Network Hardware

W&T Network Hardware banner

IT security for machines, devices and systems

The demands on IT security are continually increasing in the manufacturing world. Yet at the same time there are often too few personnel resources for implementing such security. The IT security products from W&T are designed to implement concrete IT security solutions in a straightforward manner. The W&T compact firewalls isolate critical systems (outdated equipment, IoT systems etc.) on a secure island in your network.

W&T connects

Interfaces for TCP/IP, Ethernet, RS-232, RS-485, USB, 20mA, glass and plastic fiber optic cable, http, SNMP, OPC, Modbus TCP, I/O digital, I/O analog, ISA, PCI

 

  • Microwall VPN:

    The Microwall VPN enables secure access to maintenance islands in the customer network, opens VPN tunnels between two network locations and expands your security with cryptographically authenticated access possibilities.

  • Microwall IO:

    The Microwall IO lets you use the digital in- and outputs to integrate remote maintenance and firewall-specific actions in automation and process environments, for example to use a PLC output or simple button/switch to control VPN access and to control certain firewall rules or check the status of network interfaces.

  • Fixed Defined Firewall:

    The Fixed Defined Firewall enables read-only access to your network data traffic to provide analysis with no undesirable side-effects, for example in the contexts of Big Data and anomaly monitoring.

  • Industrial Ethernet Switch:

    The compact Industry-Switch connects up to four network components in the control cabinet. The Switch itself is powered via PoE or with 24-48V and can also power the connected components using PoE injection or a voltage output (PoE extraction).


Firewalls, segmentation
and islandization

One widely used technique for improving security in corporate networks is to subdivide them into smaller segments by department. Communication between these subnets is monitored, controlled and logged by firewall routers. Attackers and malware that succeed in penetrating one of the subnets are prevented from further spreading by packet filters. One way of further increasing security is targeted isolation of individual systems and function units into their respective own network segment. This effectively protects even highly vulnerable devices.

 

Segmentation: Subdivision into secure subnets

The internet protocol (IP) makes it possible to exchange data beyond network borders. The information encapsulated in IP packets is sent to its destination through various routers.

Network administrators take advantage of this routing property to divide corporater networks into sub-networks which are linked to each other. The administrative computers are assigned to the management subnet, and even production machines are given their own network segment, just as with the desktop machines in the R&D department.

Each of these network segments is attached to the surrounding corporate network through a router. All communication between the subnets is passed through the routers.

Segmentation: diagram of subnets

Packet filters for greater security

It makes sense to analyze the passing data packets at the router and send on only permissible data packets.

It could be in the interest of company management for example to allow employees in the administration department to have free access to web sites in the Internet, but at the same time have their sensitive data, such as salary statements or contracts, remain inaccessible in the corporate network and Internet. These are made available in the Windows network via file and printer sharing.

A packet filter installed on the router analyzes whether the passing network traffic contains connections which could be used by the file and printer sharing. These are TCP connections to ports 139 and 445. If the packet filter detects IP packets which contain TCP communication with these ports, they are not passed along, but rather rejected. Whereas file and printer sharing continues to function within the subnet for administration, it cannot cross segment borders. Nor is there access to files such as salary statements from other network segments. Islandisation diagram

 


 

Islandization: Targeted segmentation of individual systems

The firewall rules for large subnets can quickly become confusing and complicated. If they are to generously dimensioned, they can be exploited by attackers. If they are made too narrow, function limitations can result. Each terminal device in a segment is also a possible source of undesired access.

Especially devices and systems with a high need for protection - such as machine tools, medical equipment, but also older control computers or those with outdated software - often have known, exploitable security holes which are no longer detected by rules.

Islandization means that these especially vulnerable systems in the network are identified and with the help of firewalls such as Microwall isolated in their own network segment - a secure island. The necessary connections between systems on the island and the surrounding network are determined in advance and described by means of a positive list of rules. Only expressly permitted data packets are passed along, all others are rejected and logged if needed. Isolated systems are therefore effectively protected from attacks by hackers or malware as well as from human error.

Only a small number of systems are located on these secure islands. Because they are protected by a narrowly described and task-targeted set of rules, islandization ensures significantly enhanced security.

 

Islandization

Islandization with the Microwall is easy to implement and effectively increases the security level in the corporate network. This is especially beneficial for smaller companies for which cumbersome segmentation by department is not worth the effort.

 

Information courtesy of Wiesemann & Theis GmbH (W&T)

 

 

Set Descending Direction
View as List Grid

7 Items

per page
  1. Product Code: 55211 Microwall VPN
    Rating:
    0%
    Microwall VPN Learn More
    $925.00
  2. Product Code: 55212 Microwall IO
    Rating:
    0%
    Microwall IO Learn More
    $1,095.00
  3. Product Code: 55312 Fixed Defined Firewall
    Rating:
    0%
    Fixed Defined Firewall Learn More
    $1,095.00
  4. Product Code: 55604 Ethernet Switch Industry
    Rating:
    0%
    Ethernet Switch Industry PoE injection/extraction). Learn More
    $385.00
  5. Product Code: 50543 FTP Data Station 3
    Rating:
    0%
    FTP Data Station 3 Learn More
    $385.00
  6. Product Code: 57920 rule.box Digital 2xIn2xOut
    Rating:
    0%
    rule.box Digital 2xIn2xOut Learn More
    $1,070.00
  7. Product Code: 55990 MQTT.box
    Rating:
    0%
    MQTT.box Learn More
    $850.00
Set Descending Direction
View as List Grid

7 Items

per page