EIO0000001999.11 Psxcs ModiconControllersPlatformCyberSecurity
EIO0000001999.11 Psxcs ModiconControllersPlatformCyberSecurity
Cybersecurity
User Guide
Original instructions
11/2023
EIO0000001999.11
www.se.com
Legal Information
The information provided in this document contains general descriptions, technical
characteristics and/or recommendations related to products/solutions.
This document is not intended as a substitute for a detailed study or operational and site-
specific development or schematic plan. It is not to be used for determining suitability or
reliability of the products/solutions for specific user applications. It is the duty of any such
user to perform or have any professional expert of its choice (integrator, specifier or the like)
perform the appropriate and comprehensive risk analysis, evaluation and testing of the
products/solutions with respect to the relevant specific application or use thereof.
The Schneider Electric brand and any trademarks of Schneider Electric SE and its
subsidiaries referred to in this document are the property of Schneider Electric SE or its
subsidiaries. All other brands may be trademarks of their respective owner.
This document and its content are protected under applicable copyright laws and provided
for informative use only. No part of this document may be reproduced or transmitted in any
form or by any means (electronic, mechanical, photocopying, recording, or otherwise), for
any purpose, without the prior written permission of Schneider Electric.
Schneider Electric does not grant any right or license for commercial use of the document or
its content, except for a non-exclusive and personal license to consult it on an "as is" basis.
Schneider Electric reserves the right to make changes or updates with respect to or in the
content of this document or the format thereof, at any time without notice.
To the extent permitted by applicable law, no responsibility or liability is assumed by
Schneider Electric and its subsidiaries for any errors or omissions in the
informational content of this document, as well as any non-intended use or misuse of
the content thereof.
Cybersecurity
Table of Contents
Safety Information ....................................................................................................5
Before You Begin .....................................................................................................6
Start-up and Test......................................................................................................7
Operation and Adjustments.......................................................................................8
About the Book .........................................................................................................9
Presentation ............................................................................................................16
Schneider Electric Guidelines..................................................................................16
How to Help Secure the Architecture ..................................................................18
System View..........................................................................................................18
Setting Passwords in Control Expert ........................................................................20
Hardening the PC...................................................................................................22
Disable Unused Embedded Communication Services ...............................................30
Restrict Data Flow from Control Network (Access Control) ........................................31
Set Up Encrypted Communication ...........................................................................34
CSPN Security Target.............................................................................................40
Set Up Cybersecurity Audit (Event Logging) .............................................................48
Event Log Message Descriptions for Control Expert..................................................56
Event Log Message Descriptions M580 Controllers (as of Firmware Version
V4.10), and BMENOR2200H (as of Firmware Version 3.01) ......................................62
Event Log Message Descriptions for M580 Controllers (Firmware earlier than
Version 4.10), BMENUA0100 and BMENOR2200H (Firmware earlier than Version
3.01) .....................................................................................................................74
Control Identification and Authentication ..................................................................89
Control Authorizations ............................................................................................93
Manage Data Integrity Checks ................................................................................97
Configure a Secure Engineering Link between Control Expert and an
M580 Ethernet Controller ......................................................................................99
Features of a Secure Connection ............................................................................99
Configure a Secure Connection Procedure ............................................................ 102
Operating Mode Considerations ............................................................................ 104
Enforced Secure Programming Compatibility and Limitations .................................. 105
EIO0000001999.11 3
Cybersecurity
4 EIO0000001999.11
Safety Information Cybersecurity
Safety Information
Important Information
Read these instructions carefully, and look at the equipment to become familiar with the
device before trying to install, operate, service, or maintain it. The following special
messages may appear throughout this documentation or on the equipment to warn of
potential hazards or to call attention to information that clarifies or simplifies a procedure.
The addition of this symbol to a “Danger” or “Warning” safety label indicates that an
electrical hazard exists which will result in personal injury if the instructions are not
followed.
This is the safety alert symbol. It is used to alert you to potential personal injury
hazards. Obey all safety messages that follow this symbol to avoid possible injury or
death.
! DANGER
DANGER indicates a hazardous situation which, if not avoided, will result in death or serious
injury.
! WARNING
WARNING indicates a hazardous situation which, if not avoided, could result in death or
serious injury.
! CAUTION
CAUTION indicates a hazardous situation which, if not avoided, could result in minor or
moderate injury.
NOTICE
NOTICE is used to address practices not related to physical injury.
EIO0000001999.11 5
Cybersecurity Safety Information
Please Note
Electrical equipment should be installed, operated, serviced, and maintained only by
qualified personnel. No responsibility is assumed by Schneider Electric for any
consequences arising out of the use of this material.
A qualified person is one who has skills and knowledge related to the construction and
operation of electrical equipment and its installation, and has received safety training to
recognize and avoid the hazards involved.
WARNING
UNGUARDED EQUIPMENT
• Do not use this software and related automation equipment on equipment which does
not have point-of-operation protection.
• Do not reach into machinery during operation.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
This automation equipment and related software is used to control a variety of industrial
processes. The type or model of automation equipment suitable for each application will
vary depending on factors such as the control function required, degree of protection
required, production methods, unusual conditions, government regulations, etc. In some
applications, more than one processor may be required, as when backup redundancy is
needed.
Only you, the user, machine builder or system integrator can be aware of all the conditions
and factors present during setup, operation, and maintenance of the machine and,
therefore, can determine the automation equipment and the related safeties and interlocks
which can be properly used. When selecting automation and control equipment and related
software for a particular application, you should refer to the applicable local and national
standards and regulations. The National Safety Council's Accident Prevention Manual
(nationally recognized in the United States of America) also provides much useful
information.
In some applications, such as packaging machinery, additional operator protection such as
point-of-operation guarding must be provided. This is necessary if the operator's hands and
6 EIO0000001999.11
Safety Information Cybersecurity
other parts of the body are free to enter the pinch points or other hazardous areas and
serious injury can occur. Software products alone cannot protect an operator from injury. For
this reason the software cannot be substituted for or take the place of point-of-operation
protection.
Ensure that appropriate safeties and mechanical/electrical interlocks related to point-of-
operation protection have been installed and are operational before placing the equipment
into service. All interlocks and safeties related to point-of-operation protection must be
coordinated with the related automation equipment and software programming.
NOTE: Coordination of safeties and mechanical/electrical interlocks for point-of-
operation protection is outside the scope of the Function Block Library, System User
Guide, or other implementation referenced in this documentation.
WARNING
EQUIPMENT OPERATION HAZARD
• Verify that all installation and set up procedures have been completed.
• Before operational tests are performed, remove all blocks or other temporary holding
means used for shipment from all component devices.
• Remove tools, meters, and debris from equipment.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
Follow all start-up tests recommended in the equipment documentation. Store all equipment
documentation for future references.
Software testing must be done in both simulated and real environments.
Verify that the completed system is free from all short circuits and temporary grounds that
are not installed according to local regulations (according to the National Electrical Code in
the U.S.A, for instance). If high-potential voltage testing is necessary, follow
recommendations in equipment documentation to prevent accidental equipment damage.
Before energizing equipment:
• Remove tools, meters, and debris from equipment.
EIO0000001999.11 7
Cybersecurity Safety Information
8 EIO0000001999.11
About the Book Cybersecurity
Validity Note
This document has been updated for EcoStruxure™ Control Expert V16.0.
For product compliance and environmental information (RoHS, REACH, PEP, EOLI, etc.),
go to www.se.com/ww/en/work/support/green-premium/.
EIO0000001999.11 9
Cybersecurity About the Book
Related Documents
Title of Documentation Reference Number
Modicon M580 System Planning Guide HRB62666 (English), HRB65318 (French), HRB65319
(German), HRB65320 (Italian), HRB65321 (Spanish),
HRB65322 (Chinese)
Modicon M340 for Ethernet, Communications Modules 31007131 (English), 31007132 (French), 31007133
and Processors, User Manual (German), 31007494 (Italian), 31007134 (Spanish),
31007493 (Chinese)
Quantum using EcoStruxure™ Control Expert, TCP/IP 33002467 (English), 33002468 (French), 33002469
Configuration, User Manuall (German), 31008078 (Italian), 33002470 (Spanish),
31007110 (Chinese)
Premium and Atrium using EcoStruxure™ Control 35006192 (English), 35006193 (French), 35006194
Expert, Ethernet Network Modules, User Manuall (German), 31007214 (Italian), 35006195 (Spanish),
31007102 (Chinese)
Quantum using EcoStruxure™ Control Expert, 35010529 (English), 35010530 (French), 35010531
Hardware Reference Manual (German), 35013975 (Italian), 35010532 (Spanish),
35012184 (Chinese)
10 EIO0000001999.11
About the Book Cybersecurity
EcoStruxure™ Control Expert, Communication, Block 33002527 (English), 33002528 (French), 33002529
Library (German), 33003682 (Italian), 33002530 (Spanish),
33003683 (Chinese)
Quantum using EcoStruxure™ Control Expert, 33002479 (English), 33002480 (French), 33002481
Ethernet Network Modules, User Manual (German), 31007213 (Italian), 33002482 (Spanish),
31007112 (Chinese)
Modicon M580 BME CXM CANopen Modules, User EIO0000002129 (English), EIO0000002130 (French),
Manual EIO0000002131 (German), EIO0000002132 (Italian),
EIO0000002133 (Spanish), EIO0000002134
(Chinese)
EIO0000001999.11 11
Cybersecurity About the Book
WARNING
LOSS OF CONTROL
• Perform a Failure Mode and Effects Analysis (FMEA), or equivalent risk analysis, of
your application, and apply preventive and detective controls before implementation.
• Provide a fallback state for undesired control events or sequences.
• Provide separate or redundant control paths wherever required.
• Supply appropriate parameters, particularly for limits.
• Review the implications of transmission delays and take actions to mitigate them.
• Review the implications of communication link interruptions and take actions to
mitigate them.
• Provide independent paths for control functions (for example, emergency stop, over-
limit conditions, and error conditions) according to your risk assessment, and
applicable codes and regulations.
• Apply local accident prevention and safety regulations and guidelines.1
• Test each implementation of a system for proper operation before placing it into
service.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
1 For additional information, refer to NEMA ICS 1.1 (latest edition), Safety Guidelines for the
Application, Installation, and Maintenance of Solid State Control and to NEMA ICS 7.1
(latest edition), Safety Standards for Construction and Guide for Selection, Installation and
Operation of Adjustable-Speed Drive Systems or their equivalent governing your particular
location.
WARNING
UNINTENDED EQUIPMENT OPERATION
• Only use software approved by Schneider Electric for use with this equipment.
• Update your application program every time you change the physical hardware
configuration.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
12 EIO0000001999.11
About the Book Cybersecurity
WARNING
UNINTENDED EQUIPMENT OPERATION, LOSS OF CONTROL, LOSS OF DATA
You, and anyone owning, designing, operating and/or maintaining equipment using
EcoStruxure Control Expert, must read, understand, and follow the instructions outlined in
the present document.
Failure to follow these instructions can result in death, serious injury, or equipment
damage.
EIO0000001999.11 13
Cybersecurity About the Book
Standard Description
ISO 12100:2010 Safety of machinery - General principles for design - Risk assessment and risk
reduction
EN 60204-1:2006 Safety of machinery - Electrical equipment of machines - Part 1: General requirements
ISO 14119:2013 Safety of machinery - Interlocking devices associated with guards - Principles for
design and selection
IEC 62061:2021 Safety of machinery - Functional safety of safety-related electrical, electronic, and
electronic programmable control systems
IEC 61784-3:2021 Industrial communication networks - Profiles - Part 3: Functional safety fieldbuses -
General rules and profile definitions.
14 EIO0000001999.11
About the Book Cybersecurity
In addition, terms used in the present document may tangentially be used as they are
derived from other standards such as:
Standard Description
IEC 61158 series Digital data communications for measurement and control – Fieldbus for use in
industrial control systems
Finally, the term zone of operation may be used in conjunction with the description of
specific hazards, and is defined as it is for a hazard zone or danger zone in the Machinery
Directive (2006/42/EC) and ISO 12100:2010.
NOTE: The aforementioned standards may or may not apply to the specific products
cited in the present documentation. For more information concerning the individual
standards applicable to the products described herein, see the characteristics tables for
those product references.
