Secure At001 - en P
Secure At001 - en P
Automation Products
Activities including installation, adjustments, putting into service, use, assembly, disassembly, and maintenance are required to
be carried out by suitably trained personnel in accordance with applicable code of practice.
If this equipment is used in a manner not specified by the manufacturer, the protection provided by the equipment may be
impaired.
In no event will Rockwell Automation, Inc. be responsible or liable for indirect or consequential damages resulting from the use
or application of this equipment.
The examples and diagrams in this manual are included solely for illustrative purposes. Because of the many variables and
requirements associated with any particular installation, Rockwell Automation, Inc. cannot assume responsibility or liability for
actual use based on the examples and diagrams.
No patent liability is assumed by Rockwell Automation, Inc. with respect to use of information, circuits, equipment, or software
described in this manual.
Reproduction of the contents of this manual, in whole or in part, without written permission of Rockwell Automation, Inc., is
prohibited.
Throughout this manual, when necessary, we use notes to make you aware of safety considerations.
WARNING: Identifies information about practices or circumstances that can cause an explosion in a hazardous environment, which
may lead to personal injury or death, property damage, or economic loss.
ATTENTION: Identifies information about practices or circumstances that can lead to personal injury or death, property
damage, or economic loss. Attentions help you identify a hazard, avoid a hazard, and recognize the consequence.
IMPORTANT Identifies information that is critical for successful application and understanding of the product.
These labels may also be on or inside the equipment to provide specific precautions.
SHOCK HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that dangerous
voltage may be present.
BURN HAZARD: Labels may be on or inside the equipment, for example, a drive or motor, to alert people that surfaces may
reach dangerous temperatures.
ARC FLASH HAZARD: Labels may be on or inside the equipment, for example, a motor control center, to alert people to potential
Arc Flash. Arc Flash will cause severe injury or death. Wear proper Personal Protective Equipment (PPE). Follow ALL Regulatory
requirements for safe work practices and for Personal Protective Equipment (PPE).
Identifies information that is useful and can help to make a process easier to do or easier to understand.
Chapter 1
Industrial Security Overview Industrial Automation Control Systems Environment . . . . . . . . . . . . . . . 9
Security Threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Vulnerability and Exploits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Security Assessment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Defense in Depth Architecture . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
CIP Security is an ODVA Standard. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Device Identity/Authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Secure Data Transport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Chapter 2
CIP Security-capable Rockwell Software and Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Automation Products CIP Security Software Applications. . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
CIP Security-capable Hardware Devices . . . . . . . . . . . . . . . . . . . . . . . 19
Use Non-CIP Security-capable Controllers with
CIP Security. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
Benefits of Using Rockwell Automation Products . . . . . . . . . . . . . . . . . . 21
CIP Security Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Security Profile and Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
CIP Security Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Security Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Zone Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Conduit Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Limitations and Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Devices That Support DLR/Linear and Dual-IP
EtherNet/IP Modes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Initial Security Model Deployment Fails If
ControlLogix 5580 Controller is in Run Mode. . . . . . . . . . . . . . . . . . . 30
Cannot Download to ControlLogix 5580 Controller
from Unsecure Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Workstation Cannot Download to a Secured
ControlLogix 5580 Controller if Security Policies Do
Not Match . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Secure the Programming Connection to Redundant
ControlLogix 5580 Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Chapter 3
CIP Security Design and Install the System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Implementation Process Identify CIP Security-capable and CIP Security-enabled
Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Unsecure Device Management . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Identify, Organize, and Create Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Create a Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Configure the Zone . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
Identify, Organize, and Create Conduits . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Create a Conduit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Configure the Conduit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55
Identify and Create Security Features/Policies . . . . . . . . . . . . . . . . . . . . . 57
Deploy Security Model. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Back Up the Security Model . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62
Save Security Model Backup to Another Secure Location . . . . . . . . 62
Different From FactoryTalk Directory Backup File . . . . . . . . . . . . . . 62
Restore FactoryTalk System Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Remove the Security Policy. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64
Remove the Security Policy From a Software Application . . . . . . . . 64
Remove the Security Policy From a Device . . . . . . . . . . . . . . . . . . . . . 68
Set Mask Parameters on PowerFlex 755T Drives to
Maintain Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72
Device Peripheral Interface (DPI) Ports . . . . . . . . . . . . . . . . . . . . . . . . 72
Setting Masks to Secure the DPI Ports . . . . . . . . . . . . . . . . . . . . . . . . . 73
Use Syslog with CIP Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Syslog Collector . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
Define Event Policy in FactoryTalk Policy Manager . . . . . . . . . . . . . 75
Facility Codes and Severity Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Syslog Message List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77
Chapter 4
CIP Security Implementation Phase One of Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Example Architecture Create Zones . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Create Zone-to-Zone Conduits. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81
Configure Conduit Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Deploy Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
Phase Two of Implementation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Create a Device-to-Device Conduit . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Create a Zone-to-Device Conduit. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Create Conduit Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86
Deploy Security Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
Chapter 5
Add or Replace A Device In a CIP Automatic Policy Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 89
Security System Enable Automatic Policy Deployment. . . . . . . . . . . . . . . . . . . . . . . . . . 90
Deployment Operation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91
Onboarding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 92
Merging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Disable Automatic Policy Deployment in a Device . . . . . . . . . . . . . . 97
Disable Automatic Policy Deployment in FactoryTalk
Policy Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Firmware Revision Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Benefits of Automatic Policy Deployment . . . . . . . . . . . . . . . . . . . . . 100
Add a New Device That Supports Automatic Policy
Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
New Device is Not in the Security Policy Model . . . . . . . . . . . . . . . . 101
New Device is in the Security Policy Model . . . . . . . . . . . . . . . . . . . . 102
Replace a Device That Supports Automatic Policy
Deployment . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Replacement Device is Not Identical to the
Existing Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Replacement Device is Identical to the Existing Device . . . . . . . . . 104
Devices That Do Not Support Automatic Policy Deployment . . . . . . . 105
Add a Device That Does Not Support APD to an Existing
CIP Security System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
Replace a Secured Device That Does Not Support APD
in an Existing System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Appendix A
CIP Security Compatibility Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Logix Controllers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
ControlLogix 5580 and 5570 Controller Redundancy . . . . . . . . . . . . . . . 109
Other Devices. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Appendix B
History of Changes SECURE-AT001B-EN-P, August 2021. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Make sure that you are familiar with the following before you use this manual:
• Basic understanding of EtherNet/IP™ networking fundamentals
• Basic understanding of network security terminology and concepts
• Use of Rockwell Automation® software, for example:
- FactoryTalk® Policy Manager
- FactoryTalk Linx
- Studio 5000 Logix Designer®
Summary of Changes This table contains the changes that are made to this revision of
the publication. Change bars indicate changes throughout the publication.
Topic Page
Added information about the following products that you can use with CIP Security
• Armor™ PowerFlex® Variable Frequency Drives (VFD)
• CompactLogix™ 5380 Controllers
• Compact GuardLogix® 5380 Controllers Throughout
• ControlLogix 5580 Process Controllers
• GuardLogix 5580 Controllers
• PowerFlex 755TS Drives
Added section Use Non-CIP Security-capable Controllers with CIP Security 20
Change Allowed to AllowedList as appropriate 21
Added a table to define icons that had not previously been defined 22
Changed section Dual-port Devices to Devices That Support DLR/Linear and Dual-IP EtherNet/IP 28
Modes and added content
Added information on how to Secure the Programming Connection to Redundant ControlLogix 32
5580 Controllers
Added information on how to Secure the Programming Connection to the CompactLogix 5380 34
Controllers
Updated the description of CIP Bridging, including changing the name to Policy Provisioning 36
Added information on CIP Bridging Control 38
Updated the description of how to use I/O connections in Redundancy Systems 41
Added description of Automatic Device Configuration (ADC) 41
Added description of how to disable CIP Security 41
Added description of how to add legacy devices to the security model 42
Added description of how to Identify CIP Security-capable and CIP Security-enabled Devices 44
Added description of Unsecure Device Management 45
Added information to section Identify, Organize, and Create Zones 45
Added information to section Back Up the Security Model 62
Add information on how Set Mask Parameters on PowerFlex 755T Drives to Maintain Security 72
Added information on how to Use Syslog with CIP Security 75
Added Chapter 5, Add or Replace A Device In a CIP Security System with the following sections:
• Automatic Policy Deployment 89
• Add a New Device That Supports Automatic Policy Deployment 101
• Replace a Device That Supports Automatic Policy Deployment 103
• Devices That Do Not Support Automatic Policy Deployment 105
Added a CIP Security Compatibility section 107
Added a History of Changes section 111
Industrial Automation Historically, industrial automation control systems (IACS) have been air-
Control Systems gapped environments, isolated systems that are running proprietary control
protocols. But IACS networks are evolving toward smart manufacturing.
