Industrial Internet Security Framework v 1.0 | Page 94

Security Framework
9 : Protecting Communications and Connectivity
A device requesting access to the network must implement a supplicant . A switch , router or wireless access point implements the authenticating counterpart , the authenticator . In some cases , network equipment may implement both the authenticator and the supplicant feature .
A supplicant requests access from an authenticator that forwards the access request to an authentication server for review . After authentication , the switch or the wireless access point enables the port or the wireless connection for traffic other than just the IEEE 802.1X authentication frames . The authentication server can be integrated into the device itself .
Authentication servers can also be made available as a centralized resource to the whole network , implemented through a Remote authentication dial-in user service ( RADIUS ) server . Access credentials such as user names and passwords can then be administrated centrally and accessed by all network devices are acting as authenticators . Also , user-specific configuration information can be rolled out via RADIUS and assigned via IEEE 802.1X , such as membership to specific VLAN .
9.2.8 USING SECURITY GATEWAYS TO PROTECT LEGACY ENDPOINTS , COMMUNICATION AND CONNECTIVITY
‘ Industrial Internet Reference Architecture ’ 1 suggests use of gateways to integrate multiple connectivity technologies , for example protecting legacy endpoints and communication links while enabling interoperability of brownfield and greenfield deployments in IIoT systems with a secured gateway acting as a mediator , as shown in Figure 9-7 . A similar approach should be used to integrate legacy endpoints with limited support for security functions into modern IIoT systems .
An IIoT gateway enacts proxies to one or more legacy endpoints and transforms the legacy protocol expected by the legacy endpoint to the modern interoperability protocols used by new endpoints . It prevents exposure of legacy endpoint attack surfaces to networks . It can also mediate between IIoT systems with support for both per-user authentication and role-based authorizations , and legacy systems with no such support . In addition , the IIoT gateway can normalize the information into a few selected interoperability protocols so that applications can interoperate without having to support all of them . This can reduce the attack surface .
The link between the IIoT gateway and each of the legacy endpoints may also be protected using technologies transparent to the legacy protocols . For example , in LAN , VLAN technology may be used to separate devices on a legacy network segment , when those devices need to communicate to the IIoT gateway and have no need to communicate with each other . In WAN , vulnerable legacy communications protocols may be tunneled transparently through VPN that are implemented in firewalls deployed at IIoT / WAN network boundaries .
1
See [ IIC-IIRA2016 ] IIC : PUB : G4 : V1.0 : PB : 20160926 - 94 -