Schneider Electric TCSEFEA23F3F22 Tofino Firewall - Connexium User Manual

Schneider Electric TCSEFEA23F3F22 Tofino Firewall - Connexium User Manual | Manualzz
ConneXium
NHA15729.00
TCSEFEA Tofino Firewall
User Manual
www.schneider-electric.com
Contents
Contents
Safety Information
7
About this Manual
9
Key
11
1
Introducing the ConneXium Tofino Configurator
13
1.1
Navigating the ConneXium Tofino Configurator
14
2
Nine Steps to a Secure Control System
17
3
Installing Your ConneXium Tofino Configurator
19
3.1
Running the ConneXium Tofino Configurator Installer
20
4
Projects
23
4.1
Creating a New Project
25
4.2
Opening an Existing Project
28
4.3
Editing Project Details
29
4.4
Deleting a Project
31
4.5
Duplicating a Project
32
4.6
Exporting a Project File
33
5
Tofino SAs
35
5.1
Defining the Tofino SAs
5.1.1 Manually creating a Tofino SA
5.1.2 Discovering a Tofino SA
36
37
40
5.2
Editing a Tofino SA
42
5.3
Deleting a Tofino SA
44
6
Assets
45
6.1
Asset Templates
6.1.1 Creating an Asset Template
6.1.2 Deleting an Asset Template
47
48
52
NHA15729 - 10/2014
3
Contents
6.2
Creating Assets
6.2.1 Creating an Asset Manually
6.2.2 Creating an Asset from a Template
53
53
56
6.3
Editing an Asset or an Asset Template
58
6.4
Creating an Asset Template from an Existing Asset
60
6.5
Deleting an Asset
61
7
Firewall Rules
63
7.1
Creating Firewall Rules
69
7.2
Deep Packet Inspection Firewalls
7.2.1 Creating a Modbus TCP Enforcer Rule
7.2.2 Creating an OPC Classic Enforcer Rule
7.2.3 Creating an EtherNet/IP Enforcer Rule
74
75
79
82
7.3
Editing Firewall Rules
87
7.4
Using Tofino Test Mode to Validate Firewall Rules
90
8
Event Logging
91
8.1
Setting up the Event Logger
92
8.2
Retrieving Log Files
96
9
Applying and Verifying Configurations
97
9.1
Applying a Tofino SA Configuration
9.1.1 Loading Your Tofino SA via USB
98
101
9.2
Verifying a Tofino SA Configuration
103
9.3
Transferring Data from Your Tofino SA via USB
106
10
Advanced Topic: Protocols
109
10.1 Creating a Protocol
110
10.2 Editing Protocols
112
10.3 Deleting a Protocol
115
11
4
Advanced Topic: Importing Templates and
_Security Profiles
117
NHA15729 - 10/2014
Contents
12
Advanced Topic: How Automatic Rule Generation Works
119
13
Advanced Topic: ConneXium Tofino Configurator
Settings
123
13.1 Managing User Logging, Access, and Privileges
13.1.1 Managing Access to a Project
13.1.2 Managing User Activity Logging and Privileges within
a Project
124
125
13.2 Customizing Program Settings and Preferences
129
14
Upgrading Your Tofino SA
127
133
14.1 Upgrading over the Network
134
14.2 Upgrading via USB
135
15
Reference: Field Descriptions
137
15.1 Tofino SA Fields
138
15.2 Asset and Asset Template Fields
144
16
Troubleshooting
149
16.1 Tofino SA Diagnostics
150
16.2 Firewall Not Blocking Traffic
154
16.3 USB Storage Device Recommendations
155
16.4 Factory Resetting Your Tofino SA
157
16.5 Special Rules
16.5.1 Tofino Rapid Network Recovery
158
158
16.6 The Discovery Feature is Not Finding Tofino SAs
160
16.7 Unable to Open a Project File
161
17
Glossary
163
NHA15729 - 10/2014
5
Contents
6
NHA15729 - 10/2014
Safety Information
Safety Information
 Important Information
Notice: Read these instructions carefully, and look at the equipment to
become familiar with the device before trying to install, operate, or
maintain it. The following special messages may appear throughout this
documentation or on the equipment to warn of potential hazards or to call
attention to information that clarifies or simplifies a procedure.
NHA15729 - 10/2014
7
Safety Information
PLEASE NOTE: Electrical equipment should be installed, operated,
serviced, and maintained only by qualified personnel.
No responsibility is assumed by Schneider Electric for any consequences
arising out of the use of this material.
© 2014 Schneider Electric. All Rights Reserved.
8
NHA15729 - 10/2014
About this Manual
About this Manual
Validity Note
The data and illustrations found in this book are not binding. We reserve the
right to modify our products in line with our policy of continuous product
development. The information in this document is subject to change without
notice and should not be construed as a commitment by Schneider Electric.
Product Related Information
Schneider Electric assumes no responsibility for any errors that may appear
in this document. If you have any suggestions for improvements or
amendments or have found errors in this publication, please notify us.
No part of this document may be reproduced in any form or by any means,
electronic or mechanical, including photocopying, without express written
permission of Schneider Electric.
All pertinent state, regional, and local safety regulations must be observed
when installing and using this product. For reasons of safety and to ensure
compliance with documented system data, only the manufacturer should
perform repairs to components.
When devices are used for applications with technical safety requirements,
please follow the relevant instructions.
Failure to use Schneider Electric software or approved software with our
hardware products may result in improper operating results.
Failure to observe this product related warning can result in injury or
equipment damage.
User Comments
We welcome your comments about this document. You can reach us by
e-mail at [email protected]
NHA15729 - 10/2014
9
About this Manual
Related Documents
Title
ConneXium TCSEFEA Tofino Firewall
User Manual
ConneXium TCSEFEA Tofino Firewall
Installation Manual
10
Reference Number
NHA1529
NAH1534
NHA15729 - 10/2014
Key
Key
The designations used in this manual have the following meanings:



List
Work step
Subheading
Link
Note:
Cross-reference with link
A note emphasizes an important fact or draws your attention to a dependency.
Courier
ASCII representation in the graphical user interface
NHA15729 - 10/2014
11
Key
12
NHA15729 - 10/2014
Introducing the ConneXium Tofino
Configurator
1 Introducing the ConneXium
Tofino Configurator
The ConneXium Tofino Industrial Security Solution is a comprehensive
package for securing industrial control systems, particularly at the Local Area
Network (LAN) level. The system consists of three core components:
 ConneXium Tofino Firewall: Referred to in this manual as the Tofino
Security Appliance or Tofino SA. These industrially hardened devices are
installed in front of individual and/or clusters of Human Machine Interfaces
(HMI), Distributed Control Systems (DCS), Programmable Logic
Controllers (PLC), or Remote Terminal Units (RTU) control devices that
require protection.
 Tofino Loadable Security Modules (LSM): A variety of software
modules providing security services, such as Firewall and Event Logger.
Each LSM is activated on the Tofino SAs to allow them to offer
customizable security functions, depending on the requirements of the
control system. LSMs can be either pre-loaded at the factory or added in
the field via the Tofino Customer Portal.
 ConneXium Tofino Configurator: A Windows-based management
system for the configuration of each Tofino SA.
Use the ConneXium Tofino Configurator on your PC to define configuration
data for each Tofino SA in your plant. When you have finished editing the
configuration, you can transfer the configuration data into the Tofino SAs.
You can also retrieve configuration details from a Tofino SA to verify that the
correct configuration is being used in the field.
The ConneXium Tofino Configurator will run on any of these supported
Microsoft operating systems: Windows XP, Windows 7 (32- and 64-bit), and
Windows Server 2003, 2008, and 2008 SR2. No other applications or
services (such as Java, .NET, or Flash) are required for the ConneXium
Tofino Configurator to operate.
NHA15729 - 10/2014
13
Introducing the ConneXium Tofino
Configurator
1.1 Navigating the ConneXium Tofino
Configurator
1.1 Navigating the ConneXium
Tofino Configurator
The ConneXium Tofino Configurator is designed to look and operate like
Windows Explorer, which you use to navigate files and folders on your
computer. Being familiar with basic Windows functionality enables you to
start using the ConneXium Tofino Configurator immediately. The main view
is divided into two sections:
 1 - Project Explorer view: Tofino SAs, Asset Templates, Assets,
Protocols, and Special Rules are listed in a tree format similar to the way
that files are displayed in Windows Explorer. Any object in the Project
Explorer view can be clicked to display its information in the Details view.
Clicking the root folder will display a table of defined objects of that type.
For example, clicking the Assets folder will display a table listing the
assets defined in the project.
 2 - Details view: The details of what is selected in the Project Explorer
view display here. This is where you can edit particular values for an
object.
14
NHA15729 - 10/2014
Introducing the ConneXium Tofino
Configurator
1.1 Navigating the ConneXium Tofino
Configurator
The ConneXium Tofino Configurator has a toolbar that allows you to perform
actions on the objects in a project.
The toolbar contains 3 sections:
 1 - Project edit commands: This section appears at the far left of the
toolbar and is for commands related to managing project files and their
data. It includes:
 Create new Projects, Assets, Asset Templates, Protocols, or Tofino
SAs using a wizard
 Open an existing project
 Save and export a project
 Import predefined Asset Templates, Protocols, Special Rules, and
Security Profiles
 Cut, Copy, Paste, and Delete objects and fields
 2 - Context commands: This section appears in the center of the toolbar
and is for commands related to the content that is currently being worked
on. The commands that appear here change depending on the type of
object selected in the Project Explorer view.
 3 - Help and Configuration commands: This section appears at the far
right of the toolbar and is for:
 Audit Logs: Viewing and managing the audit system
 Preferences: Setting configurations, such as the location of the audit
file
 Licensing: Viewing your software licenses and performing tasks that
allow you to obtain new LSM licenses through the Tofino Customer
Portal
 Help: Displaying the online help and ConneXium Tofino Configurator
product information
NHA15729 - 10/2014
15
Introducing the ConneXium Tofino
Configurator
16
1.1 Navigating the ConneXium Tofino
Configurator
NHA15729 - 10/2014
Nine Steps to a Secure Control
System
2 Nine Steps to a Secure Control
System
The ConneXium Tofino Configurator was designed to simplify the installation
of security firewalls in an industrial control system. The following 9 steps
describe how to install and configure your ConneXium Tofino Industrial
Security Solution.
 Install the ConneXium Tofino Configurator on your computer.
 Create a project.
NHA15729 - 10/2014
17
Nine Steps to a Secure Control
System
 Define the Tofino SAs for your project.
Create a virtual representation of the physical Tofino SA devices. You can
manually create these or discover existing devices. This information will
be used to configure the actual Tofino SAs that will be installed on your
network.
 Define assets for your project.
These objects represent both real network entities (such as HMIs and
PLCs) and virtual entities (such as Broadcast Addresses and subnets) on
your network. They are used to simplify tasks like creating firewall rules.
 Define firewall rules for your Tofino SAs.
These use the assets you created earlier, along with predefined protocols
and special rules that are supplied with the ConneXium Tofino
Configurator, to determine what network traffic the Tofino SA will allow or
block. The various Deep Packet Inspection (DPI) Enforcer modules are
accessed through the Firewall selection.
 Configure the Event Logger (optional).
Enter the details for your syslog server where you want Tofino SA alarms
and events sent. You can also configure the Tofino SA to save logs locally
on the Tofino SA for later offloading via a USB storage device.
 Install your Tofino SA hardware.
The Tofino SA gets installed on the network between the device(s) to be
protected and the rest of the network.
 Apply the configuration settings to the Tofino SAs in the field.
You can transfer the configuration data from the ConneXium Tofino
Configurator to the Tofino SA(s) over the network or using a USB storage
device.
 Verify the configuration.
Retrieves the configuration load reports sent over the network or from the
USB storage device that was used to load configurations onto one or
more Tofino SAs. This will allow you to record the configuration of Tofino
SAs in the field and save it in your project.
You have successfully installed the ConneXium Tofino Industrial Security
Solution and significantly improved the security of your process network.
Note: The Tofino SA will pass network traffic freely during the initial
configuration or when its configuration is being updated. Firewall rules take
effect after completion of the initial configuration or update of the Tofino SA
so that network operations are not affected before the full rule set can be
loaded. A typical configuration load will finish in approximately 30 seconds.
18
NHA15729 - 10/2014
Installing Your ConneXium Tofino
Configurator
3 Installing Your ConneXium
Tofino Configurator
This section details the procedure for installing the ConneXium Tofino
Configurator on a computer that has not previously had the ConneXium
Tofino Configurator installed on it.
Prior to installing your ConneXium Tofino Configurator software, please
verify that you have the following materials ready:
 ConneXium Tofino Configurator installer downloaded from the Schneider
Electric SA website (www.tofinosecurity.com/support/schneider-electric)
 License Activation Key (a 25 string of letters and numbers such as
X4QP9-RMNRQ-B59SD-AG5H6-KSFRW; this is affixed to the document
supplied with the Tofino Firewall product)
If you have a License Activation key, download and register your ConneXium
Tofino Configurator software as follows:
 Navigate to http://www.tofinosecurity.com/support/schneider-electric.
 Click the Licensing icon.
 Click the Register My Product button. Enter the required information and,
using one of the LAKs provided with the ConneXium Tofino Firewall,
initiate an account in the portal.
You will receive an email confirming your registration.
 Click the one-time access link included in the email and set your user
account password.
 Log out of the site.
On http://www.tofinosecurity.com/support/schneider-electric, log in to
synchronize your password.
 Click the Software and Security Profiles icon. You are now in the
Schneider Electric ConneXium customer portal.
 Download the ConneXium Tofino Configurator software.
 Install the ConneXium Tofino Configurator on a PC.
If you do not have a License Activation Key, contact your reseller.
NHA15729 - 10/2014
19
Installing Your ConneXium Tofino
Configurator
3.1 Running the ConneXium Tofino
Configurator Installer
3.1 Running the ConneXium
Tofino Configurator Installer
Running the ConneXium Tofino Configurator installer launches the
installation wizard. Work through the pages of the wizard to configure the
installation, accept the license agreement, and activate your license. You
need a License Activation Key (LAK) to perform this final step. The LAK is
attached to the Read Me document that was included with the Tofino SA.
To install the ConneXium Tofino Configurator, you need a Windows user
account with Administrator permissions.
 Run the ConneXium Tofino Configurator installer.
 Follow the on-screen instructions to install the ConneXium Tofino
Configurator.
The ConneXium Tofino Configurator installation wizard walks you through
the steps to configure your installation:
 Accept the license agreement
 Specify the installation type
 Select a destination folder
 Add program icons to specific folders
 Create shortcut icons
Click "Next" and "Back" to move between the pages of the wizard.
20
NHA15729 - 10/2014
Installing Your ConneXium Tofino
Configurator
3.1 Running the ConneXium Tofino
Configurator Installer
On the Start Installation page of the wizard, review the settings you
selected.
Clicking "Next" on this page begins the installation.
Note: To install the ConneXium Tofino Configurator with the default
installation settings, click "Install" in the bottom left corner at any time.
 To complete the installation, click "Finish" on the final page of the wizard.
If this is a new installation of the ConneXium Tofino Configurator, the
program displays the Activate Your License dialog box.
 Enter your License Activation Key and contact information. Click "OK".
The ConneXium Tofino Configurator will start automatically if you
selected the "Start the ConneXium Tofino Configurator" check box on the
final page of the wizard.
NHA15729 - 10/2014
21
Installing Your ConneXium Tofino
Configurator
3.1 Running the ConneXium Tofino
Configurator Installer
The installation is complete and your license has been activated.
Additional configuration steps may be required depending on who will be
using this program.
A Windows user with administrator permissions has full access to all
ConneXium Tofino Configurator functionality. To enable Windows users
without Administrator permissions to use the application, perform the
following additional steps.
 By default, the ConneXium Tofino Configurator preferences and audit
log files are located in C:\ProgramData\Tofino Security\ConneXium
Tofino Configurator. Non-administrator users need permission to write
to this location. Using Windows security, allow Write access to this
folder. You can choose to relocate the audit log file to a writeaccessible location (see “Customizing Program Settings and
Preferences”) but you cannot move the preferences file.
 To give non-administrator users full access to a ConneXium Tofino
Configurator project, save the project file (.tpf) to a folder that allows
them Administrator or Read/Write access. To limit their functionality in
a project, save the project file to a folder that allows them Read-Only
access. See “Managing User Logging, Access, and Privileges” for
additional techniques on how to control access to the project file.
 If you plan to use the NetConnect Loadable Security Module (LSM),
you need to create firewall exceptions to open ports for both the TCP
and UDP protocols. Tofino‘s defined port is 6689.
22
NHA15729 - 10/2014
Projects
4 Projects
The ConneXium Tofino Configurator uses project files to coordinate one or
more Tofino SAs that are being used for a common facility or project. Each
project file contains the configurations of the Tofino SAs it is managing along
with other information, such as network assets and common protocols.
When you start the ConneXium Tofino Configurator, you will be asked if you
would like to do the following:
 Create a new project (see “Creating a New Project” on page 25)
 Open an existing project
Once you create a project file, that file will be visible for you to open from the
start-up screen. The last five projects opened display here. You can set a
specific project file as the default project so that it automatically opens every
time you start the ConneXium Tofino Configurator. After you do this, the startup screen will no longer appear. You set and clear the default project with the
Preferences feature (see “Customizing Program Settings and Preferences”
on page 129).
Once you load a project file, you can view the project details and protection
information. This includes the project name; the name and location of the
project file on the computer; the revision number of the project; the users who
created and last modified the project file; the company name; the project
protection settings; and the administrator protection setting.
NHA15729 - 10/2014
23
Projects
24
NHA15729 - 10/2014
Projects
4.1 Creating a New Project
4.1 Creating a New Project
To begin using the ConneXium Tofino Configurator, create a project. You
can do this from the start-up screen or from within the application. Create as
many projects as you need for your site. While only one project is required,
you may choose to segregate your network into smaller projects.
As part of project creation, you can restrict access to the project file with the
License Activation Key, a password, or both. Each time the project is saved,
the license key and/or the password will be used to encrypt the project file.
Anyone who acquires the project file will be unable to access the content
without first providing the appropriate key and/or password. When a user
attempts to open the project in the ConneXium Tofino Configurator, the
license key will automatically be read from the program, but the user will be
prompted to enter the password.
As an extra layer of protection, you can set an Administrator password. This
helps keep users from performing certain functions without approval from the
Administrator. When this password is set, users require Administrator
permission to change the Project Protection settings or move the project file.
For more information on project protection, see “Managing User Logging,
Access, and Privileges”.
 On the start-up screen, click "Create New Project...".
