The mGuard security appliances protect industrial automation networks. They are network transparent and simple to install.
“The ability for the mGuard to do AES-256 encryption along with its industrial design was key,” Kolkebeck said. “By default, the mGuard is configured in its most secure configuration. Previously, it would require a day’s time of an experienced IT technician, whereas now we can roll out a new VPN device in 10 minutes.”
In “Stealth Mode” these products are completely transparent, automatically assuming the MAC and IP address of the equipment to which they are connected, so that no additional addresses are required for the management of the network devices. No changes need to be made to the network configuration of the existing systems involved. The devices operate invisibly and transparently, monitoring and filtering traffic to the protected systems by providing a Stateful Packet Firewall according to rules that can be configured via templates from a centrally located server.
And with bi-directional wire speed capability, the devices will not add any perceptible bottlenecks or latency to a 100 Mb/s Ethernet network.
If required, the security of networked equipment may be further enhanced. Configuration of specific user firewall rules can restrict the type and duration of access to authorized individuals, who may login and authenticate themselves from varying locations, PCs, and IP addresses. Virtual Private Network functions provide for secure authentication of remote stations, and the encryption of data traffic. CIFS Integrity Monitoring functionality can protect file systems against unexpected modifications of executable code, by Stuxnet-derived malware for instance, by sending alerts to administrators.
“We were implementing multiple measures into our SCADA network in order to actively monitor our system. We utilize network segmentation, VLANS, and centralized firewalls and were looking to introduce intrusion detection (IDS) and intrusion prevention (IPS) systems into our network. The mGuard is a tool that allows us to perform these functions,” Kolkebeck said.
Following field trials, the mGuard appliances were used to provide protection from vulnerabilities through firewall, VPN, routing and trap functions.
“We currently have mGuard security modules deployed in multiple locations throughout the Northeast,” Kolkebeck said. “We are saving money on remote support from our staff and outside contractors. Site visits are no longer required for minor code changes and troubleshooting.”
WW
About the Author: Frank Dickman is an engineering consultant based in Chicago. He can be reached at [email protected] . Circle No. 250 on Reader Service Card
For more information about current threats to networked industrial equipment, a comprehensive 18-page White Paper “Hacking the Industrial Network,” including footnotes, clickable Internet research links and detailed references, is available for download at www.innominate.com. An accessible discussion of “Post-Stuxnet Industrial Security” is also available.
“We will begin to focus more on underground and collection projects while still completing relatively minor plant upgrades and equipment replacements.”
“We expect to only do what is absolutely needed to stay within state and federal guidelines due to the poor economy.”
More WaterWorld Current Issue Articles
More WaterWorld Archives Issue Articles