In the BMENUA0100 module web pages, starting in the page, select to display links to the following configuration pages, where you can enter settings for device security:
The configurable parameters for each node are described below.
Use these settings to configure device security for the BMENUA0100 module. After changing settings, select or .
User Account Policy
Use these settings to configure user account policy:
Parameter |
Description |
---|---|
Session maximum inactivity (minutes) |
The idle session timeout period for HTTPS connections. If a connection is inactive for this period, the user session is automatically closed. Default = 15 min. NOTE: There exists no inactivity period timeout for OPC UA connections.
|
Maximum login attempts |
The number of times a user may attempt, and fail, to login. Default = 5 attempts. When the configured maximum is reached, the user account is locked. |
Login attempt timer (minutes) |
The maximum time period to login. Default = 3 min. |
Account locking duration (minutes) |
Time period during which no additional logins may be attempted after the maximum login attempts is reached. Upon the expiration of this period, a locked user account is automatically unlocked. Default = 4 min. |
Event Logs
Use these settings to configure the syslog client that resides in the BMENUA0100 module. The logs are stored locally in the module and exchanged with a remote syslog server.:
Parameter |
Description |
---|---|
Service activation |
Turns ON and OFF the syslog client service. Default = OFF. |
Syslog server IP address |
IPv4 or IPv6 address of the remote syslog server. NOTE: IPv6 is available only for firmware
version 1.10 and higher.
|
Syslog server port |
The port number used by the syslog client service. Default = 601. |
Network Services Activation
These services together constitute a firewall that permits or denies the passage of communications through the BMENUA0100 module. Use these settings to enable or disable the following services:
GLOBAL POLICY:
Service |
Description |
---|---|
Enforce Security |
Disables all network services, except IPSec which is enabled. |
Unlock Security |
Enables all network services, except IPSec which is disabled. |
NETWORK SERVICES ACTIVATION: The default setting for the following services depends on the cybersecurity operating mode (CS Op Mode), as follows:
Service |
Description |
CS Op Mode default |
|
---|---|---|---|
Standard |
Secure |
||
SNMP Agent |
Enables and disables SNMP Agent communications. |
Enabled |
Disabled |
NTP Server |
Enables and disables NTP server communications. |
Enabled |
Disabled |
IPSec |
Enables and disables IPSec communications. |
Disabled |
Enabled1 |
CPU to CPU Data Flows2, 3 Refer to Configuring Communication for CPU to CPU Data Flows.) |
Enables and disables Modbus communications, passing through the BMENUA0100 module, between M580 CPUs. |
Enabled |
Disabled |
Control Expert Data Flows to CPU only2, 3 (Refer to Configuring Communication for Control Expert Data Flow.) |
Enables and disables Modbus, EtherNet/IP, Ping, explicit messaging, and FTP communications, passing through the BMENUA0100 module, between Control Expert configuration software and the CPU only. |
Enabled |
Disabled |
Control Expert Data Flows to Device Network2, 3 (Refer to Configuring Communication for Control Expert Data Flow.) |
Enables and disables Modbus, EtherNet/IP, Ping, explicit messaging, and FTP communications, passing through the BMENUA0100 module, between Control Expert configuration software and network devices, including the CPU. |
Enabled |
Disabled |
HTTPS on control port |
Enables and disables HTTPS communications over the control port. NOTE: If HTTPS is disabled,
and the change applied, the web pages can not be accessed via the
control port. To regain access to the web pages from the control port,
you can reset the cybersecurity configuration.
|
Disabled |
Enabled |
1. IPSec is enabled with no rules defined. The service needs to be configured. 2. Refer to the troubleshooting topic Activating Network Services Using Only an IPv6 Connection for information regarding that configuration design. 3. Supported only by modules earlier than version BMENUA0100.2. |
Configuring Communication for Remote Software Running on PCs (not using NAT forwarding)
The software will address the target device (e.g., the M580 CPU) using the IP address of the target device. To support this communication, set up two default gateways, as follows:
On the host PC running the software, using IPv4, set up a PC default gateway to the BMENUA0100 module control port IP address.
