YASKAWA VIPA System SLIO Manual page 191

Hide thumbs Also See for VIPA System SLIO:
Table of Contents

Advertisement

VIPA System SLIO
Secure Channel
Security policies
HB300 | CPU | 013-CCF0R00 | en | 19-30
n
OPC UA uses private and public keys to establish secure channels between client
and server
n
Once a secure connection is established, the client and server generate a shared pri-
vate key for signing and encrypting messages.
OPC UA uses the following security policies to protect messages:
No security
n
All messages are unsecured. To use these security policies, connect to a "None" end-
point of a server.
n
Sign
All messages are signed. This allows the integrity of the received messages to be
checked. Manipulations are detected. To use these security policies, connect to a
"Sign" endpoint of a server.
n
Sign & encrypt
All messages are signed and encrypted. This allows the integrity of the received mes-
sages to be checked. Manipulations are detected. Due to the encryption, no attacker
can read the content of the message. To use these security policies, connect to a
"Sign & Encrypt" endpoint of a server.
The security guidelines are additionally named according to the algorithms used.
Example: "Basic256Sha256 - Sign & Encrypt" means: Secure Endpoint, supports a
set of algorithms for 256-bit hashing and 256-bit encryption.
Please note that the encryption of the communication can affect CPU
performance and therefore the response time of the entire system!
Deployment OPC UA
Basics OPC UA > Integrated security concept
191

Advertisement

Table of Contents
loading

Table of Contents