Introduction - ADS-tec IF1100 User Manual

It-infrastructure if1000 series
Table of Contents

Advertisement

IF1000 series

3 Introduction

The Industrial Firewall constitutes a link between the IT world and automation, thereby meeting the
requirements of IT security as well as those by the production line maintenance personnel. It enables
monitoring and control of the plant setup network, and of the relative access points. Its essential security
protection mechanism is constituted by the event-dependent and physical network separation. This
Firewall furthermore offers, amongst others, a secure access in the event of service operations; it
enables traffic shaping and is capable of implementing the available virus scanners.
Note:
For the efficient online configuration of your ads-tec devices, it is possible to
download the current version of the free tool „IDA light" on the company`s
homepage http://www.ads-tec.de. The tool offers you for example the possibility of
defining individual parameters or whole groups of parameters at a Server device
and to transfer your settings to a limited selection and/or to all ads-tec devices of
same design and version, without having to make these configurations time-
consuming at each individual device. You also have the possibility of assigning
sequential IP addresses for your ads-tec devices.
With IDA light you can comfortably provide own groups of parameters
according to your specific requirements and modify them at any time.
3.1 Cut & Stop
During critical start-up or production phases, the Ethernet uplink can be physically disconnected i.e. via
hardware, through a 24 V input. This will safely rule out both intentional and unintentional external
manipulation.
The uplink is reconnected through the same input. This function makes integration into an automation
concept very simple.
3.2 Alarming
In the event that a rule is violated, the alarm signal is reported to the control centre through an output.
Necessary measures can be automated directly. For example, acoustic indicator lights can signal the
alarm condition.
E-mails can be sent out automatically to signal a rules violation event.
3.3 Eventlog
A zero-voltage event logbook with retentive memory stores all events whenever the firewall is
disconnected from the power supply (NV-RAM option).
The event logbook can be read out either locally or via a central Syslog server.
3.4 Display / Keypad
The built-in display can be used to configure the essential unit functions.It is thus possible to obtain a
quick system analysis, e.g. of the network load, directly from the display.
The display and keys can be password-protected against unauthorized manipulation
3.5 Managed Switch
Network segments can be set up without any additional hardware by using the managed switch
integrated into the firewall. It is possible to connect multiple systems or terminals up to one Firewall.
Each port can be switched off individually to prevent unauthorized data traffic monitoring.
© ads-tec GmbH • Heinrich-Hertz-Str. 1 • D-72622 Nürtingen
7

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

If1110If1200If1210

Table of Contents