Abb Afs
Abb Afs
Abb Afs
AFS660
Deployment Guideline
User Manual
AFS660 –
Deployment Guideline
Disclaimer: ABB has taken reasonable care in compiling this document, however ABB accepts no liability whatsoever
for any error or omission in the information contained herein and gives no other warranty or undertaking
as to its accuracy.
ABB can accept no responsibility for damages, resulting from the use of the network components or the
associated operating software. In addition, we refer to the conditions of use specified in the license
contract.
ABB reserves the right to amend this document at any time without prior notice.
The product / software/ firmware/ or the resulting overall solution are designed for data-processing & data-
transmission and may therefore be connected to communication networks. It is your sole responsibility to
provide and continuously ensure a secure connection between the product / software/ firmware/ or the
resulting overall solution and your network or any other networks (as the case may be). You shall establish
and maintain any appropriate measures (such as but not limited to the installation of firewalls, application
of authentication measures, encryption of data, installation of anti-virus programs, etc.) to protect the
product / software/ firmware/ or the resulting overall solution, the network, its system and all the interfaces
against any kind of security breaches, unauthorized access, interference, intrusion, leakage and/or theft
of data or information. ABB Switzerland Ltd and its affiliates are not liable for damages and/or losses
related to such security breaches, any unauthorized access, interference, intrusion, leakage and/or theft
of data or information.
Although ABB provides functionality testing on the products including related firmware and software that
we release, you should institute your own testing program for any product updates or other major system
updates (to include but not limited to firmware/software changes, configuration file changes, third party
software updates or patches, hardware exchanges, etc.) to ensure that the security measures that you
have implemented have not been compromised and system functionality in your environment is as
expected.
Contents
1 Introduction 5
1.1 Purpose of this document 5
1.2 Legend 5
1.3 Basic Cyber Security considerations 5
1.4 A formalized security model 5
1.4.1 Security policies and principles 6
1.4.2 Security services 7
1.4.3 Security planes 7
1.4.4 Security layers 8
2 Network design 9
2.1 Zones 9
2.2 External communication (including remote access) 9
4 AFS View-CT 22
4.1 Purpose and usage 22
4.2 Secure setup and operation of CT 22
4.2.1 Rights 22
4.2.2 User accounts 23
4.2.3 Logging 23
6 Document history 26
1 Introduction
1.2 Legend
The designations used in this manual have the following meanings:
List
Work step
Subheading
Link Indicates a cross-reference with a stored link
Note: A note emphasizes an important fact or draws your attention to a dependency.
Courier ASCII representation in user interface
To provide adequate security, one must be able to model and understand the communication infrastructure and
analyze threats to these assets. A three-plane architecture derived from ITU-T X.805 standard provides a useful
and simple way of capturing relevant information, see Figure 1. All the information and recommendations given in
this Deployment Guideline address one or several topics and dimensions of the model and aim making the device
hardened in the overall network context.
The security architecture is separated into three security planes and every plane into three security layers. On
every security layer there are security services applied to mitigate threats. Policies and principles are steering the
architecture all the time. When the system is in operation, operational policies are adapted to the system
architecture. All these activities together are called "security architecture".
Accountability: Accountability procedures are used to keep track of who does what and when; it goes hand
in hand with Non-Repudiation providing evidence on who did what. Accountability functions track the usage of
security services and network resources. Accountability logs facilitate recovery and fault discovery.
Authentication: Authentication is used to confirm the identities of communicating entities (person, device, ser-
vice or application) and ensures that the entities are not masquerading or attempting unauthorized replay of
previous communication.
Authorization: Authorization protects against unauthorized use of network resources. Access control ensures
that solely authorized personnel or devices have access to network elements, stored information, information
flows, services and applications. The three security services Accountability, Authentication, and Authorization
are sometimes bundled together and abbreviated AAA.
Availability: Availability means that authorized entities have access to network elements, stored information,
information flows, services and applications regardless of incidents that affect the network.
Confidentiality: Confidentiality goes hand in hand with Privacy and entails protecting data from unauthorized
disclosure. Data confidentiality ensures that data content cannot be understood by unauthorized entities. En-
cryption, access control lists, and file permissions are methods frequently used to protect data confidentiality.
Integrity: Integrity ensures the correctness or accuracy of data. The data is protected against unauthorized
modification, deletion, creation, and replication. Integrity features might also indicate unauthorized activities.
O&M Security Plane: The O&M security plane is concerned with the protection of operation and maintenance
functions of the network elements.
This document focuses specifically to this plane as AFS View is part of ABB’s overall Network Management
Suite.
Signaling & Control Security Plane: The signaling and control security Plane protects activities that enable
the efficient delivery of information, services and applications across the network.
Examples belonging to this plane are routing or RST protocols.
End-User Security Plane: End-user in this context can mean a person but also an application generating data-
flows. The end-user security plane manages subscriber access and use of the service across the utility net-
work.
An example belonging to this plane are AAA-related functions provided e.g. by Radius or LDAP.
