Network-specific properties of the axioline e ethernet/ip io-link devices (44 pages)
Summary of Contents for Phoenix Contact FL MGUARD 1000
Page 1
FL MGUARD 1000 Web-based management mGuardNT 1.3.x User manual UM EN MGUARD NT...
Page 2
This user manual is valid for: Designation Version Order No. FL MGUARD 1102 1153079 FL MGUARD 1105 1153078 For further information see mGuardNT 1.3.x firmware Release Notes. PHOENIX CONTACT GmbH & Co. KG • Flachsmarktstraße 8 • 32825 Blomberg • Germany phoenixcontact.com...
Phoenix Contact. IT security For Phoenix Contact devices that can be integrated in an industrial network via Ethernet, or- ganizational and technical measures must be taken in order to protect components, net- works, and systems against unauthorized access and to ensure data integrity.
Page 6
Do not make components and systems available in public networks. • Avoid integrating your components and systems into public networks. • If you have to access your components and systems via a public network, use a VPN (Virtual Private Network). 6 / 72 PHOENIX CONTACT 108420_en_03...
To get help quickly in the event of an error, make a snapshot of the device configuration im- mediately when a device error occurs, if possible. You can then provide the snapshot to the support team. 7 / 72 PHOENIX CONTACT 108420_en_03...
Integrity check of data packets to increase network security x Easy Protect Mode Automatic protection of connected network clients without configuration effort directly after connection of the device. Firewall Assistant Analysis of data traffic for the automatic creation of firewall rules. 9 / 72 PHOENIX CONTACT 108420_en_03...
Page 10
Mode button on the device and without ac- cess to a management interface. Support tools TCP Dump (packet data analysis) Ping (network analysis) Log viewer (evaluation of log entries) Support snapshot (status and error analysis) 10 / 72 PHOENIX CONTACT 108420_en_03...
Data traffic unintentionally rejected by the firewall can be easily identified and permitted through the automated creation of corresponding firewall rules. (see Section 7.1, Firewall test mode) An alarm informs the user about the event (data traffic not acquired through an existing firewall rule). 11 / 72 PHOENIX CONTACT 108420_en_03...
2 (XF2–XF5) against external access (e.g., individual machines or pro- duction cells that are connected via a switch). For additional information refer to the “FL MGUARD 1000 – Installation and startup” user manual, available at phoenixcontact.net/product/1153078.
IP address: 192.168.1.1 – Subnet mask: 24 (255.255.255.0) For additional information refer to the “FL MGUARD 1000 – Installation and startup” user manual, available at phoenixcontact.net/product/1153078. User login A competing login of the admin user from several instances is not recommended and might result in loss of data.
The user is then forwarded to the login page if he/she tries to save a configuration change or an action. Once the user has logged in, the timeout starts at 30 minutes. It is reset to 30 minutes if a configuration change is saved or an action carried out. 14 / 72 PHOENIX CONTACT 108420_en_03...
Variable values can be selected via a drop-down menu or a checkbox, or entered manually. Depending on the variable, letters, numbers and/or certain special characters can be used (see Section 3.4.3). Some variables are entered into tables (e.g., 1:1 NAT rules). 15 / 72 PHOENIX CONTACT 108420_en_03...
Click on the Waste bin icon to delete the selected table row. Click on the Plus icon to transfer the selected table row (test mode alarms) as a new firewall rule to the Firewall table. 16 / 72 PHOENIX CONTACT 108420_en_03...
Click on the icon to have the corresponding error messages dis- played in the right-hand page column (see Figure 3-3). Correct the entries and apply the changed values with a click on the button. 17 / 72 PHOENIX CONTACT 108420_en_03...
Click on the row and hold the mouse button down to drag and drop the row to the de- sired position. • Release the mouse button. ⇒ The row was moved to a new position. • Click on the icon to apply the change. 18 / 72 PHOENIX CONTACT 108420_en_03...
A snapshot can be used for error diagnostics and communication with the support team. The snapshot is created and downloaded as a compressed file (in tar.gz format). The snap- shot contains the current configuration and other system information of the device (see Table 3-1). 19 / 72 PHOENIX CONTACT 108420_en_03...
