B1.3.3.3 security, B1-42 – Yokogawa YFGW710 User Manual
Page 106

B1-42
IM 01W01F01-01EN
B1.3.3.3 Security
The increasing use of open technology for operating systems and communication protocols
these days increases the possibility that even production control system products will be exposed
to the threats of computer viruses and cyberterrorism.
To ensure stable and safe operations of plants and factories, it is indispensable to keep the pro-
duction control system in a safe state and protect assets related to the production activity.
A field wireless network has high reliability to ensure safety and information security at the pro-
duction site, such as message confidentiality (encryption, authentication, and access control),
message integrity, and network availability.
The field wireless network supports the star and mesh topologies, and uses frequency hopping
and other technologies to reduce the effects caused by radio interference among wireless de-
vices or radio disturbance and other communication problems in the installation environment.
The policy of security strength, the system configuration, the level of importance of the system,
and the amount spent on security vary depending on the customer.
Some customers have their own security policies and consider security measures from the stage
of system construction. Basically, a control system using field wireless communication must also
conform with the security policy of the customer.
Yokogawa’s security policy for system products as a whole is described in the Security Standard
of System Product (TI 33Y01B30-01E).
While referring to the above Technical Information entitled “Security Standard of System Prod-
uct,” the following describes an example of connecting the ISA100.11a field wireless network to
the CENTUM system, with focus on the network configuration, hardware and software, including
a firewall, and setup to improve security.
This explanation should be used as a reference to, for example, install a firewall, if necessary, in
accordance with the security policy of the customer. Table B1-16 shows the communication port
numbers to allow through the firewall in the field wireless system.