Infrastructure Security Layer: The infrastructure security layer is the fundamental building blocks of networks
services and applications. Examples of components that belong to the infrastructure layer are network ele-
ments and links between network elements and infrastructure they are located at.
Network Services Security Layer: The network services security layer addresses network services provided
to end-users. These ranges from basic transport and connectivity to the service enablers necessary for provid-
ing network access.
Applications Security Layer: The applications security layer covers network-based applications accessed by
the end-user, for example, voice applications, multimedia applications, and web-browsing.
2 Network design
2.1 Zones
The overall network architecture is not topic of this Product specific deployment guide. It has however to be noted
that improper configuration of a single network element may compromise the overall network zoning- and security
approach and may result in serious cyber risks.
Security zones must be protected by firewall, application proxies or in extreme cases by data-diodes. It is essential
that zones are properly documented including all assumptions reg. services, addressing-schemes and data flows
between the zones.
Network segmentation or creating security zones is required to minimize the impact when one zone is
compromised. One should distinguish …
Geographical zones / physically segregated areas
(e.g. Control-Centers, Substations …)
Logical zones
(applications / services with similar security requirements across the network)
Network design and maintenance is fully in customer's responsibility unless explicitly agreed otherwise in writing.
1. External shall mean connections to other security zones (e.g. Customer office network or even Internet)
2. DM = System Data Manager; for details about SDM for Communication Systems please contact your ABB
sales representative
This chapter addresses the steps and measures to be taken to make best use of the security and hardening
functions of the Product by optimized configuration of management interfaces, user ports and services.
The Product provides following management access methods with possible roles:
3.1.4.1 General
An AFS660 in factory default has no IP address configured. Initial configuration of IP address can be done through
AFS Finder or through serial interface (CLI).
The management agent is assigned to a specific VLAN (i.e. the management VLAN). In factory default settings
this is VLAN 1. It is recommended to use separate VLANs for management traffic and for user traffic if possible
from the network design point of view.
The following users are defined in the factory default state. This is applicable for all the access methods further
explained below.
AFS660 allows to enable / disable individual servers for management access (see more information below).
AFS Finder is typically used for initial configuration of AFS660 during commissioning, when the device is still in
factory default configuration. The following parameters can be set with AFS Finder:
3.1.4.3 Access with Web Browser (through local LAN port or remotely)
Graphical User Interface is available with a web browser interface (e.g. Internet Explorer, Firefox). Two methods
can be used:
HTTP:
Unsecure connection between browser / management computer and switch. It is recommended to disable the
HTTP server on the AFS660 and thus block the unsecure browser access. Refer to [e] for configuration details.
HTTPS:
Secure connection between browser / management computer and switch. A digital certificate is required for the
encryption of the HTTP connection. In factory default configuration the switch configuration includes a self-
signed certificate for HTTPS access. The device allows you to create a new certificate yourself (through user
interface) or to load an existing secure certificate onto the device. The latter is the preferred option. Refer to [f]
for configuration details.
3.1.4.4 Access with Command Line Interface through IP connection (local or remote)
TELNET:
Unsecure connection between terminal software (e.g. PUTTY) on management computer and switch. It is rec-
ommended to disable the TELNET server on the AFS660 and thus block the unsecure CLI access. Refer to [g]
for configuration details.
SSH:
Secure connection between terminal software (e.g. PUTTY) on management computer and switch. AFS660
only supports SSHv2 (less secure version 1 of the protocol is not supported). A digital certificate is required for
the encryption of the SSH connection. In factory default configuration the switch configuration includes a self-
signed certificate for SSH access. The device allows you to create a new certificate yourself (through user in-
terface) or to load an existing secure certificate onto the device. The latter is the preferred option. Refer to [h]
for configuration details.
3.1.4.5 Access with Command Line Interface through serial interface (console port)
For this access, physical access to the equipment is required (i.e. physical security measures shall prevent
unauthorized access to the device). A laptop is connected to the console port on the AFS660 and uses RS232
protocol. Access to all monitoring and configuration functions is provided through command line interface.
The communication itself is not protected and cannot be disabled. For user authentication the same mechanisms
are used as for the other access options (protected by user name and password).
After a power-up of the equipment it is possible to enter 'System Monitor 1' through the serial interface which is
the boot menu. The 'System Monitor 1' offers the following possibilities:
System Monitor 1 can be used to recover from any unexpected behavior of firmware or configuration. (e.g.
misconfiguration) by setting back the equipment to factory default or a specific firmware. Refer to [i] for details.
The 'System Monitor 1' can be disabled through the user interface (GUI or CLI) which prevents unauthorized
access to it. However this also eliminates the recovery functionality mentioned above. In worst case a switch may
have to be sent back to factory to perform recovery actions. Refer to [j] for configuration details.
AFS View-CT is a standalone software package that offers a controlled Java environment to access the AFS660
products.
For access to the switches, the AFS View-CT does not provide new functionalities, but it will use the functionality
and security measures as described above in sections 3.1.4.3 to 3.1.4.5.
