Security; Vpn - Siemens S7-1500 Operating Instructions Manual

Simatic net
Hide thumbs Also See for S7-1500:
Table of Contents

Advertisement

Configuration, programming

4.4 Security

4.4
Security
Note the range and application of the security functions of the CP in the section Industrial
Ethernet Security (Page 15).
For the configuration limits, see section Characteristics security (Page 19).
The security functions are configured in STEP 7.
4.4.1

VPN

What is VPN?
Virtual Private Network (VPN) is a technology for secure transportation of confidential data in
public IP networks, for example the Internet. With VPN, a secure connection (= tunnel) is set
up and operated between two secure IT systems or networks via a non-secure network.
One of the main characteristics of the VPN tunnel is that it forwards all network packets
regardless of higher protocols (HTTP, FTP).
The data traffic between two network components is transported practically unrestricted
through another network. This allows entire networks to be connected together via a
neighboring network.
Properties
● VPN forms a logical subnet that is embedded in a neighboring (assigned) network. VPN
uses the usual addressing mechanisms of the assigned network, however in terms of the
data, it transports its own network packets and therefore operates independent of the rest
of this network.
● VPN allows communication of the VPN partners with the assigned network.
● VPN is based on tunnel technology, can be individually configured, is customer-specific
and is self-contained.
● Communication between the VPN partners is protected from eavesdropping or
manipulation by using passwords, public keys or a digital certificate (= authentication).
Areas of application
● Local area networks can be connected together securely via the Internet ("site-to-site"
connection).
● Secure access to a company network ("end-to-site" connection).
● Secure access to a server ("end-to-end" connection).
● Communication between two servers is possible without being accessible to third parties
("end-to-end" or "host-to-host" connection).
● Ensuring information security in networked automation systems.
36
Operating Instructions, 05/2017, C79000-G8976-C289-07
CP 1543-1

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cp 1543-1

Table of Contents