. Levels 4 and 5 are collectively
known as the business zone, comprised of enterprise IT systems and applications. First conceived in the early 1990s, the
original Purdue model did not anticipate IIoT, wireless, or cloud connectivity. With the general rollout of 5G technology, this
process of bypassing the traditional Purdue levels will only accelerate.
This paper will discuss the impact of IIoT and 5G on security for a modern OT environment. It will also review the
architectural considerations for providing secure connectivity in the enterprise and demonstrate how modern techniques
can support both the security and flexibility required in today’s enterprise.
3
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Smart
Sensor ICS Historian
Asset
Secured OT Perimeter
Smart
Sensor ICS Historian
Asset
Secured OT Perimeter
4
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Smart
Sensor ICS Historian
Asset
Secured OT Perimeter
5
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Business
Information
Application
Operators
Legend
nnGreen arrows: Data/information flows
nnGrey arrows: Decision flows
nnRed arrows: Command/request flows
Control
Sense Actuate
Physical Systems
The control domain mainly deals with the industrial or machine aspects (i.e., physical systems), such as control, sense, and
actuation technologies. For example, industrial automation and control systems (IACS/ICS) reside within this domain. The
combined control and operations domains can be considered as part of the OT side of the business, and the remaining
domains as being on the IT side.
6
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Operations
Device management
Data aggregation
connectivity across each domain and technology tiers. This mapping is illustrated in Figure 6 below. Communication networks
can be based on either wired or wireless technologies. This may include local Ethernet or Bluetooth/Zigbee (in the case of the
proximity network) or wide-area network (WAN) broadband, multiprotocol label switching (MPLS), or 5G technology (in the
case of the access and/or service network).
Other
information
systems
Control Domain
Data flows
Application Domain
Application
Actuators
and Gateway
Controllers Orchestration flows
Logic and Rules API and Portal
Biz apps
Sensors
Asset management service flows
Biz app flows
OT apps
Provisioning and Prognostics and
Deployment Optimization
Asset management service flows
Ops apps flows
Management Asset and Monitor and API and
Meta Data Diagnostics Portal OT users
7
WHITE PAPER | Securing OT in the Face of IIoT and 5G
The standard that guides the deployment for security in OT is ISA/IEC 62443.2 Based on its architectural guidance for
utilization of the PERA, Figure 7 below illustrates a mapping of the IIoT functional domains, technology tiers, and security
requirements to the Purdue model. The figure also shows various communication networks used within the IIoT ecosystem.
Cloud Services
Industrial Internet
Purdue Levels Reference Architecture Business segment
Figure 7: IIoT functional domains, technology tiers, and security requirements mapped to Purdue levels.
As highlighted in Figure 7, there may be various communication networks in the IIoT ecosystem providing communication
channels between different levels; these communication channels need to be protected and secured. The service network
typically relies on privately owned, dedicated communication networks or leased private networks—also known as mobile
private networks (MPNs) or private access point names (APNs) that include cellular networks (e.g., 4G/LTE, 5G). All of these
networks’ entry and exit points need to be proactively monitored and secured.
The edge tier (comprised of Levels 0, 1, and 2) typically runs multi-access edge computing (MEC)-based technologies that
provide compute, storage, and analytical functionality within the IIoT ecosystem. The MEC platform talks to the sensors,
controllers, and machines (the “things” of the IIoT) located within Level 1. It then connects these “things” to the platform and
enterprise tiers. The MEC platform usually runs virtualized operating systems, software applications, and tools. All of these
MEC-based implementations should be secured and protected with the necessary security measures described below.
8
WHITE PAPER | Securing OT in the Face of IIoT and 5G
1. Asset Management
6. Signaling Protection
This section will describe each security objective and provide an overview of the associated Fortinet solution. Fortinet maps
its solutions to the security requirements of the organization, not to a specific architecture. The objective is to enable security
with whatever architectural choice is made by the asset owner.
Asset Management
Asset management is applicable to all levels of the Purdue model. However, in the context of network-connected assets, it
applies to the assets in Levels 1 to 5 that have the capability to be probed and identified over the network. Asset management
is a broad subject and there are industry standards and best practices available that can be applied to devise both an asset
management strategy as well as implementation (e.g., ISO 55001:2014 or NIST SP 1800-5).
In terms of asset management within the IIoT ecosystem, several solutions within the Fortinet Security Fabric AI Fortinet
Security Fabric can help—including FortiGate next-generation firewalls (NGFWs) and FortiNAC network access control, in
combination with the FortiAnalyzer central log management and analysis platform.