Page 20
Shows the currently installed firmware version. Safety-relevant information such as passwords or cryptographic keys are not contained in the snapshot. The time the snapshot was created is indicated in the file name as follows: <YYYY-MM-DD_hh:mm:ss> (example: snapshot_2019-10-09_22_00_00.tar.gz) 20 / 72 PHOENIX CONTACT 108420_en_03...
Table 3-2, the entry is automatically changed accordingly (see Table 3-2). Table 3-2 Examples for the conversion of formats of networks in the WBM Entered format Converted format 10.1.1.1/32 10.1.1.1 10.1.1.1/24 10.1.1.0/24 10.1.1.1/16 10.1.0.0/16 10.1.1.1/8 10.0.0.0/8 10.1.1.1/0 0.0.0.0/0 21 / 72 PHOENIX CONTACT 108420_en_03...
After filling in the three mandatory fields, you have to adopt the password change with a click on the button. Current password The current password that is to be changed. New password The new password. Confirm new pass- Enter the new password again. word 23 / 72 PHOENIX CONTACT 108420_en_03...
Default setting: activated HTTPS access from When this function is activated, access to the HTTPS server of net zone 2 the device is permitted from the selected net zone. Default setting: activated 25 / 72 PHOENIX CONTACT 108420_en_03...
Menu: Network >> Interfaces >> Interfaces Mode The device can be operated in two network modes (Router mode and Stealth mode). Router See “Router mode” on page 29 Stealth See “Stealth mode” on page 32 27 / 72 PHOENIX CONTACT 108420_en_02...
Page 28
IP configuration from a DHCP server in stealth mode. If an IP configuration is still not assigned, this could be due to a non standard-compliant DHCP server. In this case, adjust the rules as follows: 28 / 72 PHOENIX CONTACT 108420_en_02...
Page 29
NAT/IP masquerading may have to be activated on the device so that devic- es from one net zone can communicate with devices from other net zones or with the Internet (see “NAT” on page 35). 29 / 72 PHOENIX CONTACT 108420_en_02...
Page 30
IP addresses of one or several DNS servers assigned by the DHCP server. (Status information in “DHCP” router mode) A DNS server (DNS = Domain Name System) allows clients to resolve host names into IP addresses. 30 / 72 PHOENIX CONTACT 108420_en_02...
Page 31
IP address of network interface XF2–XF5 (net zone 2). Input format: IPv4 address Default setting: 192.168.1.1 Subnet mask that defines in which subnet the device is lo- Netmask cated. Input format: CIDR or decimal format, e.g., 24 (= 255.255.255.0) Default setting: 24 31 / 72 PHOENIX CONTACT 108420_en_02...
Page 32
Netmask Subnet mask that defines in which subnet the device can be reached in stealth mode via the management IP address. Input format: CIDR or decimal format, e.g., 24 (= 255.255.255.0) Default setting: 24 32 / 72 PHOENIX CONTACT 108420_en_02...
Page 33
The default gateway can be reached via net zone 1 (XF1) and net zone 2 (XF2–XF5). Input format: IPv4 address Default setting: 192.168.1.254 33 / 72 PHOENIX CONTACT 108420_en_02...
Destination (network or IP address) that shall be reached via an additional route. Input format: IPv4 address, IPv4 network (CIDR notation) Gateway IP address of the gateway via which the destination can be reached using the additional route. Input format: IPv4 address 34 / 72 PHOENIX CONTACT 108420_en_02...
With port forwarding, data packets that are sent (from external devices) to a certain port of the device are forwarded to a defined destination IP address and a defined destination port in the (local) subnet of the device. See “Port forwarding” on page 37. 35 / 72 PHOENIX CONTACT 108420_en_02...
Page 36
(XF1/net zone 1). In the data packet, the sender's IP address is translated into the IP address of the network interface (XF1/net zone 1). Default setting: activated 36 / 72 PHOENIX CONTACT 108420_en_02...