NHA15729 - 10/2014
25
Projects
4.1 Creating a New Project
Note: Once you set a default project to open automatically, the start-up
screen no longer appears.
Alternately, within the application, click the New icon in the toolbar to open
the wizard, then select "Project" and click "Next". If you have another
project open, a message informs you that it will be closed. You will be
prompted to save the project, if necessary.
Whether you create the project from the start-up screen or from within the
application, the New Project Wizard opens. Here you enter the details for
the project you are creating.
 Enter a project name and a company name. Click "Next".
 Select how you want to restrict access to the project file: "License
Activation Key" and/or "Password".
If you choose password protection, complete the "Password" and
"Confirm Password" fields. Create a password that is at least 6 characters
long and includes uppercase, lowercase, and special characters.
26
NHA15729 - 10/2014
Projects
4.1 Creating a New Project
Note: If you leave both check boxes empty, any user will be able to
access the information in the .tpf project file.
To restrict access to the project file, you select the License Activation Key
option. When selected, the project file will open exclusively on a machine
with a matching License Activation Key. You can disable this option when
you need to share the project file with technical support or a person in your
company who is running a different copy of the ConneXium Tofino
Configurator.
Click "Next".
 Set an optional administrator password. Select the "Use Administrator
Password" check box then complete the "Password" and "Confirm
Password" fields.




Create a password that is at least 6 characters long and includes
uppercase, lowercase, and special characters.
Click "Finish". The project is created but has not yet been saved.
Click the Save icon in the toolbar. The standard Windows Save As dialog
box opens.
Select a location on your computer to store the project file and enter a
name for the project. The filename will be appended with .tpf.
Click "Save".
NHA15729 - 10/2014
27
Projects
4.2 Opening an Existing Project
4.2 Opening an Existing Project
You can open an existing project file when you start the ConneXium Tofino
Configurator or you can open a project from within the application.
 On the start-up screen, click "Open Project...".
For convenience, the start-up screen displays the last five projects
opened. If the project you want to open appears in this list, click it to load
the project.
Note: Once you set a default project, that project will load automatically
when you start the ConneXium Tofino Configurator.
Alternately, within the application, click the Open icon in the toolbar. If you
have another project open, a message informs you that it will be closed.
You will be prompted to save the project, if necessary.
 Locate the project file on your computer. The filename will be appended
with .tpf.
 Click the file you want to open to select it. Click "Open".
 When the project is password protected, the program prompts you to
enter the password. Type the project password and click "OK".
28
NHA15729 - 10/2014
Projects
4.3 Editing Project Details
4.3 Editing Project Details
You can view and edit the details of the project you currently have open in
the ConneXium Tofino Configurator. You can also change the protection
settings and passwords.
 Click the project name in the Project Explorer view. The details for the
current project display.
 Update the Project Details section as necessary.
 Project Name: A user editable project name.
 Project File: The name of the project file with the location it was loaded
from or last saved to. This is also the location where the project will be
stored the next time it is saved. This field displays <unsaved> for new,
unsaved projects.
 Project Revision: The number of the current version of this project,
along with a specially calculated hash code to reduce the chance of
accidental duplication of revision numbers. The project revision
number is incremented each time the project is saved.
 Creator: The user who created the project. This is the Windows user
name of the person who was logged in when the project was created.
NHA15729 - 10/2014
29
Projects
4.3 Editing Project Details
 Last Modified By: The user who last saved the project. This is the
Windows user name of the person who was logged in when the project
was last saved.
 Company: A user editable company name.
 In the Project Protection section, change how you want to restrict access
to the project file. You can add protection settings, remove protection
settings, and change the current password.
 Click a selected check box to turn off a protection setting.
 Click an empty check box to turn on a protection setting.
 Click "Change Password..." to edit the current project protection
password, if one is set. You will need to enter the current password
and then enter and confirm a new password. Create a password that
is at least 6 characters long and includes uppercase, lowercase, and
special characters. Click "OK".
 In the Administrator Password section, change the administrator setting.
 To make yourself the project administrator, enable the check box if it
is not already selected. Set a password and click "OK".
 To remove protection at this level, clear the check box. You will be
prompted to confirm the action; click "OK". When prompted, enter the
current password and click "OK" to confirm that you have permission
to remove the protection.
 To edit the current password, click "Change Administrator
Password...". Enter the current password and then enter and confirm
a new password. Create a password that is at least 6 characters long
and includes uppercase, lowercase, and special characters. Click
"OK".
 Click the Save icon in the toolbar.
If this is a new project that has not been saved, select a location on your
computer to store the project file, enter a name for the project, and click
"Save".
30
NHA15729 - 10/2014
Projects
4.4 Deleting a Project
4.4 Deleting a Project
You delete a project from outside the ConneXium Tofino Configurator. Delete
the project file as you would delete any Windows file.




Open Windows Explorer and locate the project file on your computer.
Select the .tpf file you want to delete.
Press DELETE. A message prompts you to confirm the deletion.
Click "Yes".
NHA15729 - 10/2014
31
Projects
4.5 Duplicating a Project
4.5 Duplicating a Project
The Save As feature lets you create a copy of your project file. You can also
use this feature to save a project file to a new location on your computer.





Open the project you want to duplicate.
Open the Save menu and click "Save As".
Select a location on your computer to store the new project file.
Edit the filename for the project.
Click "Save As".
If an administrator password is set for this project, then administrator
approval is required to save the project to a new location. To continue you
need the project’s administrator password.
32
NHA15729 - 10/2014
Projects
4.6 Exporting a Project File
4.6 Exporting a Project File
The Export feature lets you create a copy of your project file. Use this action
when you need to send a project file to technical support for troubleshooting
assistance.
This feature allows users with Read Only or Read/Write access to the project
to export the information to outside projects. It also lets users transfer project
details to other people, such as Technical Support staff, without having to
provide passwords. Sensitive information on your ConneXium Tofino
encryption keys is deliberately removed from all export files, so the resulting
file cannot be used to connect to any Tofino SAs.





Open the project you want to export.
Open the Save menu and click "Export".
Select a location on your computer to store the exported file.
Edit the filename (optional).
Click "Save".
If an administrator password is set for this project, then administrator
approval is required to save the export file to a new location. To continue you
need the project‘s administrator password.
NHA15729 - 10/2014
33
Projects
34
4.6 Exporting a Project File
NHA15729 - 10/2014
Tofino SAs
5 Tofino SAs
Tofino Security Appliances, referred to as Tofino SAs, are the hardware
devices installed on your live network. They also exist in the ConneXium
Tofino Configurator, where you create a Tofino SA to represent each
physical device being installed. You configure the devices in the ConneXium
Tofino Configurator and then transfer the configuration data to the devices,
either over the network or with a USB device.
From the Tofino SAs item in the Project Explorer view, you can create, edit,
and delete the configuration data for multiple Tofino SAs contained in a single
project.
By selecting a specific Tofino SA in the Project Explorer view, you can do the
following:
 Create a new Tofino SA
 View and edit the Tofino SA configuration
 Delete a Tofino SA
 Create a configuration that can be loaded onto a Tofino SA device in the
field
 Verify the configuration that is installed on a Tofino SA
Normally you will perform the last two tasks once your Tofino SA is fully
configured. After defining a Tofino SA in the project, you may also need to
configure event logging and define firewall rules.
The Discovery item in the Project Explorer view lets you search for existing
Tofino SAs already configured on your network.
NHA15729 - 10/2014
35
Tofino SAs
5.1 Defining the Tofino SAs
5.1 Defining the Tofino SAs
Within a project, you define a Tofino SA for each Tofino SA hardware device
that will be installed on your network. The two most common ways to define
a Tofino SA are:
 Create a new Tofino SA manually
 Discover Tofino SA devices already configured on the network
You can also copy and paste a Tofino SA within the same project or across
different projects. Once you paste the Tofino SA into the project, edit the
settings as necessary.
The Tofino SAs you define appear in the Project Explorer view beneath the
item Tofino SAs. Click this top level item to display the current folder structure
and the defined Tofino SAs.
You can create a folder hierarchy to organize your Tofino SAs. Use the New
Folder feature in the toolbar to create folders. You can use the Cut and Paste
actions in the toolbar to move the devices.
36
NHA15729 - 10/2014
Tofino SAs
5.1.1
5.1 Defining the Tofino SAs
Manually creating a Tofino SA
Create as many Tofino SAs in the project as are needed to represent each
physical device being installed on the network.
 Click "Tofino SAs" in the Project Explorer view and then click "New Tofino
SA" in the toolbar.
Alternately, open the New menu in the toolbar and click "Tofino SA".
The New Tofino SA wizard opens.
 Enter the Tofino ID. This number is found on the face of the Tofino SA
device.
If you don‘t know the Tofino ID of your appliance you can enter a
temporary ID of 00:00:00:00:00:XX, where XX is any two digit number.
This lets you configure the Tofino SA without the actual ID number.
However, you will receive a message indicating that you need to enter a
correct Tofino ID in order to apply the configuration to a Tofino SA.
 Enter information to identify this specific Tofino SA device in the "Name:",
"Description:", "General Location:", and "Specific Location:" fields.
 Select the mode—"Operational" or "Test"—that you want the Tofino SA to
run in when the configuration is loaded. Click "Next".
Note: During commissioning, confirm that the Tofino SA is set to Test
mode to allow validation of the firewall rules without dropping needed
traffic. Once the rules have been validated, set the Tofino SA to
Operational mode. For more information on using Test mode, see “Using
Tofino Test Mode to Validate Firewall Rules”.
NHA15729 - 10/2014
37
Tofino SAs
5.1 Defining the Tofino SAs
 Name the Tofino SA interfaces and set the configuration of each interface.
Click "Next".
 On the final page of the wizard, select the LSMs you want to activate for
this Tofino SA.
 NetConnect LSM: The Tofino NetConnect LSM enables the
ConneXium Tofino Configurator and the Tofino SA to communicate
over the network. This allows you to perform certain tasks, such as
applying and verifying configuration, from your PC without having to
physically visit the Tofino SA in the field. The NetConnect LSM will
automatically activate itself once the ConneXium Tofino Configurator
communicates with a Tofino SA licensed with that LSM.
 Firewall LSM: The Tofino Firewall LSM checks the communications
on your control network against a list of traffic rules that are defined by
your controls engineer. Any communication that is not on the allowed
list will be blocked and reported by the Firewall LSM.
 Event Logger LSM: The Tofino Event Logger LSM records security
events and alarm information. It can record and back up this
information simultaneously to both a remote IT syslog server and a
non-volatile memory in the Tofino SA.
38
NHA15729 - 10/2014
Tofino SAs
5.1 Defining the Tofino SAs
 Modbus TCP Enforcer LSM: The Tofino Modbus TCP Enforcer LSM
checks every Modbus command and response against a list of allowed
commands defined by your controls engineer. Any command that is
not on the allowed list, or any attempt to access a register or coil that
is outside the allowed range, will be blocked and reported. It also filters
traffic based on the validity of the Modbus TCP messages, screening
out messages that have been either deliberately or accidentally
malformed.
 OPC Classic Enforcer LSM: The Tofino OPC Classic Enforcer LSM
inspects, tracks, and helps secure every connection that is created by
an OPC application. It dynamically opens only the TCP ports that are
required for each connection, and only between the specific OPC
client and server that created the connection. It also filters traffic based
on the validity of the OPC Classic messages, screening out messages
that have been either deliberately or accidentally malformed.
 EtherNet/IP Enforcer LSM: The Tofino EtherNet/IP Enforcer LSM
checks EtherNet/IP explicit messages for CIP objects or services, and
compares them against selected lists of allowed commands. This
gives you the capability to restrict traffic to data read-only, data
read/write, or programming messages to PLC and other devices, as
required for your security strategy. It also filters traffic based on the
validity of the EtherNet/IP messages, screening out messages that
have been either deliberately or accidentally malformed.
 Click "Finish".
The new Tofino SA appears in the Project Explorer view.
 Expand the Tofino SA and click "General" to display the General settings
page.
See the reference section “Tofino SA Fields” for a detailed description of
the fields on this page.
 Confirm the information for this device is correct. Check the
Communications section, which defaults to "Both USB and Network". You
can specify whether you want to transfer configuration data to the Tofino
SA device over the network or with a USB device. Change this setting as
necessary.
NHA15729 - 10/2014
39
Tofino SAs
5.1.2
5.1 Defining the Tofino SAs
Discovering a Tofino SA
The Discovery feature lets you search your network for new and existing
Tofino SA devices. By scanning IP address ranges, the Tofino SAs can be
discovered and then added to your project.
A Tofino SA does not have its own IP address. During Discovery, the
ConneXium Tofino Configurator sends discovery messages to addresses of
devices on the opposite side from the Tofino SA. The ConneXium Tofino
Configurator may be located anywhere in the network, as long as it is able to
communicate with at least one device on the opposite side of the Tofino SAs.
If any routers or firewalls are located between the ConneXium Tofino
Configurator and a Tofino SA in the network, configure each router and
firewall device to allow the ConneXium Tofino Configurator traffic to pass
through these devices. See “Communications” for more information.
When working with multiple Tofino SAs, you may want to organize them in
folders. You can create the folder hierarchy before you discover the devices
or when you enter the scan details. To create folders prior to configuring the
scan settings, use the New Folder feature in the toolbar. Select "Tofino SAs"
or an existing folder in the Project Explorer view to display this button.
 In the Project Explorer view, expand the Tofino SA you are working with
and click "Discovery".
On the Tofino Discovery page, you configure a scan on the left side of the
page. On the right side, you view the progress and results of the scan.
 In the "Start IP:" and "End IP:" fields, enter the starting and ending IP
addresses for the range you want to scan.
The number of addresses to be scanned and the estimated runtime is
calculated and displayed in the Results section.
40
NHA15729 - 10/2014
Tofino SAs
5.1 Defining the Tofino SAs
Note: When setting scan ranges, it is helpful to keep them as small as
possible as scanning is deliberately slow so that it does not impact the
process network in any way. One scan message is sent each second, so
scanning larger ranges (greater than 5000 addresses) may take several
hours.
 Specify the folder where you want to save the Tofino SAs that are
discovered with this scan.
 To display the existing folders, click the button to the right of the
"Destination Folder:" field.
 To create a new folder beneath the currently selected folder, click the
Add button (+). Enter a name for the new folder and click "OK".
 Select the destination folder for discovered Tofino SAs.
 Click "OK".
 To run the scan repeatedly, select the "Continuous Scan:" check box. The
scan will run until you manually stop it.
This feature enables you to start the scan before the Tofino SA devices
are actually installed. As they are installed on the network, the scan will
discover them.
 To begin the scan, click "Start".
To pause the scan at any time, click "Pause". The scan is held at this point
until you click "Start" to begin it again. The "Duration:" field displays how
long the scan has been running since the last time "Start" was clicked.
To return the scan configuration fields to the default values, click "Reset".
The progress of the scan displays in the Results section. There are five
states:
 Ready: The scan is configured but has not been started.
 Scanning: The scan is in progress.
 Complete: The entire address range has been scanned.
 Paused: The user has paused the scan.
 Rescanning: The entire address range has been scanned at least
once and is being scanned again. This state relates to the "Iteration:"
feature. The "Iteration:" value indicates how many times the range has
been scanned.
As devices are discovered, they appear in the Project Explorer view at the
specified location. The General settings page is populated with basic device
information: Tofino ID, Name, and Hardware Type. A network connection is
automatically attempted and, if successful, provides additional device details.
NHA15729 - 10/2014
41
Tofino SAs
5.2 Editing a Tofino SA
5.2 Editing a Tofino SA
Selecting or expanding a Tofino SA in the Project Explorer view displays links
that let you navigate to pages where you can edit the device configuration.
The configuration and setting options available for a Tofino SA will depend
on its associated LSMs. Typically, the available settings include:
 General settings: Configure the general settings for the selected Tofino
SA. This includes general information, communication parameters, and
LSM selection.
 Event Logger LSM settings: Configure alarm and event logging for the
selected Tofino SA.
 Firewall LSM settings: Configure firewall rules for the selected Tofino SA.
When you copy a Tofino SA from another project, review the configuration
settings to verify that it is set up properly for the new location.
 In the Project Explorer view, expand the Tofino SA you want to work with
and click "General".
The page displayed shows the general configuration settings for this
Tofino SA.
42
NHA15729 - 10/2014
Tofino SAs
5.2 Editing a Tofino SA
 Update theTofino SA configuration as necessary.
See the reference section “Tofino SA Fields” for a detailed description of
the fields on this page.
 Click the Save icon in the toolbar.
NHA15729 - 10/2014
43
Tofino SAs
5.3 Deleting a Tofino SA
5.3 Deleting a Tofino SA
Delete a Tofino SA if you no longer need it in the current project.
The Tofino SA in your ConneXium Tofino Configurator project is a virtual
representation of the physical Tofino SA device. Special keys are stored in
both of these locations to enable communication between them. Deleting a
Tofino SA from the project deletes its configuration data, including the special
keys. This will block any future network communication between the
ConneXium Tofino Configurator and that Tofino SA device until a factory
reset is performed on the Tofino SA device. The factory reset clears the
second of the two keys and opens the door for a new ConneXium Tofino
Configurator/Tofino SA pairing to be established.
 In the Project Explorer view, click the Tofino SA you want to delete.
 Click the Delete icon in the toolbar.
When the Communications setting is "Network Only" or "Both USB and
Network", a message asks if you want to perform a factory reset on the
Tofino SA. Click "Yes". The ConneXium Tofino Configurator automatically
resets the Tofino SA to the factory settings.
When the Communications setting is "USB Only", you need to perform the
factory reset manually. See “Factory Resetting Your Tofino SA”.
 A message prompts you to confirm the deletion. Click "OK" to proceed.
44
NHA15729 - 10/2014
Assets
6 Assets
In the ConneXium Tofino Configurator, assets represent the real world
devices and systems on the control network. An asset can represent a
physical device, such as a PLC, a computer, or network equipment. It can
also represent a virtual asset, such as a broadcast address range, a network,
or a multicast address. This provides flexibility when creating firewall rules.
By selecting a specific asset in the Project Explorer view, you can do the
following:
 Create a new asset manually
 Create a folder
 View and edit the asset's details
 Create an asset template from the selected asset
 Delete an asset
You can create a new asset manually or from a template.
 Computer, Controller, Device, and Network Equipment
Assets
Most assets used in the ConneXium Tofino Configurator are real devices.
These typically use messages known as Unicast messages. A Unicast
message is network traffic directed from a specific device to another
specific device. When you define an asset to be a computer, controller,
device, or network equipment, the ConneXium Tofino Configurator
assumes it is a physical device on your network and helps create rules
appropriate for that type of device.