Fortinet has an extensive partner network known as the Open Fabric Ecosystem, where solution vendors from across the
industry can leverage Fortinet Security Fabric application programming interfaces (APIs) for two-way integration. Security
Fabric API integration enables the partner solution to be “Fabric-Ready” and offer solution-specific capabilities.4 The Fabric-
Ready partner portfolio includes many well-known ICS/OT specific asset management solutions that can be integrated
seamlessly with Fortinet solutions such as FortiGate and FortiSIEM security information and event management system
to offer holistic visibility of assets and to assist with asset management. This allows any asset identification information
collected by a third-party solution to be shared with and integrated across the Fortinet Security Fabric platform.
Industrial sensors and actuators are numerous, distributed, and well-hidden. This makes it all the more important to employ
systems capable of automatically building an inventory and tracking the real-time status of these devices, gathering
metrics such as:
nnDevice type, hardware version, software version (where available)
nnLocation
9
WHITE PAPER | Securing OT in the Face of IIoT and 5G
FortiAnalyzer provides a high-level security operations center (SOC) view of gathered information, with the ability to drill down
to specific events. Reports can be generated on a regular basis to provide ongoing visibility for assets and communication
networks. FortiAnalyzer also incorporates a sophisticated event management tool that can take actions based on log events
from registered security components. FortiSIEM can be used for more advanced correlation, customization, and out-of-the-
box integration with a wide range of third-party products.
Most IIoT devices have limited functionality. Although this reduces the probability of vulnerabilities, it introduces a different
problem. IIoT functionalities are often custom developed, which may introduce bugs that would not have appeared in general-
purpose components that are typically field-hardened. Furthermore, the full breadth and diversity of devices that may be
labeled IIoT or IoT must also be considered. An agricultural soil monitor functions in an environment that is very different from
that of an autonomous vehicle. No matter what the device, exploits must be expected and protection put in place.
IoT platforms may have vulnerabilities just like any other software. In most cases, they will consist of coding bugs that allow
buffer overflows or other memory corruptions. In addition, most IoT platform signaling happens via some kind of API—so
typical API attacks should also be considered. Finally, data received by the platform will often result in a read or write to a
database. Therefore, SQL attacks must also be covered.
Like any service platform, care must be taken to expose only the minimum, and not to leave unused services running (which
is often the default case). For example, Server Message Block (SMB) services are often enabled by default and are also a
common vector for attack. Open ports should be checked and any unnecessary services should be disabled or removed
from the system.
When communications are protected end to end with TLS, there should be at least one security device that is decrypting
the traffic to ensure that the protected traffic is as expected. If this is not the case, a compromised IoT device could use
the encrypted connection to hide malicious traffic from the operator. If the security device is co-located with the IoT
platform, then it may offload the TLS processing and send decrypted traffic directly to the platform. Otherwise, it should
reencrypt the traffic to ensure that eavesdropping is not possible.
Intrusion Prevention
To deal with many of these types of attack, the FortiGate intrusion prevention system (IPS) is designed to detect and block a
wide range of attacks against IIoT and IoT:
nnExploits: This includes any attack on a vulnerability, and will typically be used either to cause a denial of service (DoS)
(by causing crashes or extra work within software) or local code execution, which will often result in a second-stage
attack (such as transferring a malicious executable).
nnReconnaissance: Scanning attacks, which include looking for open TCP or User Datagram Protocol (UDP) ports, and
looking for known software or protocol versions. Usually the goal of reconnaissance attacks is to identify vulnerable or
high-value targets.
10
WHITE PAPER | Securing OT in the Face of IIoT and 5G
nnFuzzing attacks: This is another method for finding vulnerabilities. It is usually done locally in a controlled environment
but can be used as a blunt-instrument attack on a live network. Examples include deliberate protocol anomalies, the use
of extremely long fields, or using an invalid/unusual date. All of these techniques are designed to trigger programming
errors. The goal is to find vulnerabilities or simply to cause disruption.
All of these attack types (and more) are identified and blocked by the FortiGate IPS function, which contains more than
30,000 rules, including an optional industrial security service package for ICS/OT. Rule packages are automatically
updated on a daily basis by FortiGuard Labs (the research and analysis arm of Fortinet) to ensure that protection is
constantly up to date.