Environment
Smart manufacturing represents a gateway to digital transformation that
connects plant-level and enterprise networks, and securely connects people,
processes, and technologies.
Collectively, this opens new windows to connected smart devices for visibility
into processes, data, and analytics. The visibility enables better and faster
decision-making and seamless connectivity for remote locations.
IMPORTANT This publication focuses on threat actors with malicious intentions, also
called attackers. The word attacker is used throughout the rest of the
publication.
In this publication, attacker refers to a range from one individual or to an
Advanced Persistent Threat (APT), that is, or a group of attackers working
collectively.
Vulnerability and Exploits By default, IACS communication protocols are proprietary and insecure. They
lack the security properties such as authentication, integrity, and
confidentiality. As a result, data and endpoints are at risk. These security
properties are necessary for IACS devices to defend themselves against a
network-based attack.
When attackers access a system, they use many ways to exploit the IACS
communication protocol vulnerabilities.
Table 1 - Attack Types
Attack Type Description
EtherNet/IP Logix5585 TM
DC INPUT
SAFETY ON
NET
0000 LINK
EtherNet/IP Logix5585 TM
DC INPUT
SAFETY ON
NET
0000 LINK
EtherNet/IP Logix5585 TM
DC INPUT
SAFETY ON
NET
0000 LINK
Security Assessment Getting a security assessment is the starting point for any security
implementation. An assessment provides a picture of your current security
posture and what mitigation techniques that can be used to achieve an
acceptable risk state.
An assessment is a collaborative process, between Operational Technology
(OT) and Information Technology (IT) personnel to maximize the protection
of confidentiality, integrity, and availability while still providing functionality
and usability.
Defense in Depth Industrial security is best implemented as a complete system across your
Architecture operations. The defense in depth (DiD) approach is common to
security standards.
The DiD security approach establishes multiple layers of protection that are
based on diverse technologies through physical, electronic, and procedural
safeguards.
For example, you restrict physical access to managed switches with port locks.
Then you position edge industrial firewalls to restrict access and block
unapproved traffic flows. Finally, you employ an industrial demilitarized zone
(IDMZ) as a perimeter buffer zone between the Industrial and Enterprise
zones. The IDMZ lets secure data sharing and services take place without
direct connection.
The expectation of the DiD approach is that in the event that an attacker
breaches one layer of defense, there’s always an additional layer that thwarts
their effort.
Figure 1 - Defense in Depth Architecture
Policies,
Procedures,
Physical
Physical
Network
Computer
Application
Device
CIP Security is an As attackers become more sophisticated and network convergence opens more
ODVA Standard potential gateways to industrial zones, CIP-connected devices must be able to
defend themselves.
The following CIP Security properties are countermeasures that address the
security risks:
• Device identity and authentication
• Data integrity and authentication
• Data confidentiality (encryption)
Policies,
Procedures,
Physical
Physical
Network
CIP Security-
enabled Device
Device Identity/Authentication
Before devices start communicating, each device must be able to verify that the
identity of the device with which it wants to communicate is authentic. This
protects legitimate devices from a rogue device gaining access to the system by
pretending to be a system component.
To build this endpoint trust, a certificate or pre-shared (secret) key can be used
to provide identity to the device:
• Certificate is used to provide identity based on the X.509v3 standard.
Certificates are an agreement between communicating parties and a
common entity that is called a Certificate Authority (CA). A trusted CA
signs and issues certificates to requesters to prove their identities.
Mutual trust can be established when communicating parties exchange
certificates signed by a common CA.
FactoryTalk® System Services is the certificate authority. It is the service
that signs and issues certificates to give assurance for a communicating
party's authenticity.
An advantage to using certificates is that they provide a greater level
security than pre-shared keys.
• Pre-shared keys are used to prove identity that is based on keys that are
shared in advance among the communicating parties.
Pre-shared keys are agreement between two entities to the parameters
that determine identity and authentication. The entities are the devices
that communicate with each other.
An advantage to using pre-shared keys is that they provide less
performance impact on when establishing connections.
IMPORTANT Devices can only use one pre-shared key, as a result, any conduits that are required between any Zones that are configured
with pre-shared key must be created using Trusted IP.
TLS and DTLS are network protocols that facilitate data transfer privately and
securely between an originator and a target device.
For complete descriptions of the security properties, see the ODVA home page
available at: https://www.odva.org/.
Table 2 defines the icons that are used in Table 3 on page 16.
Table 2 - CIP Security Icons
Name Symbol Definition
An electronic representation of an identity. A certificate binds the identity’s public key to its identifiable information, such as,
Certificate name, organization, email, user name, and/or a device serial number.
This certificate is used to authenticate a connection to a zone or device. Selected by default when CIP Security is enabled.
A secret that is shared among trusted entities to represent identities. FactoryTalk® Policy Manager can create a key that can be
Pre-shared key shared.
Integrity Checks whether data was altered and whether the data was sent by a trusted entity. Altered and/or untrusted data is rejected.
Check mark Symbol used to indicate that the endpoints for communication between devices have been authenticated and can be trusted.
Encryption Encodes messages or information to help prevent reading or viewing of EtherNet/IP data by unauthorized parties.
FactoryTalk® Linx
0000
SAFETY ON
RUN FORCE SD OK
TM
NET
LINK
DC INPUT
1756-EN4TR
FactoryTalk Linx
NET
0000 LINK
1756-EN4TR
FactoryTalk Linx
NET
0000 LINK
1756-EN4TR
This section describes the components and concepts that are part of the
Rockwell Automation method of implementing CIP Security™ in an IACS.
For information on the tasks that are required to use CIP™ Security-capable
products in an IACS, see the following table:
• Chapter 3, CIP Security Implementation Process on page 43
• Chapter 4, CIP Security Implementation Example Architecture on
page 79
• Publications listed in Additional Resources on page 8
Software and Hardware The list of CIP Security-capable Rockwell Automation® products includes
software and hardware products, for example, FactoryTalk® Policy Manager
software and ControlLogix® 5580 controllers, respectively, to define the
security policy.
IMPORTANT You download software at the Rockwell Automation Product Compatibility and Download Center (PCDC).
To visit the PCDC, go to: https://compatibility.rockwellautomation.com/Pages/home.aspx
• FactoryTalk Policy Manager, version 6.11, and FactoryTalk System Services, version 6.11, are components of FactoryTalk
Services Platform, version 6.11.
When you install FactoryTalk Services Platform, version 6.11, you must select Customize from the installation wizard and
check the boxes for installation of FactoryTalk Policy Manager and FactoryTalk System Services components.
For more information, see the FactoryTalk Policy Manager Getting Results Guide, publication FTALK-GR001.
• FactoryTalk Policy Manager, version 6.20 or later, is an independent installation package. FactoryTalk System Services,
version 6.20 or later, is part of the FactoryTalk Policy Manager installation.
FactoryTalk Services Platform, version 6.20 or later, do not include FactoryTalk Policy Manager or FactoryTalk System
Services.
• Before you migrate from version 6.11 to version 6.20 or later, we recommend that you see the following Rockwell Automation
Knowledgebase articles that are available at https://rockwellautomation.custhelp.com/app/home:
– Backup and restore CIP Security models of FactoryTalk Policy Manager and FactoryTalk System Services, click here.
– Fail to migrate existing FactoryTalk System Service data with CIP Security policy models, click here.
– FactoryTalk Policy Manager download and install, click here.
Some hardware devices required later minimum firmware revisions. We recommend that you use the latest version of
FactoryTalk Policy Manager.
IMPORTANT • The minimum firmware revisions that are listed for Logix 5000 controllers in Table 5 represent the first firmware revision at
which you can connect the controller to an IACS with CIP Security implemented via a secure connection to the controller
Ethernet port.
There are some configurations in which you can use earlier firmware revisions to connect the controller to an IACS with CIP
Security implemented. For more information, see Appendix A, CIP Security Compatibility on page 107.
• The table represents products that are CIP Security-capable at the time of this publication.
Over time, new products will be released that are CIP Security-capable. New versions of existing products that aren’t CIP
Security-capable will be released in the future to make them CIP Security-capable.
To see if a product is CIP Security-capable, see the product documentation.
Benefits of Using Rockwell Implementing CIP Security with Rockwell Automation products has the
Automation Products following benefits:
• Centralized System Management - Use FactoryTalk Policy Manager
software to easily create and deploy security policies to many devices at
once.
