Cybersecurity
28 Instructions for use – Infinity
®
M300 and M300+ series – VG3.0
Security modes of operation
There are two security modes of operation for the M300/M300+ and ICS.
Secure mode
Secure mode is an enhanced Infinity network protocol that includes authentication, integrity and
encryption. Secure communication can be intercepted but not read or altered by an unauthorized device.
The ICS always uses Legacy communication (standard Infinity protocol) to communicate with all other
non-M300/M300+ devices on the Infinity network.
For Secure mode, PSKs are loaded on the ICS and M300/M300+ to establish an authorized network
connection. Both devices must share the same key to communicate. A mismatch, missing or expired key
on one or both devices will prevent communication and patient monitoring.
DrägerService, specialized service personnel, or the hospital’s trained biomedical staff loads the PSKs to
the Infinity devices using the Dräger INST software tool.
Legacy mode
Legacy mode is the standard Infinity network protocol that exchanges data between the M300/M300+ and
ICS, and other Infinity devices.
Secure/Legacy mode symbols
One of the following symbols displays on the ICS depending on which security mode is selected:
NOTE
PSKs should always be loaded on the ICS first and then the M300/M300+.
All Infinity devices should contain the same pre-shared key.
WARNING
Risk of cybersecurity attacks in Legacy mode
Disabling Secure mode and operating in Legacy mode lessens cybersecurity protection of the Infinity
network communication. Legacy communication can be intercepted, read, or altered by an unauthorized
device connected to the Infinity network, such as a malicious laptop.
Always operate devices in Secure mode when possible.
Symbol Description
Secure mode.
Legacy mode.