Virtual patching
Whenever vulnerabilities are uncovered in IIoT devices, controllers, or infrastructure components, the most effective
solution is to patch the affected device with a vendor-supplied firmware update. However, this is not always possible.
Security updates may no longer be available for legacy devices. Even if they are, installing updates presents a risk, and in
most cases, a period of testing will be performed before a new release is put into production. In some cases, devices may
not even support firmware updates.
Fortinet’s virtual patching (also known as vulnerability shielding) between patching and capabilities provides a solution
for these sorts of problems. By using an upstream intrusion prevention device (e.g., a FortiGate NGFW), exploits can be
detected and blocked before they reach the vulnerable target. This can provide temporary protection until a definitive
patch is installed, or permanent protection for cases where patching is not an option.
Breach detection
Whether for IT or OT, the general goal of cybersecurity should be to stop attacks before they are able to compromise a
device. However, when an attack does get through defenses, IIoT security solutions must be able to detect signs of the
infection and act quickly.
There are a number of threat possibilities if an attacker successfully gains control of a device. The attack may simply
disable the device. This is generally the easiest type of attack, since it does not require any malicious firmware (bot) to
be installed. Attacks like this may also be monetized using a ransom model, where a payment must be made to prevent
the attack. In some cases, a device may be permanently destroyed by an attacker. An example of this could be to
substantially increase battery usage to the point of exhaustion in a deployment where the battery is intended to last the
lifetime of the device.
A more common approach (and one that gives maximum flexibility to the attacker) is a botnet. The effectiveness of IoT
botnets was shown in 2017 with Mirai, where hundreds of thousands of IoT devices (mainly cameras and DVRs) were used to
stage the largest ever known distributed denial-of-service (DDoS) attack.5 Botnets can exploit IIoT devices in the same way.
Using FortiOS botnet protection, any botnet activity—whether detected by destination address, domain, or protocol—
can generate an alert and be blocked. FortiGuard Labs maintains a list of all known botnet destination address and port
combinations, which is frequently updated across all FortiOS devices. All outgoing sessions are checked against this list.
Additionally, connections to other known bad destinations as detected by the FortiGuard Indicators of Compromise (IOC)
Service can generate a compromise alert. Botnets that use fast-flux domains (where a domain continually changes its IP
address mapping) can be checked against the domain itself by intercepting and checking the DNS request. Finally, even if
the destination address and domain are unknown, many botnets can be detected by their command-and-control protocols.
By using these three methods in parallel, Fortinet ensures the best chance of detecting botnet-infected devices.
11
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Typically, third-party remote access is common within IIoT networks for routine or ad hoc maintenance and
troubleshooting purposes. This may include remote configuration of assets or remote factory/site acceptance tests
(FAT/SAT). NAC capabilities can apply preadmission or post-admission network policies to such third-party connection
requests. Remote access can be supplemented with multifactor authentication (MFA) via FortiToken solution integration.
Traditionally, network segmentation has been utilized within industrial networks for separating assets, making it harder for
attackers to gain access to large numbers of devices, and preventing a cyberattack from spreading across the entire network.
Other advantages of such splitting are in improving security enforcement and control as well as improving network visibility.
In general, this applies to all network boundaries and within each Purdue level. As stated earlier, segmentation can be
physical or logical, depending on the protection level desired for the assets within each level. The assets must be grouped (or
“zoned” in Purdue terminology) and segmented from other assets. Special segments (zones) known as “conduits” need to be
implemented between the zones and network boundaries or where the zones converge. This allows implementation of various
security controls—including monitoring and filtering of network communication or information exchange.
Network segmentation is typically implemented by way of network switches and virtual LANs (VLANs). A network router or
firewall is utilized for allowing communication between different VLANs also known as inter-VLAN communication. At the
network switch level, VLANs provide a good mechanism for virtually splitting the LANs and grouping the network assets into
virtual zones. However, it is not effective in terms of inspecting the network traffic and making decisions should a malicious
communication (payload) traverse the communication channel. Introduction of an NGFW with built-in next-generation
intrusion prevention (NGIPS) functionality for inter-VLAN communication can solve the problem of inspecting network traffic
between the VLANs and can be effective in implementing decisionbased security policies for VLAN communication. However,
this still leaves one gap: communication within the VLAN between hosts, also known as intra-VLAN communication. The intra-
VLAN communication will not be inspected by the NGFW unless this traffic is specifically routed to the NGFW for inspection.
This is known as microsegmentation.
