Production Software Within Manufacturing Reference Architectures
Production Software Within Manufacturing Reference Architectures
Production Software Within Manufacturing Reference Architectures
Manufacturing Reference
Architectures
Synopsis
Industry adoption of EtherNet/IP for control and information has driven the wide
deployment of standard Ethernet for manufacturing networks. This deployment
acts as the technology enabler for the convergence of manufacturing and
enterprise networks. By gaining timely access to key performance indicators
(KPIs) at the right levels by business and operation decision makers,
Manufacturers now make business decisions from real time information.
Information convergence between manufacturing and business systems within
the enterprise allows greater business agility and opportunities for innovation.
Terminal
Services
Patch
Management
Application
Mirror
Level 3
Level 2
Level 1
Level 0
Enterprise Network
Router
FactoryTalk FactoryTalk
Application
Directory
Server
Engineering
Engineering
Workstation
Workstation
Operator
Operator
Interface
Batch
Control
Control
Sensors
Application
Server
Discrete
Control
Control
Drives
Continuous
Process
Control
Control
Actuators
Manufacturing
Zone
Area
Area
Supervisory
Supervisory
Control
Control
Operator
Operator
Interface
Interface
Safety
Control
Robots
DMZ
Firewall
Site Manufacturing
Operations and
and Control
Control
Operations
Engineering
Engineering
Workstation
Workstation
Drive
Control
Web
E-Mail
CIP
Domain
Controller
FactoryTalk
Client
FactoryTalk
FactoryTalk
Client
Client
Firewall
AV
Server
Web Services
Operations
Enterprise
Zone
Basic
Basic
Control
Control
Cell/Area
Zone
Process
The Manufacturing Framework groups levels into the following zones for
specific functions:
Enterprise Zone: Levels 4 and 5 include traditional enterprise IT networks,
business applications such as email and enterprise resource planning (ERP),
and wide area networks (WAN).
Demilitarized Zone (DMZ): This buffer zone provides a barrier between the
Manufacturing and Enterprise Zones, but allows for data to be shared securely.
All network traffic from either side of the DMZ terminates in the DMZ; network
traffic does not directly traverse the DMZ. That is, no traffic directly travels
between the Enterprise and Manufacturing Zones. Additionally, no primary
services are permanently housed in the DMZ and the DMZ shall not
permanently house data.
Manufacturing Zone: Level 3 Site Manufacturing Operations and Control that
addresses plantwide applications such as historian, asset management and
facets of manufacturing execution systems (MES), and consists of multiple
Cell/Area Zones.
Cell/Area Zone: Levels 0, 1 and 2 include industrial control devices such as
controllers, drives, I/O and HMI, and multi-disciplined control applications such
as drive, batch, continuous process and discrete.
FactoryTalk
FactoryTalk, shown in Figure 2, consists of a services platform and modular
production disciplines (hereafter referred to as applications) that tightly
integrate with the Rockwell Automation Logix Control Platform, helping to deliver
a seamless flow of valuable manufacturing data. The Rockwell Automation
Integrated Architecture is comprised of FactoryTalk and Logix, together
providing both plantwide control and enterprise-wide information.
For additional information on Integrated Architecture, see note 1.
There are six distinct FactoryTalk applications that address todays diverse
plant information needs, such as MES, asset management, historian and HMI/
SCADA. The modular system design supports incremental solution deployments
to help users maximize legacy technology investments, while improving the
ability to incorporate new technologies. See notes 7 and 8 for additional
information on FactoryTalk.
Figure 2 - FactoryTalk Integrated Production and Performance Suite
Figure 3 depicts the multi-tier methodology defined by the Cisco and Rockwell
Automation framework. To align with the Manufacturing Framework shown in
Figure 1, Converged Plantwide Ethernet Architectures builds on the Campus
Network Reference Model. Common with enterprise networks, this multi-tier
model naturally segments traffic into three main tiers: core, distribution and
access. This multi-tier model provides redundancy, rapid convergence,
scalability and allows clear network segmentation, all of which are important
in an industrial environment.