EIO0000001999.11 15
Cybersecurity Presentation
Presentation
Introduction
The goal of this book is to present the cybersecurity solutions implemented in Modicon
controllers and associated software applications. In addition to the solutions presented in
this book, apply the guidelines provided in Schneider Electric cybersecurity technical notes
available on the Schneider Electric website.
Defense-In-Depth Approach
In addition to the solutions presented in the present document, follow the Schneider Electric
defense-in-depth approach as described in the following documents:
• Book title: How can I ... Reduce Vulnerability to Cyber Attacks? System Technical
Note, Cybersecurity Recommendations
• Website link description (book description): How Can I Reduce Vulnerability to
Cyber Attacks in PlantStruxure Architectures?
Managing Vulnerabilities
Reported vulnerabilities from Schneider Electric devices are documented in the
Cybersecurity support web page at http://www2.schneider-electric.com/sites/corporate/
en/support/cybersecurity/cybersecurity.page.
16 EIO0000001999.11
Presentation Cybersecurity
EIO0000001999.11 17
Cybersecurity How to Help Secure the Architecture
System View
System Architecture
The following architecture highlights the necessity to have a multi-layered architecture (with a
control network and a device network) that can be more secured. A flat architecture (all equipment
connected to the same network) cannot be secured properly.
18 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Testing
Control Expert provides a simulator to test your application before commissioning it as part
of your industrial automation system. The simulator conforms to the cybersecurity
requirements that:
• The simulator can be operated only with an application open in Control Expert.
• The application open in the simulator cannot be uploaded from the simulator to the
controller.
For information on how to operate the simulator, refer to the help for the EcoStruxure™
Control Expert, Controller Simulator (https://youtu.be/RrkorSe0G8s)..
EIO0000001999.11 19
Cybersecurity How to Help Secure the Architecture
Application Password
Control Expert provides a password mechanism to help guard against unauthorized access
to the application. Control Expert uses the password when you:
• Open the application in Control Expert.
• Connect to the controller in Control Expert.
Application protection by a password helps prevent unwanted application modification,
download, or opening of application files. The password is stored encrypted in the
application.
In addition to the password protection you can encrypt the .STU, .STA and .ZEF files. The
file encryption feature in Control Expert helps prevent unauthorized modifications by
unqualified personnel and reinforces protection against theft of intellectual property and
other malicious intentions. The file encryption option is protected by a password
mechanism.
NOTE: When a controller is managed as part of a system project, the application
password and file encryption are disabled in the Control Expert editor and need to be
managed by using the Topology Manager.
For information on how to set and use application passwords, refer to the Application
Protection topic in the EcoStruxure™ Control Expert, Operating Modes manual.
20 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
When the safety-related area password protection function is active, the safety-related parts
of the application cannot be modified.
For information on how to set and use safety-related area passwords, refer to the Safety-
related Area Password Protection topic in the EcoStruxure™ Control Expert, Operating
Modes manual
).
EIO0000001999.11 21
Cybersecurity How to Help Secure the Architecture
Hardening the PC
Workstation PCs located in the control room are highly exposed to attacks. Those PCs
supporting EcoStruxure™ Control Expert or EcoStruxure™ Server Expert need to be
hardened.
As these applications all run on the Windows OS, this chapter offers guidelines on how to
how to harden a PC by focusing on security for Windows 10.
22 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 23
Cybersecurity How to Help Secure the Architecture
24 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 25
Cybersecurity How to Help Secure the Architecture
• Disabling SMBv1:
Server Message Block version 1 (SMBv1) is a protocol used for sharing services (such
as printing, files and communication) between PCs on a network. SMBv1 has been
demonstrated to present the vulnerability of allowing remote code execution on the host
PC.
You can disable SMBv1 to help minimize vulnerabilities.
Step Action
1 In Windows 10, disable RDP via Computer > System Properties > Advanced System
Settings.
2 On the Remote tab, deselect the Allow Remote Assistance Connections to this Computer
check box.
3 Select the Don’t Allow Connection to this Computer check box.
Step Action
1 In a command window, execute secpol.msc to open the Local Security Policy window.
4 Select the Network Security: Do not store LAN Manager hash value on next password
change check box.
26 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Step Action
1 Open Control Panel > Network and Internet > Network and Sharing Center > Change
Adapter Settings.
EIO0000001999.11 27
Cybersecurity How to Help Secure the Architecture
Backup Management
Ensure that:
• All system data is automatically backed up on a regular basis (Refer to CIS control
10.1)., page 29
• The organization’s key systems are backed up as a complete system, through
processes such as imaging, to enable the quick recovery of an entire system. (Refer to
CIS control 10.2)., page 29
• Backups are properly protected via physical security or encryption when they are
stored, and also when they are moved across the network. This includes remote
backups and cloud services. (Refer to CIS control 10.4)., page 29
• All backups have at least one offline (i.e., not accessible via a network connection)
backup destination (Refer to CIS control 10.5)., page 29
You can:
• Use File History and other free tools in Windows 10 to create file backups.
28 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Confidentiality Management
Remove sensitive data or systems not regularly accessed by the organization from the
network. These systems can be used as stand-alone systems (disconnected from the
network) of the business unit that needs to occasionally use them, or can be completely
virtualized and powered off until needed. Refer to the CIS document referenced below.
(Refer to CIS control 13.2)., page 29
Turn on disk encryption with Bitlocker. More details on Bitlocker settings are provided in the
CIS Document referenced below.
Audit Management
Ensure that local security logging has been configured on Windows hosts. For details on
Audit Policy configuration, refer to the CIS Document referenced below., page 29
EIO0000001999.11 29
Cybersecurity How to Help Secure the Architecture
Both the "CIS benchmarks" document and “STIG Windows 10 Security technical
implementation guide” propose optional profiles. Your choice of a profile depends on the
criticality of your applications running on Windows.
30 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Description
In order to control the access to communication servers in an embedded product, the
access control management restricts the IP-based data flow from control network to an
authorized source or subnet IP address.
EIO0000001999.11 31
Cybersecurity How to Help Secure the Architecture
Architecture Example
The purpose of the following figure is to show the role and impact of the access control
settings. The access control manages the Ethernet data flow from devices communicating
on the operation and control networks (located in the grayed out area).
(*) Some services require access to the device network (for example: firmware update, at
source time stamping). In such cases, an optional router/VPN helps secure the access
control.
32 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
• Any equipment connected to the operation network (IP address = 192.200.x.x) can
access the controller Web server.
• Any equipment connected to the control network (IP address = 192.200.100.x) can
communicate with the controller with Modbus TCP and can access the Web server.
To restrict data flow in previous architecture example, the authorized addresses and
services are set as follows in EcoStruxure Control Expert access control table:
Source IP address Subnet Subnet FTP TFTP HTTP / Por- EIP SN-
mask HTTPS t502 MP
Network 192.200.50.2 No – – – – – – +
manager
Settings Description
An authorized address is set for devices authorized to communicate with the controller using
Modbus TCP or EtherNet/IP.
Services settings explanation for each IP address in previous example:
192.200.50.2 (SNMP) Set to authorize the access from the network manager
using SNMP.
EIO0000001999.11 33
Cybersecurity How to Help Secure the Architecture
NOTE: The access list analysis goes through each access control list entry. If a
successful match (IP address + allowed service) is found, then the other entries are
ignored.
In the EcoStruxure Control Expert security screen, for a dedicated subnet enter the
specific rules before the subnet rule. For example: To give a specific SNMP right to
device 192.200.50.2, enter the rule before the global subnet rule 192.200.0.0/
255.255.0.0 which allows HTTP access to all the devices of the subnet.
Description
The IPsec function helps to secure:
• The control room Modbus access to the controller through the BMENOC0301 and
BMENOC0311 modules.
• The control room access to the communication services running inside the
BMENOC0301 and BMENOC0311 modules in server mode (Modbus, EtherNet/IP,
HTTP, FTP, SNMP).
NOTE: IPsec is intended to help secure services running in server mode in the
controller. Secure client services initiated by the Modicon M580 PAC are outside the
scope of this manual.
Wireless connection: When a PMXNOW0300 wireless module is used to configure a
wireless connection, configure this module with the maximum security settings available
(WPA2-PSK).
34 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Architecture Example
The purpose of the following figure is to illustrate through an example the various protocols
or services involved in a encrypted communication from the control room to a Modicon
M580 controller.
EIO0000001999.11 35
Cybersecurity How to Help Secure the Architecture
EIP class 3 server These services are supported through encrypted connections.
FTP server, TFTP server
HTTP
ICMP (ping, etc.)
Modbus scanner
RSTP
DHCP, BootP client These services are not supported when IPSec is enabled.
NOTE: Before IKE/IPsec is initiated by the peer (PC), this
DHCP, BootP server
traffic is not secured by IPSec. After IKE/IPSec is
EIP class 1, TCP (forward open) established, this traffic is encrypted by IPsec. Protocol could
be supported, but only if packet recipient is a PC with IPSec
EIP class 1, UDP (data exchange) configured and enabled.
Modbus client
NTP client
SNMP agent
SNMP traps
NOTE:
• IPsec is an OSI layer 3 protection. OSI layer 2 protocols (ARP, RSTP, LLDP, loop
check protocol) are not protected by IPsec.
• Global Data communication flow (using BMXNGD0100 modules) cannot be
secured by IPsec. Use such a configuration on an isolated network.
36 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Limitations
IPsec limitations in the architecture: BMENOC0301 and BMENOC0311 modules do not
support IP forwarding to device network.
If transparency is required between control and device network, an external router/vpn is
needed to provide an encrypted communication between the control and device network (as
shown in previous architecture example figure, page 35).
Transparency is required to perform the following operations from the control network:
• Update an M580 controller firmware from the Automation Device Maintenance through
HTTPS service.
• Perform a network diagnostic of M580 controller from a network management tool
through SNMP service.
• Diagnose an M580 controller from a DTM through EIP service.
• Diagnose an M580 controller from a Web browser through HTTP service.
• Log an M580 controller cybersecurity events in a syslog server through syslog service.
• Synchronize an M580 controller time from a global time server through NTP service.
EIO0000001999.11 37
Cybersecurity How to Help Secure the Architecture
38 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Step Action
3 In the Create Composite Master Key dialog box, enter a Master password. Enter the password
again in the Repeat password field.
12 Open the Password Generation Options dialog box (Tools > Generate Password).
13 Make these selections at Generate using character set:
• Upper-case (A, B, C, …)
• Lower-case (a, b, c, …)
• Digits (0, 1, 2, …)
• Minus (-)
• Underline (_)
• Special (!, $, %, &, …)
• Brackets ([, ], [, (, ), <, >)
NOTE: These characters are not accepted for use in the pre-shared key:
• {
• }
• ;
• #
14 Press OK.
15 Right-click on your device in the Database list and scroll to Copy Password.
EIO0000001999.11 39
Cybersecurity How to Help Secure the Architecture
40 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
The following illustration describes a typical M580 system architecture that can be
vulnerable to a security attack:
EIO0000001999.11 41
Cybersecurity How to Help Secure the Architecture
M580 Features
The M580 controller offers the following features:
Feature Description
user program execution An M580 controller runs a user program that processes the inputs
and updates the outputs.
input/output management An M580 controller can read local inputs and write local outputs.
These inputs/outputs can be digital or analog and allow the M580
controller to control and command the industrial process.
communication with the supervision An M580 controller can communicate with SCADA to receive
commands and transmit process data using the Modbus protocol.
remote logging An M580 controller supports the definition of a remote logging policy;
it can log security and administrative events.
M580 Configuration
A CSPN-certified M580 configuration includes these components:
BMEP58•0•0 as of version 2.20 The controller follows the security rules described in the security
documents (see assumptions).
BMENOC0301 and as of version 2.11 This Ethernet module manages the encrypted communications
BMENOC0311 with the upper layer (EcoStruxure Control Expert supervision
and engineering software).