Microsegmentation within industrial networks carries network segmentation to its logical conclusion by further dividing each
industrial VLAN or LAN into distinct security segments down to the individual asset level, then defining security controls
and delivering services for each unique microsegment. Today’s industrial IoT environments utilize internet-enabled, open-
standard, and complex communication protocols that often carry sensitive information for production control environments.
Due to its openness and complexity, the information carried over these protocols can be manipulated to cause disruption in
the environment, opening the door to cyberattacks.
An NGFW with built-in NGIPS that understands industrial protocols and communication can prove very effective for
microsegmentation. It allows communication to and from an asset to be evaluated based on security policies, inspecting IIoT
protocols and communication at the ingress and egress points for the assets.
12
WHITE PAPER | Securing OT in the Face of IIoT and 5G
DMZ
Security Services
ISFW ISFW
FortiLink FortiLink
FortiSwitch FortiSwitch
FortiLink
FortiAP
Segment B
Plan Floor 1
HMI Historian PLC RTU HMI Historian PLC RTU
Microsegmentation
13
WHITE PAPER | Securing OT in the Face of IIoT and 5G
The ability to segment and microsegment the industrial environment, including visibility into industrial protocols, is a key benefit
of Fortinet’s approach to OT security. Fortinet products, including FortiGate, FortiSwitch, FortiAP, and others, are integrated into
the Fortinet Security Fabric, providing holistic protection of both the industrial and enterprise digital environment.
Signaling Protection
As 5G technologies mature, the use of cellular access networks will become more common in industrial networks. These
networks have a high signaling overhead. In the situation where there are large numbers of IIoT endpoints compared with
the amount of data transferred, this can pose a risk of signaling storms—either intentional (as a result of a cyberattack) or
unintentional (as a result of device malfunction).
The latter is of particular concern, because dealing with errors in embedded devices is particularly difficult. Often the most
reliable way to return the device to a known state is to restart. This is a good solution in theory. However, this may be
difficult to do in a live operational environment. Furthermore, an error condition may be caused by an external factor (e.g.,
high temperature, power outage, earthquake). If that factor impacts a large number of similar devices, then the result may
be that all such devices simultaneously reattach to the network. The resulting overhead on the signaling infrastructure may
cause outages not only for the devices involved but also for other services sharing the network.
FortiOS has a range of features designed to protect carrier networks, including protection from signaling storms. In
addition, the Fortinet IPS function has the ability to define rules for specific network behavior, including rate-based rules.
Because many IoT devices have a predictable packet rate, this can be used to detect unusual activity (possibly caused by
malfunction or compromise) and remove such devices from the network to protect the signaling infrastructure.
nnFor event logic (such as adjusting an actuator based on a sensor reading), the round-trip time between devices and
cloud may be too long and the reliability of a cloud connection may not be sufficient.
nnSending data into the cloud may present security risks, due to the transmission of private data over a public internet link.
The 3rd Generation Partnership Project (3GPP)—a consortium of standards organizations that develop protocols for
mobile telecommunications—has proposed several solutions to specifically address these issues, including:
nnThe MEC architecture, where an instance of the 5G packet core is implemented close to or on the customer premises.
This allows an IoT service platform and associated application servers to be located on-premises, which eliminates both
the round-trip time and data privacy issues.
nnA private 5G network, which is similar to the above except that the 5G packet core is dedicated to the end-user. This
further eliminates any privacy issues and ensures complete control of the infrastructure.
One or both of the above solutions can be used to provide highly reliable, low-latency, high-bandwidth applications with
all critical data remaining in the domain of the end-user.
From a security point of view, bringing the processing close to or onto the customer premises (known as “edge
computing”) brings advantages. Transactions can be handled locally without sending data over a WAN link or public
internet connection. Transactions that cannot be handled locally can exit to higher layers through a defined logical
interface with an appropriate security policy applied.
In cases where data must be sent to the cloud over an untrusted network, encryption and integrity protection should
be employed to guard against eavesdropping or tampering. FortiOS provides very mature and field-hardened TLS and
Internet Protocol security (IPsec) implementations with extreme scaling, thanks to hardware acceleration using dedicated
application-specific integrated circuits (ASICs) in FortiGate appliances or using central processing unit (CPU) acceleration
capabilities in virtualized instances.
14
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Fortinet solutions (including FortiAnalyzer, FortiManager, and FortiSIEM) can enable centralized logging and monitoring for
the Fortinet technologies deployed both within the IIoT ecosystem and across the broader OT environment. They can also
collect information from hundreds of other vendor devices that are part of the Fortinet Open Fabric Ecosystem.
