Industry NewsJanuary 16, 2024
CIP Security firewall offers enhanced intrusion deterrence
Device-based firewall profile has been added to CIP Security to further protect EtherNet/IP networks and help discourage bad actors from infiltrating industrial networks.
ODVA has announced that CIP SecurityTM, the cybersecurity network extension for EtherNet/IPTM, has added a new device-based firewall for enhanced intrusion deterrence. The CIP Security device-based firewall provides users with a simple traffic filter similar to how the IP Tables program enables a firewall to be setup in Linux.
The device-based firewall is enabled via a CIP Security Device-Based Firewall Profile, which allows flexibility to enable or disable this feature as desired. CIP Security now offers robust device level protections with a device-based firewall to discourage bad actors from infiltrating EtherNet/IP industrial networks.
The CIP Security device-based firewall is a mechanism to filter traffic based on IP address, port, and protocol. The device-based firewall is implemented via a new CIP object called the Ingress Egress Object, which enables an allow list of known IP addresses, configuration of available cipher suites, and routing rule definitions based on IP addresses and port numbers. This means that EtherNet/IP devices with CIP Security can determine what nodes can be safely communicated with and whether TLS or DTLS encryption is required. Additionally, the user can decide whether other devices can route CIP communications through the configured CIP Security device. The new device-based firewall adds another layer of deterrence as a part of a defense in depth approach to help protect physical and digital assets from harm.
“CIP Security continues to add additional security capabilities such as the new device-based firewall to help protect EtherNet/IP devices from misuse that could lead to critical system damage or information loss,” stated Jack Visoky, EtherNet/IP System Architecture Special Interest Group (SIG) vice-chair.
Dr. Al Beydoun, President and Executive Director of ODVA said “the prevention of unauthorized IP address and port numbers from accessing CIP Security enabled EtherNet/IP devices allows for another layer of protection for critical industrial automation applications as a part of a defense in depth approach. The addition of the device-based firewall profile for CIP Security is another important update to continue the fight against malicious cyber intrusions that can lead to financial and reputational loss.”
The new profile allows for only known IP addresses to communicate using standard EtherNet/IP. Additionally, permitted CIP routing can be configured based on a set of trusted IP addresses, ports, and encryption. As a result, data packets without matching IP address and/or ports will be dropped and therefore won’t be able to complete intended malicious tasks.