42 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
User Profiles
Users that interact with the controller for an improved implementation have the following
predefined EcoStruxure Control Expert Security Editor’s profiles:
Improved Implementation
These items contribute to a healthy environment for an improved implementation:
security documentation All instructions in the documentation (user guides, white papers, etc) are
applied prior to the evaluation.
unevaluated services disabled Any services that are not covered by the security target are disabled in the
configuration or by a user program (as described in the security
documentation).
user application verification The integrity of the EcoStruxure Control Expert application is controlled by
the administrator before it is loaded in the controller.
active logging The logging function is operational and the logs are not corrupt.
log checking System administrators regularly check the local and remote logs.
first configuration The initial configuration is uploaded to the controller through the USB
interface, and the controller is unplugged from the network.
firmware upgrade The firmware upgrade is performed through the USB interface, and the
controller is unplugged from the network.
strong passwords System administrators employ strong passwords that combine uppercase
letters, lowercase letters, numbers, and special characters.
EIO0000001999.11 43
Cybersecurity How to Help Secure the Architecture
Operating Modes
The following operating modes are compliant with CSPN requirements:
• During commissioning phase, initial configuration of the controller can be done with
either a Control Expert engineering station connected in point-to-point to the Ethernet
port or to the local USB port of the controller.
• In normal operating conditions (running mode, SCADA connected on the Ethernet
control network), confirm that Control Expert is disconnected.
• Perform any further modification of the configuration or application program with Control
Expert connected to the USB port of the controller.
Cybersecurity Parameters
This table describes the cybersecurity parameters:
No upload information stored inside controller. Controller Embedded Data EcoStruxure™ Control
Expert, Operating
Default password for FTP service changed. Firmware Protection Modes
Application sections are set with no read/write Section and Subroutine Protection
access.
44 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Critical Assets
Environment: This table shows the assets that are critical to the environment:
control-command of the The controller controls and commands an industrial process by reading inputs and
industrial process sending commands to actuators. The availability of these actions is protected.
engineering workstation The flows between the controller and the engineering workstation are protected in
flows integrity, confidentiality, and authenticity.
controller: This table shows the assets that are critical to the controllers:
controller memory The controller memory contains the controller configuration and a program that is loaded
by the user. Its integrity and authenticity are protected while it is running.
execution mode The integrity and authenticity of the execution mode of the controller are protected.
user secrets All passwords that are used to perform authentication are held in the confidence by the
appropriate users.
firmware X X
controller memory X X
execution mode X X
user secrets X X
EIO0000001999.11 45
Cybersecurity How to Help Secure the Architecture
Security Threats
Threats considered by attackers controlling a device plugged into the supervision network:
denial of service Av
firmware alteration I, Au
Av: availability
I: integrity
C: confidentiality
Au: authenticity
denial of service The attacker manages to generate a denial of service on the controller by performing an
unexpected action or by exploring a vulnerability (sending a malformed request, using a
corrupted configuration file...). This denial of service affect the entire controller or some of its
functions.
firmware alteration The attacker manages to inject and run a corrupted firmware on the controller. The code
injection may be temporary or permanent, and does not include any unexpected or
unauthorized code execution. A user may attempt to install that update on the controller by
legitimate means. Finally, the attacker manages to modify the version of the firmware
installed on the controller without having the privilege to do so.
execution mode The attacker manages to modify the execution mode of the controller without being
alteration authorized (a stop command for instance).
memory alteration The attacker manages to modify, temporarily or permanently, the user program or
configuration that run in the controller memory.
flows alteration The attacker manages to corrupt exchanges between the controller and an external
component without being detected. He can perform attacks such as credential theft, access
control violation, or control-command of the industrial process mitigation.
storage of secrets X
46 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
firmware signature X
malformed input The controller has been developed to correctly handle malformed input, particularly
management malformed network traffic.
strength of secrets The controller has been developed to correctly handle malformed input, particularly
malformed network traffic.
• the PSK used to mount the IPsec tunnel
• the application password used to read the .STU Control Expert file and connect
the file to the controller
• other services passwords (like FTP)
authentication on Session tokens are protected against hijack and replay; they have a short lifespan. The
administrative interface identity and permissions of the user account are systematically checked before any
privileged action. An application password is set in each configuration, which helps
prevent any modification of the controller from a non-authentic user.
access control policy The access control policy helps control the authenticity of privileged operations, i.e.,
operations that can alter identified critical assets. The access control list (ACL) is
activated in each configuration, and only identified IP addresses can connect to the
controller.
firmware signature At each firmware update, integrity and authenticity of the new firmware are checked
before updating.
EIO0000001999.11 47
Cybersecurity How to Help Secure the Architecture
integrity and authenticity of The memory protection feature is activated in each configuration, which helps prevent
controller memory the modification of the running program without an action in specific inputs or outputs. If
no input/output module is installed, the programming interface is blocked. The controller
helps ensure the integrity and authenticity of the user program, so that authorized users
can modify the program.
The memory protection also helps ensure the configuration protection, which includes
several security parameters:
• Access control policy.
• RUN/STOP by input only activated.
• Memory protection activated.
• Enabled/disabled services (FTP, TFTP, HTTP, DHCP, SNMP, EIP, NTP).
• IPsec parameters.
• Syslog parameters.
integrity of the controller The controller helps ensure that the execution mode can be modified by authorized
execution mode users that are authenticated. The RUN/STOP by input only feature is activated, which
helps prevent the possibility of changing the RUN/STOP status through the Ethernet
interface.
encrypted communication The controller supports encrypted communication, protected in integrity, confidentiality,
and authenticity (IPsec encrypted with ESP).The FTP protocol is disabled, and IPsec
helps secure Modbus communication through the BMENOC0301 and BMENOC0311
modules.
48 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
0 Kernel messages.
1 User-level messages.
2 Mail system.
3 System daemons.
8 UUCP subsystem
9 Clock daemon.
10 Security / authorization messages.
11 FTP daemon.
12 NTP subsystem.
13 Log audit.
14 Log alert.
15 Clock daemon.
16...23 Local use 0...7.
EIO0000001999.11 49
Cybersecurity How to Help Secure the Architecture
50 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Architecture Example
The following figure highlights the position of logging server in a system architecture:
Syslog messages.
VERSION Version of the Syslog protocol specification (Version = 1 for RFC 5424).
EIO0000001999.11 51
Cybersecurity How to Help Secure the Architecture
Fields Description
TIMESTAMP Time stamp format is issued from RFC 3339 that recommends the following ISO8601
Internet date and time format: YYY-MM-DDThh:mm:ss.nnnZ
NOTE: -, T, :, . , Z are mandatory characters and they are part or the time stamp field.
T and Z need to be written in uppercase. Z specifies that the time is UTC.
Time field content description:
• YYY: Year
• MM: Month
• DD: Day
• hh: Hour
• mm: Minute
• ss: Second
• nnn: Fraction of second in millisecond (0 if not available)
HOSTNAME Identifies the machine that originally sent the Syslog message: fully qualified domain name
(FQDN) or source static IP address if FQDN is not supported.
Source @IP address = @IP address A OR @IP address B in case of HSBY controller
APP-NAME Identifies the application that initiates the Syslog message. It contains information that
identifies the entity sending the message (for example, subset of commercial reference).
PROCID Process or protocol name that originated the message (for example, Modbus, HTTPS,
LocalHMI)
MSG Message containing the event-specific result (see Event Log Message Descriptions for
Control Expert, page 56)
52 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 53
Cybersecurity How to Help Secure the Architecture
Field Description
VERSION Version of the Syslog protocol specification (Version = 1 for RFC 5424.).
TIMESTAMP Time stamp format is issued from RFC 3339 that recommends the following ISO8601 Internet
date and time format: YYY-MM-DDThh:mm:ss.nnnZ
NOTE: -, T, :, . , Z are mandatory characters and they are part or the time stamp field. T
and Z need to be written in uppercase. Z specifies that the time is UTC.
Time field content description:
• YYY: Year
• MM: Month
• DD: Day
• hh: Hour
• mm: Minute
• ss: Second
• nnn: Fraction of second in millisecond (0 if not available)
HOSTNAME Identifies the machine that originally sent the Syslog message. Fully Qualified Domain Name
(FQDN) or source static IP address if FQDN is not supported.
APP-NAME Identifies the application that initiates the Syslog message. It contains information that
identifies the entity sending the message (for example, subset of commercial reference).
PROCID Process or protocol name that originated the message (for example, Modbus, HTTPS,
LocalHMI, ….)
54 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Step Action
Unity Pro is the former name of Control Expert for version 13.1 or earlier.
4 Enter a valid SYSLOG server address and SYSLOG server port number.
5 Perform a Build after configuring this setting (you are not required to select Analyze
Project).
EIO0000001999.11 55
Cybersecurity How to Help Secure the Architecture
Control Expert If a communication error with the Syslog server occurs, the detected error is
recorded in the event viewer. To enable the event viewer in Control Expert, select
the Audit check box in the Policies tab of the Security Editor (see EcoStruxure™
Control Expert, Security Editor, Operation Guide).
56 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Update initial values with present 10 6 Update init values with present
values values
Upload of the application from 10 6 transfer project from PAC
the controller
Download of the application to 10 6 transfer project to PAC
the controller
Transfer data values from file to 10 6 transfer data values from file to
controller PAC
Restore project backup in 10 6 restore project backup in PAC
controller
Save to project backup in 10 6 save to project backup in PAC
controller
Change controller address 10 6 Set address
connection
Control Expert options 10 6 Modify options
modifications
Variable value modification inside 10 6 Modify variable values
the controller
Variable forcing value 10 6 Force internal bits
modification inside the controller:
internal bits
Variable forcing value 10 6 Force outputs
modification inside the controller:
outputs
EIO0000001999.11 57
Cybersecurity How to Help Secure the Architecture
58 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 59
Cybersecurity How to Help Secure the Architecture
60 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
File action File XXXXX open 0 6 XXXXX file has been opened
EIO0000001999.11 61
Cybersecurity How to Help Secure the Architecture
62 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 63
Cybersecurity How to Help Secure the Architecture
64 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 65
Cybersecurity How to Help Secure the Architecture
66 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 67
Cybersecurity How to Help Secure the Architecture
68 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 69
Cybersecurity How to Help Secure the Architecture
70 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 71
Cybersecurity How to Help Secure the Architecture
Hardware Change Network 6 System HARD- [sys- Port link up, CPU
change detected physical WARE_ tem@3833 Port link
in network port CHANG- object= down
topology change: E Object ]
port link up/ Object =
down "eth"
followed by
decimal
number
Any 6 System HARD- [sys- Port enable CPU
topology WARE_ tem@3833 Port disable
change CHANG- object= Port
detected E Object ] learning
from RSTP Object = Port
/ HSR / "eth" forward
PRP followed by Port
decimal blocking
number
Change M580 SD 6 System HARD- [sys- Insertion, CPU
detected card WARE_ tem@3833 Extraction
in insertion/ CHANG- object=
Hardware extraction E "SDCard" ]
72 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
NOTE: In addition to the structure described above, each message will also contain the
following fields and values:
• Facility = 10
• HOSTNAME = Fully Qualified Domain Name (FQDN) or local IP address
• APPNAME = Commercial reference name, for example, BMEP584040
EIO0000001999.11 73
Cybersecurity How to Help Secure the Architecture
74 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 75
Cybersecurity How to Help Secure the Architecture
76 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
via
HTTPS)
EIO0000001999.11 77
Cybersecurity How to Help Secure the Architecture
protocol
(about
IEC60870
client and
server)
78 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
TYP_
DSCNCT_
TIME-
OUT)
EIO0000001999.11 79
Cybersecurity How to Help Secure the Architecture
80 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
For NUA
only:
XXXX =
"Control
Expert
Data
Flows to
controller
only" or
"Control
Expert
Data
Flows to
Device
Network"
or "CPU to
CPU Data
Flows" For
NOR only:
XXXX =
"DNP3
over TLS
channel
["channel
name"]" or
"IE-
C60870
over
TLS"YYY-
Y=
"enable"
or
"disa-
ble"Exam-
ple:"Major
communi-
cation
EIO0000001999.11 81
Cybersecurity How to Help Secure the Architecture
parameter
update:
FTP
enable"
Network Any 10 4 DEVICE_ "(null)" LI19: Any "Major CPU
physical network MANAG- network network
port physical ER physical physical NUA
change: port status port status port status
port link change. change. change:
up/down Can be Can be XXXX link
the simple the simple YYYY"
status of a status of a XXXX =
Ethernet Ethernet "ETH"
port, or port, or following
informa- informa- by decimal
tion tion number
gathered gathered for the
from from port or
RSTP / RSTP / "FRONT
HSR / HSR / port"
PRP PRP YYYY =
algorithm algorithm "link up" or
for for "link
redundant redundant down"
systems systems Example:
(MNT_ "Major
ENG_ network
MSG_ physical
TYP_ port status
NETWK_ change:
PORT_ ETH1 link
CHG) up)
82 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
"forward",
"blocking"
EIO0000001999.11 83
Cybersecurity How to Help Secure the Architecture
"PLC state
update:
RUN"
"PLC state
update:
Mainte-
nance
mode"
Major Operation 13 6 DEVICE_ "(null)" LI26: "Hardware CPU
Changes on MANAG- Hardware update:
in the SDCard ER change XXXX"
system: for module MNT_ (with
Hardware that have ENG_ XXXX that
change MSG_ describes
HARD- the
WARE_ update)
CHANGE XXXX =
"SD card
insertion"
or "SD
card
extraction"
Rotary DEVICE_ "Hardware NUA
Wheel MANAG- update:
position ER XXXX"
change: (with
Reset, XXXX that
Advanced describes
the
update)
XXXX =
"back to
factory
mode" or
"secure
mode"
Major Create HTTPS "(null)" Li11: "Update NUA
change in user MNT_ RBAC"
Cyberse- account ENG_
curity MSG_
RBAC Delete TYP_
(done user RBAC_
through account UPDATE
Cyberse-
curity Update
configura- user
tion web account
pages).
