PhoenixContact#FL MGUARD 1105_Part1_Let’s start up the security router.!

Here is a new article series using Phoenix Contact’s Security Router FL MGUARD 1105! Cyber security is one of the essential issues in our FA industry today.

We will start with a brief introduction and setup of the Security Router FL MGUARD 1105 and the concept of security.

Come on, let’s enjoy FA.

Reference Video

Cybersecurity…

Cybersecurity requires protecting components, networks, and systems from unauthorized access and ensuring data integrity. To do so, organizational and technical measures must be put in place to protect network-enabled devices, solutions, and PC-based software.

Recommendation

✓Isolate components and systems from the public network

Avoid integrating components or systems into a public network and use a VPN (Virtual Private Network) if you need to access components or systems via a public network.

✓Firewall Settings

Configure firewalls to protect the network and the components and systems integrated into the network from outside influences. Use firewalls to segment networks or isolate controllers.

✓Stop unused communication channels

Disable unused communication channels (SNMP, FTP, BootP, DCP, etc.) among the components in use.

✓Consider Defense-in-Depth in System Planning

When protecting components, networks, and systems, it is not enough to simply implement measures that have been considered in isolation; a Defense-in-Depth strategy would do well to encompass several coordinated measures involving operators, integrators, and manufacturers.

✓Restrictions on access rights

Restrict access to components, networks, and systems to individuals whose authorization is strictly necessary, and suspend unused user accounts.

✓Secure Access

For starters, make a mental note to change your default login information after the first startup. Also, use a secure password that reflects complexity and longevity.

Its password should be changed according to the rules applicable to its use and use a password manager with a randomly generated password.

Also, whenever possible, use a central user management system to simplify user management and login information management.

✓Re-secure access to remote access using a secure access path

Use secure access routes such as VPN (Virtual Private Network) or HTTPS for remote access.

✓Enable security-related event logging

Enable security-related event logging in accordance with security guidelines and legal requirements for data protection.

✓Use the latest firmware version

Ensure that the firmware of all devices used is always up-to-date.Also check the devices in use and security advisories for published security vulnerabilities.

✓Use the latest security software

Install security software on all PCs to detect and eliminate security risks such as viruses, Trojan horses, and other malware, and ensure that you are always using the latest database.

✓Conduct regular threat analysis

Threat analysis should be conducted on a regular basis to determine if the measures taken for your components, networks, and systems are still providing adequate protection.

✓Secure access to SD card

Devices with SD cards need to be protected against unauthorized physical access; SD cards can be read at any time with a conventional SD card reader; if SD cards are not protected from unauthorized physical access (e.g., by using a secure management cabinet), sensitive data can be accessed by anyoneaccess.

Ensure that the SD card cannot be accessed by unauthorized persons and that data cannot be recovered when the SD card is destroyed.

FL MGUARD 1000?

The FL MGUARD 1000 series is an industrial security router with a built-in stateful packet inspection firewall.It provides high data throughput and helps to decentralize and protect production cells and individual machines from unauthorized operation.

NAT router

As a router or gateway, the device connects to a subnet or network zone.Each network zone is assigned a separate IP address through which the device can be accessed from the network.

NAT features (IP masquerading, 1:1 NAT, port forwarding) make it easy to integrate separate machines (PLCs) or multiple subnets with the same IP settings into an existing network without having to change the IP settings of the machines or subnets.

Security by Design

All mGuard devices feature proven mGuard security technology and are designed from the ground up to meet network security requirements.The devices use a strong firewall.System and network services are hardened.

Vulnerabilities – quickly closed (PSIRT)

All end-of-life components are continuously monitored through the PSIRT process (Product Security Incident Response Team).Any security gaps detected or reported are immediately analyzed and closed if necessary.

For more information, please refer to this site.

https://www.phoenixcontact.com/de-de/service-und-support/psirt?cpn=murl_psirt&murl=psirt

Layout

This is the Layout of FL MGUARD 1105 used in this article.

Factory settings

In the factory configuration, the device is configured as follows

XF1

If there is a DHCP server in the network, an IP address will be assigned automatically.IP masquerading (NAT) is also applied to all routed data packets leaving the device via network interface XF1 (downstream of netzone 1).

XF2

IP=192.168.1.1, netmask=24.

User access

In the WBM and Config API user interface, the user name and password will return to the Default state.

  • User name: admin
  • Password private

Start UP!

Now let’s turn on FL MGUARD 1105 and plug the LAN cable into XF2.

Access Web Server

Launch a Browser such as Chrome or Firefox and go to the XF02’s Default IP address https://192.168.1.1にアクセスしましょう.This is the Web server Login screen for FL MGUARD 1105.

By default, Username=admin, Password=private.

Done!I was able to Login to the Web Server of FL MGUARD 1105.

Updating Firmware

First, to update the Firmware of FL MGUARD 1105, please go to Downloads>Firmware>Download from the following side.

https://www.phoenixcontact.com/en-pc/products/router-fl-mguard-1105-1153078

Please accept the Software License and download the update package.

A ZIP file like this was downloaded.

Next, click Management>Firmware update>Update.

Unzip the ZIP file you just downloaded and select the file .update.signed.

Update in progress message will be displayed, please wait a moment…

Done!Firmware has been updated.

2024年12月時点でVersion1.8.0が最新です。

Device access 

Management>Device access allows you to restrict access rights to Network Interface 1 and 2.Access rules allow you to limit access to the device’s web server (web-based management or config API) to one of the available netzones.When enabled, access to the device’s HTTPS server is allowed from the selected netzone (TCP port 443).

Time and date setting

Next, go to Management>Time and Date and set the time for FL MGUARD 1105.

Since we did not prepare an NTP Server for this article, we will disable the time synchronization function of the NTP Server.

Instead, click the Calendar button next to the Set time and date Field.

Set the time for FL MGUARD 1105.

Finally, click the button in the red frame to save the settings.

Done!FL MGUARD 1105 hours have been changed.

Network Interface

This time, to change the Network Interface settings for FL MGUARD 1105, click Management>Interfaces. set Net zone1 and Net zone2 to match your actual application.

DHCP Server

You can enable or disable the DHCP Server feature on the FL MGUARD 1105 under Management>DHCP Server.

Footer_Basic

Please Support some devices for my blog

Amazon Gift List

Find ME

Twitter:@3threes2
Email:soup01threes*gmail.com (* to @)
YoutubeChannel:https://www.youtube.com/channel/UCQ3CHGAIXZAbeOC_9mjQiWQ

シェアする

  • このエントリーをはてなブックマークに追加

フォローする