 Network Assets
Network assets are a virtual representation of the devices contained in a
specific network or subnetwork. When you define an asset to be a
network, the ConneXium Tofino Configurator assumes it is a collection of
devices on your network that belong to a group of IP addresses known as
a subnet. Thus, if you use a network asset in a rule, the ConneXium
Tofino Configurator helps create rules that allow or deny traffic from that
range of addresses.
NHA15729 - 10/2014
45
Assets
 Broadcast and Multicast Assets
In most networks there are messages that are sent to a general address
and are expected to be received by everyone on the network. These are
called Broadcast and Multicast messages. The ConneXium Tofino
Configurator has special assets designed to handle these types of
messages.
 Broadcast: This asset represents an address that is used for IP
broadcasts. Broadcast packets, which are a normal part of network
operation, are transmitted by a device to a broadcast address that
many devices listen to. For example, IP networks use broadcasts to
resolve network addresses using Address Resolution Protocol (ARP).
The exact broadcast address is dependent on the subnet defined for
a given network. If the node address is 192.168.1.1 the broadcast
address might be 192.168.1.255, depending on the subnet of the
node. This type of asset is required if you wish to provide broadcast
filtering rules in the Firewall LSM.
 Multicast: This asset represents an address that is used for IP
multicasts. Multicast packets are transmitted to a multicast address
that a set of devices listen to. Typically these are IP addresses in the
range between 224.0.0.0 through 239.255.255.255 and depend on the
manufacturer of controller hardware, the protocols in use, and the
network configuration. For example, 239.192.22.121 is often used in
EtherNet/IP networks, while 234.5.6.7 is often used with Fault Tolerant
Ethernet Systems. This is required if you wish to provide multicast
filtering rules in the Firewall LSM.
46
NHA15729 - 10/2014
Assets
6.1 Asset Templates
6.1 Asset Templates
An asset template is a tool to help you create multiple assets quickly. It
contains predefined fields that can be used to rapidly create similar assets.
For example, if you have ten PLCs in your plant that are a similar make and
model, you can create an asset template (or use a pre-existing template) to
represent that type of PLC. Then you can quickly generate assets to
represent the ten similar PLCs.
The ConneXium Tofino Configurator comes with a number of templates
preloaded for Schneider Automation products. You can also import new
templates or create templates of your own.
By selecting a specific asset template in the Project Explorer view, you can
do the following:
 Create a new asset template
 Create a folder
 Create a new asset from the selected template
 View and edit the asset template's details
 Delete the asset template
The templates that you create appear in the Project Explorer view in the
Asset Templates folder.
You can create a folder hierarchy to organize your templates. Use the New
Folder feature in the toolbar to create folders. You can create a template in a
specific folder, or you can use the Cut and Paste actions in the toolbar to
relocate templates.
Some templates are factory defined, and cannot be cut or deleted.
NHA15729 - 10/2014
47
Assets
6.1.1
6.1 Asset Templates
Creating an Asset Template
Create as many asset templates in a project as you need to simplify the
process of creating assets. When you have several assets that are similar, it
will save time to create a template containing the common information and
then use that to create your assets.
You can create rule profiles for asset templates. When you create a template
you can specify the protocols that this type of asset typically uses, along with
how you want those protocols managed. The New Firewall Rule Wizard can
use this information to automatically create rules for the assets created from
this template. For more information, see “Rule Profiles”.
48
NHA15729 - 10/2014
Assets
6.1 Asset Templates
Note: To add rule profiles to preloaded templates, first make a copy of the
template and then add the rule profiles.
 Click "Asset Templates" in the Project Explorer view and then click "New
Asset Template" in the toolbar.
Alternately, open the New menu in the toolbar and click "Asset Template".
Note: This creates an asset template at the top level. Select a folder
before clicking "New Asset Template" to create the template in a specific
location. Use the New Folder feature in the toolbar to create folders to
organize the templates.
The New Asset Template dialog box opens.
 Enter a name for this asset template and select the type of asset it
represents.
 Complete the remaining fields (optional).
 Click "Finish".
The program adds the new template in the specified location in the Project
Explorer view. The details view displays the template configuration.
NHA15729 - 10/2014
49
Assets
6.1 Asset Templates
Generally, you will not complete the Communications section. A user will
add these details when creating a specific asset from this template.
You can now define rule profiles. This lets you specify the protocols that
an asset uses, along with how you want the protocols managed. The New
Firewall Rule Wizard uses this information to automatically create rules
for the asset. For more information, see “Rule Profiles”.
 To open the New Rule Profile Wizard, click "Add Rule Profile..." beneath
the Rule Profiles table.
 Select the type of rule you want to create: standard or special. If you are
creating a special rule, you also select a rule type from the list provided.
Click "Next".
 Define the rule profiles.
 Expand the folders and select the protocols you want to use. Use
SHIFT+click to select a range of protocols; use CTRL+click to select
multiple protocols out of sequence. The ConneXium Tofino
Configurator creates a rule profile for each protocol selected.
 Set the permission. This tells the firewall what to do with a packet that
matches the rule profile: allow it to pass ("Allow") or stop it from
passing ("Deny"). The "Enforcer" option inspects and filters the traffic
using Deep Packet Inspection. This option is appropriate solely for the
Enforcer protocols.
50
NHA15729 - 10/2014
Assets
6.1 Asset Templates
 To create a log each time the rule is triggered, select the "Enable
Logging" check box.
 Click "Finish".
The profiles created appear in the Rule Profiles table.
 Select the rule protocol in this table and finish configuring it in the Rule
Details section.
You can adjust advanced settings, such as traffic rate limiting, for most
rule profiles. Additional settings for the selected rule profile are displayed
in one or more tabs below the table.
 Click the Save icon in the toolbar.
See the reference section “Asset and Asset Template Fields” for a
detailed description of the fields on this page.
NHA15729 - 10/2014
51
Assets
6.1.2
6.1 Asset Templates
Deleting an Asset Template
Delete an asset template if you no longer need it in the current project. The
templates reside in the "Asset Templates" folder.
 In the Project Explorer view, locate the asset template you want to delete
and click it in the tree to select it.
 View the details to verify that this is the correct template.
 Click the Delete icon in the toolbar. A message prompts you to confirm the
deletion.
 Click "OK" to proceed.
52
NHA15729 - 10/2014
Assets
6.2 Creating Assets
6.2 Creating Assets
To build your asset library, you can create assets manually or from existing
templates. Asset templates contain default asset details, allowing you to
create similar assets quickly.
You can also copy and paste an asset or asset template into the Assets
folder to create an asset. However, this does not run the wizard. To make the
asset unique, you need to edit the details manually.
6.2.1
Creating an Asset Manually
Creating an asset involves defining its general information, communication
parameters, and rule profiles.
You can create as many assets as needed for your project. When working
with multiple assets, you may want to organize them in folders. Use the New
Folder feature in the toolbar to create the folder hierarchy.
 In the Project Explorer view, expand "Assets" and click the folder where
you want the new asset to reside. To create the asset at the top level, click
"Assets".
 Click "New Asset" in the toolbar.
Alternately, open the New menu in the toolbar and click "Asset".
The New Asset wizard opens.
NHA15729 - 10/2014
53
Assets
6.2 Creating Assets
 Enter a name for this asset and select its type.
 Complete the remaining fields to identify the asset (optional). Click "Next".
 Enter an IP address and/or a MAC address for this asset. This information
will be used by the ConneXium Tofino Configurator when creating firewall
rules for this asset.
 Click "Finish".
The new asset appears in the specified location in the Project Explorer
view. The details view displays the asset details.
54
NHA15729 - 10/2014
Assets




6.2 Creating Assets
You can now define rule profiles. This lets you specify the protocols that
an asset uses, along with how you want the protocols managed. The New
Firewall Rule Wizard uses this information to automatically create rules
for the asset. For more information, see “Rule Profiles”.
To open the New Rule Profile Wizard, click "Add Rule Profile..." beneath
the Rule Profiles table.
Select the type of rule you want to create: standard or special. If you are
creating a special rule, you also select a rule type from the list provided.
Click "Next".
Define the rule profiles.
 Expand the folders and select the protocols you want to use. Use
SHIFT+click to select a range of protocols; use CTRL+click to select
multiple protocols out of sequence. The ConneXium Tofino
Configurator creates a rule profile for each protocol selected.
 Set the permission. This tells the firewall what to do with a packet that
matches the rule profile: allow it to pass ("Allow") or stop it from
passing ("Deny"). The "Enforcer" option inspects and filters the traffic
using Deep Packet Inspection. This option is appropriate solely for the
Enforcer protocols.
 To create a log each time the rule is triggered, select the "Enable
Logging" check box.
 Click "Finish".
The profiles created appear in the Rule Profiles table.
Select the rule protocol in this table and finish configuring it in the Rule
Details section.
NHA15729 - 10/2014
55
Assets
6.2 Creating Assets
You can adjust advanced settings, such as traffic rate limiting, for most
rule profiles. Additional settings for the selected rule profile are displayed
in one or more tabs below the table.
 Click the Save icon in the toolbar.
See the reference section “Asset and Asset Template Fields” for a
detailed description of the fields on this page.
6.2.2
Creating an Asset from a Template
Use a template to quickly create an asset with default values already
completed.
Assets created from a template are placed in the Assets folder in alphabetical
order. You can reorganize the assets into specific folders as needed.
 In the Project Explorer view, expand "Asset Templates" and locate the
template you want to use to create an asset.
 Click the asset template to select it and click "New Asset from Template"
in the toolbar.
The New Asset wizard opens with default values populating some of the
fields completed.
56
NHA15729 - 10/2014
Assets
6.2 Creating Assets
 Change the entry in the "Name:" field to identify the asset you are
creating.
 Complete the remaining fields to identify the asset (optional). Click "Next".
 Enter an IP address and/or a MAC address for this asset. This information
will be used by the ConneXium Tofino Configurator when creating firewall
rules for this asset.
 Click "Finish".
The program adds the new asset to the Assets folder in the Project
Explorer view. The Rule Profiles table displays any rule profiles
configured for the template.
 Click the Save icon in the toolbar.
 To relocate the asset to another folder, use the Cut and Paste actions in
the toolbar.
See the reference section “Asset and Asset Template Fields” for a
detailed description of the fields on this page.
NHA15729 - 10/2014
57
Assets
6.3 Editing an Asset or an Asset
Template
6.3 Editing an Asset or an Asset
Template
Selecting an asset or an asset template in the Project Explorer view displays
the configuration details for the selected item. From here you can edit the
settings. This page includes general information, communication
parameters, and rule profiles.
The Rule Profiles table displays the rule profiles created for the selected
asset or template. You can make changes directly on this page: in the table
and in the Rule Details section.
 In the Project Explorer view, click the asset or template you want to edit.
The configuration details are displayed.
 Update the fields in the General and Communications sections.
Note: Generally, you will not complete the Communications section for an
asset template. A user will add these details when creating a specific
asset from this template.
58
NHA15729 - 10/2014
Assets
6.3 Editing an Asset or an Asset
Template
 In the Rule Profiles table, click the cell you want to edit and make the
necessary change in the table. Depending on the cell selected, you will be
able to:
 Change the state of a check box
 Select an entry in a list
 Open a dialog box and select from a list of appropriate values
 Enter text
To delete a rule profile, select it in the table and click the Remove button
(x) beneath the table.
 On the General and Enforcer tabs in the Rule Details section, update the
settings as necessary for the currently selected rule profile.
 Click the Save icon in the toolbar.
See the reference section “Asset and Asset Template Fields” for a
detailed description of the fields on this page.
NHA15729 - 10/2014
59
Assets
6.4 Creating an Asset Template from
an Existing Asset
6.4 Creating an Asset Template
from an Existing Asset
You may find yourself in the situation where you need to create several
assets that are similar to one you already have in your project. You can
create an asset template from that existing asset. This will then allow you to
quickly create the additional assets from the template.
 In the Project Explorer view, locate the asset you want to use as the basis
for an asset template.
 View the details to verify that this is the correct asset.
 In the Project Explorer view, right click that asset and click "Copy".
 Right click the folder where you want the new asset template to reside and
click "Paste". You can place it in the Asset Templates folder or one of the
subfolders.
The asset appears in the specified location.
 In the Project Explorer view, click the new asset template to display its
details. Make any changes necessary so that it can be used to quickly
create assets.
 Click the Save icon in the toolbar.
60
NHA15729 - 10/2014
Assets
6.5 Deleting an Asset
6.5 Deleting an Asset
Delete an asset if it no longer belongs in the current project. The assets
reside in the Assets folder or in a subfolder.
 In the Project Explorer view, locate the asset you want to delete and click
it in the tree to select it.
 View the details to verify that this is the correct asset.
 Click the Delete icon in the toolbar.
If the selected asset is referenced in a firewall rule, you will receive a
message with three options. You can choose to cancel the deletion;
delete the asset and replace the references to it with its current address;
or delete the asset and fix the detected errors later.
When you choose to delete the asset, a message prompts you to confirm
the action. Click "OK" to proceed. Canceling the deletion at this prompt
will not reinstate the asset in any firewall rules from which it was removed.
NHA15729 - 10/2014
61
Assets
62
6.5 Deleting an Asset
NHA15729 - 10/2014
Firewall Rules
7 Firewall Rules
A firewall is a mechanism used to control and monitor traffic between two
networks (or two portions of the same network) to increase the level of
security on the network. It compares the traffic passing through the firewall to
a predefined set of rules, discarding traffic that does not meet the rule criteria.
In effect, it is a filter that blocks unwanted network traffic and places
limitations on the amount and type of communication that occurs between
devices (or networks) in need of protection and other systems, such as the
corporate network or another portion of a site's control network.
The Tofino Firewall is a Loadable Security Module (LSM) that is activated on
the Tofino SA to process traffic. On its own, it is a stateful layer 2, 3, and 4
firewall. When combined with the Enforcer LSMs, it also offers stateful Deep
Packet Inspection.
An Enforcer is an advanced firewall for specific SCADA and ICS protocols. It
allows you to filter traffic based on high level message content, such as the
commands and services being used or the memory locations being
accessed. Enforcers are designed to be add-ons to the standard Tofino
Firewall LSM. There are multiple Enforcers that you can activate and use;
each one provides Deep Packet Inspection for a different protocol. The
following Enforcers are available in the current version of the ConneXium
Tofino Configurator:
 Modbus TCP Enforcer
 OPC Classic Enforcer
 EtherNet/IP Enforcer
The Tofino SA model and the installed LSM licenses determine the Enforcers
available in the ConneXium Tofino Configurator.
The Firewall details page lists the firewall rules configured for the selected
Tofino SA. On this page you can create a new firewall rule and manage the
existing rules. You can do the following:
 Create a new firewall rule
 View and edit the rules
 Reorder rules
 Cut, copy, and paste rules
 Delete rules
NHA15729 - 10/2014
63
Firewall Rules
The Rule Table supports multiple selection. Use SHIFT+click to select a
range of rules; use CTRL+click to select multiple rules out of sequence. This
lets you copy multiple rules from one Tofino SA and paste them into another.
Selecting a rule in the table displays additional information for that rule and
protocol in the Rule Details section at the bottom of the page.
 Firewall Rule Order
The Tofino SA inspects packets in a sequential manner according to the
order that the rules are displayed in the firewall rule table. Having the
same rules but placing them in a different order can alter how the Tofino
SA manages traffic.
When the Tofino SA receives a packet, it compares it against the first rule,
then the second, then the third, and so on. When it finds a rule that
matches, it stops checking and applies that rule. If the packet goes
through each rule without finding a match, then that packet is denied.
You can manually reorder the rules by selecting a rule and clicking "Move
Up" and "Move Down" in the toolbar.
64
NHA15729 - 10/2014
Firewall Rules
Keep in mind that the first rule in the Tofino SA that matches is applied to
the packet: not the rule that is the most appropriate match. Based on this,
set the more specific rules at the top of the list, followed by the more
general rules. This helps to prevent a general rule being matched before
hitting a more specific rule.
There are certain exceptions to this strategy: for example, rules using
MAC addresses need to be evaluated before rules using IP addresses.
The ConneXium Tofino Configurator advises you if this is required.
 Assisted Firewall Rule Creation
Some firewall rules are needed for other rules to work correctly. For
example, because the devices using the TCP protocol use the ARP
protocol to determine each other's addresses, an ARP Allow rule is
needed in order for a TCP rule to work. The Tofino SA detects when an
additional rule is needed and prompts you to insert it. The message
displays in the title bar above the rule table.
NHA15729 - 10/2014
65
Firewall Rules
 Firewall Rate Limiting
The Rate Limit fields are advanced settings that are available for firewall
rules. These define the rate at which packets that have met the other
criteria for a given rule are allowed through the firewall. The rate limiting
uses a token bucket filter algorithm with three settings:
 Rate Limit: the average packet allow rate over the defined time interval
 Interval: the time interval used for the rate limit (second, minute, hour,
day)
 Burst Limit: the maximum initial number of packets allowed
To understand how token bucket filtering works, picture a 'bucket' of
'tokens'. It costs one token for the firewall to forward one packet. If the
bucket is out of tokens, then the firewall will drop packets until there are
more tokens in the bucket. The number of tokens (and thus the number
of forwarded packets) is controlled by two settings: Rate Limit and Burst
Limit.
The Rate Limit is the rate at which the bucket is refilled with tokens. The
rate limit setting is calculated over an interval set by the user (such as per
second or per minute). If the rate limit is 50 and the interval is set to
seconds, then 50 tokens per second will be placed in the bucket and 50
packets per second will be let through the firewall. Keep in mind that the
bucket is refilled gradually over an interval and not at the start of the
interval.
66
NHA15729 - 10/2014
Firewall Rules
The Burst Limit is the initial number of tokens in the bucket, as well as the
maximum number of tokens the bucket can hold. In other words, this
helps to prevent the number of tokens from building up during times of low
traffic.
The firewall will immediately allow through any burst of packets equal to
the number of tokens in the bucket. Once the bucket is empty, the firewall
can only forward packets as the bucket refills over time at the rate
specified by the rate limit. If the rate of packets is faster than the rate limit,
the bucket will empty at the rate of packets and then will be limited by the
rate limit which refills the bucket. In other words, if your burst limit is 100,
your rate limit is 25 per second, and 1000 packets are sent to the firewall,
then the first 100 will be allowed, followed by another 25 packets per
second after that. Other packets will be dropped.
 Direction: Right, Left, Bidirectional
The arrow in the rule table indicates which device establishes a
connection between the two nodes. The direction indicator does not refer
to packet flow. For example, if a Human Machine Interface (HMI) is using
Modbus/TCP to request data from a PLC, the HMI will be the device
initially setting up the communications connection. Once the connection
is established, then packets will flow in both directions.