Figure 3 - Positioning of FactoryTalk within Converged Plantwide
Ethernet Architectures
Enterprise Zone
Levels 4 and 5
Patch Management
Terminal Services
Application Mirror
AV Server
Detection
Firewall
(Active)
FactoryTalk Application Servers
View
Historian
AssetCentre
Transaction Manager
FactoryTalk Services
Platform
Directory
Security
Data Servers
Cisco
ASA 5500
Cisco Catalyst
6500/4500
Layer 3
Router
Cisco
Catalyst Switch
Layer 3
Network Services
Switch Stack
Cisco Catalyst
3750 StackWise
HMI
Cell/Area Zone
Levels 02
Rockwell Automation
Stratix 8000
Layer 2 Access Switch
FactoryTalk Clients
Engineering
Workstation
Drive
Controller
Distributed I/O
Cell/Area
(Ring Topology)
Layer 2 access switches aggregate control devices within the Cell/Area Zones.
Additionally, they provide layer 2 switching and network services such as
resiliency via Spanning Tree Protocol (STP). Features such as IGMP Snooping,
QoS, and Virtual LANs (VLANs) make sure that multicast traffic is managed, and
critical control traffic is prioritized and properly segmented. This helps to restrict
communications to the necessary network segments, and provides optimized
communication performance for FactoryTalk applications.
Multilayer (layers 2 and 3) distribution switches reside in the Manufacturing
Zone (level 3), bringing together access switches from the Cell/Area Zones
and providing network services. Services include layer 2 and 3 switching, routing,
load balancing, resiliency via Hot Standby Routing Protocol (HSRP), QoS, IGMP
Querier and security.
The core switch aggregates distribution switches and provides high speed
switching, and allows improved scalability and performance for large
networks. Like Converged Plantwide Ethernet Architectures, IT professionals
frequently use core/distribution/access as a common concept and tool within
the enterprise.
The architecture depicted in Figure 3 will vary based on the size of the
Manufacturing Zone to be supported, and requirements such as scalability,
geographical dispersion and availability requirements. Examples of these
scaleable architectures within the Converged Plantwide Ethernet Architectures
are as follows:
Small (Manufacturing Zone of up to 50 nodes)
- collapsed core-distribution switch: multilayer switches with combined core
and distribution functionality
Medium (Manufacturing Zone of up to 200 nodes)
- shown in Figure 3, separate core and distribution switches
Large (Manufacturing Zone of more than 200 nodes)
Site Manufacturing Operations and Control (Level 3)
Site Manufacturing Operation and Control has a dedicated network segment
within the Manufacturing Zone and contains the FactoryTalk application servers.
Administrators should assign a unique IP subnet and Virtual LAN (VLAN) to this
network segment.
The FactoryTalk application servers connect to a dedicated multilayer access
switch, which aggregates into the layer 3 distribution switches. To provide
redundant default gateways to the Cell/Area Zones, use Cisco Catalyst 3750
Stackwise layer 3 distribution switches. If stand-alone distribution switches are
used, then use Gateway Load Balancing Protocol (GLBP) or Hot Standby Routing
Protocol (HSRP) between the distribution switches. These protocols provide
layer 3 failover and load balancing capabilities which are important to ensure the
communications of FactoryTalk applications within level 3 to devices, controllers,
and applications within the lower levels of the control system in the event of
network disruption. FactoryTalk application server redundancy is the subject of a
future whitepaper.
An example of software applications that would be deployed within the level 3
network segment include:
FactoryTalk Services Platform
- Directory
- Activation
- Security
- Diagnostics
- Audit
- Live Data
- Alarms and Events
Application Servers
- Factory Talk View SE
- FactoryTalk AssetCentre
- FactoryTalk Historian
- FactoryTalk Transaction Manager
Engineering Workstation
- RSLogix 5000/500/5
- RSNetWorx
Manufacturing Zone implementations will also include additional applications
and services which are recommended to be replicated within the level 3 network
segment. This helps provide availability to manufacturing assets if connectivity to
the Enterprise Zone is disrupted. Examples of these additional applications and
services include:
Active Directory
DNS
SQL Database
File/Print Server
Policies should identify both security risks and potential mitigation techniques to
address these risks. Mitigation techniques include the use of a defense-in-depth
security approach that addresses internal and external security threats.
This approach utilizes multiple layers of defense (physical and electronic) at
separate manufacturing levels by applying policies and procedures that address
different types of threats. For example, multiple layers of network security protect
networked assets, data, and end points, and multiple layers of physical security
to protect high value assets. No single technology or methodology can fully
secure industrial control systems. For additional details on defense-in-depth,
see notes 10 and 13.
Given the different requirements, priorities, policies, and implications of incidents
between the Enterprise Zone and the Manufacturing Zone, and the desire to
share data, a DMZ should be used as a mitigation technique to provide a buffer
zone between the Manufacturing and Enterprise Zones. The DMZ (Figure 4) can
allow data that needs to be accessed by manufacturing and business systems
to be shared securely, protecting information and accommodating the different
security requirements of these zones.