84 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 85
Cybersecurity How to Help Secure the Architecture
86 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
EIO0000001999.11 87
Cybersecurity How to Help Secure the Architecture
NOTE: In addition to the structure described above, each message will also contain the
following fields and values following the Severity field:
• HOSTNAME = Local IP address or null.
• APPNAME = Commercial reference name, for example, BMEP584040.
• PROCID is not used.
• MSG:IssuerAdress = Local IP Address.
• MSG:Peer is not used.
88 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Managing Passwords
Password management is one of the fundamental tools of device hardening, which is the
process of configuring a device against communication-based threats. It is a good practice
to apply the following password management guidelines:
• Enable password authentication on all e-mail and Web servers, controllers, and
Ethernet interface modules.
EIO0000001999.11 89
Cybersecurity How to Help Secure the Architecture
• Change all default passwords immediately after installation, including those for:
◦ user and application accounts on Windows, SCADA, HMI, and other systems
◦ scripts and source code
◦ network control equipment
◦ devices with user accounts
◦ FTP servers
◦ SNMP and HTTP devices
◦ Control Expert
• Grant passwords only to people who require access. Prohibit password sharing.
• Do not display passwords during password entry.
◦ Require passwords that are difficult to guess. They should contain at least 8
characters and should combine upper and lower case letters, digits, and special
characters when permitted.
• Require users and applications to change passwords on a scheduled interval.
• Remove employee access accounts when employment has terminated.
• Require different passwords for different accounts, systems, and applications.
• Maintain a secure master list of administrator account passwords so they can be quickly
accessed in the event of an emergency.
• Implement password management so that it does not interfere with the ability of an
operator to respond to an event such as an emergency shutdown.
• Do not transmit passwords by e-mail or other manner over the insecure Internet.
Managing HTTP
Hypertext transfer protocol (HTTP) is the underlying protocol used by the Web. It is used in
control systems to support embedded Web servers in control products. Schneider Electric
Web servers use HTTP communications to display data and send commands via webpages.
If the HTTP server is not required, disable it. Otherwise, use hypertext transfer protocol
secure (HTTPS), which is a combination of HTTP and a cryptographic protocol, instead of
HTTP if possible. Only allow traffic to specific devices, by implementing access control
mechanisms such as a firewall rule that restricts access from specific devices to specific
devices.
You can configure HTTPS as the default Web server on the products that support this
feature.
90 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Managing FTP
File transfer protocol (FTP) provides remote file handling services through a TCP/IP-based
network, such as Internet. FTP uses a client-server architecture as well as separate control
and data connections between the client and the server.
Consider the following behavior of the FTP service provided by Schneider Electric:
• FTP protocol is disabled by default.
• FTP protocol is necessary for specific maintenance and configuration activities only. It is
a good practice to disable the entire set of FTP services when they are not required.
• FTP protocol is an unsecure protocol and must be used with care to avoid sensitive
information disclosure and unauthorized access to the controllers:
◦ Change the default passwords of all devices that support FTP, when possible.
◦ Use Access Control List to restrict communication to the authorized IP addresses.
Refer to “Cybersecurity Services Per System” for details on the concerned module.
◦ When using BMENOC module, configure the IPSEC feature (Set Up Encrypted
Communication, page 34).
◦ Block all inbound and outbound FTP traffics at the boundary of the enterprise
network and operations network of the control room.
◦ Filter FTP commands between the control network and operations network to
specific hosts or communicate them over a separate, encrypted management
network.
◦ Use external module to setup a VPN between the controller impacted modules and
the engineering workstation on control network.
• BMENOC0301 and BMENOC0311 modules do not support IP forwarding to the device
network.
If transparency is required between the control and device networks, an external router/
VPN is needed to provide an encrypted communication between the control and device
networks (refer to the illustration in CSPN Security Target, page 40).
In FTP protocol, transparency is required to perform the following operations from the
control network:
• Update of M580 controller firmware from the Automation Device Maintenance.
• Network diagnostics of M580 controller executed from a network management tool
through SNMP service.
EIO0000001999.11 91
Cybersecurity How to Help Secure the Architecture
Managing SNMP
Simple network management protocol (SNMP) provides network management services
between a central management console and network devices such as routers, printers, and
controllers. The protocol consists of three parts:
• Manager: an application that manages SNMP agents on a network by issuing requests,
getting responses, and listening for and processing agent-issued traps.
• Agent: a network-management software module that resides in a managed device. The
agent allows configuration parameters to be changed by managers. Managed devices
can be any type of device: routers, access servers, switches, bridges, hubs, controllers,
drives.
• Network management system (NMS): the terminal through which administrators can
conduct administrative tasks.
Schneider Electric Ethernet devices have SNMP service capability for network
management.
Often SNMP is automatically installed with public as the read string and private as the write
string. This type of installation allows an attacker to perform reconnaissance on a system to
create a denial of service.
To help reduce the risk of an attack via SNMP:
• If SNMP v1 is required, use access settings to limit the devices (IP addresses) that can
access the switch. Assign different read and read/write passwords to devices.
• Change the default passwords of all devices that support SNMP.
• Block all inbound and outbound SNMP traffic at the boundary of the enterprise network
and operations network of the control room.
• Filter SNMP v1 commands between the control network and operations network to
specific hosts or communicate them over a separate, encrypted management network.
• Control access by identifying which IP address has privilege to query an SNMP device.
• Use an external module to set up a VPN between the controller impacted modules and
the engineering workstation on the control network.
92 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
• Application
Control Expert and controller application protection by a password helps prevent
unwanted application modification, download, or opening (.STU, .STA and .ZEF files).
The password is stored encrypted in the application.
In addition to the password protection you can encrypt the .STU, .STA and .ZEF files.
The file encryption feature in Control Expert helps prevent unauthorized modifications
by unqualified personnel and reinforces protection against theft of intellectual property
and other malicious intentions. The file encryption option is protected by a password
mechanism.
NOTE: When a controller is managed as part of a system project, the application
password and file encryption are disabled in Control Expert editor and need to be
managed by using the Topology Manager.
More details are provided in the Application Protection topic (see EcoStruxure™ Control
Expert, Operating Modes).
• Section
The section protection function is accessible from the Properties screen of the project
in offline mode. This function is used to help protect the program sections. More details
are provided in the Section and Subroutine Protection topic (see EcoStruxure™ Control
Expert, Operating Modes).
NOTE: The section protection is not active as long as the protection is not activated
in the project.
• Data Storage/Web
Data storage protection by a password can help prevent unwanted access to the data
storage zone of the SD memory card (if a valid card is inserted in the controller). It can
also help prevent unwanted access to web diagnostics (for M580 controller firmware ≥
4.0). More details are provided in the Data Storage Protection topic (see EcoStruxure™
Control Expert, Operating Modes).
• Firmware
Firmware download protection by a password helps prevent download of malicious
firmware. More details are provided in the Firmware Protection topic (see EcoStruxure™
Control Expert, Operating Modes).
Control Authorizations
Control Expert Security Editor
A security configuration tool is used to define software users and their respective
authorizations. EcoStruxure Control Expert access security affects the terminal or terminals
on which the software is installed and not the project, which has its own protection system.
EIO0000001999.11 93
Cybersecurity How to Help Secure the Architecture
For more detailed information, refer to EcoStruxure™ Control Expert, Security Editor,
Operation Guide.
It is a good practice to establish a dedicated password to the security administrator
(SecurityAdmin) and limit other users authorizations with a restricting profile.
94 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
NOTE: The controller memory protection cannot be configured with Hot Standby
controllers. In such cases, use IPsec encrypted communication.
The memory protection is activated as follows:
• Modicon M340 controller: Input bit. For details, refer to the Configuration of Modicon
M340 processors section (see EcoStruxure™ Control Expert, Operating Modes).
• Modicon M580 controller: Input bit. For details, refer to the Managing Run/Stop Input
section (see Modicon M580, Hardware, Reference Manual).
• Modicon Quantum controller: Physical key switch on the controller module, either for
low end (see Quantum using EcoStruxure™ Control Expert, Hardware, Reference
Manual) or high end (see Quantum using EcoStruxure™ Control Expert, Hardware,
Reference Manual) controller.
• Modicon Premium controller: Input bit. For details, refer to the Configuration of Premium
processors section (see EcoStruxure™ Control Expert, Operating Modes).
• Modicon MC80 controller: Input bit. For details, refer to the Modicon MC80 controller
manual.
It is a good practice to activate the controller memory protection whenever possible.
Modicon M340: Controller remote access to run/stop allows one of the following:
• Stop or run the controller remotely by request.
• Stop the controller remotely by request. Rejects requests to run the controller
remotely. Only a run controlled by the input is available when a valid input is
configured.
Refer to the Configuration of Modicon M340 Processors section (see EcoStruxure™
Control Expert, Operating Modes).
EIO0000001999.11 95
Cybersecurity How to Help Secure the Architecture
Modicon Premium: Controller remote access to run/stop allows one of the following:
• Stop or run the controller remotely by request.
• Stop the controller remotely by request. Rejects requests to run the controller
remotely. Only a run controlled by the input is available when a valid input is
configured.
Refer to the Configuration of Premium\Atrium Processors section (see
EcoStruxure™ Control Expert, Operating Modes).
Modicon MC80: Controller remote access to run/stop allows one of the following:
• Stop or run the controller remotely by request.
• Stop the controller remotely by request. Rejects requests to run the controller
remotely. Only a run controlled by the input is available when a valid input is
configured.
• Reject running or stopping the controller remotely by request.
Refer to the Configuration of Modicon MC80 Processors section in MC80 user
manual.
96 EIO0000001999.11
How to Help Secure the Architecture Cybersecurity
Step Action
Result: The integrity check runs in the background. Control Expert creates a log of the successful
and unsuccessful component login. The log file contains the IP address, the date and time, and
the result of the login.
NOTE: If an integrity check displays an unsuccessful component login, the Event Viewer
displays a message. Click OK. Manually fix the items in the log.
EIO0000001999.11 97
Cybersecurity How to Help Secure the Architecture
Step Action
Result: The integrity check runs in the background. Scans are performed on the local client
servers (local or remote) that the client is connected to. The client and the servers keep running
until the integrity check result is returned.
Refer to the following table for the integrity check result consequences.
IF THEN
No data corruption is detected The message self-test completed successfully is displayed.
Click OK.
Data corruption is detected on the client A message box indicates the corrupted files. Click OK and
Control Expert client closes.
Data corruption is detected on one of the servers The server stops. An error is logged that you can view using
the Event viewer.