Another way of thinking about this is to consider a normal telephone
system. The person dialing the phone number (Person 1) is the one
setting up (i.e., establishing) the connection. Once the other person
(Person 2) answers the phone, then speech can flow both ways.
There are three direction options for a Tofino Firewall LSM:
 Right: Connections can be established by the left asset (as defined in
the rule table) and will flow to the right.
Example: Consider an HMI is the left asset and a PLC is the right asset
with the direction set to Right. This would allow the HMI to initiate the
connection and the PLC to respond, but the PLC would not be allowed
to initiate a session.
 Left: Connections can be established by the right asset (as defined in
the rule table) and will flow to the left.
NHA15729 - 10/2014
67
Firewall Rules
Example: Consider a Workstation with a browser client is the right
asset and a Web Server is the left asset with the direction set to Left.
This would allow the Workstation to initiate web sessions and the Web
Server to respond, but the Web Server would be unable to initiate a
session.
 Bidirectional: The connections can be established by either device.
Once the connection is established, traffic will be able to flow in both
directions regardless of the direction set in the rule.
68
NHA15729 - 10/2014
Firewall Rules
7.1 Creating Firewall Rules
7.1 Creating Firewall Rules
The ConneXium Tofino Configurator allows you to create two types of firewall
rules:
 Standard rules
 Special rules
Standard firewall rules are designed to allow or deny specific protocols
passing through the firewall. They let you set the source, destination,
direction, permission and rate limits for traffic of a particular protocol type. For
example, if you want to allow Modbus/TCP traffic between two devices, a
standard rule can be used.
Special Rules are highly complex rules that go beyond simple allow or deny.
For example, a Special Rule could be used to block a subset of a particular
type of traffic. The available Special Rules can be viewed in the Special
Rules folder.
You will normally use standard rules. Use special rules solely in exceptional
cases.
 In the Project Explorer view, expand the Tofino SA you want to work with
and click "Firewall".
 Click "Create Rule" in the toolbar.
The New Firewall Rule Wizard opens.
NHA15729 - 10/2014
69
Firewall Rules
7.1 Creating Firewall Rules
 Select the type of rule you want to create: standard or special. If you are
creating a special rule, you also select a rule type from the list provided.
Click "Next".
 Define the assets involved in the firewall rule and click "Next".
For each asset you:
 Select the interface where the asset or address is found.
 Specify the asset or address that the rule applies to. You can enter a
specific address or select from a list of known assets. You can also
specify that the rule applies to any asset.
 Set the direction to indicate which asset can establish the connection.
The options are left, right, and bidirectional.
 Define the rule protocols for the selected assets.
When the assets selected have no rule profiles associated with them, the
Protocol page opens where you manually create the rule profiles.
However, when one or both of the assets selected is associated with a
rule profile, a prompt appears. You can choose to use the existing profile
to build the firewall rules or create the firewall rules manually.
70
NHA15729 - 10/2014
Firewall Rules
7.1 Creating Firewall Rules
 If prompted, select how you want to create the firewall rules and click
"Finish".
When you choose to manually create the rule profiles, you are directed
to the Protocol page.
When you choose to use the existing rule profiles, the ConneXium
Tofino Configurator checks both of the assets for protocols listed in
their rule profiles. The automatic rule generator then creates one rule
for every protocol that the two assets have in common. The New
Firewall Rule Wizard closes and the rules created display in the table
on the Firewall page.
If the assets have no protocols in common, no rules are generated.
Similarly, if they have protocols in common but are both clients or are
both servers, no rules are generated. In these cases, a message
informs you of the situation and you will need to define the protocols
manually on the Protocol page.
NHA15729 - 10/2014
71
Firewall Rules
7.1 Creating Firewall Rules
 To create rules manually on the Protocol page, expand the folders and
select the protocols you want to use for the asset rules. Use
SHIFT+click to select a range of protocols; use CTRL+click to select
multiple protocols out of sequence. A rule will be created for each
protocol selected.
 Set the permission. This tells the firewall what to do with a packet that
matches the rule: allow it to pass ("Allow") or stop it from passing
("Deny"). The "Enforcer" option inspects and filters the traffic using
Deep Packet Inspection. This option is appropriate solely for the
Enforcer protocols.
 To create a log each time the rule is triggered, select the "Enable
Logging" check box.
 Click "Finish".
 Finish configuring the firewall details in the Rule Details section.
Many firewall rules allow you to adjust advanced settings, such as traffic
rate limiting. Additional settings for the selected rule are displayed in one
or more tabs below the rules table. The Details column in the rules table
displays a summary of these advanced settings. For more information on
setting these rule details, see “Firewall Rate Limiting” and the appropriate
sections on Enforcer rules: “Creating a Modbus TCP Enforcer Rule”,
“Creating an OPC Classic Enforcer Rule”, “Creating an EtherNet/IP
Enforcer Rule”.
72
NHA15729 - 10/2014
Firewall Rules
7.1 Creating Firewall Rules
 Manually reorder the rules as necessary.
 Click the Save icon in the toolbar.
NHA15729 - 10/2014
73
Firewall Rules
7.2 Deep Packet Inspection Firewalls
7.2 Deep Packet Inspection
Firewalls
A Deep Packet Inspection firewall digs deeper into the protocols to
understand exactly what the protocol is being used for. After the traditional
firewall rules have been applied, the Enforcer firewall inspects the content of
the contained messages and applies more detailed rules. It then makes a
more informed decision on what should be allowed and what should be
blocked.
There are multiple Enforcers that you can activate and use; each one
provides Deep Packet Inspection for a different protocol.
The Modbus TCP Enforcer LSM provides security features for managing
Modbus TCP traffic. This LSM does the following:
 Checks to determine if each Modbus packet conforms to the protocol
specification and then allows or rejects this packet as appropriate.
 Allows you to specify what classes of Modbus traffic are permitted, such
as data read-only, data read-write, or programming messages.
 Allows you to define specific Modbus functions, as well as register or coil
locations, that should be allowed or denied by the Tofino SA.
 Monitors the state of Modbus TCP connections to determine that
incoming messages are expected and in sequence.
The OPC Classic Enforcer LSM provides security features for managing
OPC traffic. This LSM does the following:
 Inspects, tracks, and secures every connection that is created by an OPC
application.
 Dynamically opens only the TCP ports that are required for each
connection between the specific OPC client and server.
 Checks to determine if each packet is properly formed and follows the
RPC and OPC specifications.
 Checks to determine if OPC session connection requests are fragmented.
 Can be directed to block messages that are not properly formed or are
fragmented.
74
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
The EtherNet/IP Enforcer LSM provides security features for managing
EtherNet/IP and CIP traffic. This LSM does the following:
 Checks to determine if each packet conforms to the protocol specification
and then allows or rejects this packet accordingly.
 Allows you to specify what classes of EtherNet/IP traffic are permitted,
such as data read-only, data read-write, or programming messages.
 Allows you to specify CIP classes and services that should be allowed or
denied by the Tofino SA.
The Tofino SA model and the installed LSM licenses determine the Enforcers
available in the ConneXium Tofino Configurator.
7.2.1
Creating a Modbus TCP Enforcer Rule
The Modbus TCP Enforcer LSM is an advanced Deep Packet Inspection
firewall for the Modbus TCP protocol. It allows you to filter traffic based on
specific Modbus function codes, register ranges, and the validity of the
Modbus messages. The Modbus TCP Enforcer LSM is a security software
module that is part of the standard ConneXium Tofino Firewall.
Note: To create and apply a Modbus TCP Enforcer rule, the Modbus TCP
Enforcer LSM needs to be licensed for activation in your Tofino SA. Without
a license for the LSM, you can create trial Enforcer rules in the ConneXium
Tofino Configurator; however, you will be unable to load them into the Tofino
SA.
 Open the General settings page for the Tofino SA you are configuring.
Check that the "Firewall LSM" and "Modbus TCP Enforcer LSM" options
are selected in the Loadable Security Modules list.
 Open the Firewall settings page and click "Create Rule".
NHA15729 - 10/2014
75
Firewall Rules
7.2 Deep Packet Inspection Firewalls
 Work through the New Firewall Rule Wizard to define a firewall rule with
the following settings:
 On the Rule Type page, select "Standard rule". Click "Next".
 On the Assets page, create a firewall rule between two assets. Set the
direction so that it is FROM the Modbus Master TO the Modbus Slave.
The Bidirectional option is not an appropriate selection for the Modbus
TCP Enforcer LSM. Click "Next".
 On the Protocol page, expand the "Common Industrial" folder and
select either "Modbus TCP" or "Modbus UDP". In the Permission
section, select "Enforcer".
Note: If you select "Allow" or "Deny" as the permission setting, the Tofino
SA will allow or block the Modbus TCP traffic between the two assets
accordingly without reference to the Modbus TCP Enforcer.
 Click "Finish". The ConneXium Tofino Configurator creates the Enforcer
firewall rule and adds it to the table. Configure the firewall settings in the
Rule Details section at the bottom of the page.
76
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
 Select the "General" tab. Set rate and burst limits as required.
 Select the "Enforcer" tab and configure the rule as follows.
 Select the appropriate function code. The options are:
 Read-Only: Function codes that are data read commands are
permitted.
 Read/Write: Function codes that are data read or data write
commands are permitted.
 Programming/OFS: Function codes that are either data read/write or
programming commands are permitted.
 Any: All Modbus function codes are permitted.
 Advanced: Opens a new window where you select from a list of
available function codes. Select a function code and then add the
register or coil ranges that you wish to allow for the rule, as
appropriate. You can add a comment for each code and reorder the
codes. Add as many function codes as needed to one rule, but select
a single instance of each function code per rule. Click the Add Function
Code Rule button (+) to display the available codes. Use the Move Up
and Move Down icons to reorder the codes. Click "OK" when you are
done.
NHA15729 - 10/2014
77
Firewall Rules
7.2 Deep Packet Inspection Firewalls
You can use the Tofino SA in test mode to determine if the selected
function code is suitable for your application.
 Specify the "Unit ID:".
Modbus master devices use the unit identifier to communicate through
devices such as Modbus bridges and gateways. It allows these
devices to use a single IP address to support multiple independent
Modbus end units. If you want the Unit ID to be inspected, enter one
or more comma separated values in this field. If you do not require
restrictions on the Unit ID, leave this field blank.
 To have the Tofino SA check that the messages for well-known
Modbus commands (1-6, 15, 16, 20-24) are properly formed and
follow the Modbus specification, select "Sanity Check:".
If a message does not follow the specification, the Tofino SA will block
it. For example, if a Modbus Write Multiple Registers command
(Function Code 16) has a value in its length field that is either illegal or
does not match the amount of data being sent, then the message
would be dropped. This option may have to be disabled for Modbus
devices that do not conform to the Modbus/TCP 1.1b specification.
The Tofino SA performs a sanity check on the Modbus MBAP header
whether or not this option is selected.
 To have the Tofino SA block and report any Modbus command or
response that is out of sequence for the current state of the
connection, select "State Check:".
Examples of 'out-of-state' traffic include a command sent by the slave
device to the master or a response sent by the master device to the
slave.
78
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
CAUTION
LOSS OF COMMUNICATION OR PROCESS VIEW
Select the Modbus Exception option only when you are using the product
in a test environment.
Failure to follow these instructions can result in injury or equipment
damage.
 To have the Tofino SA send a Modbus TC exception response, if
appropriate, to the Modbus device that generated a blocked message,
select "Exception:".
Setting this option may make some Windows-based client applications
unresponsive. This can happen when the operating system incorrectly
processes TCP reset packages (sent when the firewall blocks traffic)
if those packets also contain additional information. When this occurs,
the TCP/IP session remains open, leaving the client in a wait state.
 To have the Tofino SA send a TCP reset message to both Modbus
devices when it blocks a message, select "Reset:". This can keep
session from locking up.
 Click the Save icon in the toolbar.
7.2.2
Creating an OPC Classic Enforcer Rule
The Tofino OPC Classic Enforcer Loadable Security Module (LSM) inspects,
tracks and helps to secure every connection that is created by an OPC
application. It dynamically opens the TCP ports that are required for each
connection, and between the specific OPC client and server that created the
connection. No configuration changes are required on the OPC clients and
servers, and it is more secure than conventional firewall or tunneler solutions.
NHA15729 - 10/2014
79
Firewall Rules
7.2 Deep Packet Inspection Firewalls
Note: To create and apply an OPC Classic Enforcer rule, the OPC Classic
Enforcer LSM needs to be licensed for activation in your Tofino SA. Without
a license for the LSM, you can create trial Enforcer rules in the ConneXium
Tofino Configurator; however, you will be unable to load them into the Tofino
SA.
 Open the General settings page for the Tofino SA you are configuring.
Check that the "Firewall LSM" and "OPC Classic Enforcer LSM" options
are selected in the Loadable Security Modules list.
 Open the Firewall settings page and click "Create Rule".
 Work through the New Firewall Rule Wizard to define a firewall rule with
the following settings:
 On the Rule Type page, select "Standard rule". Click "Next".
 On the Assets page, create a firewall rule between two assets. Set the
direction to Bidirectional to allow OPC callbacks from servers. Click
"Next".
 On the Protocol page, expand the "Common Industrial" folder and
select "OPC Classic". In the Permission section, select "Enforcer".
Note: If you select "Allow" or "Deny" as the permission setting, the Tofino
SA will allow or block the OPC traffic between the two assets accordingly
without reference to the OPC Enforcer.
 Click "Finish". The ConneXium Tofino Configurator creates the Enforcer
firewall rule and adds it to the table. Configure the firewall settings in the
Rule Details section at the bottom of the page.
80
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
 Select the "General" tab. Set rate and burst limits as required.
 Select the "Enforcer" tab and configure the rule as follows.
 To have the Tofino SA check that the connection establishment
messages are properly formed and follow the RPC specification,
select "Sanity Check:".
 To have the Tofino SA check to see if the connection establishment
messages have been fragmented, select "Fragment Check:".
 Set the "Connection Timeout:" in seconds. This is the amount of time
the Tofino SA will wait for an OPC connection after a port has been
requested.
 To have the Tofino SA wait indefinitely, select the "Never Timeout"
check box.
Rather than performing a DCOM object request each time they
connect to an object, some OPC clients perform the object request
solely on the first connection. They then re-use the same TCP port
number without performing a new object request on subsequent
connections to that OPC data object. Use the "Never Timeout" option
so that the firewall doesn‘t drop subsequent connections.
 Click the Save icon in the toolbar.
NHA15729 - 10/2014
81
Firewall Rules
7.2.3
7.2 Deep Packet Inspection Firewalls
Creating an EtherNet/IP Enforcer Rule
The EtherNet/IP Enforcer LSM is an advanced Deep Packet Inspection
firewall for the EtherNet/IP protocol. It is specifically designed to increase the
level of security on CIP explicit messaging network traffic. It allows you to
filter traffic based on specific CIP objects or services and the validity of the
EtherNet/IP messages.
The EtherNet/IP Enforcer can also be configured to inspect PCCC messages
that are encapsulated within CIP objects. This is useful when securing
communications to PLC-5 or MicroLogix controllers.
To perform EtherNet/IP Deep Packet Inspection on CIP and CPPP
messages, select the Enforcer option on the applicable firewall rules.
Note: To create and apply an EtherNet/IP Enforcer rule, the EtherNet/IP
Enforcer LSM needs to be licensed for activation in your Tofino SA. Without
a license for the LSM, you can create trial Enforcer rules in the ConneXium
Tofino Configurator; however, you will be unable to load them into the Tofino
SA.
Some control products, such as older Rockwell PLCs, may be configured to
use protocols like CSP4 (rather than EtherNet/IP) for Ethernet-based
communications. You can enable these messages to pass through the
firewall without Deep Packet Inspection.
The EtherNet/IP Enforcer helps secure CIP Class 3 explicit messages.
Enforcer firewall rules do not process CIP implicit messages such as I/O
communications. If you are setting up a firewall that filters implicit messages,
you can either pass this type of traffic through the firewall according to
stateful layer 3 and 4 filters or block it.
82
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
CAUTION
LOSS OF COMMUNICATION OR PROCESS VIEW
 To create firewall rules to manage implicit messages, select EtherNet/IP
(CIP) Implicit Msg.
 To allow PCCC traffic embedded in CIP EtherNet/IP to pass through the
firewall, select the EtherNet/IP (CIP) Explicit Msg protocol on the
applicable firewall rules and then select the Allow Embedded PCCC
option on the Enforcer tab.
 To allow PCCC traffic embedded in the CSPv4 protocol to pass through
the firewall, select the Rockwell CSP protocol on the applicable firewall
rules.
 Before deploying the firewall, test your settings by sending both implicit
and explicit messages, and verify that your configuration is correct.
Failure to follow these instructions can result in injury or equipment
damage.
 Open the General settings page for the Tofino SA you are configuring.
Check that the "Firewall LSM" and "EtherNet/IP Enforcer LSM" options
are selected in the Loadable Security Modules list.
 Open the Firewall settings page and click "Create Rule".
 Work through the New Firewall Rule Wizard to define a firewall rule with
the following settings:
 On the Rule Type page, select "Standard rule". Click "Next".
 On the Assets page, create a firewall rule between two assets. Set the
direction so that it is FROM the EtherNet/IP Client TO the EtherNet/IP
Server. The Bidirectional option is not an appropriate selection for the
EtherNet/IP Enforcer LSM. Click "Next".
 On the Protocol page, expand the "Common Industrial" folder and
select "EtherNet/IP (CIP) Explicit Msg". In the Permission section,
select "Enforcer".
NHA15729 - 10/2014
83
Firewall Rules
7.2 Deep Packet Inspection Firewalls
Note: If you select "Allow" or "Deny", the Tofino SA will allow or block the
EtherNet/IP traffic between the two assets accordingly without reference
to the EtherNet/IP Enforcer.
 Click "Finish". The ConneXium Tofino Configurator creates the Enforcer
firewall rule and adds it to the table. Configure the firewall settings in the
Rule Details section at the bottom of the page.
 Select the "General" tab. Set rate and burst limits as required.
 Select the "Enforcer" tab and configure the rule as follows.
 Select the appropriate option for CIP Services. The options are:
 Read-Only Data: CIP services that are data read commands are
permitted.
 Read/Write Data: CIP services that are data read or data write
commands are permitted.
84
NHA15729 - 10/2014
Firewall Rules
7.2 Deep Packet Inspection Firewalls
 Any: All CIP services are permitted.
 Advanced: Opens a new window where you add CIP objects and
services. Select the Add CIP Filter button (+) to open the Add CIP
Object window. From the drop-down list, select a CIP object and then
select the CIP services codes that you want to allow. Add a comment,
if desired. You can add as many CIP objects as needed to one firewall
rule.
