CIP Security

The Common Industrial Protocol, also known as CIP, encompasses a comprehensive suite of messages and services for the collection of industrial automation applications - control, safety, energy, synchronization and motion, information, and network management. CIP allows users to integrate these applications with enterprise-level EtherNet networks and the Internet.
CIP provides a unified communication architecture throughout the industrial enterprise. CIP allows users to benefit today from the many advantages of open networks and protects their existing automation investments, while providing an extensible and upgradeable communication architecture.
CIP Security has multiple layers of security that enable a CIP-connected device to protect itself from malicious CIP communications. Then the device can reject data that has been altered, reject messages sent by untrusted people or untrusted devices, and reject messages that request actions that are not allowed.
With CIP Security communications, you can have:
  • Authentication of the endpoints
    .
    Ensures that the target and originator devices are both trusted entities.
  • Message integrity and authentication
    . Ensures that the message sent by the trusted endpoint was not modified in transit.
  • Message encryption
    . Optional capability to encrypt the communications to prevent the data from being observed.
Provide Feedback
Have questions or feedback about this documentation? Please submit your feedback here.
Normal