• Micro-segmentation - Segment the automation application into smaller
cell/zones, thus, reducing the attack surface.
• HTTP ports - You can enable or disable unsecure (HTTP) ports/protocols
of devices in a system with CIP Security configured.
• Legacy system support - The following options are available to use for
products that aren’t CIP Security-capable in a specific unsecured
communication network that deploys the CIP Security feature:
- Use the 1783-CSP CIP Security Proxy to connect a device that is not CIP
Security-capable to an IACS that has CIP Security™ enabled.
- Retrofit ControlLogix 5570-based systems with a 1756-EN4TR
communication module.
- AllowedList - Authorize specific communication based on IP address.
In FactoryTalk Policy Manager, the Authentication Method property for a conduit
uses the term Trusted IP to represent AllowedList.
IMPORTANT Make sure that you are aware of the limitations of allowed as a security
measure before its use.
CIP Security Properties CIP Security is comprised of a security profile, attributes, and components.
These key mechanisms facilitate the security requirements for the resource
that you are trying to protect.
IMPORTANT The rest of this section describes each component and, for zones and
conduits, steps to create and configure them. However, the descriptions
aren’t exhaustive.
For more detailed information on security models, including the tasks that
you must complete to configure them, see the FactoryTalk Policy Manager
Getting Results Guide, publication FTALK-GR001.
The following table describes icons that are used in this publication.
Symbol Definition
Devices
Devices are the modules, drives, controllers, HMI panels, computers, and
servers that work together to create an IACS network. You add devices that
share security requirements for a particular function to the same zone.
Considerations with devices in the security model when you use devices in an
IACS network:
• The lists of current CIP Security-capable Rockwell Automation products
are on page 17 and page 19.
More CIP Security-capable Rockwell Automation products are
in development.
• Just because a device is CIP Security-capable, you aren’t required to
enable CIP Security on that device in an IACS network.
• You can use non-CIP Security-capable devices in an IACS that includes
CIP Security-enabled devices.
Zones
Zones are groups to which devices are added. Zones establish the rules for data
integrity, data privacy, and the authentication method that is used to
authenticate trusted devices.
• You can have multiple zones in a system and set security policy on a
zone-by-zone basis. By using zones, you simplify management of large
sets of devices in a system.
• Zones can include devices that are CIP Security-capable and devices that
aren’t. There can be multiple zones in an IACS network, but a device can
only belong to one zone.
• Once a CIP Security-capable device is added to a zone, the device uses the
policy settings of that zone.
Communication between devices in the same zone is implied and
mutually trusted. Therefore, you do not have to create conduits between
devices in the same zone.
Figure 3 shows a zone that includes devices that are CIP Security-capable, for
example, a ControlLogix 5580 controller, and devices that aren’t, for example, a
PanelView™ Plus terminal.
Figure 3 - Security Model - Zones
jpvasko
2 2 2 2 2
1 1 1 1 1
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
-
MBRK
+
Zone
DC INPUT
OK
LINK 1
F1 F9 LINK 2
DEVICE
PORT
F2 F10
F3 F11
F4 F12
F5 F13
F6 F14
F7 F15
F8 F16
1783-CSP
1 2
(rear) (front)
Conduits
PC Zone
Conduit 1
Conduit 2
Zone 1 Zone 2
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
2 2 2 2 2 2 2 2 2 2
1 1 1 1 1 1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
4 4
I/O I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
+ +
DC INPUT DC INPUT
OK OK
LINK 1 LINK 1
LINK 2 LINK 2
DEVICE DEVICE
PORT PORT
1783-CSP 1783-CSP
1 2 1 2
(rear) (front) (rear) (front)
Security Model The security model is a fully configured instance of zones, devices, and
conduits, along with their respective CIP Security properties, in FactoryTalk
Policy Manager software. The zones and conduits structure the security model.
The security model is deployed to the devices in the IACS via security profiles
for individual devices.
If multiple devices use the same security policies and are in the same zone, we recommend that you configure the security policies at
the zone level.
The advantage to configuring security policies at the zone level is that you can configure the policies once and apply them to multiple
devices. This method avoids the possibility of differences in security policies across devices that should use the same policies.
Zone Properties
Table 6 lists the configurable fields that are available when you configure zone
properties.
Table 6 - Zone Security Properties
Property Available Choices Example FactoryTalk Policy Manager Screen
Name User configurable
Description User configurable
• Enable
Enable/Disable CIP Security
• Disable
• Certificate
Authentication Method
• Pre-Shared Key
• None
I/O Data Security • Integrity Only
• Integrity + Confidentiality
• Integrity Only
Messaging Security
• Integrity + Confidentiality
• Enable
Disable Ports - HTTP (80)
• Disable
IMPORTANT For more information on the Zone Properties, see the FactoryTalk Policy Manager Getting Results Guide, publication
FTALK-GR001.
Conduit Properties
Table 7 lists the configurable fields that are available when you configure
conduit security policy.
Table 7 - Conduit Security Properties
Property Available Choices Example FactoryTalk Policy Manager Screen
Name User configurable
Description User configurable
Connection
Can be any of the following based on how you
assign each Endpoint: • Endpoint 1 (Device or Zone)
• Device-to-Device • Endpoint 2 (Device or Zone)
• Device-to-Zone
• Zone-to-Zone
• Trusted IP
Authentication Method
• Certificate
• None
I/O Data Security • Integrity Only
• Integrity + Confidentiality
• Integrity Only
Messaging Security
• Integrity + Confidentiality
IMPORTANT For more information on the Conduit Properties, see the FactoryTalk Policy Manager Getting Results Guide, publication
FTALK-GR001.
Limitations and The following are limitations and considerations of the solution from
Considerations Rockwell Automation to implement CIP Security in an IACS:
• Devices That Support DLR/Linear and Dual-IP EtherNet/IP Modes
• Initial Security Model Deployment Fails If ControlLogix 5580 Controller
is in Run Mode
• Cannot Download to ControlLogix 5580 Controller from Unsecure
Workstation
• Workstation Cannot Download to a Secured ControlLogix 5580
Controller if Security Policies Do Not Match
• Network Address Translation
• Policy Provisioning
• CIP Bridging Control
• Use of I/O Connections in Redundancy Configuration
• RSLinx Classic Software
• Disable CIP Security
Linear/DLR
In DLR/Linear mode, the device uses one IP address for both Ethernet ports
and you can secure communication on both ports.
Dual-IP Mode
Port A1 Connected to a
Plant-wide Operations System Device-level Network
Port 2 Connected to a
NET NET NET NET
2 2 2 2
1 1 1 1
Device-level Network
4
I/O
5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+
D- D- D- D-
-
MBRK
+
Port A1
Connected to
an Enterprise-
level Network
When you use Dual-IP mode, you can only secure the connection on one
Ethernet port for CIP Security.
IMPORTANT You must install FactoryTalk Policy Manager and FactoryTalk System
Services software on the same server as the FactoryTalk Directory.
So the network to which the secured port is connected must also have the
server with this software that is connected to it.
Because CIP Security does not support configuring separate security
policies for the different Ethernet ports on the same device, you can only
deploy a security model to one of the networks to which the controller is
connected.
For example, if you secure the port A1 connection to an enterprise-level
network, you can’t deploy a security model to the network to which port A2
is connected.
For more information on Dual-IP mode, see the CompactLogix 5380 and
Compact GuardLogix 5380 Controllers User Manual, publication 5069-UM001.
Rockwell Automation Publication SECURE-AT001C-EN-P - August 2022 29
Chapter 2 CIP Security-capable Rockwell Automation Products
IMPORTANT This designed limitation protects the controller from a DoS attack by an
attacker.
The asset owner is the only party with physical access to the controller.
Confirm that the controller mode is Remote Run, Remote Program or
Program so the initial security deployment is successful. If desired, you can
change the controller to Run mode after the initial deployment and future
security model deployments are successful.
After a ControlLogix 5580 controller has a security profile, the controller mode
does not affect future security model deployments.
