Policy model
The security policy model of your system includes zones, conduits, and devices.
Zones
Zones form groups of logical or physical devices to which security settings are applied. Devices within a zone trust each other, except for
OPC UA
servers.Zones can contain
CIP
and OPC UA
devices.To configure zones, see Zones.
Conduits
Conduits are communication pathways in the policy model, connecting pairs of policy model components.
You can create conduits between these components:
Endpoint 1 | Endpoint 2 |
---|---|
Zone | Zone |
Zone | Device |
Zone | Range |
Device | Device |
Device | Range |
Endpoint 1 | Endpoint 2 |
---|---|
Zone | Zone |
Zone | OPC UA server |
Zone | OPC UA client |
Zone | Range |
OPC UA client | OPC UA server |
Conduits must follow these rules:
- Conduits cannot be duplicated, each combination of endpoints must be unique.
- One of the endpoints must beCIP SecurityorOPC UA security policycapable.
- If one endpoint is a zone, the other endpoint cannot be a device within that zone.
- Devices not assigned to any zone or onboarding devices cannot be used as endpoints.
To configure conduits, see Conduits.
Devices
Devices include:
- Computers
- Controllers
- Modules
- HMI panels
- OPC UAclients
- OPC UAservers
- Drives
Some devices do not support
CIP Security
or OPC UA security policy
and cannot authenticate themselves to the system. For such devices, consider using these approaches:
- CIP Proxy device
- A CIP Proxy device can be placed in front of the non-CIP securable device. The CIP Proxy device controls the communication to the device it proxies and can sign and encrypt data from the device. For more information, see CIP Proxy devices.
- Trusted IP address
- The device is assigned an IP address that is trusted by the system and permitted to communicate within the security zone. However, these devices are not able to sign or encrypt communications.
To configure devices, their ports, and device ranges, see Devices.
Policy model planning
To plan the policy model, establish the following:
- Zones and their security requirements
- Devices, their IP addresses, and zone assignments
- Conduits to define trust relationships between policy model components
For an example, see Policy model example.
Provide Feedback