To include specific types of CIP Services, select "Also Include CIP
Services" and then select the appropriate option: "Read-Only Data" or
"Read/Write Data".
Click "OK".
 To have the Tofino SA inspect PCCC messages that are embedded
within EtherNet/IP, select "Allow Embedded PCCC". This is useful
when securing network traffic to PLC-5 and MicroLogix controllers.
Note: You can use the Tofino SA in test mode to determine if an option is
suitable for your application.
CAUTION
LOSS OF COMMUNICATION OR PROCESS VIEW
Select the EtherNet/IP Debug option only when you are using the product
in a test environment.
Failure to follow these instructions can result in injury or equipment
damage.
NHA15729 - 10/2014
85
Firewall Rules
7.2 Deep Packet Inspection Firewalls
 To have the Tofino SA validate that the EtherNet/IP command layer
adheres to the ODVA specification, select "Sanity Check:". Validation
includes length checking proper protocol version, option field values,
and correct IP address usage. If the "Allow Embedded PCCC" option
has been selected, the PCCC messages will also be inspected to
determine if they adhere to the PCCC protocol definitions.
 To have the Tofino SA send a TCP reset packet to both EtherNet/IP
devices when it blocks a message, select "Reset:". This can keep a
session from locking up on certain EtherNet/IP products.
 To have the Tofino SA include an ASCII text string as a payload in a
TCP reset packet, select "Debug:". The string will explain the reason
why the message was dropped by the Tofino SA. To view the text,
capture network traffic with a tool such as Wireshark. Use this option
solely during testing. Clear this check box during regular operations as
it may expose security details to potential attackers.
 Click the Save icon in the toolbar.
86
NHA15729 - 10/2014
Firewall Rules
7.3 Editing Firewall Rules
7.3 Editing Firewall Rules
The Rule Table on the Firewall page displays the firewall rules created for the
selected Tofino SA. You can make changes directly on this page: in the table
and in the Rule Details section. You can also change the order in which the
rules are evaluated.
 In the Project Explorer view, expand the Tofino SA you want to work with
and click "Firewall". The Firewall page displays the rules created for this
Tofino SA.
 ! : The check box in this column indicates if the rule is active (selected).
When the check box is not selected, the rule will not be loaded into the
firewall. This allows you to create rules in advance to activate later. It also
allows you to quickly deactivate rules for testing without having to delete
them.
 Asset (first of two): An asset or address that the rule applies to. Certain
protocols require a specific address type or a predefined address.
 Interface: The Tofino SA interface where the first asset or address is
found.
 Direction: The direction a session is initiated. There are three possible
options: right, left, and bidirectional.
 Asset (second of two): An asset or address that the rule applies to.
Certain protocols require a specific address type or a predefined address.
NHA15729 - 10/2014
87
Firewall Rules
7.3 Editing Firewall Rules
 Interface: The Tofino SA interface where the second asset or address is
found.
 Protocol: The protocol defined when the firewall rule was created. The
Protocols folder contains a list of available protocols.
 Permission: What the firewall does with a packet based on the defined
rules. There are three options:
– Allow: The Tofino SA will allow traffic matching the rule to pass.
– Deny: The Tofino SA will stop traffic matching the rule from passing.
– Enforcer: The Tofino SA will further inspect and filter the traffic using
Deep Packet Inspection. This option is available for protocols that
have Enforcer LSMs installed.
 Type: The type selected when the firewall was created: Standard or
Special.
– Standard: These rules are designed to allow or deny specific protocols
passing through the firewall. They allow the user to set the source,
destination, direction, and permission for traffic of a particular protocol
type.
– Special: These rules are highly complex and go beyond allowing and
denying traffic. For example, a Special Rule could be used to block a
subset of a particular type of traffic. The available Special Rules can
be viewed in the Special Rules folder.
 Log: A check box indicating if logging is enabled for the rule.
Note: By default, the Tofino SA will log denied packets that do not match
any of the rules in the firewall table. Similarly, if you enable logging on a
rule (the permission may be Allow or Deny), packets matching the rule will
be logged. Conversely, if logging is disabled on a rule, no log events will
be created for packets matching this rule. A common use for this option is
to help stop nuisance alarms from blocking broadcast traffic.
 Details: A short form summary of special firewall rule details. The
information in this column comes from the Rule Details section.
 Description: A text field where the controls engineer can add a comment
about the rule.
 Click the cell you want to edit and make the necessary change in the
table. Depending on the cell selected, you will be able to do the following:
 Change the state of a check box
 Select an entry in a list
 Open a dialog box and select from a list of appropriate values
 Enter text
88
NHA15729 - 10/2014
Firewall Rules
7.3 Editing Firewall Rules
 On the General and Enforcer tabs in the Rule Details section, update the
settings as necessary for the currently selected rule in the table.
 Reorder the rules as necessary. Packets will be inspected sequentially
beginning at the top of the table. Select a rule and position it by clicking
"Move Up" and "Move Down" in the toolbar.
 Check the title bar above the rule table for messages. You will be
prompted if a rule is incorrect or if an additional rule is required.
 Click the Save icon in the toolbar.
NHA15729 - 10/2014
89
Firewall Rules
7.4 Using Tofino Test Mode to
Validate Firewall Rules
7.4 Using Tofino Test Mode to
Validate Firewall Rules
You can operate the Tofino SA in two modes: Test and Operational.
Running in Test mode allows the Tofino SA to fully process network
messages and generate event logs without actually blocking network traffic.
This is a non-invasive way to check the impact that the firewall rules will have
when put in Operational mode. Use Test mode to confirm that the Tofino SA
is configured correctly.
 In the Project Explorer view, expand the Tofino SA you want to work with
and click "General". The main view displays the general settings for the
selected Tofino SA.
 In the Status section, select "Test" as the mode.
 On the Firewall page create firewall rules based on the known network
traffic patterns and desired security.
 Load the resulting configuration into the Tofino SA (see “Applying and
Verifying Configurations”).
 Let the Tofino SA process network traffic for a period of time (typically 24
hours or longer).
 Using a syslog server, or the USB Save feature and log viewing software
(see “Retrieving Log Files”), review the log messages generated by the
Tofino SA to determine if there are instances of either of the following:
 Packets marked to be dropped that you think should be allowed
 Packets marked to be dropped that you think should be dropped
without being logged (i.e., nuisance alarms)
 If either of these are noted, adjust the firewall rules accordingly and repeat
this task.
 Once no unwanted log messages are being generated, return to the
General settings page, set the mode to "Operational", and load the final
configuration into the Tofino SA.
90
NHA15729 - 10/2014
Event Logging
8 Event Logging
The Event Logger LSM is a security module used to provide external alarm
and event logging for the Tofino SA to a syslog server. It offers two methods
for saving event logs:
 Via the syslog protocol to forward Tofino SA exception events to a remote
syslog server
 Saving exception events to the long-term memory in the Tofino SA for
offloading via USB storage device
NHA15729 - 10/2014
91
Event Logging
8.1 Setting up the Event Logger
8.1 Setting up the Event Logger
Configure the Event Logger page to specify the type of events you want to
collect in the log files and how you want to store the files.
Note: To activate event logging, the Event Logger LSM needs to be licensed
for activation in your Tofino SA. Without a license for the LSM, you can create
a trial logging configuration in the ConneXium Tofino Configurator; however,
you will be unable to load them into the Tofino SA.
 Open the General settings page for the Tofino SA you are configuring.
Confirm that the "Event Logger LSM" is selected in the Loadable Security
Modules list.
 In the Project Explorer view, click "Event Logger" beneath the Tofino SA
you are working with.
92
NHA15729 - 10/2014
Event Logging
8.1 Setting up the Event Logger
 Complete the fields in the Event Logger Settings section to specify the
information to be captured and where the files should be stored.
 Syslog Server IP Address: This is the address of the syslog server
where you would like your logs sent. To disable the remote syslog
feature, set this field to zeros.
 Default Gateway: This is the IP address of the forwarding router on the
network where the Tofino SA is located. This is required when the
syslog server is on a different network than the Tofino SA. If the
syslog feature is not being used, or if the Tofino SA and the syslog
server are on the same subnet, set this field to zeros.
 Destination Port: This is the UDP port number your syslog server is
listening for log messages on (usually port 514). To disable the syslog
feature, leave this field blank.
 Lowest Priority Logged: This is the cut-off as to the lowest logging level
you would like the Tofino SA to record. Setting the priority to 0 would
result in just the emergency events being recorded while setting the
priority to 7 would result in every detected event with smaller or equal
priority being recorded. The default setting is 5.
The following table shows the options available in the Lowest Priority Logged
list.
NHA15729 - 10/2014
93
Event Logging
8.1 Setting up the Event Logger
0
1
Lowest Priority Message to be Logged
Emergency: system is unusable
Alert: action must be taken immediately
2
Critical: critical conditions
3
Error: error conditions
4
5
6
Warning: warning conditions
Notice: normal but significant condition
Informational: informational messages
7
Debug: debug-level messages
Table 1:
Explanation
Not used by the Tofino SA.
A physical change to the system occurred,
such as a detected power supply failure or
interface disconnection. This can also
indicate the detected loss of a process on the
firewall.
An event occurred that could modify the
operation of the firewall, such as a new
configuration being loaded.
The firewall and/or an Enforcer dropped a
network packet.
Not used by the Tofino SA.
Not used by the Tofino SA.
The Event Logger LSM generated a periodic
event message.
Not used by the Tofino SA.
Lowest Priority Message to be Logged setting options for the Event
Logger
The following table shows the priority settings for a selection of event logs
generated by the Tofino SA.
Event Type
Network Interface Up/Down
Power Failure or Power Recovery
License Eypiration
TC Configuration Load Attempted
Tofino Mode Change
Firewall Packet Allow/Deny
Modbus Enforcer Allow/Deny
EtherNet/IP Enforcer Allow/Deny
OPC Enforcer Allow/Deny
Event Log Periodic Message
Table 2:
94
Syslog Level
1
1
1
2
2
3
3
3
3
6
Event Log Priority Settings
NHA15729 - 10/2014
Event Logging
8.1 Setting up the Event Logger
To record when packets are denied by the Firewall and Enforcer modules,
set the "Lowest Priority Logged:" value to 3 or higher.
 Complete the fields in the Syslog Address section to indicate the address
from which syslog messages will originate.
 Tofino SA IP Address: This address is used exclusively for syslog
reporting. The Tofino SA will not respond to traffic directed to this
address.
 Tofino SA Subnet Mask: The subnet mask is used by the Tofino SA in
conjunction with the IP address to identify if the syslog server is on the
same subnet as the Tofino SA. A subnet mask is a 32-bit number that
is notated by using four numbers from 0 to 255, separated by periods.
Typically subnet masks use either 255 or 0 for each number (such as
255.255.255.0) but other numbers can appear in special cases.
 Click the Save icon in the toolbar.
Note: Keep in mind that the Tofino SA does not require an IP address to
communicate to a remote syslog server. The Tofino SA uses special
stealth technology to communicate without having an IP address. The
syslog server will see the messages coming from the address you entered
as the Tofino SA IP Address.
NHA15729 - 10/2014
95
Event Logging
8.2 Retrieving Log Files
8.2 Retrieving Log Files
When the Event Logger is configured to save to the Tofino SA’s long-term
memory, you use a USB storage device to retrieve the log files.
 Power on the Tofino SA for at least one minute.
 Insert the USB storage device into the USB port.
 Press the Save Load Reset button once. The Save/Load LED will
illuminate in green. After a few seconds the Mode, Save/Load, and Reset
LEDs will flash in green in a left to right sequence to indicate the USB
Save is in progress.
 When the flashing sequence stops, remove the USB storage device.
If the save was successful the Tofino SA LEDs will revert to the state they
were in prior to the save action.
Note: For more details on the USB Save function, see “Transferring Data
from Your Tofino SA via USB” on page 106.
 Insert the USB device into a computer.
 Open the storage device to locate and view the file containing the logs.
The logs will be stored in eventlogger_<tofino id>.zip, which is
compressed.
When an Event Logger file reaches 4 MB in size, it is rotated. The rotated
files are numbered and appear as eventlogger_<tofino id>.X.zip, where X
is the number of the file. This number increases by 1 each time a new
rotated file is created; up to 20 rotated files are saved. Upon reaching
eventlogger_<tofino id>.20.zip, the first rotated file (eventlogger_<tofino
id>.1.zip) is removed and eventlogger_<tofino id>.21.zip is created.
 Extract the files using an extraction tool, such as 7-zip.
 Open the log files using a syslog viewer or WordPad. The file is more
clearly formatted in WordPad.
Following is an example of a log file opened with WordPad.
96
NHA15729 - 10/2014
Applying and Verifying Configurations
9 Applying and Verifying
Configurations
Once your Tofino SAs are configured in the ConneXium Tofino Configurator,
these configurations need to be transferred to the Tofino SAs in the field. This
is a two step process:
 Transfer the configuration to the Tofino SAs
 Verify the configuration
The ConneXium Tofino Configurator can communicate with the Tofino SAs
in the field in two ways:
 Over the network
 Via encrypted files on a USB storage device
To communicate with a Tofino SA over the network, select either "Network
Only" or "Both USB and Network" as the communication setting on the
General page.
NHA15729 - 10/2014
97
Applying and Verifying Configurations
9.1 Applying a Tofino SA
Configuration
9.1 Applying a Tofino SA
Configuration
To configure a Tofino SA in the field, you apply the configuration settings in
the ConneXium Tofino Configurator to the matching Tofino SA device. The
Apply action builds an encrypted configuration that you transfer to the Tofino
SA in one of two ways: over the network or via encrypted files on a USB
storage device.
When you set up a Tofino SA to communicate over the network, you apply
the configuration directly to the Tofino SA in the field. When you set up a
Tofino SA to communicate via USB, you apply the configuration to a USB
storage device and then transfer the configuration manually to the matching
Tofino SA.
Regardless of how you transfer the configuration, you will receive a set of
files back from the Tofino SA that you can verify in the ConneXium Tofino
Configurator.
You can apply a configuration if the following conditions are met:
 The Tofino SA configuration is valid.
 You have write access to the project file.
 Any changes to the project have been saved.
The write access requirement helps to keep users without sufficient
privileges from modifying Tofino SAs in the field.
The final requirement reduces the possibility that the configurations being
transferred to the Tofino SAs in the field are different from the configurations
in the project file.
 To list the Tofino SAs in this project, click "General" in the Project Explorer
view.
 Select the Tofino SAs that you want to create configurations for. Use
SHIFT+click to select a range of devices; use CTRL+click to select
multiple devices out of sequence.
Selecting a folder also selects the Tofino SAs within that folder.
You can create multiple Tofino SA configurations at once. If transferring
configurations via USB, you can store them on a single USB device.
98
NHA15729 - 10/2014
Applying and Verifying Configurations
9.1 Applying a Tofino SA
Configuration
 Click "Apply" in the toolbar.
The Apply Configuration dialog box opens.
 Confirm that the Tofino SAs that you want to configure are selected in the
list.
 Select the method you want to use to transfer the configuration to the
Tofino SA: "Network" or "USB Drive".
Note: You may be unable to change the transport method specified in this
dialog box.The Communications section on the General settings page
determines how the ConneXium Tofino Configurator can communicate
with the Tofino SA in the field.
 When the transport method is set to "USB Drive", insert a USB device and
click "Browse...". Select the location you want to save the configuration to.
Click the "Use as default location" check box to save the selected location
as the default for the next time you perform this action.
NHA15729 - 10/2014
99
Applying and Verifying Configurations
9.1 Applying a Tofino SA
Configuration
Note: You can save the configuration directly to the USB device, or you
can save it to a location on your computer and transfer it to the USB
device at another time. The configuration file is saved as a .tcf file.
 Click "Finish".
If you transferred the configuration data over the network, the ConneXium
Tofino Configurator displays a results page indicating whether or not the
transfer was successful. Click "OK" to close this dialog box. When the
transfer is successful, verification files for each Tofino SA configured will
be returned to the ConneXium Tofino Configurator.
If you transferred the configuration data to a USB device, you need to
manually load that data into the Tofino SA. Proceed to the task “Loading
Your Tofino SA via USB”.
Note: The Tofino SA will pass network traffic freely during the initial
configuration or when its configuration is being updated. Firewall rules take
effect after completion of the initial configuration or update of the Tofino SA
so that network operations are not affected before the full rule set can be
applied. A typical configuration transfer will finish in approximately
30 seconds.
100
NHA15729 - 10/2014
Applying and Verifying Configurations
9.1.1
9.1 Applying a Tofino SA
Configuration
Loading Your Tofino SA via USB
WARNING
UNINTENDED EQUIPMENT OPERATION
Follow these configuration loading steps carefully.
 Power on the Tofino SA for at least one minute.
 Insert the USB storage device containing the prepared files into the USB
port.
 Press the Save Load Reset button twice. The Save/Load LED will
illuminate in yellow. After a few seconds the Mode, Save/Load, and
Reset LEDs will flash in yellow in a right to left sequence to indicate the
USB Load is in progress.
 When the flashing sequence stops remove the USB storage device.
Failure to follow these instructions can result in death, serious injury,
or equipment damage.
The Save Load Reset button on the Tofino SA provides three functions
depending on the number of times it is pressed.
 Once: Saves diagnostics files and log files to a USB storage device.
 Twice: Transfers configuration files from a USB storage device.
 Three times: Performs a factory reset and returns the Tofino SA back to
its default state as shipped from the factory.
You use the USB Load function to transfer configuration files generated by
the ConneXium Tofino Configurator and firmware updates to a Tofino SA in
the field. This is the second part of a two-step process. Before you load the
Tofino SA, transfer the desired data to the USB storage device. See the
appropriate topic to perform this first step:
 “Applying a Tofino SA Configuration”
 “Upgrading Your Tofino SA”
NHA15729 - 10/2014
101
Applying and Verifying Configurations
9.1 Applying a Tofino SA
Configuration
Note: The following version 2.0 USB storage devices are known to work:
Kingston Data Traveler, SanDisk Cruzer, Sony Microvault, Lexar, and
Schneider TCSEAM0100. Other brands and models may work, but have not
been tested. Only USB devices formatted as FAT or FAT32 are compatible.
The Tofino SA Fault LED will flash twice when it detects an invalid storage
device.
If the load was successful, the Tofino SA‘s Fault LED will be off.