Unsecured Workstation
Studio 5000 Logix Designer, version 32
DC INPUT
4
I/O
2
1
I/O
6
2
1
I/O-A
6 1
I/O-B
6
2
1
I/O-A
6 1
I/O-B
6
2
1
I/O-A
6 1
I/O-B
6
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
-
MBRK
+
Zone
F1 F9
F2 F10
F3 F11
F4 F12
F5 F13
F6 F14
F7 F15
F8 F16
PC Zone
DC INPUT
MOD MOD MOD MOD MOD
2 2 2 2 2
1 1 1 1 1
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
-
MBRK
+
Zone 1
F1 F9
F2 F10
F3 F11
F4 F12
F5 F13
F6 F14
F7 F15
F8 F16
PC Zone
DC INPUT
MOD MOD MOD MOD MOD
2 2 2 2 2
1 1 1 1 1
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
-
MBRK
+
Zone 1
F1 F9
F2 F10
F3 F11
F4 F12
F5 F13
F6 F14
F7 F15
F8 F16
Secure Enclosure
Stratix 5400 Switch
1756-EN4TR
1756-EN4TR
1756-L85E
1756-L85E
I/O devices
X100
FLEX 5000 I/O FLEX 5000 I/O
TM TM
POWER STATUS POWER STATUS
FLEX 5000 I/O
TM
EtherNet/IP™ Adapter
X10 STATUS
NET
X100
FLEX 5000 I/O FLEX 5000 I/O
TM TM
POWER STATUS POWER STATUS
FLEX 5000 I/O
TM
EtherNet/IP™ Adapter
X10 STATUS
NET
The CompactLogix 5380 controllers must use firmware revision 34.011 or later.
There is no need for the 1783-CSP Proxy because you can connect the
workstation to an Ethernet port on the controller.
IMPORTANT This example shows the controller that is connected to a DLR ring via a
1783-ETAP tap. The controller can be connected to any valid I/O
architecture, for example, a Linear topology that does not include a 1783-
ETAP tap, and the concepts that are described in this section still apply.
Figure 7 - CIP Security with CompactLogix 5380 Controllers Connected to the I/O Network
CompactLogix 5380
Workstation with Logix
controller
Designer application and
FactoryTalk Linx software
1783-ETAP X100
FLEX 5000 I/O
TM
FLEX 5000 I/O
TM
POWER STATUS FLEX 5000 I/O
TM
POWER STATUS
Tap
EtherNet/IP™ Adapter
X10 STATUS
NET
LINK 1 5094-IB16 DIGITAL 16 INPUT 24 VDC 1 1 TB3 5094-OB16 DIGITAL 16 OUTPUT 24 VDC 1 2 TB3
Secure Enclosure
X1
0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15
IP ADDRESS LINK 2
5094-AENTR
POWER
PRP
DLR
In this example, the 1756-EN4TR in M1 Zone (Machine 1) can use CIP Security
because the Stratix® 5700 switch performing the NAT contains a NAT
translation for the 1756-EN4TR and a Gateway Translation. When NAT with
routing is configured correctly in a network, the outside computer/server with
FactoryTalk Policy Manager can access the CIP Security endpoint via the
Outside translated IP address that is configured in the Stratix 5700 switch.
It’s important that NAT is properly configured before you apply any CIP
Security implementation. For more information, see Deploying Network
Address Translation within a CPwE Architecture Design and Implementation
Guide, publication ENET-TD007.
Line Controller
10.10.30.15
VLAN 10 VLAN 20
M1 Zone M2 Zone
Inside Inside IES
IES
192.168.1.x/24 192.168.1.x/24 Stratix 5700
Stratix 5700
NAT
NAT
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
.10 .10
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
.16 .16
.11 - .13 .11 - .13
.14 - .15
.14 - .15
Machine 1 Machine 2
Policy Provisioning
CIP Security protocol policies can only be deployed over an EtherNet/IP
network. A device must reside on the same physical Ethernet network as
FactoryTalk Policy Manager server or on a different network connected with a
router. Policy deployment over multiple different networks and platforms
using CIP Bridging is not supported.
For example, in Figure 8 on page 37, you can deploy CIP Security policies to
Kinetix 5700 Drives_1 and Kinetix 5700 Drives_2 because they are on the same
physical Ethernet network.
2 2 2 2 2
1 1 1 1 1
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
-
MBRK
+
2 2 2 2 2
1 1 1 1 1
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
5069-AENTR 5094-AENTR
X100
FLEX 5000 I/O FLEX 5000 I/O
TM TM
POWER STATUS POWER STATUS
FLEX 5000 I/O
TM
EtherNet/IP™ Adapter
X10 STATUS
NET
LINK 1 5094-IB16 DIGITAL 16 INPUT 24 VDC 1 1 TB3 5094-OB16 DIGITAL 16 OUTPUT 24 VDC 1 2 TB3
1
2
1
2
1
2
4
I/O
5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+
D- D- D- D-
-
MBRK
+
IMPORTANT CIP Bridging Control is only available with FactoryTalk Policy Manager
software, version 6.30 and later.
This example describes how you can use CIP Bridging Control to segregate
secure and unsecure communication.
It’s common for modern devices to be part of a larger platform connected via a
backplane. Some of them, for example, ControlLogix systems, let you combine
many communication modules for network-to-network connectivity.
With the introduction of CIP Security, many existing control system owners
are challenged by the requirement to define an adoption strategy that becomes
a multi-step process that secures only certain parts of IACS in each step. This
scenario can create a back door to secure networks. Controlling CIP bridging
can help to close that back door.
HMI/Supervisory Network
1756-L85E controller
1756-EN2TR modules
HMI/Supervisory Network
After device configuration is downloaded, you must add the drive to the
security model and deploy the policy to establish secure connections with the
drive.
This applies whether the drive is CIP Security-capable and connected directly
to the network or non-CIP Security-cable and connected via a 1783-CSP CIP
Security Proxy.
We recommend that you consider adding legacy devices to security model only
if they are intended to initiate connections with secured devices and you
accept the associated risk.
This section describes the overall process of implementing CIP Security™ with
Rockwell Automation® products in a simple IACS.
You can use the security assessment process to assign security levels to zones
and conduits. We recommend that you assign zone and conduit security levels
based on the potential consequences if an attack objective be achieved in that
zone.
Design and Install You must install software on specific computers and connect hardware devices
the System to EtherNet/IP™ networks.
Remember, the system can include products that are CIP™ Security-capable
and products that aren’t. The list of CIP Security-capable products that are
currently available from Rockwell Automation are listed at the following:
• CIP Security Software Applications on page 17
• CIP Security-capable Hardware Devices on page 19
IMPORTANT We generally recommend that you design and implement your CIP Security
model before you download your Logix Designer application project to a
Logix 5000 controller.
However, there are some systems in which it is more appropriate to
download a project to the system before you implement CIP Security.
The following example shows the CIP Security status of ControlLogix 5580
controllers in FactoryTalk Linx Network Browser.
Identify, Organize, and Zones are groups to which devices are added. Devices that share security
Create Zones requirements for a particular function, and you want to trust each other, can
be added to the same zone.
When devices are added to the zone, communication between the devices is
implied while still letting mutual trust be established through an exchange of
certificates or pre-shared keys. It’s worth noting that any device in a zone that
is deemed to be ‘trusted’ is only trusted by other devices in the same zone, not
all devices in the IACS.
For example, if a ControlLogix® 5580 controller and Kinetix® 5700 drives are
added to Zone 1 and certificates are used with integrity, the devices are
authenticated by exchanging certificates with each other.
If a zone includes devices that are non-CIP Security-capable and CIP Security-
enabled devices, connections to the non-CIP Security-capable devices are not
secured using standard ports.
You can create zones and add other computers/servers that do not use
FactoryTalk Linx software but still require communications to IACS devices.
The devices that do not use FactoryTalk Linx are added as generic devices. This
lets you easily create Trusted IP conduits between the computers/servers to the
IACS devices.
Figure 10 - System Implementation - Zones
PC Zone
Zone 1 Zone 2
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
2 2 2 2 2 2 2 2 2 2
1 1 1 1 1 1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
4 4
I/O I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
+ +
DC INPUT DC INPUT
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
After you identify and organize the zones, create a detailed security matrix
that lists what devices occupy each zone.
Create a Zone
1. In the FactoryTalk Policy Manager navigation bar, choose Zones.
2. On the toolbar next to ZONES, click [+].
3. Add devices to the zone. You can add devices in three ways:
• Discover devices via FactoryTalk Linx.
• Manually add devices.
Identify, Organize, and Conduits create explicit trusted communication pathways between zones,
Create Conduits zones and devices, and between devices in separate zones. After you create,
identify, and organize the conduits, update the security matrix to detail the
conduits.
Figure 11 - System Implementation - Conduits
PC Zone
Conduit 1
Conduit 2
Zone 1 Zone 2
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
2 2 2 2 2 2 2 2 2 2
1 1 1 1 1 1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
4 4
I/O I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
+ +
DC INPUT DC INPUT
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
In the table, the Source row and Destination column cell intersections
represent the endpoints of the Conduit between the zones. For example, cell at
column 2/row 3 indicates that Conduit 2 uses a Zone-to-Zone pathway
between PC Zone and Zone 2.
