B1.3.3.3 security, B1-42 – Yokogawa YFGW710 User Manual

Page 106

Advertising
background image

<B1. Engineering>

B1-42

IM 01W01F01-01EN

B1.3.3.3 Security

The increasing use of open technology for operating systems and communication protocols

these days increases the possibility that even production control system products will be exposed

to the threats of computer viruses and cyberterrorism.
To ensure stable and safe operations of plants and factories, it is indispensable to keep the pro-

duction control system in a safe state and protect assets related to the production activity.
A field wireless network has high reliability to ensure safety and information security at the pro-

duction site, such as message confidentiality (encryption, authentication, and access control),

message integrity, and network availability.
The field wireless network supports the star and mesh topologies, and uses frequency hopping

and other technologies to reduce the effects caused by radio interference among wireless de-

vices or radio disturbance and other communication problems in the installation environment.
The policy of security strength, the system configuration, the level of importance of the system,

and the amount spent on security vary depending on the customer.
Some customers have their own security policies and consider security measures from the stage

of system construction. Basically, a control system using field wireless communication must also

conform with the security policy of the customer.
Yokogawa’s security policy for system products as a whole is described in the Security Standard

of System Product (TI 33Y01B30-01E).
While referring to the above Technical Information entitled “Security Standard of System Prod-

uct,” the following describes an example of connecting the ISA100.11a field wireless network to

the CENTUM system, with focus on the network configuration, hardware and software, including

a firewall, and setup to improve security.
This explanation should be used as a reference to, for example, install a firewall, if necessary, in

accordance with the security policy of the customer. Table B1-16 shows the communication port

numbers to allow through the firewall in the field wireless system.

Advertising