EasyManua.ls Logo

Allen-Bradley Stratix 5950 - Page 24

Allen-Bradley Stratix 5950
130 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
24 Rockwell Automation Publication 1783-UM010C-EN-P - June 2019
Chapter 2 Industrial Firewall Use Cases
Figure 7 shows how the security zones depicted can be applied to the CPwE
network architecture to create DMZs and other types of segmentation.
Figure 7 - Security Zones within CPwE Architecture
Firewalls are normally positioned either as a node, where the network splits
into multiple paths, or inline with one network path. In routed networks, the
firewall usually resides at the location immediately before traffic enters the
router. Most firewalls provide routing and, in some network designs, the
firewall acts as both the firewall and the router.
Most firewalls inspect the following elements of a packet:
Source MAC or IP address
Destination MAC or IP address
Source TCP or UDP Port
Destination TCP or UDP Port
Protocol - Layer 2, 3, 4, or 7
Firewalls that inspect these elements of a packet are commonly known as
five-tuple firewalls. Typically, firewall rules include these five elements to
configure a rule. The firewall is configured to permit or deny ingress and egress
traffic that is based on these five-tuple rules.
A firewall can inspect traffic for conformance with proper protocol behavior
and drop non-compliant traffic, but the firewall does not have deep knowledge
of the protocol. To inspect and make permit-and-deny decisions at the
protocol level, deep packet inspection (DPI) capabilities are needed. These
DPI capabilities are discussed in the following section.

Table of Contents