Table 10 - Security Matrix - Conduits
Destination
Source
PC Zone Zone 1 Zone 2
PC Zone Permit(1) Conduit 1: Zone-to-Zone Conduit 2: Zone-to-Zone
Zone 1 Conduit 1: Zone-to-Zone Permit Denied
Zone 2 Conduit 2: Zone-to-Zone Denied Permit
(1) Default permits pathway.
Create a Conduit
1. In the FactoryTalk Policy Manager navigation bar, choose Conduits.
2. On the toolbar, click [+].
In Filter, you can type part of the name to list only endpoints that match that criteria.
5. Click OK.
In Filter, you can type part of the name to list only endpoints that match that criteria.
8. Click OK.
9. Click Next.
If you must create another conduit, repeat the process, starting at step 2
on page 50.
Identify and Create Security Security policies are created based on device capabilities and operational
Features/Policies functions of automation applications.
Figure 12 - System Implementation - Security Policies
PC Zone
Conduit 1
Conduit 2
Zone 1 Zone 2
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
2 2 2 2 2 2
1 1 1 1 1 1
I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
+ +
DC INPUT DC INPUT
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
After you identify and create security features/policies, update the security
matrix that details applicable security policies between conduits. For example,
enable certificates or pre-shared keys, enable/disable confidentiality and
AllowedList.
Deploy Security Model After the zones, conduits, and devices security policies have been configured,
the resulting security model can be deployed.
You click the Deploy button in FactoryTalk Policy Manager software to trigger
FactoryTalk System Services to deploy the security model. FactoryTalk System
Services runs in the background. You do not take action in the client.
Once the security model is deployed and active, that is, communication is reset
on a device, the device only accepts communication from other devices in the
same zone or using conduits that are configured to enable communication
with other security zones or devices.
Before deploying a security model, make sure that all devices are operational
and have network access.
After the security model is deployed and active on all affected devices,
FactoryTalk Policy Manager and FactoryTalk System Services are no longer
required for real-time operations. They’re required again if changes to the
security model must be deployed.
To deploy the model, complete the following steps.
1. On the FactoryTalk Policy Manager toolbar, select Deploy.
IMPORTANT If the list contains unexpected devices, click CANCEL and then change
the model as needed.
3. Complete the following steps.
a. Choose the Deployment scope based on your application.
• Select Changed device communication ports only for differential
deployment.
• Select All device communication ports in the model for full
deployment.
We recommend that you use the default option. That is, Changed
device communication ports only.
IMPORTANT With the After deployment option, the security policy is applied to
each connection individually. If the connection reset is postponed
and an unexpected connection drop occurs, the system can enter a
state in which the security policy operates only in parts of the
system.
In this case, unexpected connection outages can occur. Connection
outages are difficult to track. We recommend that you use extreme
caution when using the After deployment option.
This option is useful if there’s a scheduled maintenance reset process
in your environment that can be relied upon to perform this function.
4. Click DEPLOY.
The Results pane updates with the results of the deployment as it occurs. After
deployment is complete a summary report is provided listing the successes,
failures, and errors encountered during the process.
For information on how to deploy a security model, see the FactoryTalk Policy
Manager Getting Results Guide, publication FTALK-GR001.
Back Up the Security Model You aren’t required to back up the security model. However, we strongly
recommend that you back it up after each policy deployment to keep the
backup files synchronized with the current security policy.
Back up FactoryTalk System Services to save a copy of the security model and
its associated certificates. After the model has been created, the FactoryTalk
System Services backup file is included with the FactoryTalk Services Platform
backup when it’s performed.
Restore FactoryTalk Restore FactoryTalk System Services to return the FactoryTalk System Services
System Services databases to a known good state.
IMPORTANT Before you migrate from version 6.11 to version 6.20 or later, we recommend
that you see the following Rockwell Automation Knowledgebase articles that
are available at https://rockwellautomation.custhelp.com/app/home:
– Backup and restore CIP Security models of FactoryTalk Policy Manager and
FactoryTalk System Services, click here.
– Fail to migrate existing FactoryTalk System Service data with CIP Security
policy models, click here.
– FactoryTalk Policy Manager download and install, click here.
We recommend that you use the latest version of FactoryTalk Policy
Manager.
Remove the Security Policy If necessary, you can remove the security policy from software applications
and hardware devices.
Remove Security Policy From FactoryTalk Linx Via FactoryTalk Policy Manager
1. In the FactoryTalk Policy Manager navigation bar, select Devices, and
then select the device.
After you click Delete, the device stays in the table but is crossed out. The
device no longer appears in the list after you deploy the updated security
model and state in the next step.
3. Deploy the security model as described starting on page 58, and choose to
reset the communication channels During deployment.
Remove Security Policy From a Device Via FactoryTalk Policy Manager - Option 1
1. In the FactoryTalk Policy Manager navigation bar, select Devices, and
then select the device.
3. Deploy the security model as described starting on page 58, and choose to
reset the communication channels During deployment.
The device security policy is reset to none.
Remove Security Policy From a Device Via FactoryTalk Policy Manager - Option 2
1. In the FactoryTalk Policy Manager navigation bar, select Devices, and
then select the device.
After you click Delete, the device stays in the table but is crossed out.
After you deploy the updated security model and state, the device no
longer appears in the list.
3. Deploy the security model as described starting on page 58, and choose to
reset the communication channels During deployment.
IMPORTANT If the device can’t be reached when the Deploy attempts to clear the security
policy from the device, the attempt fails and the security policy remains in
the device.
Remove Security Policy From a Device By Resetting Device to Factory Default State
You can remove the security policy from a device by resetting the device to its
factory default state.
IMPORTANT The methods by which you reset devices to their factory default, and the
conditions of each device when it is in its factory default state, vary.
Before you reset a device to its factory default state to remove the security
policy, be aware of the impact the reset can have on your IACS in general.
Resetting a device to its factory default state can affect the overall system in
ways unrelated to CIP Security.
For information on how to reset a device to its factory default state, see the
technical documentation for the device.
Set Mask Parameters on You can only apply CIP Security to the built-in EtherNet/IP interface on
PowerFlex 755T Drives to PowerFlex 755TL/TM/TR/TS products. There are ports in addition to the built-
in EtherNet/IP interface that you should secure.
Maintain Security
There are ports on these products where Human Interface Modules (HIMs)
and communication option cards can connect. You can secure these ports by
configuring mask parameters in the host PowerFlex product.
Port 1 is the HIM cradle on the control pod. Ports 2 and 3 are accessible through
the DPI connector on the back of the HIM cradle on the control pod.
Communication option cards can connect to DPI ports 4…6. The cards include
the following devices:
• 20-750-CNETC
• 20-750-DNET
• 20-750-ENETR
• 20-750-PBUS
• 20-750-PNET
• 20-750-PNET2P
For more information, see the PowerFlex Drives with TotalFORCE Control
Programming Manual, publication 750-PM101.
1. Identify which ports contain HIMs, serial communication devices and
communication option cards.
For example, this drive has a HIM at port 1 and a PROFINET option card
in port 6.
Clearing the bit that corresponds to the port helps prevent a device at that port
from controlling the logic command (start, stop, and so forth) of the host
product.
3. Clear the corresponding bits in the parameter 0:230 [Write Mask Cfg].
In our example we must disable port 1 and port 6. We must clear the
corresponding bits 1 and 6.
Clearing the bit that corresponds to the port helps prevent a device at
that port from writing values to any of the parameters in the host
product.
4. Cycle power or perform a reset to allow the configuration in parameter
0:230 [Write Mask Cfg] to take effect.
5. Verify that the corresponding bits are properly set in parameter 0:231
[Write Mask Act].
Syslog Collector
A Syslog collector stores event messages that are sent from the generating
device to the collector.
IMPORTANT The syslog collector and the generating device must be connected to the
same Ethernet network.
If you use another tool as the Syslog collector, it must support the following:
• RFC-5424 syslog protocol
• Ability to receive messages from CIP Security-enabled devices
You must configure an IP address for the Syslog Collector in FactoryTalk Policy
Manager software.
Also known as Secure Eventing, this service uses the following communication
protocols to log messages:
• UDP - A protocol that gives good performance for a high volume of
messages, however, it can lose data during network issues.
• TCP - A protocol that is best suited for high-priority messaging.
When an event occurs, the syslog generates an event that includes metadata
that is related to the syslog configuration.
