EasyManua.ls Logo

Allen-Bradley Stratix 5950 - Rockwell Automation Publication 1783-UM010 C-EN-P - June

Allen-Bradley Stratix 5950
130 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
98 Rockwell Automation Publication 1783-UM010C-EN-P - June 2019
Chapter 8 Firewall Modes
Considerations
Before implementing the IFW in a machine/skid protection architecture, it is
recommended that the designer understands and documents the following.
Ingress and egress traffic source and destination host communications.
For example, IP addresses of controllers, HMI, engineering
workstations, and all communications that enter or leave the
machine/skid must be known so firewall and DPI security policies can
be configured.
Ingress and egress traffic source and destination protocols must be
known to configure the firewall and DPI rules.
Ingress and egress traffic volume.
Redundancy and availability requirements. For example, when
considering high availability, one must regard the security
considerations while in hardware bypass mode.

Table of Contents