AFS View is a network management software with a graphical overview of a complete AFS network.
AFS View uses SNMP protocol to monitor and access the switches. Per default SNMPv3 with MD5 Authentication
and DES Encryption is used.
It is possible to access the AFS660 switch with any SNMP based manager software. SNMPv3 shall be used as
described in section 3.1.4.7.
To prevent the access to the switch through unsecure SNMPv1 or v2, disable the corresponding servers on
the AFS660.
Refer to [k] for configuration details.
AFS660 allows to monitor the security status of the device. The following settings can be supervised:
Activate the security status monitoring for the parameters which are applicable in your setup.
The device status will show an alarm on the device, in AFS View and can also send traps to any SNMP trap
receiver.
An AFS660 can optionally be equipped with SD based external storage medium, the CRA-SD.
Disable all unused physical ports in such a way, that they can only be enabled by authorized staff (either locally
or remotely).
Refer to [m] for configuration details.
3.1.6.2 Disable / close all unused logical ports and disable all unused services and
protocols
It is possible to disable the management servers (i.e. services) for unused access methods (e.g. Telnet). Refer to
section 3.1.4 for details.
Disable all services and protocols not required for standard operation.
AFS660 offers port security functionality on all ports. The feature can be activated on one, several or all ports of
the switch, depending on project requirements.
On a port, access can be limited to one or several host with predefined settings for VLAN and MAC address.
3.1.7 Logging
Complete and accurate logs are crucial to monitor the security of a system. In case of a security incident log files
provide information to better understand details of the incident.
By default network devices might not log all necessary events and badly configured log services do not provide
the information needed.
If a Syslog server is present in your network, forward AFS660 system events to the Syslog server.
The AFS660 allows to send messages to up to 8 syslog servers. For each server the following can be configured:
Type of events to be sent: From System Log and/or from Audit Trail
Minimum severity of events to be sent to syslog server. Examples for severity:
– If it is sufficient to send messages for failed login attempts, the severity can be set to 'warning'.
– If also successful logins or logouts shall be forwarded to syslog server the severity must be set to 'notice'
(preferred option).
Even if flawless patching / updating is the normal case for ABB solutions it's recommended to make a backup of
the device configuration for the rare case of issues (see following clause).
Note:
Make a backup of the complete device configuration after initial commissioning.
Make configurations backups based on a scheduled scheme; recommended cycle depends on frequency
and extend of changes in the network
Make always a backup before you apply patched & updates
Configure devices to accept time events from dedicated time servers only.
Avoid broadcast based time-info.
4 AFS View-CT
The CT runs on any state of the art Windows-based computer / laptop; recommended is to use:
The CT is mostly installed on computers of deployment- and maintenance-personal. It's their IT-departments
responsibility to setup and operate the computer in a secure way.
For more information, please also consult e.g. 'Microsoft Security Guidance' available on the Internet.
4.2.1 Rights
AFS View-CT does not require any installation. The following is possible:
Copy all necessary files to the maintenance computer and start the executable.
In this setup make sure that the executable is only accessible by authorized users on the laptop, do not copy
the files to public folders
Systems/applications that provide user authentication and access control should be configured according to the
least-privilege principle. If a user has more roles, separate accounts should be made for each role. This user
should only use elevated roles when needed, not by default.
4.2.3 Logging
AFS View-CT itself does not offer any logging functionality. For monitoring and logging purposes use the
functionality of the network elements (see relevant sections in this document).
For using HTTPS, enter the IP address of a device including the protocol information e.g. "https://192.168.1.1".
For using SSH, enter the IP address of the device and click on the corresponding SSH icon in the GUI.
The AFS View-CT does not offer the possibility to disable unsecure protocols, this shall be done on device level.
If your computer is connected to the device through a firewall, enter rules in the firewall that allow the data traffic
through following ports:
UDP/161 SNMP
TCP/443 HTTPS (for access with GUI)
TCP/22 SSH (for access with CLI)
(Ports for unsecure protocols HTTP and Telnet are not listed here.)
Always make sure that the operating system is up to date with necessary security patches and updates.
Unpatched applications and services represent one of the biggest security vulnerability.
Make sure that you use the latest available release of AFS View-CT.
Rev. Document
[1] AFS660-S/AFS665-S, Reference Manual, Graphical User Interface
1KHD652009 / Revision May 2014
[2] AFS660-B/AFS665-B, Reference Manual, Graphical User Interface
1KHD653881 / Revision May 2014
[3] AFS660-C, Reference Manual, Graphical User Interface
1KHD653886 / Revision May 2014
[4] AFS660-S/AFS665-S, User Manual, Basic Configuration
1KHD652010 / Revision May 2014
[5] AFS660-B/AFS665-B, User Manual, Basic Configuration
1KHD653882 / Revision May 2014
[6] AFS660-C, User Manual, Basic Configuration
1KHD653887 / Revision May 2014
[7] AFS View-CT GUI Application
1KHD653905 / Revision June 2015
6 Document history
www.abb.com/communicationnetworks