Security Functions; Vpn; Vpn (Virtual Private Network) - Siemens S7-1200 Operating Instructions Manual

Hubs & controllers telecontrol/lte
Hide thumbs Also See for S7-1200:
Table of Contents

Advertisement

Configuration and operation

4.13 Security functions

4.13
Security functions
Note the range and application of the security functions of the CP, refer to the section Other
services and properties (Page 14).
4.13.1

VPN

4.13.1.1

VPN (Virtual Private Network)

VPN tunnel
Virtual Private Network (VPN) is a technology for secure transportation of confidential data in
public IP networks, for example the Internet. With VPN, a secure connection (tunnel) is set
up and operated between two secure IT systems or networks via a non-secure network.
One of the main features of the VPN tunnel is that it forwards all frames even from protocols
of higher layers (HTTP, FTP telecontrol protocols of the application layer etc.).
The data traffic between two network components is transported practically unrestricted
through another network. This allows entire networks to be connected together via a
neighboring or intermediate network.
Properties
● VPN forms a logical subnet that is embedded in a neighboring (assigned) network. VPN
uses the usual addressing mechanisms of the assigned network, however in terms of the
data, it transports its own frames and therefore operates independent of the rest of this
network.
● VPN allows communication of the VPN partners in the subnet with the assigned network.
● VPN is based on tunnel technology and can be individually configured.
● Communication between the VPN partners is protected from eavesdropping or
manipulation by using passwords, public keys or a digital certificate (authentication).
Areas of application
● Local area networks can be connected together securely via the Internet ("site-to-site"
connection).
● Secure access to a company network ("end-to-site" connection)
● Secure access to a server ("end-to-end" connection)
● Communication between two servers without being accessible to third parties (end-to-end
or host-to-host connection)
● Ensuring information security in networked automation systems
● Securing the computer systems including the associated data communication within an
automation network or secure remote access via the Internet
● Secure remote access from a PC/PG to automation devices or networks protected by
security modules via public networks.
58
Operating Instructions, 01/2015, C79000-G8976-C381-01
CP 1243-7 LTE

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Cp 1243-7

Table of Contents