On the target device (e.g. the M580 CPU), using IPv4, set up a device default gateway to the BMENUA0100 module control port IP address.
On the host PC, add a route with the following command:
route ADD <<destination=subnet of the target device>> MASK <<subnet mask of the target device>> <<gateway=BMENUA0100 module backplane port IP address>>
For IPv4 in all firmware versions, and for IPv6 in firmware versions 1.10 and higher, Modbus communications from Control Expert Connect screen will address the BMENUA0100 control port IP address. Gateways are not needed for this communication.
Configuring Communication for CPU to CPU Data Flows
Modbus TCP/IP communications from CPU to CPU through the BMENUA0100 module will use the BMENUA0100 module IPv4 control port address, and not the address of the target CPU.
For BMENUA0100 V1.x, the CPU to CPU forwarding is limited to Modbus TCP/IP protocol.
Only IPv4 – and not IPv6 – addressing supports Modbus TCP/IP CPU to CPU data flows.
Service Forwarding (IP Forwarding)
A BMENUA0100 module with firmware version 2.01 or higher includes this web page. Use it to configure the forwarding of unicast data flows that pass through the module between the control network and device network. In this web page you can create, edit, or remove a list of IP forwarding rules for the module.
Multicast data flows.
EtherNet/IP implicit messaging.
As a result, this service the following tasks are not supported:
Device discovery by the EcoStruxure Automation Device Maintenance (EADM) tool operating in automatic discovery mode. EADM device discovery using the manual discovery mode is supported. (multicast).
Message forwarding to the PAC's local slaves (EtherNet/IP implicit messaging).
Features:
The main features of the Service/IP forwarding function are:
Capability to forward all data flows (“Forward All”).
IP forwarding of the most common protocols used in the architecture through predefined templates (e.g.: Modbus, HTTPS, SNMP, …)
Creation and application of of custom IP forwarding templates.
NAT (Network Address Translation) forwarding of some protocols to local CPU if @remote IP address is the BMENUA0100 IP V4 Control port
NOTE: NAT forwarding applies to the following protocols: Modbus, Modbus over TLS, EIP explicit, EIP explicit over TLS, EIP implicit, OPC UA Client.The option to use, or not use, IPSEC for protocols forwarded by NAT. Refer to the recommendations set forth in the notes at the end of the IPSEC section, below.
If several BMENUA0100 modules are placed in the same rack, configure only one BMENUA0100 module with the forwarding function.
Multicast data flows are not forwarded.
An online update of IP Forwarding rules may cause some ongoing communications to stop with resulting loss of messages.
For Service Forwarding (IP Forwarding) to succeed, the destination IP network needs to be different from the source IP network. For example, it is not possible to execute IP Forwarding between:
Source IP network 192.168.x.x (Mask 255.255.0.0) and
Destination IP network 192.168.x.x (Mask 255.255.0.0).
The value of OPC UA Listening port needs to be the same for all BMENUA0100 modules communicating together (for example, in the case of OPC UA NAT forwarding between several BMENUA0100 modules.
Activating the FTP protocol opens a range of TCP ports, from 1024 to 65535. As a result, other protocols with TCP ports in this range may also be forwarded. It is recommended to enable forwarding of the FTP protocol only temporarily when it is required.
Activating the TFTP protocol as a custom rule causes the same result as activating the FTP protocol. It is recommended to enable forwarding of the TFTP protocol only temporarily when it is required.
Refer to the following topics for more information about Service (IP) Forwarding architectures:
IP Forwarding and OPC UA Communication
Both IP Forwarding and OPC UA compete for the BMENUA0100 module’s available communication bandwidth. For performance test results describing the impact of IP Forwarding, OPC UA communications, confidentiality settings, and custom rules on bandwidth, refer to the chapter IP Forwarding and OPC UA Communication.