Facility Codes
Table 12 describes the facility codes that syslog uses to label events.
Table 12 - Syslog Event Facility Codes
Category ID Facility Code Definition
For future use, no events belong to this
null 0 local0(16) category.
comms 1 local0(16) A general communications-related event.
config 2 local0(16) A general configuration-related event.
diag 3 syslog(5) A general fault or error diagnostic.
stat 4 local0(16) A general event providing statistical data.
alert 5 syslog(5) A general event-related to a potential threat.
control 6 local0(16) A general control system-related event.
audit 7 local0(16) A general audit log-related event.
backup 8 local0(16) A general backup or restore-related event.
security 9 auth(4) A general security-related event.
cip 10 local0(16) A CIP-related event.
http 11 local0(16) A web server or client-related event.
opc 12 local0(16) An OPC or OPC-UA-related event.
log 13 local0(16) A log-related event.
cert 14 local0(16) A certificate-related event.
discovery 15 local0(16) A system discovery-related event.
Severity Levels
Events can have security risks that can take many forms, for example:
• Threat actors that try to gain unauthorized, and undetected, access to an
IACS network with the intention to commit malicious acts.
• Well-intentioned personnel with no malicious intention but who make
mistakes that can result in unintended consequences.
Table 13 describe the severity levels as defined by The Syslog Protocol, RFC
5424, standard.
Table 13 - Event Security Risk Severity Levels
Severity Name Severity Level Definition
emrg 0 Emergency System is unusable.
alrt 1 Alert Should be corrected immediately.
crit 2 Critical Critical condition.
err 3 Error Error condition.
warn 4 Warning Error may occur if action not taken.
note 5 Notice Events are unusual.
info 6 Informational Normal operations, no action required.
audit 7 Audit Information for the audit system.
dbg 8 Debug Information for developers.
Notes:
Phase One of In the first phase of the CIP™ Security implementation, you secure
Implementation communication between the Computer (PC) zone and each IACS zone. The
degree to which you secure communication depends on your system needs.
For more information on the CIP Security properties that you can use to secure
communication, see Secure Data Transport on page 15.
Create Zones
Create zones and all applicable devices including CIP Security-capable and
non-CIP Security-capable devices.
• PC Zone (FactoryTalk® Site servers and engineering workstations
[EWS])
• Cell Zone A (Controller zone)
• Cell Zone B (I/O zone)
• Cell Zone C (Controller zone)
IMPORTANT The example zones that are shown in this section are all in the same subnet/
VLAN.
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
(rear) (front)
1734-AENTR
Kinetix® 5700 Kinetix 5700
1783-CSP Proxy module
servo drives_1 servo drives__2
POINT I/O™
modules
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
(rear) (front)
1734-AENTR
1783-CSP Proxy module Kinetix 5700 Kinetix 5700
POINT I/O servo drives_1 servo drives_2
modules
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
Optionally, you can establish an allowed list from the PC zone to each IP
address of the non-CIP Security-capable devices.
Figure 15 - CIP Security Architecture - Conduit Security Policies
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
(rear) (front)
1734-AENTR
1783-CSP Proxy module Kinetix 5700 Kinetix 5700
POINT I/O servo drives_1 servo drives_2
modules
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
Integrity
Zone to Zone Conduit
Certificate
Allowed
Phase Two of In the second phase of the CIP Security implementation, you secure
Implementation communication between device to device for micro-segmentation. You use the
existing zones that are created in the first phase.
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
(rear) (front)
1734-AENTR
Kinetix 5700 Kinetix 5700
1783-CSP Proxy module
POINT I/O servo drives_1 servo drives_2
modules
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
Integrity
Zone to Zone Conduit
Certificate
Device to Device Conduit
Allowed
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
(rear) (front)
1734-AENTR
1783-CSP Proxy module Kinetix 5700 Kinetix 5700
POINT I/O servo drives_1 servo drives_2
modules
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
Integrity
Zone to Zone Conduit
Certificate
Device to Device Conduit
PC Zone
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
OK
2 2 2 2 2 2 2 2 2 2
LINK 1
1 1 1 1 1 1 1 1 1 1
LINK 2
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
DEVICE 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
PORT 4
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
L85_Line1 L85_Motion
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
1783-CSP
1 2
1734-AENTR
(rear) (front)
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
Integrity
Zone to Zone Conduit
Certificate
Device to Device Conduit
Allowed
Zone to Device Conduit
Encryption
Notes:
This section describes how to perform the following tasks in an IACS with CIP
Security™ implemented:
• Add a new device
• Replace a device
The processes for adding or replacing a device differ based on whether the
device supports Automatic Policy Deployment (APD).
APD lets EtherNet/IP™ endpoints, for example, field devices, initiate
deployment of security policies that are defined on a system server. This
feature makes it easier to add and replace CIP™ Security-capable devices that
support APD to an IACS with CIP Security implemented.
Automatic Policy APD leverages ODVA's CIP Security Pull Model concept that enables EtherNet/
Deployment IP endpoints, for example, field devices, to initiate deployment of policies
defined on a system server. That is, a CIP Security-capable endpoint can obtain
a certificate from the certificate authority.
During the onboarding process, the devices are discovered, identified, and
provisioned with identities and temporary policies. The onboarded devices can
then be merged into the security model and have their policies deployed
automatically.
APD requires a system server with FactoryTalk Policy Manager installed and
FactoryTalk System Services running.
After the FactoryTalk Policy Manager installation, FactoryTalk System Services start
automatically with Windows® and run independently from FactoryTalk Policy Manager.
FactoryTalk System Services operate in the background even if the FactoryTalk Policy
Manager application is closed.
To enable APD, you must check the boxes in the Automatic Policy Deployment
section of FactoryTalk Policy Manager software. The Automatic Policy
Deployment section is in the software’s global settings.
Deployment Operation
APD discovers the device on the network that you can add to the security
model.
IMPORTANT • The server with the certificate authority, that is, FactoryTalk System
Services, must be turned on and connected to the EtherNet/IP network.
• APD can onboard and merge only one EtherNet/IP device interface. This
applies to CompactLogix 5380 and Compact GuardLogix 5380 controllers
when they’re configured for Dual-IP mode.
4
3
2
1
DC INPUT
2 2 2 2 2
1 1 1 1 1
F1 F9
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6
4 F2 F10
I/O
5
UFB
10 5
UFB-A
10 5
UFB-B
10 5
UFB-A
10 5
UFB-B
10 5
UFB-A
10 5
UFB-B
10 F3 F11
F4 F12
F5 F13
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
F7 F15
F8 F16
-
MBRK
+
The devices in the Onboarding Area aren’t a part of the security model. You
can’t add a conduit to the Onboarding Area or to any onboarding device.
Depending on the onboarding policy, you can allow or restrict the onboarding
devices from connecting with other devices in the network.
While you can restrict communication over the EtherNet/IP network, you
cannot restrict communication over the backplane. For example, you can
restrict connections to a ControlLogix 5580 controller via its Ethernet port.
However, a module in the same chassis can still communicate with the
controller via the backplane.
When the device is in the Onboarding area, there is security because other
devices can’t communicate with the device. You must add the device to the
FactoryTalk Policy Manager security model for other devices to communicate
with it.
You can manually move the devices from the Onboarding Area into the
security model.
IMPORTANT When you move a device from the Onboarding Area to a zone or make the
device unassigned, you can’t assign the device to the Onboarding Area
again.
It is possible that a device that supports APD is connected to the network and
doesn’t appear in the Onboarding area of FactoryTalk Policy Manager
software.
If the APD function is disabled on the device, it does not appear in the
Onboarding Area. You can enable APD by resetting the device to the out-of-
the-box state.
Once the EST server has been discovered then the device interacts with it to
request an identity and trust information.
The following issues can prevent devices from appearing in Onboarding Area:
• For some reason, a firewall is preventing communication to mDNS and/
or EST servers, therefore FactoryTalk System Services cannot respond to
requests.
To resolve this issue, you must add or modify the firewall rules to allow
the communication between the CIP Security-capable device and the
mDNS and/or EST servers.
The ports that must be enabled are:
- mDNS: UDP 5353
- EST: TCP 40014
If this issue exists in your application, we recommend that you use
resources available with the company that designed your firewall to
resolve the issue.
• If more than one network interface is used in the workstation, there are
two IP addresses used in the same workstation, one for each interface.
In this case, FactoryTalk System Services software can fail to identify,
and use, the correct IP addresses. That is, the EST server uses one IP
address. But the mDNS-SD functions as if the EST server is using the
other IP address.
As a result, the request for a certificate is not responded to, and the
device is not onboarded.