Following a successful USB Load function, five or more files should be stored
on your USB storage device for each Tofino SA loaded (<tofino id> is
replaced with the actual ID of the Tofino SA):
 <tofino id>_tc_data
Verification data indicating if the configuration was successful or not (see
“Verifying a Tofino SA Configuration”)
 <tofino id>_diagnostics.txt
Diagnostics information on the Tofino SA (see “Tofino SA Diagnostics” on
page 150)
 eventlogger_<tofino id>.zip and eventlogger_<tofino id>.X.zip
Event logs from the Tofino SA in a compressed file (see “Setting up the
Event Logger” on page 92)
 <tofino id>_kernel_evt.enc
Encrypted kernel diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_diagnostics.enc
Encrypted module diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_configuration.txt
Configuration data listing the LSMs licensed for this Tofino SA
Note: The Tofino SA will pass network traffic freely during the initial
configuration or when its configuration is being updated. Firewall rules take
effect after completion of the initial configuration or update of the Tofino SA
so that network operations are not affected before the full rule set can be
applied. A typical configuration transfer will finish in approximately 30
seconds.
102
NHA15729 - 10/2014
Applying and Verifying Configurations
9.2 Verifying a Tofino SA
Configuration
9.2 Verifying a Tofino SA
Configuration
To record and verify the configuration of one or more Tofino SAs in the field,
use the Verify action. This retrieves the configuration transfer reports sent
over the network or from a USB storage device.
When you configure the Tofino SAs over the network, the verification files are
automatically returned to the ConneXium Tofino Configurator. When you
transfer the configurations or perform firmware updates via USB, the
verification files reside on the USB storage device that was used to transfer
the configuration or upgrade the Tofino SAs.
 To list the Tofino SAs in this project, click "Tofino SAs" in the Project
Explorer view.
 Select the Tofino SAs you want to verify. Use SHIFT+click to select a
range of devices; use CTRL+click to select multiple devices out of
sequence.
 Click "Verify" in the toolbar.
The Verify Loaded Configuration dialog box opens.
NHA15729 - 10/2014
103
Applying and Verifying Configurations
9.2 Verifying a Tofino SA
Configuration
 Confirm that the Tofino SAs you want to verify are selected in the list.
 Select the method you want to use to transfer the configuration to the
Tofino SA: "Network" or "USB Drive".
Note: You may be unable to change the transport method specified in this
dialog box.The Communications section on the General settings page
determines how the ConneXium Tofino Configurator can communicate
with the Tofino SA in the field.
 When the transport method is set to "USB Drive", insert into your
computer the USB storage device that you used to load the configuration
onto the Tofino SA in the field. Click "Browse..." and select the USB drive
location.
Click the "Use as default location" check box to save the selected location
as the default for the next time you perform this action.
 Click "Finish".
The verification data will be displayed and logged by the ConneXium
Tofino Configurator.
104
NHA15729 - 10/2014
Applying and Verifying Configurations
9.2 Verifying a Tofino SA
Configuration
The Verified Configuration Revision, Hardware Type, and Firmware
Version for the verified Tofino SAs will be updated in the project file. You
can view the verification information on the General settings page for
each Tofino SA.
NHA15729 - 10/2014
105
Applying and Verifying Configurations
9.3 Transferring Data from Your
Tofino SA via USB
9.3 Transferring Data from Your
Tofino SA via USB
The Save Load Reset button on the Tofino SA provides three functions
depending on the number of times it is pressed.
 Once: Saves diagnostics files and log files to a USB storage device.
 Twice: Transfers configuration files from a USB storage device.
 Three times: Performs a factory reset and returns the Tofino SA back to
its default state as shipped from the factory.
You use the USB Save function (pressing the button once) to copy
diagnostics and validation files from the Tofino SA to the USB storage device.
You can then validate these files using the Verify function in the ConneXium
Tofino Configurator or you can send them to technical support for analysis.
Note: Performing a USB Load (see “Loading Your Tofino SA via USB”)
automatically executes a USB Save in order to record the results of the
transfer and the status of the Tofino SA after the transfer is finished. If you
transferred configuration files via USB, you will not need to perform a USB
Save to retrieve the files required for verification. They will already be on the
USB storage device.
 Power on the Tofino SA for at least one minute.
 Insert the USB storage device into the USB port.
 Press the Save Load Reset button once. The Save/Load LED will
illuminate in green. After a few seconds the Mode, Save/Load, and Reset
LEDs will flash in green in a left to right sequence to indicate the USB
Save is in progress.
 When the flashing sequence stops, remove the USB storage device.
If the save was successful the Tofino SA LEDs will revert to the state they
were in prior to the saving action.
106
NHA15729 - 10/2014
Applying and Verifying Configurations
9.3 Transferring Data from Your
Tofino SA via USB
Note: The following version 2.0 USB storage devices are known to work:
Kingston Data Traveler, SanDisk Cruzer, Sony Microvault, Lexar, and
Schneider TCSEAM0100. Other brands and models may work, but have not
been tested. Only USB devices formatted as FAT or FAT32 are compatible.
The Tofino SA Fault LED will flash twice when it detects an invalid storage
device.
Following a successful USB Save function, five or more files should be stored
on your USB storage device for the Tofino SA (<tofino id> is replaced with
the actual ID of the Tofino SA):
 <tofino id>_tc_data
Verification data indicating if the configuration was successful or not
(see “Verifying a Tofino SA Configuration” on page 103)
 <tofino id>_diagnostics.txt
Diagnostics information on the Tofino SA (see “Tofino SA Diagnostics”
on page 150)
 eventlogger_<tofino id>.zip and eventlogger_<tofino id>.X.zip
Event logs from the Tofino SA in a compressed file (see “Setting up the
Event Logger” on page 92)
 <tofino id>_kernel_evt.enc
Encrypted kernel diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_diagnostics.enc
Encrypted module diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_configuration.txt
Configuration data listing the LSMs licensed for this Tofino SA
NHA15729 - 10/2014
107
Applying and Verifying Configurations
108
9.3 Transferring Data from Your
Tofino SA via USB
NHA15729 - 10/2014
Advanced Topic: Protocols
10 Advanced Topic: Protocols
In the ConneXium Tofino Configurator, protocols define the particular
services that are communicated between devices on the network. For
example, the use of web traffic on a network would use the HyperText
Transport Protocol (HTTP) for communications between a web server and a
web client. Similarly, an HMI might use the Modbus/TCP protocol to
communicate to a PLC.
The ConneXium Tofino Configurator comes with a number of predefined
protocols that are common to many industrial systems. However, in special
cases you may want to create new protocols for specific types of equipment
or situations.
By selecting a protocol in the Project Explorer view, you can do the following:
 Create a new protocol
 Create a folder
 View and edit the protocol's details
 Delete a protocol
The factory defined protocols cannot be edited, cut, or deleted.
NHA15729 - 10/2014
109
Advanced Topic: Protocols
10.1 Creating a Protocol
10.1 Creating a Protocol
Create new protocols for specific types of equipment or situations where one
of the predefined protocols does not meet your needs.
In addition to creating a protocol manually, you can copy and paste an
existing protocol to create a new one. However, this does not run the wizard.
To make the protocol unique, you need to edit the details manually.
When creating your own protocols, you may want to organize them in folders.
Use the New Folder feature in the toolbar to create the folder hierarchy.
 In the Project Explorer view, expand "Protocols" and click the folder where
you want the new protocol to reside.
Click "Protocols" to create the protocol at the top level.
 Click "New Protocol" in the toolbar.
Alternately, open the New menu in the toolbar and click "Protocol".
The New Protocol wizard opens.
 Enter a name and description for the protocol, and select the type. Click
"Next".
On the second page of the wizard you enter specific details for the
protocol. This page varies depending on the type of protocol selected.
110
NHA15729 - 10/2014
Advanced Topic: Protocols
10.1 Creating a Protocol
 Complete the fields as appropriate for your protocol.
For a detailed description of these fields, see “Editing Protocols” on
page 112.
 Click "Finish".
The new protocol appears in the Project Explorer view.
NHA15729 - 10/2014
111
Advanced Topic: Protocols
10.2 Editing Protocols
10.2 Editing Protocols
Selecting a protocol in the Project Explorer view allows you to view and edit
its current settings. This includes general information and specific
parameters. The information displayed in the Protocol Details view varies
depending on the type of protocol selected.
The factory defined protocols cannot be edited, cut, or deleted.
 In the Project Explorer view, click the protocol you want to edit.
 Edit the protocol settings as necessary. The available fields may include:
 Protocol Name: A name or identifier that uniquely identifies the
protocol. Remember that each protocol needs to have a unique name
to avoid confusion.
 Description: A text field solely for reference. This can be used to
describe the function of this protocol.
 Protocol Type: The general classification of this protocol. The
classification determines the fields available for input (UDP, TCP, IP
or Ethernet).
 Ports: The ports used by this protocol. Use commas to separate
individual port numbers and dashes to separate a range of port
numbers. For example, if the protocol uses the TCP ports 5000
through 5004, they can be entered as either 5000, 5001, 5002, 5003,
5004 or 5000-5004. Exclusively use the numbers 0 through 9 and
commas and dashes.
 IP Protocol: The IP protocol number in hexadecimal format.
 EtherType: The Ethernet type number in hexadecimal format. For
more information see:
http://www.iana.org/assignments/ethernet-numbers/ethernetnumbers.xml
 Click the Save icon in the toolbar.
Following are three typical protocols of different types.
112
NHA15729 - 10/2014
Advanced Topic: Protocols
10.2 Editing Protocols
 UDP/TCP Protocol
 IP Protocol
NHA15729 - 10/2014
113
Advanced Topic: Protocols
10.2 Editing Protocols
 Ethernet Protocol
114
NHA15729 - 10/2014
Advanced Topic: Protocols
10.3 Deleting a Protocol
10.3 Deleting a Protocol
Delete a protocol if you no longer need it in the current project.
The factory defined protocols cannot be edited, cut, or deleted.
 In the Project Explorer view, click the protocol you want to delete.
 View the details to verify that this is the protocol you want to delete.
 Click the Delete icon in the toolbar.
If the selected protocol is referenced in a firewall rule, you will receive a
message with two options. You can choose to cancel the deletion, or
delete the protocol and fix the resulting errors later.
When you choose to delete the protocol, a message prompts you to
confirm the action. Click "OK" to proceed. Canceling the deletion at this
prompt will not reinstate the protocol in any firewall rules or assets from
which it was removed.
NHA15729 - 10/2014
115
Advanced Topic: Protocols
116
10.3 Deleting a Protocol
NHA15729 - 10/2014
Advanced Topic: Importing Templates
and Security Profiles
11 Advanced Topic: Importing
Templates and Security
Profiles
The ConneXium Tofino Configurator allows you to import predefined objects
that can be used as building blocks for your security design. The following
types of objects can be imported:
 Asset templates
 Protocols
 Special rules
 Security profiles
Importing asset templates, protocols, or special rules allows you to update
existing definitions or add new ones to your project. Importing new versions
of asset templates, protocols, or special rules will not automatically update
the rules in your firewalls.
Security profiles are predefined combinations of asset templates, special
rules, and protocol definitions, bundled into a single security profile file (.tsp).
They allow you to import the related objects needed to help secure PLCs,
DCS, and other devices against published vulnerabilities as a single file.
Note: If the asset templates or the security profiles in an imported file
reference protocols or special rules, these will be imported during the import
operation.
To import a predefined object follow these steps:
 Click the Import icon in the toolbar.
 Select the type of object you would like to import. Click "Next".
 Click "Browse...". Locate and select the object file.
 Click "Finish".
NHA15729 - 10/2014
117
Advanced Topic: Importing Templates
and Security Profiles
118
NHA15729 - 10/2014
Advanced Topic: How Automatic Rule
Generation Works
12 Advanced Topic: How
Automatic Rule Generation
Works
The ConneXium Tofino Configurator offers the ability to automatically
generate rules based on the rule profiles associated with a given asset. For
example, if a workstation uses the protocol HTTP as a client (i.e., it initiates
the communications to an HTTP server), the New Firewall Rule Wizard can
use this information to automatically create HTTP rules for the asset to allow
it to talk to the server.
When the option to automatically generate rules is selected, the ConneXium
Tofino Configurator will perform a series of checks based on the rule profiles
of the assets selected earlier in the wizard:
 If one of the assets has rule profiles and the other has no rule profiles,
then the rule profiles from the asset with rule profiles will be used to create
rules.
 If both of the assets have rule profiles, the automatic rule generator will
create one rule for every protocol the assets have in common. If the
assets have no protocols in common, a message will display and no rules
will be created. Similarly, no rules will be created if the assets have a
protocol in common, but are either both clients or both servers.
 Finally, since two assets may have different rule profile settings for the
same protocol, the ConneXium Tofino Configurator will use a series of
priorities to determine what the final rule should be. The following table
shows how these conflicts are resolved.
If a field is required to match and the rule profiles of the two assets do not
match on that field, then no rule will be created. If the fields do match, then
the value of that field will be used for the new rule to be created.
If a field is indicated as not having to match, then the priority describes how
the value of the field in the resulting firewall rule is determined. For example,
if the assets have different values for the Rate Limit, then the lowest rate limit
will have priority and will be used in the resulting firewall rule. Alternatively if
the two rule profiles both have comments that are different, the automatic rule
generator will combine the comments in the resulting rule.
NHA15729 - 10/2014
119
Advanced Topic: How Automatic Rule
Generation Works
The following table shows the correlation between rule profiles and the
resulting rules.
Field
Special Rule Type
Assets
Protocol
Direction
Permission
Log
Rate Limit
Burst Limit
Enforcer Details
Description
Are rule
If values do not Notes
profile
match, priority is
values
given to:
required
to match?
Yes
Special Rules that lock assets cannot
be used for rule profiles.
N/A
Yes
See Notes
Rule direction is decided based on the
relationship of Server and Client
settings for both profiles.
See Notes
If one profile is set to Allow and the
other is set to Enforcer, Enforcer is the
resulting permission.
No
Enabled
No
Lowest
If one asset has no Rate Limit defined,
the Rate Limit of the other asset is
used.
No
Lowest
If one asset has no Burst Limit defined,
the Burst Limit of the other asset is
used.
No
Refer to Modbus If one profile has an Enforcer detail
and EtherNet/IP and the other does not, the existing
sections in this
Enforcer detail will be assigned to the
table
rule.
No
Both
The rule profile descriptions from both
assets are combined.
Modbus
Function Codes
No
Unit ID
Yes
Sanity Check
State Check
Exception
Reset
No
No
No
No
120
The most
Read Only (most restrictive) <
restrictive group Read/Write < Programming/OFS <
takes precedence Advanced < Any (least restrictive).
 If both assets have Advanced
Function Codes, see the Modbus
Advanced Filters section in this
table.
Unit IDs common to both assets will be
used.
Enabled
Enabled
Enabled
Enabled
NHA15729 - 10/2014
Advanced Topic: How Automatic Rule
Generation Works
Field
Are rule
If values do not Notes
profile
match, priority is
values
given to:
required
to match?
Modbus Advanced
Filters
Function Code
Yes
Range
Yes
Comment
No
Both
EtherNet/IP
CIP Services
No
Read Only Data (most restrictive) <
The most
restrictive group Read/Write Data < Advanced < Any
takes precedence (least restrictive)
 If both assets have Advanced CIP
Services, see the EtherNet/IP
Advanced Filters section in this
table.
Enabled
Enabled
Enabled
Sanity Check
Reset
Debug
EtherNet/IP
Advanced Filters
Object
Yes
Service
Yes
Comment
No
Both
OPC Classic
Sanity Check
Fragment Check
Connection Timeout
No
No
No
Enabled
Enabled
Lowest
NHA15729 - 10/2014
No
No
No
Function Codes common to both
assets will be used.
Ranges for Function Codes common
to both assets will be used.
The comments from both assets are
combined.
Objects common to both assets will be
used.
Services common to both assets will
be used.
The comments from both assets are
combined.
A checked Never Timeout is
considered the highest connection
timeout setting.
121
Advanced Topic: How Automatic Rule
Generation Works
122
NHA15729 - 10/2014
Advanced Topic: ConneXium Tofino
Configurator Settings
13 Advanced Topic: ConneXium
Tofino Configurator Settings
You can update and customize the following aspects of your ConneXium
Tofino Configurator:
 User permissions
See “Managing User Logging, Access, and Privileges” on page 124.
 Program settings and preferences
See “Customizing Program Settings and Preferences” on page 129.
NHA15729 - 10/2014
123
Advanced Topic: ConneXium Tofino 13.1 Managing User Logging, Access,
Configurator Settings
and Privileges
13.1 Managing User Logging,
Access, and Privileges
The ConneXium Tofino Configurator is designed to give users the flexibility
to tailor the security controls on the ConneXium Tofino Configurator projects
to their needs. It uses functionality built into the software, along with the
Windows File Management system, to control user access to each Tofino
project and log user activities.
There are three possible levels of access:
 View-Only Access
 Configuration Access
 Administration Access
The following table details the functionality available in the ConneXium
Tofino Configurator for each level of user permission.
Functionality
Open Project
Save Project
Save As Project
Read from Tofino SAs
Configure Tofino SAs
Change Project LAK or Password
Change Project File Location
Change Audit File Settings
Table 3:
View-Only
Access
Yes
No
No
Yes
No
No
No
No
Configuration
Access
Yes
Yes
No
Yes
Yes
No
No
No
Administration
Access
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Yes
Available functionality by user permission level
These levels are enforced using a combination of techniques which are
described in “Managing Access to a Project” and “Managing User Activity
Logging and Privileges within a Project”.
124
NHA15729 - 10/2014
Advanced Topic: ConneXium Tofino 13.1 Managing User Logging, Access,
Configurator Settings
and Privileges
13.1.1 Managing Access to a Project
The core method to control access to a project is based in the ConneXium
Tofino Configurator protection settings. This allows a combination of
passwords, License Activation Keys (LAKs), and encryption to help secure
the project files. The protection settings on the main project page in the
ConneXium Tofino Configurator control who has access to the project.
NHA15729 - 10/2014
125
Advanced Topic: ConneXium Tofino 13.1 Managing User Logging, Access,
Configurator Settings
and Privileges
There are three options for controlling access to your project:
 Project Protection: License Activation Key
When the "License Activation Key" option is selected, the project file is
encrypted when saved. Each time the project file is opened, the system
confirms that the ConneXium Tofino Configurator is using the same LAK
that it had when the project was created. If the LAK is different, then the
file cannot be decrypted. This is a low level of security, but it restricts
computers that are running other copies of ConneXium Tofino
Configurator software from viewing or modifying your projects—provided
that the LAK is not shared outside the company.
 Project Protection: Password
When the "Password" option is selected, the project file is encrypted when
saved. Each time the project file is opened, the user will be prompted for
the project password. If the password entered is incorrect, then the file
cannot be decrypted or opened. This is a higher level of security, as it
restricts unauthorized users from viewing or modifying your projects.
