Emerson v3.1.0 Home Security System User Manual


 
www.emersonprocess.com/deltaV
DeltaV Security Manual October 2014
3.2.1.1.1 Description................................................................................................................ 22
3.2.1.1.2 DeltaV 2.5 network connectivity................................................................................ 25
3.2.1.1.3 Using wireless in the DeltaV 2.5 network ................................................................... 26
3.2.1.1.3.1 Wireless Ethernet device security...................................................................... 28
3.2.1.1.4 The DeltaV 2.5 network perimeter security device.................................................... 28
3.2.1.2 The DeltaV remote (RAS) network .................................................................................... 29
3.2.1.3 The Process DMZ............................................................................................................... 30
3.2.1.4 Remote access applications............................................................................................... 32
3.2.1.4.1 Overview................................................................................................................... 32
3.2.1.4.2 Microsoft Remote Desktop ....................................................................................... 33
3.2.1.4.3 DeltaV remotely accessible applications ................................................................... 34
3.2.1.4.4 DeltaV Firewall Conguration Information ................................................................. 35
3.2.2 DeltaV control system networks ............................................................................................... 39
3.2.2.1 DeltaV area control network (ACN) .............................................................................. 39
3.2.2.1.1 Description........................................................................................................... 39
3.2.2.1.2 Emerson Process Management Smart Switches ................................................... 40
3.2.2.1.2.1 Capabilities and operation ........................................................................... 40
3.2.2.1.2.2 Management ............................................................................................... 41
3.2.2.1.3 DeltaV Controller Firewall ..................................................................................... 41
3.2.2.1.3.1 Capabilities and operation ........................................................................... 41
3.2.2.1.3.2 Management ............................................................................................... 42
3.2.2.1.4 Connecting non-DeltaV computers to the ACN..................................................... 42
3.2.2.1.5 Extending the ACN using wireless Ethernet bridges............................................... 43
3.2.2.2 SIS networks................................................................................................................. 43
3.2.2.2.1 Description........................................................................................................... 43
3.2.2.2.2 DeltaV SIS Intrusion Protection Device (SIS IPD).................................................... 44
3.2.2.2.2.1 Capabilities and operation ........................................................................... 44
3.2.2.2.2.2 Management ............................................................................................... 45
3.2.2.2.3 SIS Engineering Workstations............................................................................... 45
3.2.2.3 WirelessHART segments................................................................................................ 45
3.2.2.3.1 Description........................................................................................................... 45
3.2.2.3.2 Separation of maintenance workstations and wireless devices ............................. 47
3.2.2.3.3 WirelessHART device security .............................................................................. 47
3.2.3 DeltaV Zones .................................................................................................................. 47
3.2.4 DeltaV workstations ....................................................................................................... 47
3.2.4.1 Physical security ..................................................................................................... 47
ii