Management of SD Card
Activate the application signature in order to avoid running an incorrect application from an
SD card.
The SD card signature is managed using the SIG_WRITE and SIG_CHECK functions (see
EcoStruxure™ Control Expert, Communication, Block Library).
98 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
EIO0000001999.11 99
Configure a Secure Engineering Link between
Cybersecurity Control Expert and an M580 Ethernet Controller
100 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
• Enforced (default):
This mode provides the highest level of security. Only secure protocols are accepted by
controller.
◦ For Control Expert communication, the controller accepts only the secure drivers
HTTPS and HTTPS via USB.
◦ For SCADA or controller to controller communication, Modbus TCP (port 502) or
UMAS (OFS) are NOT accepted.
Enforced ✔ ✘ ✘ ✘
Engineering
Filtered ✔ ✘ ✔ ✔
Link Mode:
Full Access ✔ ✔ ✔ ✔
EIO0000001999.11 101
Configure a Secure Engineering Link between
Cybersecurity Control Expert and an M580 Ethernet Controller
Preliminary Tasks
1. Upgrade your controller to V4.20 or later.
2. Upgrade Control Expert to V16.0 or later.
3. Open an existing project and change the application level to V4.20 or later, or create a
new project with application level to V4.20 or later.
4. Enable HTTPS, if disabled, in the Security tab of the controller.
5. Select an Engineering Link Mode setting:
• Enforced: Provides the highest level of security. Port 502 is closed on the
controller. Monitoring and programming can be performed using only HTTPS
connections over port 443. SCADA cannot communicate in Modbus TCP.
• Filtered: Provides a hybrid mode, good balance between cybersecurity and
connectivity. Monitoring and programming can be performed using HTTPS
connections over port 443. Monitoring alone can be performed using Modbus
TCPIP or USB connections over port 502. SCADA can communicate in Modbus
TCP.
• Full Access: Programming and monitoring can be performed using Modbus
TCPIP or USB over port 502 or HTTPS connections over port 443.
NOTE: Application download time could be significantly impacted if Full Access
mode is configured and secure drivers HTTPS or HTTPS via USB are used. If you
intend to use secure drivers, consider using Filtered or Enforced mode to preserve
performance.
6. Configure the definitive M580 Ethernet controller IP Address settings, if not previously
done.
NOTE: Because the certificate of an M580 controller contains its IP Address, every
time you change the IP Address setting, the controller renews its certificate. You will
need to again trust the certificate in the Security Editor.
7. Create an Application Password for the new project.
8. Create Firmware and Web Passwords for the new project.
9. Download the application to the controller using Modbus TCP or Modbus TCP via
USB.
102 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
EIO0000001999.11 103
Configure a Secure Engineering Link between
Cybersecurity Control Expert and an M580 Ethernet Controller
104 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
EIO0000001999.11 105
Configure a Secure Engineering Link between
Cybersecurity Control Expert and an M580 Ethernet Controller
106 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
EIO0000001999.11 107
108
Engineering Link
Modbus
Modbus TCP
TCP HTTPS
Programming
Monitoring
Cybersecurity
C
C
C
X
C
C
Controller Alone
X
X
C
C
C
C
M
M
M
Backplane Controller + NOCs (NOC301,
X
C
C
M
M
Port Enabled NOC311, NOC321)
X
X
C
M
X
C
C
Backplane Controller + NOCs (NOC301,
X
X
C
Port Disabled NOC311, NOC321)
X
X
X
C
C
C
Backplane
Port Disabled Controller + NOC321
X
C
C
IP Forwarding
X
X
C
M
M
M
C*
C*
C*
Controller + NUA
IP Forwarding
X
M
M
C*
C*
(Sec mode)
X
X
X
X
M
M
Backplane
X
X
Controller + BMXNOR
Isolated
X
X
X
X
M**
M**
X
X
X
C
C
C
M
M
Backplane
X
C
C
M
M
Backplane
X
X
EIO0000001999.11
Configure a Secure Engineering Link between
Server Mode Client Mode
-
-
C
C
C
C
C
C
EIO0000001999.11
-
-
C
C
C
C
C
C
Controller Alone
-
-
X
X
X
C
C
C
-
-
-
C
C
C
C
M
M
M
Backplane Controller + NOCs (NOC301,
-
-
-
C
C
C
C
M
M
M
Port Enabled NOC311, NOC321)
-
-
-
X
X
C
C
M
M
-
-
-
C
C
M
M
M
Expert and an M580 Ethernet Controller
-
-
-
Backplane
C
C
M
M
M
Port Disabled NOC311, NOC321)
-
-
-
X
X
C
M
M
-
-
C
C
C
C
C
C
M
M
Backplane
-
-
Port Disabled Controller + NOC321
C
C
C
C
C
C
M
M
Configure a Secure Engineering Link between Control
IP Forwarding
-
-
X
X
C
C
C
M
M
-
-
C*
C*
C*
C*
C*
C*
M*
Controller + NUA
IP Forwarding
-
-
C*
C*
C*
C*
C*
C*
M*
(Sec mode)
-
-
X
X
X
C*
C*
C*
-
-
-
-
C
C
M
M
Backplane
-
-
-
-
C
C
M
M
Controller + BMXNOR
Isolated
-
-
-
-
X
X
X
-
-
-
-
C
C
M**
Backplane Controller + BMENOR
-
-
-
-
C
C
M
Port Disabled step3
M**
-
-
-
-
X
X
X
C
C
C
C
C
C
M
M
Backplane
C
C
C
C
C
C
M
M
Port Enabled Controller + NOP
w/o IP Forwarding
X
X
X
X
C
C
C
-
-
-
C
C
C
M
M
- Backplane
-
-
C
C
C
M
M
Port Disabled Controller + NOP
IP Forwarding
-
-
-
X
X
X
C
C
109
Cybersecurity
110
SCADA Communication
60870 of controller
-
-
-
C
C
-
-
-
C
C
Controller Alone
-
-
-
C
C
-
-
-
C
M
Backplane Controller + NOCs (NOC301,
-
-
-
C
M
Port Enabled NOC311, NOC321)
-
-
-
C
M
-
-
-
-
M
Controller + NOCs (NOC301,
-
-
-
-
Backplane
M
Port Disabled NOC311, NOC321)
-
-
-
-
-
-
-
C
C
M
Backplane
-
-
-
Port Disabled Controller + NOC321
C
C
M
IP Forwarding
-
-
-
C
C
M
-
-
-
M
C*
Controller + NUA
IP Forwarding
-
-
-
M
C*
(Sec mode)
-
-
-
X
C*
-
-
-
-
M
Backplane
-
-
-
-
M
Controller + BMXNOR
Isolated
-
-
-
-
-
-
-
-
M
Backplane Controller + BMENOR
-
-
-
-
M
Port Disabled step3
-
-
-
-
X
-
-
-
M
Backplane
-
-
-
M
Port Enabled Controller + NOP
w/o IP Forwarding
-
-
-
X
C
-
-
-
-
M
Backplane
-
-
-
-
X
Control Expert and an M580 Ethernet Controller
EIO0000001999.11
Configure a Secure Engineering Link between
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
Symbol Description
EIO0000001999.11 111
Configure a Secure Engineering Link between
Cybersecurity Control Expert and an M580 Ethernet Controller
112 EIO0000001999.11
Configure a Secure Engineering Link between Control
Expert and an M580 Ethernet Controller Cybersecurity
EIO0000001999.11 113
Cybersecurity Cybersecurity Services Per System
Cybersecurity Services
Overview
Software, DTM, or devices are elements providing cybersecurity services in a global system.
The available cybersecurity services are listed for the following elements:
• Control Expert software, page 115
• Modicon M340 controller, page 115
• Modicon M580 controller, page 116
• Modicon Momentum (Cybersecurity services are not implemented.)
• Modicon Quantum controller and communication modules, page 117
• Modicon X80 modules, page 118
• Modicon Premium/Atrium controller and communication modules, page 119
The cybersecurity services listed below are described in previous chapter:
• Disable unused services, page 30
• Access control, page 31
• Set Up Encrypted Communication, page 34
• Event logging, page 48
• Authentication, page 89
• Authorizations, page 93
• Integrity checks, page 97
114 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
– Not available
There are more robust password recovery mechanisms available when using Control Expert
versions greater than or equal to v.15.1 targeting applications for M580 firmware versions
greater than or equal to v4.01.
EIO0000001999.11 115
Cybersecurity Cybersecurity Services Per System
– Not available
116 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
– Not available
140CPU43412• 3.20 – – – – X X –
140CPU53414• 3.20 – – – – X X –
140CPU651•0 3.20 X X – – X X –
140CPU65260 3.20 X X – – X X –
140CPU65860 3.20 X X – – X X –
140CPU67060 3.20 X X – – X X –
140CPU67160 3.20 X X – – X X –
140CPU6726• 3.20 X X – – X X –
140CPU67861 3.20 X X – – X X –
– Not available
EIO0000001999.11 117
Cybersecurity Cybersecurity Services Per System
140NOC78000 2.00 X X – – X – –
140NOC78100 2.00 X X – – X – –
140NOE771•• X X – – – X – –
140NWM10000 – X – – – – – –
– Not available
Reference Min. Disable Access Encryp- Encryp- Event Authen- Authori- Integrity
firm- unused control ted ted logging tication zations checks
ware serv- commu- commu-
ices nication nication
with
confi-
dentiali-
ty
BMECXM0100 1.01 X X – – X – – X
BMENOC0301 1.01 X X X – X X – X
BMENOC0311 1.01 X X X – X X – X
BMXNOC0401.2 2.05 X X – – – – – –
BMXNOE0100.2 2.90 X X – – – – – –
BMXNOE0110.2 6.00 X X – – – – – –
BMXPRA0100 2.60 X X – – – X – –
BMENOC0301 2.11 X X X X X X – X
BMENOC0311 2.11 X X X X X X – X
BMXNOR0200H
118 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
Reference Min. Disable Access Encryp- Encryp- Event Authen- Authori- Integrity
firm- unused control ted ted logging tication zations checks
ware serv- commu- commu-
ices nication nication
with
confi-
dentiali-
ty
BMENOR2200H
X Available, at least one service is implemented.
– Not available
TSXP570244M 3.10 – – – – X X –
TSXP57•04M 3.10 – – – – X X –
TSXP57•54M 3.10 – – – – X X –
TSXP571634M 3.10 X X – – X X –
TSXP572634M
TSXP573634M
(through ETY
port)
EIO0000001999.11 119
Cybersecurity Cybersecurity Services Per System
TSXP575634M
TSXP576634M
(embedded
Ethernet port)
– Not available
TSXETY4103 5.70 X X – – – – –
TSXETY5103 5.90 X X – – – – –
– Not available
120 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
Ethernet communication: Refer to Security section (see Modicon M340 for Ethernet, Communications
Modules and Processors, User Manual).
Access control: Refer to Messaging Configuration Parameters section (see Modicon M340 for
Ethernet, Communications Modules and Processors, User Manual).
Ethernet communication: Refer to Security (Enable / Disable HTTP, FTP, and TFTP) section (see Quantum
using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual).
Access control: Refer to Modicon Quantum with Control Expert Ethernet Controller Messaging
Configuration section (see Quantum using EcoStruxure™ Control Expert, Ethernet
Network Modules, User Manual).
EIO0000001999.11 121
Cybersecurity Cybersecurity Services Per System
Ethernet communication: Refer to Security (Enable / Disable HTTP, FTP, and TFTP) section (see Quantum
using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual).
Access control: Refer to Configuring Access Control section (see Quantum using EcoStruxure™
Control Expert, 140 NOC 771 01 Ethernet Communication Module, User Manual).
Ethernet communication: Refer to Security section (see Quantum EIO, Control Network, Installation and
Configuration Guide).
Access control: Refer to Configuring Access Control section (see Quantum EIO, Control Network,
Installation and Configuration Guide).
Ethernet communication: Refer to Security section (see Quantum EIO, Control Network, Installation and
Configuration Guide).
Access control: Refer to Configuring Access Control section (see Quantum EIO, Control Network,
Installation and Configuration Guide).