Page 37
IP address of the device (XF1 = 10.1.0.70) and port 5001. All other devices in the production network (e.g., PLC 192.168.1.150) shall not be reached from the outside. They are protected by the firewall. 37 / 72 PHOENIX CONTACT 108420_en_02...
Page 38
Default setting: Net zone 1 Protocol TCP, UDP Network protocol that has to be used for transmitting the data packets so that the rule is applied. Default setting: TCP 38 / 72 PHOENIX CONTACT 108420_en_02...
Page 39
(e.g., 192.168.1.200) with translated (virtual) IP addresses from the office network (e.g., 10.1.0.102). Communication with devices in the office network is now implemented in both directions via the translated IP addresses of the clients in the production network. 39 / 72 PHOENIX CONTACT 108420_en_02...
Page 40
IP address without the need for manual configuration of MAC addresses. When this function is deactivated, ARP requests sent to trans- lated IP addresses remain unanswered. Default setting: activated 40 / 72 PHOENIX CONTACT 108420_en_02...
DHCP server are accepted via the con- figured network interface (net zone 2) and UDP port 67. The server then assigns IP addresses from the configured IP address range to the clients. Default setting: activated 42 / 72 PHOENIX CONTACT 108420_en_02...
Page 43
If the DNS server of the device shall be used, the IP address of the net zone on which this service is active has to be speci- fied (default setting: net zone 2 = 192.168.1.1). Input format: IPv4 address Default setting: 192.168.1.1 43 / 72 PHOENIX CONTACT 108420_en_02...
Page 44
IP address of a WINS server the DHCP server assigns to re- WINS server questing clients. A WINS server (Windows Internet Naming Service) allows cli- ents to resolve host names (NetBIOS names) into IP ad- dresses. Input format: IPv4 address Default setting: empty 44 / 72 PHOENIX CONTACT 108420_en_02...
Inter- net via the released net zone. When this function is deactivated, access to the DNS server via the selected net zone is dropped by the firewall. Default setting: deactivated 45 / 72 PHOENIX CONTACT 108420_en_02...
Page 46
If no user-defined DNS server is specified, the device uses a DNS server assigned via DHCP. – If a DNS server is not assigned via DHCP either, the de- vice uses default Root Name Servers. 46 / 72 PHOENIX CONTACT 108420_en_02...
NTP server of the device) but are routed (Router mode) or forwarded (Stealth mode) by the device. The connections can also be received and forwarded on the same network interface (net zone). 47 / 72 PHOENIX CONTACT 108420_en_03...
Page 48
Log entries can be analyzed via the Menu: Logs or in the jour- nal file, which can be created and downloaded via a snapshot (see Section 3.4.7). Log prefix: fw-forward-policy- Default setting: deactivated 48 / 72 PHOENIX CONTACT 108420_en_03...
Page 49
Source and destination port in the TCP packet are not equal to zero. IPv4 packets Protocol not set to zero. Data packets that do not meet the specified requirements are dropped by the firewall and not forwarded. Default setting: activated 49 / 72 PHOENIX CONTACT 108420_en_03...
Page 50
If the Firewall test mode is deactivated, all entries in the Test mode alarms table are deleted and a signaling by the LED "PF2" and the switching output "O1" is terminated. Default setting: deactivated 50 / 72 PHOENIX CONTACT 108420_en_03...
Page 51
Accept: The data packets may pass through. Reject: The data packets are rejected. The sender is in- formed. Drop: The data packets are dropped. The sender is not in- formed. Default setting: Accept 51 / 72 PHOENIX CONTACT 108420_en_03...
Page 52
Log entries can be analyzed via the Menu: Logs or in the jour- nal file, which can be created and downloaded via a snapshot (see Section 3.4.7). Log prefix: fw-forward- Default setting: deactivated 52 / 72 PHOENIX CONTACT 108420_en_03...
Adapt the inserted firewall rules according to your security requirements. • Then click on the icon to apply the change. ⇒ The newly added firewall rules are activated and immediately permit the correspond- ing data traffic unless superordinate rules prohibit the data traffic. 53 / 72 PHOENIX CONTACT 108420_en_03...