 Administrator Password
When the "Use Administrator Password" option is selected, the user is
unable to make administrative changes to the project file, such as
changing the Project Protection settings, attempting to move the project
file to a new location, or modifying audit log settings. When activated,
users attempting to make these changes are prompted for the
administrative password.
These three options can be used simultaneously. For the highest level of
project security, activate all three options and use different passwords for the
Project Protection and the Administrator passwords.
To help stop unwanted access to the project file, limit the distribution of the
Administrator Password.
126
NHA15729 - 10/2014
Advanced Topic: ConneXium Tofino 13.1 Managing User Logging, Access,
Configurator Settings
and Privileges
13.1.2 Managing User Activity Logging and
Privileges within a Project
User Identification and User Privileges for the ConneXium Tofino
Configurator are based on the Windows Account Management system. The
ConneXium Tofino Configurator continuously checks the active account
name on the computer running the ConneXium Tofino Configurator software,
as well as the Windows access rights to the project file. It then uses this
information to log user activity and determine whether a user is permitted to
configure a project or solely view it.
To accurately log user activity, each user should be required to have a unique
user account on the computer where the ConneXium Tofino Configurator is
located. When a user makes key changes to a project, the Windows user
name for the active account will be recorded in the audit logs.
To limit access to project functions by giving users View-Only (i.e., Read
Only) or Configuration (i.e., Read/Write) permissions, the system
administrator should set Windows user permission on either the Tofino
Project File (.tpf) or on the folder in which the project file is located. The
ConneXium Tofino Configurator then limits access to project functionality to
View-Only (Read Only) or Configuration (Read/Write) permissions based on
these file or folder permissions.
NHA15729 - 10/2014
127
Advanced Topic: ConneXium Tofino 13.1 Managing User Logging, Access,
Configurator Settings
and Privileges
For example, if a user‘s account is given read-only access to the folder where
a project file is stored, then the ConneXium Tofino Configurator will also give
the user read-only access to project tasks. These settings extend beyond
basic file management: they can keep an unauthorized user from loading a
new configuration into the Tofino SA.
The file permissions can be set as follows:
 Locate the folder on your computer where the project file (.tpf) resides.
This can be on the local computer or a file server.
 Right click the folder or the project file, and select "Properties".
 Navigate to the Security tab.
 Set the advanced permissions for a specific user or group.
Confirm that View-Only users are not included in any Windows permission
groups that allow Full Control, Modify, or Write access. Also, check that ViewOnly users do not have administrative rights in the project or on the computer
that would allow them to change either the project file permissions or file
locations.
Refer to the Windows documentation for details on setting user permissions.
128
NHA15729 - 10/2014
Advanced Topic: ConneXium Tofino
Configurator Settings
13.2 Customizing Program Settings
and Preferences
13.2 Customizing Program
Settings and Preferences
The Preferences command allows you to view and edit preferences that are
not project specific.
 Open the Preferences menu and click "Preferences".
The Preferences dialog box opens. There are three categories listed in
the side panel:
 Audit
 Help
 Project
 Audit Preferences
The Audit page allows you to set the maximum size of the audit file and
specify where it is stored.
 Click "Audit" in the side panel.




Click the "Log audit events to file" check box to enable logging.
Specify the maximum size of the log file in bytes.
Click "Browse..." and select where you want to store the log files.
Click "Apply" to save the settings.
NHA15729 - 10/2014
129
Advanced Topic: ConneXium Tofino
Configurator Settings
13.2 Customizing Program Settings
and Preferences
 Help Preferences
The Help page allows you to select how ConneXium Tofino Configurator
help content is displayed on your computer. For example, you can select
whether the help is displayed in a ConneXium Tofino Configurator window
or in an external browser.
 Click "Help" in the side panel.
 Select from the lists to indicate how you want to display the help
content.
 To save the settings, click "Apply".
130
NHA15729 - 10/2014
Advanced Topic: ConneXium Tofino
Configurator Settings
13.2 Customizing Program Settings
and Preferences
You can also incorporate help topics from remote servers into the local
help system.
 Open the "Help" item in the side panel and click "Content".
 Configure the remote servers you want to include content from.
 To save the settings, click "Apply".
 Project Preferences
The Projects page allows you to set a default project to open
automatically when you start the ConneXium Tofino Configurator.
 Click "Projects" in the side panel.
NHA15729 - 10/2014
131
Advanced Topic: ConneXium Tofino
Configurator Settings
13.2 Customizing Program Settings
and Preferences
 To enable the default project feature, click the "Use default project on
application startup" check box.
Note: If a default project is specified but this check box is disabled, the
project will not open on start-up.
 Click "Browse". Locate and select the project you want to open
automatically on start-up.
 To save the settings, click "Apply".
132
NHA15729 - 10/2014
Upgrading Your Tofino SA
14 Upgrading Your Tofino SA
There are two ways to upgrade your Tofino SA device:
 Over the network
 Via encrypted files on a USB storage device
The information you receive with your upgrade will indicate the proper
method for your Tofino SA.
To communicate with a Tofino SA over the network, select either "Network
Only" or "Both USB and Network" as the communication setting on the
General page.
NHA15729 - 10/2014
133
Upgrading Your Tofino SA
14.1 Upgrading over the Network
14.1 Upgrading over the Network
Perform your Tofino SA upgrade over the network when your device is
configured to use the NetConnect LSM.
 In the Project Explorer view, click "Tofino SAs".
 To open the Tofino SA Update Wizard, click "Firmware Update" in the
toolbar.
 Select the Tofino SAs that you want to update and click "Next".
Selecting a folder also selects the Tofino SAs within that folder.
 Click "Browse...". Locate and select the .tfo upgrade file provided to you.
 Click "Finish". The ConneXium Tofino Configurator displays a
confirmation dialog box.
 To proceed with the update, click "Yes".
The Verification Results dialog box lets you know the verification is
complete. It indicates the upgrade was successful or lists any errors
detected.
 Click "OK" to close this window.
134
NHA15729 - 10/2014
Upgrading Your Tofino SA
14.2 Upgrading via USB
14.2 Upgrading via USB
Upgrade a Tofino SA to the latest software version using the firmware update
software downloaded from the Schneider Electric website
(www.tofinosecurity.com/support/schneider-electric). You will use a USB
storage device to load these files to the Tofino SA. The USB device needs to
be empty before you begin this task.
 Place the upgrade files on a suitable USB storage device.
 Follow the steps described in “Loading Your Tofino SA via USB”.
 Once the USB Load is complete, confirm that it was successful by
performing a USB verification as described in “Verifying a Tofino SA
Configuration”.
The Verification Results dialog box lets you know the verification is
complete. It indicates the upgrade was successful or lists any errors
detected.
 Click "OK" to close this window.
NHA15729 - 10/2014
135
Upgrading Your Tofino SA
136
14.2 Upgrading via USB
NHA15729 - 10/2014
Reference: Field Descriptions
15 Reference: Field Descriptions
The topics in this section provide detailed field descriptions to help you edit
and maintain your project.
NHA15729 - 10/2014
137
Reference: Field Descriptions
15.1 Tofino SA Fields
15.1 Tofino SA Fields
 General
The General section provides identification information for the selected
Tofino SA.
 Tofino ID: The ID number found on the right hand side of the Tofino
SA‘s face. This number is used to confirm that the configuration is
loaded into the correct Tofino SA.
If you don‘t know the Tofino ID of your appliance you can enter a
temporary ID of 00:00:00:00:00:XX, where XX is any two digit
number. This lets you configure the Tofino SA without the actual ID
number. However, you will receive a message indicating that you need
to enter a correct Tofino ID in order to apply the configuration to a
Tofino SA.
 Name: Insert a name or identifier that uniquely identifies the Tofino SA.
(e.g., Jasper Pump Station Tofino or JP-TFN-001). Each Tofino SA
needs to have a unique name for clarity and ease of deployment.
138
NHA15729 - 10/2014
Reference: Field Descriptions
15.1 Tofino SA Fields
 Description: A text field that can be used to describe the function of this
Tofino SA.
 General Location: A text field for reference.
 Specific Location: A text field for reference.
 NTP Time Sync: A check box indicating the Tofino SA uses Network
Time Protocol messages to calibrate its internal clock. When selected,
the Tofino SA will intercept NTP packets that pass through it and
calibrate its clock to the information in the packet. This applies a more
accurate timestamp to messages in log files. When not selected, the
Tofino SA time will be set when information is loaded to the appliance
via a USB device or over the network.
 Network Interfaces
The Network Interfaces section displays the network interface settings for
the selected Tofino SA.
 Net 1 Name: A name or identifier that describes the upper Ethernet
port on the Tofino SA. For example, you could name it after the
network it connects to (such as Business Network) or it could be
named by function (such as Untrusted).
 Net 1 Medium: This sets the interface settings on the upper Ethernet
port. The Tofino SA supports auto-negotiation of both Ethernet ports,
meaning the Tofino SA‘s connection and transmission parameters are
negotiated automatically with the switch or device it is attached to.
Depending on the media type in the Tofino SA, you can manually set
the Ethernet ports to the following:
– Auto (auto-negotiate)
– 10baseT-HD (Twisted pair, 10 Mb/s, half duplex)
– 10baseT-FD (Twisted pair,10 Mb/s, full duplex)
– 100baseTX-HD (Twisted pair,100 Mb/s, half duplex)
– 100baseTX-FD (Twisted pair,100 Mb/s, full duplex)
– 100baseFX-HD (Fiber,100 Mb/s, half duplex)
– 100baseFX-FD (Fiber,100 Mb/s, full duplex)
The default value is Auto.
NHA15729 - 10/2014
139
Reference: Field Descriptions
15.1 Tofino SA Fields
 Net 2 Name: A name or identifier that describes the lower Ethernet port
on the Tofino SA. For example, you could name it after the network it
connects to (such as Control Network) or you could name it by function
(such as Trusted).
 Net 2 Medium: This sets the interface settings on the lower Ethernet
port. The Tofino SA supports auto-negotiation of both Ethernet ports,
meaning the Tofino SA‘s connection and transmission parameters are
negotiated automatically with the switch or device it is attached to.
Depending on the media type, you can also manually set the Ethernet
ports to:
– Auto (auto-negotiate)
– 10baseT-HD (Twisted pair, 10 Mb/s, half duplex)
– 10baseT-FD (Twisted pair,10 Mb/s, full duplex)
– 100baseTX-HD (Twisted pair,100 Mb/s, half duplex)
– 100baseTX-FD (Twisted pair,100 Mb/s, full duplex)
– 100baseFX-HD (Fiber,100 Mb/s, half duplex)
– 100baseFX-FD (Fiber,100 Mb/s, full duplex)
The default value is Auto.
 Status
The Status section provides status and version information for the
selected Tofino SA.
 Mode: You can set the Tofino SA to one of two modes:
– Test: The Tofino SA is fully functional and processes traffic but will
not drop any network traffic. You can use this mode to test if the
Tofino SA is correctly configured before you use it to filter control
system traffic.
For more information on using Test mode, see “Using Tofino Test
Mode to Validate Firewall Rules”.
– Operational: The Tofino SA provides full-packet processing and
protection.
140
NHA15729 - 10/2014
Reference: Field Descriptions
15.1 Tofino SA Fields
 Configuration Status: This is the current status of the actual Tofino SA
in the field, as determined by the last verification:
– Unconfigured: The configuration has either not been loaded onto
the Tofino SA or has not been verified.
– Verified: A configuration was successfully loaded onto the Tofino
SA and the Verify command was run to read the results back into
ConneXium Tofino Configurator.
– Failed: The last attempt to apply a configuration to this Tofino SA
was unsuccessful.
 Latest Configuration Revision: The number of the current version of
this Tofino SA‘s configuration in this project file, along with a specially
calculated hash code to reduce the chance of accidental duplication of
revision numbers. The configuration revision number is incremented
each time you modify the settings of the Tofino SA and the project is
saved. This is calculated separately from the Project Revision number
by the ConneXium Tofino Configurator.
 Verified Configuration Revision: The number of the last version of this
Tofino SA‘s configuration. This value is returned from the Tofino SA
when you verify its configuration. There is also a specially calculated
hash code to reduce the chance of accidental duplication of revision
numbers. If the Verified Configuration Revision is different than the
Latest Configuration Revision, then the Tofino SA in the field may
contain an outdated configuration.
 Hardware Type: This field is updated by the Verify command based on
the Tofino type reported by the Tofino SA.
 Model: This field is updated by the Verify command based on the
model reported by the Tofino SA
 Firmware Version: This field is updated by the Verify command based
on the firmware version reported by the Tofino SA.
NHA15729 - 10/2014
141
Reference: Field Descriptions
15.1 Tofino SA Fields
 Communications
The Communications section displays the chosen method of
communication for the selected Tofino SA.
 You can specify whether you want to transfer configuration data to the
Tofino SA device over the network or with a USB device.
 The Contact Assets list displays the assets the ConneXium Tofino
Configurator will use to communicate with the Tofino SA in the field. A
Tofino SA doesn‘t have its own IP address. The ConneXium Tofino
Configurator uses a contact asset‘s address in order to contact and
communicate with (send packets to) the Tofino SA. This does not
impact the other devices on the network, but it makes the Tofino SA
almost impossible for hackers to detect. You manually specify the
contact devices for each Tofino SA.
You can define multiple contact assets for a Tofino SA. You can select
any device or IP address in the network as a contact device. However,
for successful communication, the contact device must be on the other
side of the Tofino SA from the ConneXium Tofino Configurator.
Note: If your ConneXium Tofino Configurator is installed on a laptop
that will be moved between various locations, select contact assets on
opposite sides of the Tofino SA. This gives you a valid path for
communicating between the ConneXium Tofino Configurator and the
Tofino SA, regardless of where you are on the network. Managed
switches make great contact assets.
Each Tofino SA in your project maintains a list of contact assets.
These assets can be one of three types:
– The IP address of a contact asset found with the Discovery function
– A specific IP address
– An existing asset
You can add any number of assets to this list but at least one needs to
be on the other side of the Tofino SA from the ConneXium Tofino
Configurator. The ConneXium Tofino Configurator will attempt to
establish communication with the Tofino SA using the first asset in the
list and then move onto the next until a successful connection is
established. Use the arrow buttons to the right of the list to reorder the
assets to make the connection process faster.
142
NHA15729 - 10/2014
Reference: Field Descriptions
15.1 Tofino SA Fields
The ConneXium Tofino Configurator may be located anywhere in the
network, as long as it is able to communicate with the Tofino SAs that
it manages. If any routers or firewalls are located between the
ConneXium Tofino Configurator and a Tofino SA in the network, then
configure each router/firewall device to allow the ConneXium Tofino
Configurator traffic to pass through these devices.
The ConneXium Tofino Configurator uses both TCP and UDP traffic to
manage Tofino SAs. There are three types and directions of traffic that
pass between the ConneXium Tofino Configurator and Tofino SAs:
– TCP Port 6689: ConneXium Tofino Configurator to Tofino SA
– UDP Port 6689: ConneXium Tofino Configurator to Tofino SA
– UDP Port 6689: Tofino SA to ConneXium Tofino Configurator
 Loadable Security Modules (LSMs)
The Loadable Security Modules (LSMs) section displays the LSMs active
for the selected Tofino SA.
 A key icon to the left of the LSM indicates that the Tofino SA is licensed
to use that LSM. The check box to the left of the LSM indicates that
this LSM has been activated. If you activate an LSM that is not
licensed, you can configure the features associated with this
(unlicensed) LSM. However, if you do this, you need to purchase a
license for that LSM to successfully apply the Tofino SA configuration
to the Tofino SA device.
NHA15729 - 10/2014
143
Reference: Field Descriptions
15.2 Asset and Asset Template Fields
15.2 Asset and Asset Template
Fields
 General
The General section contains the basic settings for an asset.
 Name: The name or identifier that uniquely identifies the asset. (e.g.,
Jasper Pump Station PLC or JP-PLC-001). Each asset needs to have
a unique name to avoid confusion.
 Type: The asset type. Asset types include:
– Computer
– Controller
– Device
– Network
– Network Equipment
– Broadcast
– Multicast
 Description: A text field describing the function of this asset.
 Manufacturer: The make or company that manufactured or sold this
asset (e.g., Schneider Electric).
144
NHA15729 - 10/2014
Reference: Field Descriptions




15.2 Asset and Asset Template Fields
Model: The model of this asset (e.g., Quantum).
General Location: A text field for reference.
Specific Location: A text field for reference.
Asset Tag: A user-defined field for corporate asset tags.
 Communications
The Communications section contains the settings related to the Tofino
SA‘s communication settings.
 IP Address: This is the IP address of the asset. In order for the firewall
rules to operate properly, check that the address is correct.
 Subnet Mask: The subnet mask is used by the Tofino SA in
conjunction with the IP address to identify the computers or devices
that are part of a local or subnetwork. A subnet mask is a 32-bit
number that is notated by using four numbers from 0 to 255, separated
by periods. Typically subnet masks use either 255 or 0 for each
number (such as 255.255.255.0) but other numbers can appear in
special cases.
 MAC Address: This is the Ethernet MAC or physical address of the
asset. This is an optional field so can be left blank. However, if you are
creating rules for non-IP protocols, such as GOOSE, then enter a MAC
address.
 Rule Profiles
When you create an asset you can also specify the protocols that this
asset typically uses, along with how you want those protocols managed.
For example, you can specify whether the asset uses a protocol as a
client (i.e., it initiates the communications) or as a server (i.e., it responds
to requests from clients). The New Firewall Rule Wizard can use this
information to automatically create rules for the asset. For more
information on how rule profiles are used in automatic rule generation see
“Advanced Topic: How Automatic Rule Generation Works”.
NHA15729 - 10/2014
145
Reference: Field Descriptions
15.2 Asset and Asset Template Fields
The Rule Profiles section contains a table that lists the rule profiles
associated with an asset. You can set the following options for any rule
profile.
 Protocol: A list of protocols that this asset can use for network
communications.
Note: If you select an application layer protocol, such as Modbus or
HTTP, lower layer protocols (such as Ethernet, TCP, and IP) are
automatically included.
 Type: The type of protocol:
– Standard firewall rules are designed to allow or deny specific
protocols passing through the firewall.
– Special Rules are highly complex rules that go beyond simple allow
or deny. For more information see “Creating Firewall Rules”.
 Server: Selecting this check box indicates that the asset acts as a
server and responds to requests from clients. For example, a web
server or a Modbus slave device (such as a PLC) would be selected
as a server.
 Client: Selecting this check box indicates that the asset acts as a client
and initiates requests to servers. For example, a web browser or a
Modbus client device (such as an HMI) would be selected as a client.