122 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
Ethernet communication: Refer to Security (Enable / Disable HTTP, FTP, and TFTP) section (see Quantum
using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual),
Security section (see Quantum using EcoStruxure™ Control Expert, Ethernet
Network Modules, User Manual), and Establishing HTTP and Write Passwords
section (see Quantum using EcoStruxure™ Control Expert, Ethernet Network
Modules, User Manual).
Ethernet communication: Refer to Security (Enable / Disable HTTP, FTP, and TFTP) section (see Quantum
using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual).
BMXNOC0401.2 Module
A description of communication parameters related to cybersecurity is provided in the listed
topics:
Ethernet communication: Refer to the Security section (see Modicon M340 for Ethernet, Communications
Modules and Processors, User Manual).
Access control: Refer to the Configuring Access Control section (see Modicon M340, BMX NOC
0401 Ethernet Communication Module, User Manual).
EIO0000001999.11 123
Cybersecurity Cybersecurity Services Per System
Ethernet communication: Refer to the Security section (see Modicon M340 for Ethernet, Communications
Modules and Processors, User Manual).
Access control: Refer to the Messaging Configuration Parameters section (see Modicon M340 for
Ethernet, Communications Modules and Processors, User Manual).
BMXPRA0100 Module
The BMXPRA0100 module is configured as an Modicon M340 controller. A description of
communication parameters related to cybersecurity is provided in the listed topics:
Ethernet communication: Refer to the Security topic (see Modicon M340 for Ethernet, Communications
Modules and Processors, User Manual).
Access control: Refer to the Messaging Configuration Parameters topic (see Modicon M340 for
Ethernet, Communications Modules and Processors, User Manual).
BMXNOR0200H Module
A description of communication parameters related to cybersecurity is provided in the listed
topics:
Ethernet communication: Refer to the Security topic (see Modicon X80 , BMXNOR0200H RTU Module, User
Manual).
BMENOR2200H Module
A description of communication parameters related to cybersecurity is provided in the listed
topics:
124 EIO0000001999.11
Cybersecurity Services Per System Cybersecurity
BMECXM0100 Module
A description of communication parameters related to cybersecurity is provided in the
Ethernet Services Configuration chapter (see Modicon M580, BMECXM CANopen Modules,
User Manual).
BMENUA0100 Module
A description of communication parameters related to cybersecurity is provided in the listed
topics:
Ethernet Refer to the Cybersecurity Settings topic (see M580, BMENUA0100 OPC UA
communication: Embedded Module, Installation and Configuration Guide).
EIO0000001999.11 125
Cybersecurity Cybersecurity Services Per System
Ethernet communication: Refer to Security Service Configuration Parameters section (see Premium and
Atrium Using EcoStruxure™ Control Expert, Ethernet Network Modules, User
Manual).
Access control: Refer to Configuration of TCP/IP Messaging (TSX P57 6634/5634/4634) section
(see Premium and Atrium Using EcoStruxure™ Control Expert, Ethernet Network
Modules, User Manual).
Ethernet communication: Refer to Security Service Configuration Parameters section (see Premium and
Atrium Using EcoStruxure™ Control Expert, Ethernet Network Modules, User
Manual).
Access control: Refer to Configuration of TCP/IP Messaging section (see Premium and Atrium
Using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual).
Ethernet communication: Refer to Security section (see Premium using EcoStruxure™ Control Expert, TSX
ETC 101 Ethernet Communication Module, User Manual).
Access control: Refer to Configuring Access Control section (see Premium using EcoStruxure™
Control Expert, TSX ETC 101 Ethernet Communication Module, User Manual).
Ethernet communication: Refer to Security Service Configuration Parameters section (see Premium and
Atrium Using EcoStruxure™ Control Expert, Ethernet Network Modules, User
Manual).
Access control: Refer to Configuration of TCP/IP Messaging section (see Premium and Atrium
Using EcoStruxure™ Control Expert, Ethernet Network Modules, User Manual).
126 EIO0000001999.11
How to help protect M580 and M340 architectures with
EAGLE40 using VPN Cybersecurity
EAGLE40 Firewall
Why use a Firewall?
Relying on a firewall to reinforce the cybersecurity of an existing architecture brings the
following advantages:
• The cybersecurity of control networks and devices is reinforced.
• Reinforced cybersecurity relies on the IPSEC protocol.
• Impact on existing architecture and performances can be minimized.
EIO0000001999.11 127
How to help protect M580 and M340 architectures
Cybersecurity with EAGLE40 using VPN
Prerequisites
Software Installation
A compatible VPN client software is necessary to establish a VPN tunnel based on IPSEC
protocol between the client and the firewall.
The EAGLE40 firewall requires the use of the VPN client IPSEC/IKEV2.
NOTE: Use the VPN client solution provided by TheGreenBow.
In the configuration procedures described below we use this software that you can
download at the following URL:
• https://www.thegreenbow.fr/vpn_client.html, for Windows.
• https://www.thegreenbow.fr/vpn_linux.html, for Linux
128 EIO0000001999.11
How to help protect M580 and M340 architectures with
EAGLE40 using VPN Cybersecurity
Typical Architecture
The architecture and configuration instructions in this document are provided as examples
and can be adapted to various architectures and systems.
As an example, the following mixed architecture, combining both Modicon M340 and
Modicon M580 controllers is a typical architecture:
EIO0000001999.11 129
How to help protect M580 and M340 architectures
Cybersecurity with EAGLE40 using VPN
Step Action
1. On the Navigation left pane open Routing > Interfaces > Configuration webpage. Choose
the Ethernet interface you want to configure.
2. Click the icon to launch the Configure VLAN Router Interface window.
2 Set an ID number to the VLAN you want to configure (1 in the example), then click Next.
130 EIO0000001999.11
How to help protect M580 and M340 architectures with
EAGLE40 using VPN Cybersecurity
Step Action
3 Set a route name to the VLAN you want to configure (RouteName in the example), then click Next.
4 Set the IP address of the Control Network and its mask, (192.168.30.254/16 in the example),
then click Finish.
5 Repeat the steps 1 to 4 for the Machine Network using the second Ethernet interface.
EIO0000001999.11 131
How to help protect M580 and M340 architectures
Cybersecurity with EAGLE40 using VPN
In the following example we have set the control network gateway interface of the firewall to
192.168.30.254/16 on the physical port n°1 and machine network to
139.160.235.254/16 on the physical port n°2.
Step Action
1 On the left pane of the web page, click on Virtual Private Network > Connections menu. Click
the icon.
2 Choose an index number and a name then click Next.
3 Choose a password (PSK) then click Next.
132 EIO0000001999.11
How to help protect M580 and M340 architectures with
EAGLE40 using VPN Cybersecurity
Step Action
Click Next.
5 Set a margin time. The default value is 150.
Step Action
EIO0000001999.11 133
How to help protect M580 and M340 architectures
Cybersecurity with EAGLE40 using VPN
Step Action
4 Set the IP address of the firewall accessible via the Control Network interface (192.168.0.254 in the
example).
5 On the left pane of the VPN Client window, right click on the Ikev2 tunnel just created and rename
it.
6 Right click on the just renamed Ikev2 tunnel and select Open Tunnel.
134 EIO0000001999.11
How to help protect M580 and M340 architectures with
EAGLE40 using VPN Cybersecurity
Step Action
EIO0000001999.11 135
Cybersecurity
Glossary
802.1Q:
The IEEE protocol designator for Virtual Local Area Network (VLAN). This standard
provides VLAN identification and quality of service (QoS) levels.
A
adapter:
An adapter is the target of real-time I/O data connection requests from scanners. It cannot
send or receive real-time I/O data unless it is configured to do so by a scanner, and it does
not store or originate the data communications parameters necessary to establish the
connection. An adapter accepts explicit message requests (connected and unconnected)
from other devices.
advanced mode:
In Control Expert, advanced mode is a selection that displays expert-level configuration
properties that help define Ethernet connections. Because these properties should be
edited only by people with a good understanding of EtherNet/IP communication protocols,
they can be hidden or displayed, depending upon the qualifications of the specific user.
architecture:
Architecture describes a framework for the specification of a network that is constructed of
these components:
• physical components and their functional organization and configuration
• operational principles and procedures
• data formats used in its operation
EIO0000001999.11 137
Cybersecurity
ARRAY:
An ARRAY is a table containing elements of a single type. This is the syntax: ARRAY
[<limits>] OF <Type>
Example: ARRAY [1..2] OF BOOL is a one-dimensional table with two elements of type
BOOL.
ARRAY [1..10, 1..20] OF INT is a two-dimensional table with 10x20 elements of type
INT.
ART:
(application response time) The time a controller application takes to react to a given input.
ART is measured from the time a physical signal in the controller turns on and triggers a
write command until the remote output turns on to signify that the data has been received.
AUX:
An (AUX) task is an optional, periodic processor task that is run through its programming
software. The AUX task is used to execute a part of the application requiring a low priority.
This task is executed only if the MAST and FAST tasks have nothing to execute. The AUX
task has two sections:
• IN: Inputs are copied to the IN section before execution of the AUX task.
• OUT: Outputs are copied to the OUT section after execution of the AUX task.
B
BCD:
(binary-coded decimal) Binary encoding of decimal numbers.
BOOL:
(boolean type) This is the basic data type in computing. A BOOL variable can have either of
these values: 0 (FALSE) or 1 (TRUE).
A bit extracted from a word is of type BOOL, for example: %MW10.4.
BOOTP:
(bootstrap protocol) A UDP network protocol that can be used by a network client to
automatically obtain an IP address from a server. The client identifies itself to the server
using its MAC address. The server, which maintains a pre-configured table of client device
MAC addresses and associated IP addresses, sends the client its defined IP address. The
BOOTP service utilizes UDP ports 67 and 68.
138 EIO0000001999.11
Cybersecurity
broadcast:
A message sent to all devices in a broadcast domain.
C
CCOTF:
(change configuration on the fly) A feature of Control Expert that allows a module hardware
change in the system configuration while the system is operating. This change does not
impact active operations.
CIP™:
(common industrial protocol) A comprehensive suite of messages and services for the
collection of manufacturing automation applications (control, safety, synchronization,
motion, configuration and information). CIP allows users to integrate these manufacturing
applications with enterprise-level Ethernet networks and the internet. CIP is the core
protocol of EtherNet/IP.
class 1 connection:
A CIP transport class 1 connection used for I/O data transmission via implicit messaging
between EtherNet/IP devices.
class 3 connection:
A CIP transport class 3 connection used for explicit messaging between EtherNet/IP
devices.
connected messaging:
In EtherNet/IP, connected messaging uses a CIP connection for communication. A
connected message is a logical relationship between two or more application objects on
different nodes. The connection establishes a virtual circuit in advance for a particular
purpose, such as frequent explicit messages or real-time I/O data transfers.
connection originator:
The EtherNet/IP network node that initiates a connection request for I/O data transfer or
explicit messaging.
connection:
A virtual circuit between two or more network devices, created prior to the transmission of
data. After a connection is established, a series of data is transmitted over the same
communication path, without the need to include routing information, including source and
destination address, with each piece of data.
EIO0000001999.11 139
Cybersecurity
connectionless:
Describes communication between two network devices, whereby data is sent without prior
arrangement between the two devices. Each piece of transmitted data also includes
routing information, including source and destination address.
control network:
An Ethernet-based network containing PACs, SCADA systems, an NTP server, PCs, AMS,
switches, etc. Two kinds of topologies are supported:
• flat: All modules and devices in this network belong to same subnet.
• 2 levels: The network is split into an operation network and an inter-controller network.
These two networks can be physically independent, but are generally linked by a
routing device.
CPU:
(central processing unit) The CPU, also known as the processor or controller, is the brain of
an industrial manufacturing process. It automates a process as opposed to relay control
systems. CPUs are computers suited to survive the harsh conditions of an industrial
environment.
D
DDT:
(derived data type) A derived data type is a set of elements with the same type (ARRAY) or
with different types (structure).
determinism:
For a defined application and architecture, you can predict that the delay between an event
(change of value of an input) and the corresponding change of a controller output is a finite
time t, smaller than the deadline required by your process.
device network:
An Ethernet-based network within a remote I/O network that contains both remote I/O and
distributed I/O devices. Devices connected on this network follow specific rules to allow
remote I/O determinism.