For more information, see the FactoryTalk Policy Manager Getting
Results Guide, publication FTALK-GR001.
If the device is connected to a switch that knows the location of the server with
FactoryTalk System Services installed on it, you can set up the switch to
respond to the mDNS requests on behalf of the server with FactoryTalk System
Services.
In this case, the switch functions more like a proxy. When the device makes the
request for the EST server, the switch responds with the location of the EST
server.
However, you must configure the switch to respond with the location of the
EST server. If the switch is not properly configured, the device can’t obtain the
IP address of the EST server.
DMZ/IT
IDMZ
Network
Firewalls
Proxy servers
laptop
network FactoryTalk Linx
supervisory
network
DC INPUT
F1 F9
F2 F10
F3 F11
F4 F12
F5 F13
F6 F14
F7 F15
F8 F16
Controller
LEVEL 0-1
/sensor
network
Merging
Depending on the security model and the devices available in the network, the
merging process can be automatic or manual.
Automatic Merging
The merging process is automatic if the onboarding device has the same IP
address as the matching device in the security model.
The onboarding device does not need to be identical with the matching device
in the security model. During the merging process, the newer device
properties overwrite the older device properties.
IMPORTANT The following properties are never overwritten by the automatic merging
process:
• IP address
• Device name
• Device description
Manual Merging
You can use FactoryTalk Linx software, version 6.30.00 or later, to disable
Automatic Policy Deployment. However, to do so, you must disable CIP
Security completely for the device.
To disable APD for a device with FactoryTalk Linx software, version 6.30.00 or
later, complete the following steps.
1. Go to the Advanced Settings dialog box.
2. On the General tab, the check the Enable Device Configuration
check box.
3. Confirm that the Enable Device Configuration checkbox is enable and
click OK.
IMPORTANT Once Automatic Policy Deployment is disabled, to re-enable it, you must
return the device to its factory default settings and, if necessary, update
the firmware to the required minimum revision or later.
Add a New Device That There are two scenarios in which a device that supports APD is added to an
Supports Automatic Policy IACS with CIP Security implemented:
• New Device is Not in the Security Policy Model
Deployment • New Device is in the Security Policy Model
Existing CIP Security System CIP Security System with Newly Device
Device To Be Added
1756-EN4TR
Communication Module
DC INPUT
2 2 2 2 2
2 2 2 2 2
1 1 1 1 1
1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
4 1 6 1 6 1 6 1 6 1 6 1 6 1 6
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B
-
MBRK
+ -
MBRK
+
DC INPUT
F1 F9
F1 F9
F2 F10
F2 F10
F3 F11
F3 F11
F4 F12
F4 F12
F5 F13
F5 F13
F6 F14
F6 F14
F7 F15
F7 F15
F8 F16
F8 F16
Existing CIP Security System CIP Security System with New Device
Device To Be Added
1756-EN4TR
Communication Module
DC INPUT
2 2 2 2 2
2 2 2 2 2
1 1 1 1 1
1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
4 1 6 1 6 1 6 1 6 1 6 1 6 1 6
I/O
4
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B
-
MBRK
+ -
MBRK
+
DC INPUT
F1 F9
F1 F9
F2 F10
F2 F10
F3 F11
F3 F11
F4 F12
F4 F12
F5 F13
F5 F13
F6 F14
F6 F14
F7 F15
F7 F15
F8 F16
F8 F16
Replace a Device That There are two scenarios in which a device that supports APD replaces a device:
Supports Automatic Policy • Replacement Device is Not Identical to the Existing Device
Deployment • Replacement Device is Identical to the Existing Device
IMPORTANT When you replace a device with another device that uses the same IP
address, the new device’s properties overwrite the existing device’s
properties.
Figure 22 shows an example in which the PowerFlex 755T drive with IP address
192.168.1.10 is replaced by a 1756-EN4TR communication module with the same
IP address.
Figure 22 - Replace a Device With a New Device That Only Uses the Same IP Address Only
Existing CIP Security System CIP Security System with Replacement Device
Replacement Device
1756-EN4TR
Communication Module
DC INPUT
MOD
NET
MOD
NET
MOD
NET
MOD
NET
MOD
NET
Communication Module
2 2 2 2 2
2 2 2 2 2
1 1 1 1 1
1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 4
4 I/O
I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
IP Address - 192.168.1.10
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
D+ D+ D+ D+ D+ D+
D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B
-
MBRK
- +
MBRK
+
PowerFlex DC INPUT
DC INPUT
755T Drive
F1 F9
F1 F9
F2 F10
F2 F10
F3 F11
F3 F11
F4 F12
F4 F12
IP Address -
F5 F13
F5 F13
F6 F14
F6 F14
F7 F15
F7 F15
F8 F16
F8 F16
192.168.1.10
Existing CIP Security System CIP Security System with New Device
Replacement Device
1756-EN4TR
Communication Module
DC INPUT
MOD MOD MOD MOD MOD MOD MOD MOD MOD MOD
NET NET NET NET NET NET NET NET NET NET
2 2 2 2 2 2 2 2 2 2
1 1 1 1 1 1 1 1 1 1
1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B 1 I/O I/O-A I/O-B I/O-A I/O-B I/O-A I/O-B
1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6 1 6
4 4
I/O I/O
5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10 5 10
UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B UFB UFB-A UFB-B UFB-A UFB-B UFB-A UFB-B
D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+ D+
D- D- D- D- D- D- D- D- D- D- D- D-
MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B MF-A MF-B
- -
MBRK MBRK
+ +
DC INPUT DC INPUT
F1 F9 F1 F9
F2 F10 F2 F10
F3 F11 F3 F11
F4 F12 F4 F12
F5 F13 F5 F13
F6 F14 F6 F14
F7 F15 F7 F15
F8 F16 F8 F16
1756-EN4TR 1756-EN4TR
Communication Module Communication Module
Devices That Do Not Support Table 20 lists CIP Security-capable devices that do not support APD.
Automatic Policy Table 20 - CIP Security-capable Devices That Do Not Support APD
Deployment Software or Component Software Version Firmware Revision
FactoryTalk® Policy Manager —
FactoryTalk System Services 6.21 or later —
FactoryTalk Linx —
ControlLogix® 5580 Controllers — 33.xxx or earlier
Armor™ PowerFlex Drives — 10.001
Kinetix® 5300 Drives — 13.003
Kinetix 5700 Drives — 11.001
PowerFlex 755T Drives — 10.001
PowerFlex 755TS Drives — 11.001
IMPORTANT This restriction does not apply when you use a 1783-CSP Proxy to connect a
proxied device to an IACS that uses CIP Security.
If you replace a proxied device that is connected to a 1783-CSP Proxy with
an identical device, that is, same device type, catalog number, firmware
revision, and IP address, you aren’t required to redeploy the security
model.
For more information on how to use a 1783-CSP Proxy in an IACS that has
CIP Security implemented, see the CIP Security Proxy User Manual,
publication 1783-UM013.
4. When the following dialog box appears, choose when to reset device
communication on ports included in the model, and click Deploy.
This section describes the software and the devices that you can use in an IACS
with CIP Security™ implemented. The devices that are listed in the section can
be connected directly to the IACS or via a CIP™ Security-capable device, for
example, a 1756-EN4TR EtherNet/IP™ communication module or a 1783-CSP
CIP Security Proxy.
Software Table 21 lists the software that is used to implement CIP Security.
Table 21 - Software That Is Used to Implement CIP Security
Software Version Required
FactoryTalk® Policy Manager 6.11 or later Yes
FactoryTalk System Services 6.11 or later Yes
FactoryTalk Linx 6.11 or later Yes
Not required but commonly
Studio 5000 Logix Designer® 31.00.00 or later
used with CIP Security.
Logix Controllers Table 22 lists how Logix controllers can, and can’t, be used with CIP Security.
Table 22 - Logix Controllers With CIP Security
RSLogix 5000® Studio 5000 Logix Designer®
Controller
V16 V17 V18 V19 V20 V21 V23 V24 V26 V27 V28 V29 V30 V31 V32 V33 V34
CIP Security is
supported by using
either of the CIP Security is supported by using one of the
following: following:
ControlLogix® 5580 • A 1756-EN4TR • The controller Ethernet port.
controllers NA No support for CIP Security communication • A 1756-EN4TR communication module in the
module in the same chassis.
same chassis. • A CIP Security Proxy.(1)
• A CIP Security
Proxy.(1)
CIP Security is supported by using either of the following:
ControlLogix 5570 • A 1756-EN4TR communication module in the same chassis.