Protocols can be set as both client and server on an asset if
appropriate. For example, a computer may contain both web server
software and web browser software and thus could be designated as
both an HTTP client and an HTTP server.
 Permission: What the firewall does with a packet based on the defined
rules. There are three options:
– Allow: The Tofino SA will allow traffic matching the rule to pass.
– Deny: The Tofino SA will stop traffic matching the rule from
passing.
– Enforcer: The Tofino SA will further inspect and filter the traffic
using Deep Packet Inspection settings. This option is available for
protocols such as Modbus and EtherNet/IP that have Enforcer
LSMs installed.
 Log: A check box for setting logging on the rule.
146
NHA15729 - 10/2014
Reference: Field Descriptions
15.2 Asset and Asset Template Fields
Note: By default, the Tofino SA will log denied packets that do not
match any of the rules in the firewall table. Similarly, if you check the
Log option on a rule (the permission may be Allow or Deny), packets
matching the rule will be logged. Conversely, if you uncheck the Log
option on a rule, no log events will be created for packets matching this
rule. A common use for this option is to help stop nuisance alarms
when blocking broadcast traffic.
 Details: A short form summary of special rule profile details, such as
RO for Modbus Read-Only.
 Description: This field is available as a convenience so the controls
engineer can add a comment about the rule profiles.
NHA15729 - 10/2014
147
Reference: Field Descriptions
148
15.2 Asset and Asset Template Fields
NHA15729 - 10/2014
Troubleshooting
16 Troubleshooting
The topics in the Troubleshooting chapter address common questions that
may arise while using the ConneXium Tofino Configurator.
NHA15729 - 10/2014
149
Troubleshooting
16.1 Tofino SA Diagnostics
16.1 Tofino SA Diagnostics
The Tofino SA has the capability to save diagnostics files to a USB storage
device for troubleshooting purposes. You can view these files with a standard
text editor or send them to technical support for analysis.
To create these files you need to perform a USB Save.
 Power on the Tofino SA for at least one minute.
 Insert the USB storage device into the USB port.
 Press the Save Load Reset button once. The Save/Load LED will
illuminate in green. After a few seconds the Mode, Save/Load, and Reset
LEDs will flash in green in a left to right sequence to indicate the USB
Save is in progress.
 When the flashing sequence stops, remove the USB storage device.
 If the save was successful the Tofino SA LEDs will revert to the state they
were in prior to the saving action.
 Send copies of these files to technical support for analysis.
Note: The following version 2.0 USB storage devices are known to work:
Kingston Data Traveler, SanDisk Cruzer, Sony Microvault, Lexar, and
Schneider TCSEAM0100. Other brands and models may work, but have not
been tested. Only USB devices formatted as FAT or FAT32 are compatible.
The Tofino SA Fault LED will flash twice when it detects an invalid storage
device.
150
NHA15729 - 10/2014
Troubleshooting
16.1 Tofino SA Diagnostics
 Interpreting Diagnostics Files
If the USB Diagnostics Save is successful there will be files on the USB
storage device similar to this (<tofino id> is replaced with the actual ID of
the Tofino SA):
 <tofino id>_tc_data
Verification data indicating if the configuration was successful or not
(see “Verifying a Tofino SA Configuration” on page 103)
 <tofino id>_diagnostics.txt
Diagnostics information on the Tofino SA
 eventlogger_<tofino id>.zip and eventlogger_<tofino id>.X.zip
Event logs from the Tofino SA in a compressed file (see “Setting up the
Event Logger” on page 92)
 <tofino id>_kernel_evt.enc
Encrypted kernel diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_diagnostics.enc
Encrypted module diagnostics information (solely for factory
troubleshooting use)
 <tofino id>_configuration.txt
Configuration data listing the LSMs licensed for this Tofino SA
If you examine the file ending in .txt using a standard text editor, such as
WordPad, you should see something like the following:
NHA15729 - 10/2014
151
Troubleshooting
16.1 Tofino SA Diagnostics
The files ending in .enc are encrypted files and should be sent to product
technical support.
152
NHA15729 - 10/2014
Troubleshooting
16.1 Tofino SA Diagnostics
The eventlogger_<tofino id>.zip and eventlogger_<tofino id>.X.zip files
are compressed files that contain log files created by the Event Logger
LSM. After you extract the log files you can open and view them with any
event management system or text editor.
NHA15729 - 10/2014
153
Troubleshooting
16.2 Firewall Not Blocking Traffic
16.2 Firewall Not Blocking Traffic
If the Tofino Firewall LSM does not appear to be blocking traffic that you think
it should, first check the following:
 The Tofino Firewall LSM status (Is the Firewall LSM activated?)
See “Editing a Tofino SA” on page 42.
 The mode of the Tofino SA (Is the Tofino SA in Operational mode?)
The Tofino SA‘s Mode LED should be on steady.
 Does the configuration of the Tofino SA really match what is stored on the
ConneXium Tofino Configurator?
If in doubt, verify the Tofino SA configuration (see “Verifying a Tofino SA
Configuration” on page 103).
Next, check the rules on the Tofino SA‘s firewall details view for the following
(see “Editing Firewall Rules” on page 87):
 Are the device IP addresses correct?
 Are the protocols and direction correct?
 Are there conflicting rules? For example, does the Tofino SA have an
Allow All rule as well as a protocol-specific rule?
 Was the connection between devices established before the rule was
loaded? The Tofino SA will not break established connections between
two devices. If you think the connection was made before the rule was
loaded, try breaking the connection by restarting one of the devices.
154
NHA15729 - 10/2014
Troubleshooting
16.3 USB Storage Device
Recommendations
16.3 USB Storage Device
Recommendations
If you are experiencing difficulties doing USB Loads or USB Saves, check to
see if you are using a version 2.0 USB storage device. USB storage devices
that are version 1.1 are not compatible and will not work with the Tofino SA.
The Tofino SA Fault LED will flash twice (indicating invalid USB storage
device), if it detects a version 1.1 USB storage device.
The tested and approved USB storage devices include: Kingston Data
Traveler, SanDisk Cruzer, Sony Microvault, Lexar, and Schneider
TCSEAM0100.
Only USB devices formatted as FAT or FAT32 are compatible.
No. of Flashes
1
2
3
4
Table 4:
During Load Sequence
The USB port is disabled. Check the
Communications setting on the
General page. The method of
communication should be "USB
Only" or "Both USB and Network".
No USB memory device is
connected to the USB connection, or
the file system of the memory device
is not formatted as FAT or FAT32.
The files on the USB memory device
are invalid.
During Save Sequence
No USB memory device is
connected to the USB connection, or
the file system of the memory device
is not formatted as FAT or FAT32.
The device was unable to create any
diagnostic files. Please contact your
technical support.
The device was unable to encrypt The device was unable to encrypt
the configuration files. It is possible the diagnostic files. Please contact
that the files were damaged during your technical support.
the copying operation. Repeat the
copying operation. If the condition
persists, please contact your
technical support.
Fault LED Activity During Load/Save
NHA15729 - 10/2014
155
Troubleshooting
No. of Flashes
5
6
16.3 USB Storage Device
Recommendations
During Load Sequence
The device was unable to load the
files. It is possible that the files were
damaged during the copying
operation. Repeat the copying
operation. If the condition persists,
please contact your technical
support.
The device was unable to deactivate
the USB connection. Please contact
your technical support.
7
Table 4:
156
During Save Sequence
The device was unable to copy the
encrypted diagnostic files to the
USB memory device. It is possible
that the memory device is full.
The device was unable to deactivate
the USB connection. Please contact
your technical support.
The file system of the device does
not have enough memory capacity
to save the files temporarily before
they are copied to the USB memory
device. Please contact your
technical support.
Fault LED Activity During Load/Save
NHA15729 - 10/2014
Troubleshooting
16.4 Factory Resetting Your Tofino
SA
16.4 Factory Resetting Your
Tofino SA
To reset the Tofino SA back to its default state as shipped from the factory,
you can perform a Factory Reset.
 Confirm that power is applied to the Tofino SA and it has completed its
start-up initialization.
 Press and release the Save Load Reset button 3 times. On the first press
the Save/Load LED illuminates in green; on the second press the
Save/Load LED illuminates in yellow; and on the third press the Reset
LED illuminates in yellow with the Save/Load LED off. After a few seconds
the Mode, Save/Load, Reset, and Fault LEDs flash simultaneously while
the factory reset is being performed.
Once the factory reset is complete, the LEDs will turn off. This indicates
that the Tofino SA is passive and passing traffic without filtering.
If the Mode LED is green, either flashing or solid, repeat this task. If the
LEDs are different than described in this task, contact technical support.
NHA15729 - 10/2014
157
Troubleshooting
16.5 Special Rules
16.5 Special Rules
Special Rules are complex rules that go beyond allow or deny. For example,
a Special Rule could be used to block a subset of a particular type of traffic.
They often have specific permission, protocol, and direction attributes
embedded within them. You can view the available Special Rules in the
"Special Rules" folder in the Project Explorer view. You use special rules
solely in exceptional cases.
The special rules are provided by Schneider Electric.
16.5.1 Tofino Rapid Network Recovery
Tofino Security Appliances are often utilized in networks that have high
availability requirements. Therefore, these networks use redundancy
protocols—such as the RSTP (Rapid Spanning Tree Protocol) or other
comparable protocols—to achieve redundant connections. Many of these
protocols detect device or media errors based on the loss of the physical
network link between adjacent devices (e.g., two Ethernet switches). Without
further configuration, a Tofino SA will not pass link status information from
one of its network ports to the other port. Therefore, it may interrupt or block
the correct detection of a device or connectivity loss by a redundancy
protocol.
To allow the Tofino SA to forward link status information between its two
network ports, create a rule in its firewall configuration that has the special
rule type Tofino Rapid Network Recovery.
158
NHA15729 - 10/2014
Troubleshooting
16.5 Special Rules
Note: Even with the Tofino Rapid Network Recovery special rule configured,
each Tofino SA adds a small time span to the overall recovery time of the
network. Also, when a Tofino SA loses the physical link to both of its network
ports simultaneously, the first network port to be reconnected will experience
a short link-up before taking down the network link again.
When utilizing a Tofino SA with the Tofino Rapid Network Recovery special
rule, test the network recovery time in your installation prior to
commissioning. Also check that the redundancy protocol utilized can cope
with a possible short link-up on one network port of the Tofino SA.
NHA15729 - 10/2014
159
Troubleshooting
16.6 The Discovery Feature is Not
Finding Tofino SAs
16.6 The Discovery Feature is Not
Finding Tofino SAs
The Discovery feature lets you scan IP address ranges to locate new and
existing Tofino SA devices on your network. If you are performing scans and
not discovering Tofino SAs that you know are on the network, try the
following suggestions.
 Reset the scan settings and create a new scan.
 Verify that both interfaces of the Tofino SA are connected to networks or
devices. Also check that at least one device on the port opposite the port
connected to the ConneXium Tofino Configurator has an IP address in the
range you have selected to scan.
 If any routers or firewalls are located between the ConneXium Tofino
Configurator and a Tofino SA on the network, check that each
router/firewall device is configured to allow the ConneXium Tofino
Configurator traffic to pass through it. For more details, see
“Communications”.
 Check that the Tofino SAs you are trying to discover are new Tofino SAs
direct from the factory or existing Tofino SAs that have been factory reset.
In these cases, the Mode light on the Tofino SA will be off. To help stop
attackers from using a stolen copy of the ConneXium Tofino Configurator
to discover a Tofino SA, the Tofino SAs configured by one project
database cannot be discovered by a ConneXium Tofino Configurator
using a different project.
160
NHA15729 - 10/2014
Troubleshooting
16.7 Unable to Open a Project File
16.7 Unable to Open a Project File
Tofino project files are secured using state of the art cryptography to reduce
the chance of unauthorized people accessing them and the Tofino SAs they
control. As a result, you may experience situations where you are unable to
open a project file. Here are some reasons why this may occur.
 When opening a project file you are asked for a password.
This indicates that the project is password protected. Provide the correct
password to proceed.
 When opening a project file you are informed that your License Activation
Key (LAK) is different from the one used to save the project you are trying
to open.
This indicates that the License Activation Key (LAK) protection has been
turned on for the project and the project you are trying to open was
created with ConneXium Tofino Configurator software licensed with a
different LAK than your current software. To address this, use the same
ConneXium Tofino Configurator that was used to save the project.
 When opening a project file you are asked for a Project Administrator
Password.
This indicates that the project is protected by an Administrator Password.
The project file has been moved from its original location to its current
location. Provide the administrator password to proceed.
 When opening a project file from the list of recent projects, you are
informed that the selected project cannot be found.
This indicates that the project has been moved. Click "Open Project..." to
locate and open the correct project file (.tfp).
To help avoid being locked out of a project, back up your project files
regularly and record all passwords in a suitable password management
system.
NHA15729 - 10/2014
161
Troubleshooting
162
16.7 Unable to Open a Project File
NHA15729 - 10/2014
Glossary
17 Glossary
ACL
ARG
Asset
Children
CIP
CSP
DCOM
DCS
DMZ
DNP3
DNS
DPI
EtherNet/IPTM
Firewall
FTP
GOOSE
GUI
HMI
HTML
Access Control List: List of rules specifying access privileges to network
resources.
Assisted Rule Generation: a feature that helps you create firewall rules for the
purpose of helping to protect devices on your network. This feature comes with
the Secure Asset Management LSM.
The objects used to represent the devices (or groups of devices) installed in
your control system. They can be broken down into seven categories:
Computers, Controllers, Devices, Networks, Networking equipment, Broadcast
and Multicast.
A child node is one that is connected under another node (known as its parent).
Common Industrial Protocol: CIP is an open standard for industrial network
technologies. It is supported by an organization called Open DeviceNet Vendor
Association (ODVA).
Client Server Protocol: An Allen-Bradley protocol used to communicate to
PLCs over TCP/IP.
Distributed Component Object Model: This is an extension to the Component
Object Model that Microsoft made to support communication among objects on
different computers across a network.
Distributed Control System: A Distributed Control System allows for remote
human monitoring and control of field devices from one or more operation
centers.
Demilitarized Zone: A small network inserted as a neutral zone between a
trusted private network and the outside untrusted network.
Distributed Network Protocol 3: A protocol used between components in
process automation systems.
Domain Name System: A distributed database system for resolving human
readable names to Internet Protocol addresses.
Deep Packet Inspection.
An industrial control protocol defined by the Open DeviceNet Vendors
Association (ODVA).
A set of security schemes that helps prevent unauthorized persons or devices
from gaining access to protected nodes on a network. A firewall essentially
works as a control point that blocks invalid connections to nodes behind the
firewall while allowing trusted communications to pass through unaffected.
File Transfer Protocol.
Generic Object Oriented Substation Events.
Graphical User Interface: Graphical, as opposed to textual, interface to a
computer.
Human Machine Interface: This interface enables the interaction of human and
machine.
HyperText Markup Language: The authoring software language used on the
Internet's World Wide Web.
NHA15729 - 10/2014
163
Glossary
HTTP
HTTPS
IDS
IP
IT
LAN
LDAP
LSM
Modbus
MySQL
NETBEUI
NetBIOS
NTP
OFS
OLE
OPC
Parent
PCN
PLC
Protocol
RPC
SA
SCADA
164
HyperText Transfer Protocol: The protocol used to transfer Web documents
from a server to a browser.
HyperText Transfer Protocol over SSL: A protocol that uses encryption to
transfer Web documents from a server to a browser.
Intrusion Detection System: A system to detect suspicious patterns of network
traffic.
Internet Protocol: The standard protocol used on the Internet that defines the
datagram format and a best-effort packet delivery service.
Information Technology: The development, installation and implementation of
business computer systems and their applications.
Local Area Network: A network that interconnects computers in a limited area
such as a home, office, laboratory or factory.
Lightweight Directory Access Protocol: Protocol to access directory services.
Loadable Security Module: Software plug-ins providing security services, such
as Firewall, Intrusion detection system (IDS), and Diagnostics.
A communications protocol designed by Modicon Incorporated for use with its
PLCs.
A relational database management system (RDBMS) that runs as a server
providing multi-user access to a number of databases.
NetBIOS Extended User Interface: An enhanced version of the NetBIOS
protocol.
Network Basic Input Output System: A de facto IBM standard for applications
to use to communicate over a LAN.
Network Time Protocol.
OPC Factory Server: Data server software.
Object Linking and Embedding: A precursor to COM, allowing applications to
share data and manipulate shared data.
OLE for Process Control: A standard based on OLE, COM and DCOM for
accessing process control information on Microsoft Windows systems.
A parent node is one that has nodes connected to it (known as children).
Process Control Network: A communications network used to transmit
instructions and data to control devices and other industrial equipment.
Programmable Logic Controller: A PLC is a small dedicated computer used for
controlling industrial machinery and processes.
A convention or standard that controls or enables the connection,
communication, and data transfer between two computing endpoints. In its
simplest form, a protocol can be defined as the rules governing the syntax,
semantics, and synchronization of communication. Protocols may be
implemented by hardware, software, or a combination of the two. At the lowest
level, a protocol defines the behavior of a hardware connection.
Remote Procedure Call: A standard for invoking code residing on another
computer across a network.
Security Appliance: An industrially hardened security appliance designed to be
installed in front of individual and/or networks of HMI, DCS, PLC or RTU control
devices that require protection.
Supervisory Control And Data Acquisition: A system for industrial control
consisting of multiple Remote Terminal Units (RTUs), a communications
infrastructure, and one or more Control Computers.
NHA15729 - 10/2014
Glossary
SNMP
SQL
SSL
Syslog
TCP
Simple Network Management Protocol: A protocol used to manage devices
such as routers, switches and hosts.
A database computer language designed for managing data in relational
database management systems.
Secure Socket Layer: A de facto standard for encrypted communications
created by Netscape Incorporated.
A standard for logging event messages.
Transmission Control Protocol: A transport level protocol that provides a
connection-oriented stream service.
Trivial File Transfer Protocol.
Configuration software for configuring the Tofino security appliances.
TFTP
Tofino
ConfiguratorTM
Tofino Security An industrially hardened security appliance designed to be installed in front of
Appliance
individual and/or networks of HMI, DCS, PLC or RTU control devices that
require protection.
UDP
User Datagram Protocol: Connectionless network transport protocol.
URL
Uniform Resource Locator: The address of a resource on the Internet.
USB
Universal Serial Bus: a specification to establish communication between
devices and a host controller (usually personal computers); in the context of
this document, it refers to USB-based flash drives used to transfer files.
XML
eXtensible Markup Language: A general-purpose markup language for
creating special purpose markup languages that are capable of describing
many different kinds of data.
NHA15729 - 10/2014
165
Glossary
166
NHA15729 - 10/2014
Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement