98 Rockwell Automation Publication 1783-UM010C-EN-P - June 2019
Chapter 8 Firewall Modes
Considerations
Before implementing the IFW in a machine/skid protection architecture, it is
recommended that the designer understands and documents the following.
• Ingress and egress traffic source and destination host communications.
For example, IP addresses of controllers, HMI, engineering
workstations, and all communications that enter or leave the
machine/skid must be known so firewall and DPI security policies can
be configured.
• Ingress and egress traffic source and destination protocols must be
known to configure the firewall and DPI rules.
• Ingress and egress traffic volume.
• Redundancy and availability requirements. For example, when
considering high availability, one must regard the security
considerations while in hardware bypass mode.