NA No support for CIP Security
controllers
• A CIP Security Proxy.(1)
ControlLogix 5560
No support for CIP Security NA
controllers
No
ControlLogix 5550 support
NA
controllers for CIP
Security
CIP Security is supported
by using one of the
following:
CIP Security is supported by using either
of the following: • The controller Ethernet
GuardLogix® 5580 • A 1756-EN4TR communication module port.
NA • A 1756-EN4TR
controllers in the same chassis.
communication
• A CIP Security Proxy.(1) module in the same
chassis.
• A CIP Security Proxy.(1)
CIP Security is supported by using either of the following:
GuardLogix 5570 • A 1756-EN4TR communication module in the same chassis.
NA No support for CIP Security
controllers
• A CIP Security Proxy.(1)
GuardLogix 5560
No support for CIP Security NA
controllers
ControlLogix 5580 and 5570 Table 23 lists how ControlLogix 5570 and 5580 controller redundancy can be
Controller Redundancy used with CIP Security.
Table 23 - ControlLogix 5580 and 5570 Controller Redundancy With a CIP Security System
RSLogix 5000 Studio 5000 Logix Designer
Device
V16 V17 V18 V19 V20 V21 V23 V24 V26 V27 V28 V29 V30 V31 V32 V33 V34
CIP Security is supported by
CIP Security is using one of the following:
supported by • A single CIP Security
using a single CIP Proxy through an
Security Proxy Ethernet switch to
ControlLogix through an 1756-EN2x EtherNet/IP
5580 NA Ethernet switch communication modules
Redundancy to 1756-EN2x in a redundant chassis
communication pair. (1)
modules in a • A pair of 1756-EN4TR
redundant communication modules,
chassis pair. (1) firmware revision 4.001
or later. (2)
ControlLogix CIP Security is supported by using a single CIP Security Proxy through
5570 NA No support for CIP Security an Ethernet switch to 1756-EN2x EtherNet/IP communication modules
Redundancy in a redundant chassis pair.(1)
(1) IMPORTANT: This is only for workstation programming, upload/download, and data collection, not for I/O.
For more information, see the CIP Security Proxy User Manual, publication 1783-UM013.
(2) IMPORTANT: This is only for workstation programming, upload/download, and data collection, not for I/O.
For more information, see the High Availability Systems Reference Manual, publication HIGHAV-RM002.
Other Devices Table 24 lists other devices that you can use with CIP Security.
Table 24 - Other Devices Used With a CIP Security System
Device Firmware Revision
1756-EN4TR EtherNet/IP communication module Any
Armor™ PowerFlex® drives 10.001 or later
Kinetix® 5300 drives 13.003 or later
Kinetix 5700 drives 11.001 or later
PowerFlex® 755T drives 10.001 or later
PowerFlex 755TS drives 11.001 or later
1783-CSP CIP Security Proxy Any
For information on the devices that have been
Proxied devices that have been tested with the 1783- tested with a CIP Security Proxy and can be used in
CSP CIP Security Proxy a system with CIP Security implemented, see the CIP
Security Proxy User Manual, publication 1783-UM013.
Notes:
History of Changes
This section contains the new or updated information for each revision of this
publication. These lists include substantive updates only and are not intended
to reflect all changes. Translated versions are not always available for each
revision.
Notes:
Numerics connections
I/O 41
1783-CSP CIP Security Proxy secure programming connection
description 20 CompactLogix 5370 controllers 34
ControlLogix 5570 or 5580 redundant
controllers 32
A controllers
Armor PowerFlex drives 19 Compact GuardLogix 5380 19
attack types CompactLogix 5380 19
denial of service 10 ControlLogix 5580 19, 20
man-in-the-middle 10 GuardLogix 5580 20
monitor data 10 ControlLogix 5580 controllers
automatic device configuration 41 description 19, 20
automatic policy deployment 89 - 100 ControlLogix EtherNet/IP communication
disable 97 - 99 module (1756-EN4TR)
enable 90 description 20
countermeasures
data confidentiality 13
B data integrity and authentication 13
back up device identity and authentication 13
FactoryTalk Directory 62
security model 62 D
data confidentiality
C description 16
certificates 14 data integrity and authentication
CIP bridging 36 description 16
defense-in-depth architecture 12
CIP bridging control 38 - 40
CIP Security components 23 - 25 denial-of-service attack 10
conduits 25 deploy
devices 23 no deploy to controller in run mode 30
zones 24 security model 58 - 61
CIP Security properties device
data confidentiality 16 add 101, 105
data integrity and authentication 16 replace 103, 104, 106
device identity and authentication 16 device identity and authentication 14
CIP Security-capable certificates 14
hardware 19 description 16
1783-CSP CIP Security Proxy 20 pre-shared keys 14
Armor PowerFlex drives 19 disable CIP Security 41
Compact GuardLogix 5380 controllers 19 drives
CompactLogix 5380 controllers 19 Armor PowerFlex 19
ControlLogix 5580 controllers 19, 20 automatic device configuration 41
ControlLogix EtherNet/IP communication Kinetix 5300 20
module (1756-EN4TR) 20 Kinetix 5700 20
GuardLogix 5580 controllers 20 PowerFlex 755T 20
Kinetix 5300 drives 20 PowerFlex 755T drives
Kinetix 5700 drives 20 set mask parameters 72 - 74
PowerFlex 755T drives 20 Dual-IP mode 28 - 29
PowerFlex 755TS drives 20
software 17
FactoryTalk Linx 18 E
FactoryTalk Policy Manager 18
FactoryTalk System Services 18 events
Studio 5000 Logix Designer 18 use with syslog 75 - 77
Compact GuardLogix 5380 controllers 19
CompactLogix 5380 controllers 19
conduits 25, 49 - 56
F
configure 55 FactoryTalk Administration Console
create 50 - 54 remove security configuration from
security matrix 81 FactoryTalk Linx 66
security policy properties 27
G S
GuardLogix 5580 controllers
secure eventing 75
description 20
security assessment
conduct threat assessment 11
I perform risk assessment 11
perform vulnerability assessment 11
I/O connections 41 security matrix
conduits 81
zones and devices 46, 80
K security model
Kinetix 5300 drives back up 62
description 20 deploy 58 - 61
Kinetix 5700 drives security policy
description 20 remove from a device 64 - 71
security policy properties
conduits 27
L zones 26
legacy devices software
add to security model 42 CIP Security-capable 17
limitations FactoryTalk Linx 18
CIP bridging 36 disable CIP security 41
Dual-IP mode 28 - 29 FactoryTalk Policy Manager 18
I/O connections 41 FactoryTalk System Services 18
no connection between workstation and restore 63
controller 31 RSLinx Classic 42
no deployment to controller in run mode 30 Studio 5000 Logix Designer 18
no download from unsecure workstation 30 Studio 5000 Logix Designer
using network address translation 34 description 18
Syslog 75 - 77
collector 75
M fault codes 76
man-in-the-middle attack 10 secure eventing 75
severity levels 76
mask parameters
set on PowerFlex 755T drives 72 - 74
monitor data attack 10 T
threat assessment 11
N
network address translations V
limitations with CIP Security 34 vulnerability assessment 11
P Z
Policy provisioning 36
zones 24, 45 - 48
PowerFlex 755T drives
configure 48
description 20 create 46
set mask parameters 72 - 74 security matrix 46
security policy properties 26
Documentation Feedback
Your comments help us serve your documentation needs better. If you have any suggestions on how to improve our
content, complete the form at rok.auto/docfeedback.
At the end of life, this equipment should be collected separately from any unsorted municipal waste.
Rockwell Automation maintains current product environmental compliance information on its website at rok.auto/pec.
Allen-Bradley, Armor, Compact 5000, CompactLogix, Connected Components Workbench, ControlLogix, DPI, expanding human possibility, FactoryTalk, FactoryTalk Network Manager, FLEX 5000,
GuardLogix, Kinetix, Logix 5000, On-Machine, POINT I/O, PowerFlex, PanelView, Rockwell Automation, RSLinx, Stratix, Studio 5000, Studio 5000 Logix Designer, and TotalFORCE are trademarks of Rockwell
Automation, Inc.
CIP, CIP Security, and EtherNet/IP is a trademark of ODVA, Inc.
Windows is a trademark of Microsoft Corporation.
Trademarks not belonging to Rockwell Automation are property of their respective companies.
Rockwell Otomasyon Ticaret A.Ş. Kar Plaza İş Merkezi E Blok Kat:6 34752, İçerenköy, İstanbul, Tel: +90 (216) 5698400 EEE Yönetmeliğine Uygundur