140 EIO0000001999.11
Cybersecurity
device network:
An Ethernet-based network within an RIO network that contains both RIO and distributed
equipment. Devices connected on this network follow specific rules to allow RIO
determinism.
DFB:
(derived function block) DFB types are function blocks that can be defined by the user in
ST, IL, LD or FBD language.
Using these DFB types in an application makes it possible to:
• simplify the design and entry of the program
• make the program easier to read
• make it easier to debug
• reduce the amount of code generated
DHCP:
(dynamic host configuration protocol) An extension of the BOOTP communications
protocol that provides for the automatic assignment of IP addressing settings, including IP
address, subnet mask, gateway IP address, and DNS server names. DHCP does not
require the maintenance of a table identifying each network device. The client identifies
itself to the DHCP server using either its MAC address, or a uniquely assigned device
identifier. The DHCP service utilizes UDP ports 67 and 68.
DIO cloud:
A group of distributed equipment that is not required to support RSTP. DIO clouds require
only a single (non-ring) copper wire connection. They can be connected to some of the
copper ports on DRSs, or they can be connected directly to the controller or Ethernet
communications modules in the local rack. DIO clouds cannot be connected to sub-rings.
DIO network:
A network containing distributed equipment, in which I/O scanning is performed by a
controller with DIO scanner service on the local rack. DIO network traffic is delivered after
RIO traffic, which takes priority in an RIO network.
DIO:
(distributed I/O) Also known as distributed equipment. DRSs use DIO ports to connect
distributed equipment.
distributed equipment:
Any Ethernet device (Schneider Electric device, PC, servers, or third-party devices) that
supports exchange with a controller or other Ethernet I/O scanner service.
EIO0000001999.11 141
Cybersecurity
DNS:
(domain name server/service) A service that translates an alpha-numeric domain name
into an IP address, the unique identifier of a device on the network.
domain name:
An alpha-numeric string that identifies a device on the internet, and which appears as the
primary component of a web site’s uniform resource locator (URL). For example, the
domain name schneider-electric.com is the primary component of the URL www.se.com.
Each domain name is assigned as part of the domain name system, and is associated with
an IP address.
Also called a host name.
DRS:
(dual-ring switch) A ConneXium extended managed switch that has been configured to
operate on an Ethernet network. Predefined configuration files are provided by Schneider
Electric to downloaded to a DRS to support the special features of the main ring / sub-ring
architecture.
DSCP:
(differentiated service code points) This 6-bit field is in the header of an IP packet to
classify and prioritize traffic.
DST:
(daylight saving time) DST is also called summer time and is a practice consisting of
adjusting forward the clock near the start of spring and adjusting it backward near the start
of autumn.
142 EIO0000001999.11
Cybersecurity
DT:
(date and time) The DT type, encoded in BCD in a 64-bit format, contains this information:
• the year encoded in a 16-bit field
• the month encoded in an 8-bit field
• the day encoded in an 8-bit field
• the time encoded in an 8-bit field
• the minutes encoded in an 8-bit field
• the seconds encoded in an 8-bit field
NOTE: The eight least significant bits are not used.
The DT type is entered in this format:
DT#<Year>-<Month>-<Day>-<Hour>:<Minutes>:<Seconds>
This table shows the upper/lower limits of each field:
Month [01,12] The leading 0 is displayed; it can be omitted during data entry.
Hour [00,23] The leading 0 is displayed; it can be omitted during data entry.
Minute [00,59] The leading 0 is displayed; it can be omitted during data entry.
Second [00,59] The leading 0 is displayed; it can be omitted during data entry.
DTM:
(device type manager) A DTM is a device driver running on the host PC. It provides a
unified structure for accessing device parameters, configuring and operating the devices,
and troubleshooting devices. DTMs can range from a simple graphical user interface (GUI)
for setting device parameters to a highly sophisticated application capable of performing
complex real-time calculations for diagnosis and maintenance purposes. In the context of a
DTM, a device can be a communications module or a remote device on the network.
See FDT.
EIO0000001999.11 143
Cybersecurity
E
EDS:
(electronic data sheet) EDS are simple text files that describe the configuration capabilities
of a device. EDS files are generated and maintained by the manufacturer of the device.
EFB:
(elementary function block) This is a block used in a program which performs a predefined
logical function.
EFBs have states and internal parameters. Even if the inputs are identical, the output
values may differ. For example, a counter has an output indicating that the preselection
value has been reached. This output is set to 1 when the value is equal to the preselection
value.
EF:
(elementary function) This is a block used in a program which performs a predefined logical
function.
A function does not have any information on the internal state. Several calls to the same
function using the same input parameters will return the same output values. You will find
information on the graphic form of the function call in the [functional block (instance)].
Unlike a call to a function block, function calls include only an output which is not named
and whose name is identical to that of the function. In FBD, each call is indicated by a
unique [number] via the graphic block. This number is managed automatically and cannot
be modified.
Position and configure these functions in your program to execute your application.
You can also develop other functions using the SDKC development kit.
EIO network:
(Ethernet I/O) An Ethernet-based network that contains three types of devices:
• local rack
• X80 remote drop (using a BM•CRA312•0 adapter module), or a BMENOS0300
network option switch module
• ConneXium extended dual-ring switch (DRS)
NOTE: Distributed equipment may also participate in an Ethernet I/O network via
connection to DRSs or the service port of X80 remote modules.
144 EIO0000001999.11
Cybersecurity
EN:
EN stands for ENable; it is an optional block input. When the EN input is enabled, an ENO
output is set automatically.
If EN = 0, the block is not enabled; its internal program is not executed, and ENO is set to 0.
If EN = 1, the block's internal program is run and ENO is set to 1. If a runtime error is
detected, ENO is set to 0.
If the EN input is not connected, it is set automatically to 1.
ENO:
ENO stands for Error NOtification; this is the output associated with the optional input EN.
If ENO is set to 0 (either because EN = 0 or if a runtime error is detected):
• The status of the function block outputs remains the same as it was during the
previous scanning cycle that executed correctly.
• The output(s) of the function, as well as the procedures, are set to 0.
Ethernet DIO scanner service:
This embedded DIO scanner service of M580 controllers manages distributed equipment
on an M580 device network.
EtherNet/IP™:
A network communication protocol for industrial automation applications that combines the
standard internet transmission protocols of TCP/IP and UDP with the application layer
common industrial protocol (CIP) to support both high speed data exchange and industrial
control. EtherNet/IP employs electronic data sheets (EDS) to classify each network device
and its functionality.
Ethernet:
A 10 Mb/s, 100 Mb/s, or 1 Gb/s, CSMA/CD, frame-based LAN that can run over copper
twisted pair or fiber optic cable, or wireless. The IEEE standard 802.3 defines the rules for
configuring a wired Ethernet network; the IEEE standard 802.11 defines the rules for
configuring a wireless Ethernet network. Common forms include 10BASE-T, 100BASE-TX,
and 1000BASE-T, which can utilize category 5e copper twisted pair cables and RJ45
modular connectors.
EIO0000001999.11 145
Cybersecurity
explicit messaging:
TCP/IP-based messaging for Modbus TCP and EtherNet/IP. It is used for point-to-point,
client/server messages that include both data, typically unscheduled information between a
client and a server, and routing information. In EtherNet/IP, explicit messaging is
considered class 3 type messaging, and can be connection-based or connectionless.
F
FAST:
A FAST task is an optional, periodic processor task that identifies high priority, multiple
scan requests, which is run through its programming software. A FAST task can schedule
selected I/O modules to have their logic solved more than once per scan. The FAST task
has two sections:
• IN: Inputs are copied to the IN section before execution of the FAST task.
• OUT: Outputs are copied to the OUT section after execution of the FAST task.
FBD:
(function block diagram) An IEC 61131-3 graphical programming language that works like a
flowchart. By adding simple logical blocks (AND, OR, etc.), each function or function block in
the program is represented in this graphical format. For each block, the inputs are on the
left and the outputs on the right. Block outputs can be linked to inputs of other blocks to
create complex expressions.
FDR:
(fast device replacement) A service that uses configuration software to replace an
inoperable product.
FDT:
(field device tool) The technology that harmonizes communication between field devices
and the system host.
FTP:
(file transfer protocol) A protocol that copies a file from one host to another over a TCP/IP-
based network, such as the internet. FTP uses a client-server architecture as well as
separate control and data connections between the client and server.
146 EIO0000001999.11
Cybersecurity
full duplex:
The ability of two networked devices to independently and simultaneously communicate
with each other in both directions.
G
gateway:
A gateway device interconnects two different networks, sometimes through different
network protocols. When it connects networks based on different protocols, a gateway
converts a datagram from one protocol stack into the other. When used to connect two IP-
based networks, a gateway (also called a router) has two separate IP addresses, one on
each network.
GPS:
(global positioning system) The GPS standard consists of a space-based positioning,
navigation, and timing signals delivered worldwide for civil and military use. Standard
positioning service performance depends on satellite broadcast signal parameters, GPS
constellation design, the number of satellites in sight, and various environmental
parameters.
H
harsh environment:
Resistance to hydrocarbons, industrial oils, detergents and solder chips. Relative humidity
up to 100%, saline atmosphere, significant temperature variations, operating temperature
between -10°C and + 70°C, or in mobile installations. For hardened (H) devices, the
relative humidity is up to 95% and the operating temperature is between -25°C and + 70°C.
HART:
(highway addressable remote transducer) A bi-directional communication protocol for
sending and receiving digital information across analog wires between a control or
monitoring system and smart devices.
HART is the global standard for providing data access between host systems and
intelligent field instruments. A host can be any software application from a technician's
hand-held device or laptop to a plant's process control, asset management, or other
system using any control system.
EIO0000001999.11 147
Cybersecurity
HMI:
(human machine interface) System that allows interaction between a human and a
machine.
Hot Standby:
A Hot Standby system uses a primary PAC (PLC) and a standby PAC. The two PAC racks
have identical hardware and software configurations. The standby PAC monitors the
current system status of the primary PAC. If the primary PAC becomes inoperable, high-
availability control is maintained when the standby PAC takes control of the system.
HTTP:
(hypertext transfer protocol) A networking protocol for distributed and collaborative
information systems. HTTP is the basis of data communication for the web.
I
%I:
According to the CEI standard, %I indicates a language object of type discrete IN.
IEC 61131-3:
International standard: programmable logic controllers
Part 3: programming languages
IGMP:
(internet group management protocol) This internet standard for multicasting allows a host
to subscribe to a particular multicast group.
IL:
(instruction list) An IEC 61131-3 programming language that contains a series of basic
instructions. It is very close to assembly language used to program processors. Each
instruction is made up of an instruction code and an operand.
148 EIO0000001999.11
Cybersecurity
implicit messaging:
UDP/IP-based class 1 connected messaging for EtherNet/IP. Implicit messaging maintains
an open connection for the scheduled transfer of control data between a producer and
consumer. Because an open connection is maintained, each message contains primarily
data, without the overhead of object information, plus a connection identifier.
inter-controller network:
An Ethernet-based network that is part of the control network, and provides data exchange
between controllers and engineering tools (programming, asset management system
(AMS)).
I/O scanner:
An Ethernet service that continuously polls I/O modules to collect data, status, event, and
diagnostics information. This process monitors inputs and controls outputs. This service
supports both RIO and DIO logic scanning.
INT:
(INTeger) (encoded in 16 bits) The upper/lower limits are as follows: -(2 to the power of 15)
to (2 to the power of 15) - 1.
Example: -32768, 32767, 2#1111110001001001, 16#9FA4.
IODDT:
(input/output derived data type) A structured data type representing a module, or a channel
of a CPU. Each application expert module possesses its own IODDTs.
IP address:
The 32-bit identifier, consisting of both a network address and a host address assigned to a
device connected to a TCP/IP network.
IPsec:
(internet protocol security) An open set of protocol standards that make IP communication
sessions private and encrypted for traffic between modules using IPsec, developed by the
internet engineering task force (IETF). The IPsec authentication and encryption algorithms
require user-defined cryptographic keys that process each communications packet in an
IPsec session.
EIO0000001999.11 149
Cybersecurity
%IW:
According to the CEI standard, %IW indicates a language object of type analog IN.