Creating Rules:
To document both predefined rules and custom rules, click
, and complete the settings that define that rule.NOTE: When you select a service name, the port number and protocol are automatically assigned their default settings. These can be edited as required.To edit an existing rule, click the pencil icon, and edit its settings.
To remove an existing rule, click the trash container icon.
Set OFF to apply the listed rules. If you set to ON:
toThe rules are suspended and the module forwards all protocols;
You cannot configure forwarding for individual services, and
All services will be forwarded over IPSec if IPSec is enabled.
Each rule is defined by the following fields:
Setting |
Description |
---|---|
Service name |
The following services are pre-defined:
NOTE: For OPC UA, the port number is the OPC UA port set in Control
Expert for the BMENUA0100 module.
|
Port Number1 |
The port associated with the service. |
Protocol1 |
The protocol associated with the service. |
IPSec use |
This selection is available only when IPSec is enabled. NOTE: It is recommended that you:
|
Inbound Interface |
|
1. Auto-filled, but editable, for a predefined service names. |
IPSEC
Use IPSEC to help secure IPv4 Ethernet communication.
Use these settings to configure a maximum of 8 IKE / IPSEC channels over IPv4 for the BMENUA0100 module. If more than 4 IPSec links are configured, the automatic connection to the PAC after transfer through the BMENUA0100 may not succeed. In that case, connect to the PAC manually.
Parameter |
Description |
---|---|
IPSEC SERVICE |
|
NTP authorized outside IPSEC |
|
New link |
Creates a new IKE / IPSEC channel and adds it to the list for editing. NOTE: A maximum
of 8 IKE / IPSec channels are supported.
|
For each IKE / IPSEC channel, configure the following settings: |
|
Remote IP address |
IPv4 address of the remote IPSEC endpoint. NOTE: The remote device needs to be accessible from the BMENUA0100 Control Port (and not from the BMENUA0100 Backplane Port).
|
Confidentiality |
NOTE: Confidentiality is disabled if NTP without
IPSEC is enabled.
|
Client type |
Type of the remote IPSEC endpoint: Windows or Device. NOTE: Default
is Windows. Verify that the configured endpoint type matches the actual
client.
|
PSK |
A pre-shared key that is 32 hexadecimal characters long, the result of a random number generated by the BMENUA0100 module. It can be copied and edited in this web page. NOTE: PSK is disabled if NTP without IPSEC is enabled.
|
SNMP
Use these settings to configure the SNMP version and related settings.
Parameter |
Description |
---|---|
SNMP Version |
|
Security Level |
For SNMP v1 and v3:
For SNMP v3 only:
|
Authentication Password |
If authentication is enabled, enter a case-sensitive authentication password. It can contain from 8 to 12 characters, and can include alphanumeric characters (uppercase letters, lowercase letters, and numbers) as indicated by the web page tool tip. |
Privacy Password |
If privacy is enabled, enter a case-sensitive privacy password. It must contain 8 characters, and can and include alphanumeric characters (uppercase letters, lowercase letters, and numbers) as indicated by the web page tool tip. |
OPC UA
Use these settings to configure the connection for the OPC UA server embedded in the BMENUA0100 module:
Parameter |
Description |
---|---|
Message Security mode |
NOTE: When is selected, the User Identifier token type in the BMENUA0100 module is defined as . In this case, you also need to configure the user
identifier token type in the OPC UA client to .
|
Security Policy |
|
User Identifier token types |
|
To re-establish a connection:
Disconnect your current OPC UA clients.
Change the OPC UA configuration in BMENUA0100 web page.
Wait while the BUSY LED is ON (yellow) until it turns OFF (not lighted).
For the OPC UA clients, change their configuration (Message Security Mode) to the same setting used for the OPC UA server.
Reconnect the OPC UA clients to the server.
Security Banner
This page contains editable text that is displayed when a user accesses the BMENUA0100 module web pages:
Parameter |
Description |
---|---|
Banner text |
A string of up to 128 characters that is displayed to a user on the login page. The following editable text is displayed by default: “Unauthorized use of the system is prohibited and subject to criminal and/or civil penalties.” |