Page 54
(e.g., ICMP data packets). Protocol Network protocol that was used for transmitting the data packet. The TCP, UDP, ICMP, GRE, and ESP protocols are ac- cepted. For all other protocols, the value All is entered. 54 / 72 PHOENIX CONTACT 108420_en_03...
For all other protocols, the value “All” is entered in the firewall rule. Accept ––– Action In all firewall rules created via the Firewall Assistant or Firewall test mode, “Accept” is al- ways entered as the action value. 55 / 72 PHOENIX CONTACT 108420_en_03...
Page 56
If the created firewall rules are not visible under Network security >> Firewall >> Fire- wall, reload the page in the web browser. The Firewall table created using the Firewall Assistant can be adapted and extended as re- quired. 56 / 72 PHOENIX CONTACT 108420_en_03...
The current time and date of the device are configured and saved to the real-time clock (RTC). (Only visible if NTP is deactivated) Format: Coordinated Universal Time (UTC) Permissible range: >= 2018-01-01_00:00:00 <= 2069-01-01_00:00:00 57 / 72 PHOENIX CONTACT 108420_en_03...
Page 58
NOTE: Access from the Internet Possibly, the server can be reached from the In- ternet when the device is connected to the Inter- net via the released net zone. Default setting: deactivated 58 / 72 PHOENIX CONTACT 108420_en_03...
Page 59
(see Section 6.3). Default: – 0.pool.ntp.org | Port:123 – 1.pool.ntp.org | Port:123 – 2.pool.ntp.org | Port:123 – 3.pool.ntp.org | Port:123 Port Port on which the external NTP server accepts NTP requests. Default setting: 123 59 / 72 PHOENIX CONTACT 108420_en_03...
Starting the firmware update Menu: Firmware update Firmware update A signed update file provided by Phoenix Contact (e.g., mguard-image- 1.3.1.mguard3.update.signed) is uploaded from a configuration computer to the device and installed automatically. All current settings, passwords and certificates are retained on the device. Downgrading from a higher to a lower firmware version is not possible.
To start the analysis, click on the Start button. • To stop and download the analysis, click on the Stop button. The result of the analysis was saved to a file (*.pcap), downloaded and deleted from ⇒ the device. 64 / 72 PHOENIX CONTACT 108420_en_03...
Page 65
The acquired packet contents are summarized in a file (*.pcap) and can be downloaded from the device. Afterwards, the file is deleted from the device. The time of the file download is indicated in the file name as follows: <YYYY-MM-DD_hh:mm:ss> (Example: tcpdump_2019-10-09_22_00_00.pcap) 65 / 72 PHOENIX CONTACT 108420_en_03...
= A routing firewall rule was applied to a package. – fw-forward-policy = A package for which no rules have been defined was reject- – fw-forward-testmode = Relates to entries (Test mode alarms) created by means of the Firewall test mode function. 67 / 72 PHOENIX CONTACT 108420_en_03...
Page 68
(Firewall - routing/stealth and incoming firewall) will be displayed. When the function is deactivated, all log entries will be dis- played. Default setting: activated Buttons Update Click the Update button to refresh the log entries display. 68 / 72 PHOENIX CONTACT 108420_en_03...
12.2 Using smart mode The use of smart mode is described in the “FL MGUARD 1000 – Installation and startup” user manual (UM EN FL MGUARD 1000). Available in the download area of the corresponding product page in the Phoenix Contact web shop, for example, under phoenixcontact.net/product/1153078.
Page 71
The receipt of technical documentation (in particular user documentation) does not constitute any further duty on the part of Phoenix Contact to furnish information on modifications to products and/or technical documentation. You are responsible to verify the suitability and intended use of the products in your specific application, in particular with regard to observing the applicable standards and regulations.
Page 72
Should you have any suggestions or recommendations for improvement of the contents and layout of our manuals, please send your comments to: tecdoc@phoenixcontact.com 72 / 72 PHOENIX CONTACT GmbH & Co. KG • Flachsmarktstraße 8 • 32825 Blomberg • Germany phoenixcontact.com...
Need help?
Do you have a question about the FL MGUARD 1000 and is the answer not in the manual?
Questions and answers