L
LD:
(ladder diagram) An IEC 61131-3 programming language that represents instructions to be
executed as graphical diagrams very similar to electrical diagrams (contacts, coils, etc.).
local rack:
An M580 rack containing the CPU and a power supply. A local rack consists of one or two
racks: the main rack and the extended rack, which belongs to the same family as the main
rack. The extended rack is optional.
local slave:
The functionality offered by Schneider Electric EtherNet/IP communication modules that
allows a scanner to take the role of an adapter. The local slave enables the module to
publish data via implicit messaging connections. Local slave is typically used in peer-to-
peer exchanges between PACs.
M
main ring:
The main ring of an Ethernet RIO network. The ring contains RIO modules and a local rack
(containing a CPU with Ethernet I/O scanner service) and a power supply module.
%M:
According to the CEI standard, %M indicates a language object of type memory bit.
150 EIO0000001999.11
Cybersecurity
MIB:
(management information base) A virtual database used for managing the objects in a
communications network. See SNMP.
Modbus:
Modbus is an application layer messaging protocol. Modbus provides client and server
communications between devices connected on different types of buses or networks.
Modbus offers many services specified by function codes.
multicast:
A special form of broadcast where copies of the packet are delivered to only a specified
subset of network destinations. Implicit messaging typically uses multicast format for
communications in an EtherNet/IP network.
%MW:
According to the CEI standard, %MW indicates a language object of type memory word.
EIO0000001999.11 151
Cybersecurity
N
network convergence:
Activity of re-configuring the network in situation of network loss to ensure system
availability.
network:
There are two meanings:
• In a ladder diagram:
A network is a set of interconnected graphic elements. The scope of a network is local,
concerning the organizational unit (section) of the program containing the network.
• With expert communication modules:
A network is a set of stations that intercommunicate. The term network is also used to
define a group interconnected graphic elements. This group then makes up part of a
program that may comprise a group of networks.
NIM:
(network interface module) A NIM resides in the first position on an STB island (leftmost on
the physical setup). The NIM provides the interface between the I/O modules and the
fieldbus master. It is the only module on the island that is fieldbus-dependent — a different
NIM is available for each fieldbus.
NTP:
(network time protocol) Protocol for synchronizing computer system clocks. The protocol
uses a jitter buffer to resist the effects of variable latency.
O
O->T:
(originator to target) See originator and target.
ODVA:
(Open DeviceNet Vendors Association) The ODVA supports network technologies that are
based on CIP.
152 EIO0000001999.11
Cybersecurity
OFS:
(OPC Factory Server) OFS enables real-time SCADA communications with the Control
Expert family of PLCs. OFS utilizes the standard OPC data access protocol.
OPC DA:
(OLE for Process Control Data Access) The Data Access Specification is the most
commonly implemented of the OPC standards that provide specifications for real-time data
communications between clients and servers.
operation network:
An Ethernet-based network containing operator tools (SCADA, client PC, printers, batch
tools, EMS, etc.). Controllers are connected directly or through routing of the inter-
controller network. This network is part of the control network.
originator:
In EtherNet/IP, a device is considered the originator when it initiates a CIP connection for
implicit or explicit messaging communications or when it initiates a message request for
un-connected explicit messaging.
P
PAC:
programmable automation controller. The PAC is the brain of an industrial manufacturing
process. It automates a process as opposed to relay control systems. PACs are computers
suited to survive the harsh conditions of an industrial environment.
port 502:
Port 502 of the TCP/IP stack is the well-known port that is reserved for Modbus TCP
communications.
port mirroring:
In this mode, data traffic that is related to the source port on a network switch is copied to
another destination port. This allows a connected management tool to monitor and analyze
the traffic.
PTP:
(precision time protocol) Use this protocol to synchronize clocks throughout a computer
network. On a local area network, PDP achieves clock accuracy in the sub-microsecond
range, making it suitable for measurement and control systems.
EIO0000001999.11 153
Cybersecurity
Q
%Q:
According to the CEI standard, %Q indicates a language object of type discrete OUT.
QoS:
(quality of service) The practice of assigning different priorities to traffic types for the
purpose of regulating data flow on the network. In an industrial network, QoS is used to
provide a predictable level of network performance.
%QW:
According to the CEI standard, %QW indicates a language object of type analog OUT.
R
rack optimized connection:
Data from multiple I/O modules are consolidated in a single data packet to be presented to
the scanner in an implicit message in an EtherNet/IP network.
ready device:
Ethernet ready device that provides additional services to the EtherNet/IP or Modbus
module, such as: single parameter entry, bus editor declaration, system transfer,
deterministic scanning capacity, alert message for modifications, and shared user rights
between Control Expert and the device DTM.
RIO drop:
One of the three types of RIO modules in an Ethernet RIO network. An RIO drop is an
M580 rack of I/O modules that are connected to an Ethernet RIO network and managed by
an Ethernet RIO adapter module. A drop can be a single rack or a main rack with an
extended rack.
RIO network:
An Ethernet-based network that contains 3 types of RIO devices: a local rack, an RIO drop,
and a ConneXium extended dual-ring switch (DRS). Distributed equipment may also
participate in an RIO network via connection to DRSs or BMENOS0300 network option
switch modules.
RPI:
(requested packet interval) The time period between cyclic data transmissions requested
by the scanner. EtherNet/IP devices publish data at the rate specified by the RPI assigned
to them by the scanner, and they receive message requests from the scanner at each RPI.
154 EIO0000001999.11
Cybersecurity
RSTP:
(rapid spanning tree protocol) Allows a network design to include spare (redundant) links to
provide automatic backup paths if an active link stops working, without the need for loops
or manual enabling/disabling of backup links.
S
S908 RIO:
A Quantum RIO system using coaxial cabling and terminators.
SCADA:
(supervisory control and data acquisition) SCADA systems are computer systems that
control and monitor industrial, infrastructure, or facility-based processes (examples:
transmitting electricity, transporting gas and oil in pipelines, and distributing water).
scanner:
A scanner acts as the originator of I/O connection requests for implicit messaging in
EtherNet/IP, and message requests for Modbus TCP.
service port:
A dedicated Ethernet port on the M580 RIO modules. The port may support these major
functions (depending on the module type):
• port mirroring: for diagnostic use
• access: for connecting HMI/Control Expert/ConneXview to the CPU
• extended: to extend the device network to another subnet
• disabled: disables the port, no traffic is forwarded in this mode
SFC:
(sequential function chart) An IEC 61131-3 programming language that is used to
graphically represent in a structured manner the operation of a sequential CPU. This
graphical description of the CPU's sequential behavior and of the various resulting
situations is created using simple graphic symbols.
SFP:
(small form-factor pluggable). The SFP transceiver acts as an interface between a module
and fiber optic cables.
EIO0000001999.11 155
Cybersecurity
SMTP:
(simple mail transfer protocol) An email notification service that allows controller-based
projects to report alarms or events. The controller monitors the system and can
automatically create an email message alert with data, alarms, and/or events. Mail
recipients can be either local or remote.
SNMP:
(simple network management protocol) Protocol used in network management systems to
monitor network-attached devices. The protocol is part of the internet protocol suite (IP) as
defined by the internet engineering task force (IETF), which consists of network
management guidelines, including an application layer protocol, a database schema, and a
set of data objects.
SNTP:
(simple network time protocol) See NTP.
SOE:
(sequence of events) SOE software helps users understand a chain of occurrences that
can lead to unsafe process conditions and possible shutdowns. SOEs can be critical to
help resolving or preventing such conditions.
ST:
(structured text) An IEC 61131-3 programming language that presents structured literal
language and is a developed language similar to computer programming languages. It can
be used to organize a series of instructions.
sub-ring:
An Ethernet-based network with a loop attached to the main ring, via a dual-ring switch
(DRS) or BMENOS0300 network option switch module on the main ring. This network
contains RIO or distributed equipment.
subnet mask:
The 32-bit value used to hide (or mask) the network portion of the IP address and thereby
reveal the host address of a device on a network using the IP protocol.
156 EIO0000001999.11
Cybersecurity
%SW:
According to the CEI standard, %SW indicates a language object of type system word.
switch:
A multi-port device used to segment the network and limit the likelihood of collisions.
Packets are filtered or forwarded based upon their source and destination addresses.
Switches are capable of full-duplex operation and provide full network bandwidth to each
port. A switch can have different input/output speeds (for example, 10, 100 or 1000Mbps).
Switches are considered OSI layer 2 (data link layer) devices.
T
T->O:
(target to originator) See target and originator.
target:
In EtherNet/IP, a device is considered the target when it is the recipient of a connection
request for implicit or explicit messaging communications, or when it is the recipient of a
message request for un-connected explicit messaging.
TCP/IP:
Also known as internet protocol suite, TCP/IP is a collection of protocols used to conduct
transactions on a network. The suite takes its name from two commonly used protocols:
transmission control protocol and internet protocol. TCP/IP is a connection-oriented
protocol that is used by Modbus TCP and EtherNet/IP for explicit messaging.
TCP:
(transmission control protocol) A key protocol of the internet protocol suite that supports
connection-oriented communications, by establishing the connection necessary to transmit
an ordered sequence of data over the same communication path.
TFTP:
(trivial file transfer protocol) A simplified version of file transfer protocol (FTP), TFTP uses a
client-server architecture to make connections between two devices. From a TFTP client,
individual files can be uploaded to or downloaded from the server, using the user datagram
protocol (UDP) for transporting data.
TIME_OF_DAY:
See TOD.
EIO0000001999.11 157
Cybersecurity
TOD:
(time of day) The TOD type, encoded in BCD in a 32-bit format, contains this information:
• the hour encoded in an 8-bit field
• the minutes encoded in an 8-bit field
• the seconds encoded in an 8-bit field
NOTE: The eight least significant bits are not used.
The TOD type is entered in this format: xxxxxxxx: TOD#<Hour>:<Minutes>:<Seconds>
This table shows the upper/lower limits of each field:
Minute [00,59] The leading 0 is displayed; it can be omitted during data entry.
Second [00,59] The leading 0 is displayed; it can be omitted during data entry.
Example: TOD#23:59:45.
trap:
A trap is an event directed by an SNMP agent that indicates one of these events:
• A change has occurred in the status of an agent.
• An unauthorized SNMP manager device has attempted to get data from (or change
data on) an SNMP agent.
TR:
(transparent ready) Web-enabled power distribution equipment, including medium- and
low-voltage switch gear, switchboards, panel boards, motor control centers, and unit
substations. Transparent Ready equipment allows you to access metering and equipment
status from any PC on the network, using a standard web browser.
U
UDP:
(user datagram protocol) A transport layer protocol that supports connectionless
communications. Applications running on networked nodes can use UDP to send
datagrams to one another. Unlike TCP, UDP does not include preliminary communication
to establish data paths or provide data ordering and checking. However, by avoiding the
overhead required to provide these features, UDP is faster than TCP. UDP may be the
preferred protocol for time-sensitive applications, where dropped datagrams are preferable
to delayed datagrams. UDP is the primary transport for implicit messaging in EtherNet/IP.
158 EIO0000001999.11
Cybersecurity
UMAS:
(Unified Messaging Application Services) UMAS is a proprietary system protocol that
manages communications between Control Expert and a controller.
UTC:
(coordinated universal time) Primary time standard used to regulate clocks and time
worldwide (close to former GMT time standard).
V
variable:
Memory entity of type BOOL, WORD, DWORD, etc., whose contents can be modified by the
program currently running.
VLAN:
(virtual local area network) A local area network (LAN) that extends beyond a single LAN to
a group of LAN segments. A VLAN is a logical entity that is created and configured
uniquely using applicable software.
EIO0000001999.11 159
Cybersecurity
160 EIO0000001999.11
Cybersecurity
EIO0000001999.11 161
Cybersecurity
162 EIO0000001999.11
Cybersecurity
U
USB
access ...................................................19
user profiles
security, M580 Control Expert Security
Editor ...................................................43
V
vulnerability
cybersecurity ..........................................16
X
X80
cybersecurity ........................................ 123
EIO0000001999.11 163
Schneider Electric
35 rue Joseph Monier
92500 Rueil Malmaison
France
+ 33 (0) 1 41 29 70 00
www.se.com