Asset All Levels All Networks All Domains All Tiers FortiGate, FortiSwitch, FortiAP, FortiNAC,
Management Fabric-Ready Partner Solutions
Application Levels 1-5 All Networks All Domains All Tiers FortiGate, FortiSwitch, FortiAP
Visibility and
Control
Intrusion Levels 1-5 All Networks All Domains All Tiers FortiGate, FortiSwitch, FortiAP, Fabric-
Detection and Ready Partner Solutions
Response
Network Access Within and Between the Network All Domains All Tiers FortiGate, FortiSwitch, FortiAP,
Control Between Boundaries FortiAuthenticator, FortiToken, FortiNAC
Levels 1-5
Network Within and Between the Network All Domains All Tiers FortiGate, FortiSwitch, FortiAP
Segmentation Between Boundaries
Levels 1-5
Logging and Within Level 3.5 Between the Network All Domains All Tiers FortiGate, FortiSwitch, FortiAP, FortiNAC,
Monitoring or Level 3.5 and Boundaries FortiAnalyzer, FortiManager, FortiSIEM,
Level 5 Fabric-Ready Partner Solutions
Figure 9: Fortinet technologies mapped to security requirements and IIoT functional domains, tiers, and networks.
15
WHITE PAPER | Securing OT in the Face of IIoT and 5G
Cloud
Operational Segments
Major Enforcement Boundary
Purdue
Wireless Boundary
Enterprise Wireless
(Sensors, Platform)
Levels
IoT Boundary
5
(WiFi, 5G)
Enterprise Network Corporate
Business and
IT
IoT
Enterprise Segment
4
Business Planning
Site
and Logistics
Operations and
(Actuators, Sensors, Platform) Major Enforcement Boundary
Control Segment
Wireless Boundary
3
Industrial Wireless
Operations and Control Simulation, Engineering, Test
2
Area Supervisory
Security Management
Control
OT
Process Control 1 Basic Control Security Management
Segment
0 Process Security Management
Enforcement Boundaries
Safety and
Protection Segment S SIS Safety Instrumented System
Fortinet is totally focused on cybersecurity. As the industry’s leading pure-play cybersecurity provider with over 20 years of
experience protecting both IT and OT environments, Fortinet offers a full portfolio of integrated security solutions that not
only work with each other but also interconnect with products from hundreds of other suppliers. This includes all of the major
ICS and supervisory control and data acquisition (SCADA) offerings, asset and network industrial systems visibility products,
and industrial systems integrators. As production and operational technology evolves, organizations can be sure that the
Fortinet security investment made today will adapt and grow to meet future requirements.
1
“Industrial Internet Reference Architecture,” IIC, accessed December 30, 2020.
2
“New ISA/IEC 62443 standard specifies security capabilities for control system components,” ISA, accessed December 30, 2020.
3
“Cybersecurity Framework,” NIST, accessed December 30, 2020.
4
“Open Fabric Ecosystem,” Fortinet, accessed December 30, 2020.
5
Josh Fruhlinger, “The Mirai botnet explained: How teen scammers and CCTV cameras almost brought down the internet,” CSO, March 9, 2018.
www.fortinet.com
Copyright © 2021 Fortinet, Inc. All rights reserved. Fortinet®, FortiGate®, FortiCare® and FortiGuard®, and certain other marks are registered trademarks of Fortinet, Inc., and other Fortinet names herein may also be registered and/or common law trademarks of Fortinet. All other product
or company names may be trademarks of their respective owners. Performance and other metrics contained herein were attained in internal lab tests under ideal conditions, and actual performance and other results may vary. Network variables, different network environments and other
conditions may affect performance results. Nothing herein represents any binding commitment by Fortinet, and Fortinet disclaims all warranties, whether express or implied, except to the extent Fortinet enters a binding written contract, signed by Fortinet’s General Counsel, with a purchaser
that expressly warrants that the identified product will perform according to certain expressly-identified performance metrics and, in such event, only the specific performance metrics expressly identified in such binding written contract shall be binding on Fortinet. For absolute clarity, any
such warranty will be limited to performance in the same ideal conditions as in Fortinet’s internal lab tests. Fortinet disclaims in full any covenants, representations, and guarantees pursuant hereto, whether express or implied. Fortinet reserves the right to change, modify, transfer, or otherwise
revise this publication without notice, and the most current version of the publication shall be applicable.
884983-A-0-EN