Figure 4 - Demilitarized Zone (DMZ)
Disconnect Point
Replicated
Services
Enterprise Zone
DMZ
No Direct
Traffic
Disconnect Point
Manufacturing Zone
The FactoryTalk Transaction Manager server (level 3) uses the RSLinx Data
Server to read/write tags to controllers in level 1 utilizing EtherNet/IP.
This same FactoryTalk Transaction Manager server is configured to read/write
its SQL data to and from an MSSQL server located in the DMZ.
This MSSQL server replicates the data to and from the Enterprise Zone
MSSQL server.
Business systems within the Enterprise Zone only access the enterprise
MSSQL server.
Figure 5 - FactoryTalk Transaction Manager and MSSQL Server
SQL
or HTTP
Replicated MSSQL Server
(Transaction Manager Data)
SQL
Replication
Enterprise Zone
Levels 4 and 5
Demilitarized Zone (DMZ)
MSSQL Server
(Transaction Manager Data)
Gbps Link
Failover
Detection
Firewall
(Active)
SQL
Cisco
ASA 5500
Firewall
(Standby)
Layer 3
Router
Cisco
Catalyst Switch
Layer 3
Switch Stack
Network Services
Cell/Area Zone
Levels 02
HMI
EtherNet/IP
Rockwell Automation
Stratix 8000
Layer 2 Access Switch
Drive
Controller
Distributed I/O
Cell/Area
(Ring Topology)
protocol (RDP) connection to the remote access server (RAS) located in the
Manufacturing Zone. The RAS hosts monitoring, management and configuration
applications such as RSLogix 5000, FactoryTalk View Studio and RSLinx.
For this example, the internet client uses Ciscos VPN (virtual private network)
Client to initiate a secure connection to the enterprise edge firewall via IPsec
(IP security). A web browser (HTTPS) on the internet client is used to connect
to the ASA web portal via SSL VPN (secure sockets layer). The firewall web
portal establishes a link to the RAS server via RDP. From within the web
browser on the internet client, the desktop of the RAS terminal server is
accessed and applications such as RSLogix 5000 can be seen and interacted
with. This minimizes the need to load manufacturing software on the remote
clients, and the necessity to check the health status of the remote client itself
(operating system patching and antivirus).
For additional information on Rockwell Automation software application use
with terminal services see note 11. For additional information on secure remote
access to plant floor applications and data see note 9.
Figure 6 - Remote Access Example
Remote Engineer
or Partner
IPSEC
VPN
IPSEC VPN
Enterprise Edge
Firewall
SSLVPN
SSL
VPN
Enterprise
Enterprise
DataCenter
Center
Data
Internet
Enterprise Zone
Levels 4 and 5
Enterprise
Connected
Engineer
Enterprise
Enterprise
WAN
WAN
HTTPS
Patch Management
Terminal Services
Application Mirror
AV Server
View
Historian
AssetCentre
Transaction Manager
FactoryTalk Services
Platform
Directory
Security
Data Servers
Remote Desktop
Protocol (RDP)
Detection
Gbps Link
Failover
Cisco
ASA 5500
Enterprise Zone
Levels 4 and 5
Firewall
(Active)
Firewall
(Standby)
Cisco Catalyst
6500/4500
Layer 3
Router
Layer 3
Switch Stack
Manufacturing Zone
Site Manufacturing
Operations and Control
Level 3
Cisco Catalyst
3750 StackWise
HMI
Rockwell Automation
Stratix 8000
Layer 2 Access Switch
Drive
Controller
Distributed I/O
Cell/Area
(Ring Topology)
Cell/Area Zone
Levels 02
Summary
The convergence of manufacturing and enterprise networks has provided greater
access to manufacturing data, which has led to greater agility in making business
decisions for Manufacturers. The resulting agility has provided Manufacturers
who have embraced the convergence trend with a competitive edge.
Network convergence has also exposed manufacturing assets to security
threats that were traditionally found in the enterprise. Securing manufacturing
assets such as FactoryTalk requires a comprehensive security model based
on a well-defined set of security policies, and the use of a defense-in-depth
security approach that addresses internal and external security threats. This
approach utilizes multiple layers of defense (physical and electronic) at separate
manufacturing levels by applying policies and procedures that address different
types of threats.
General recommendations include:
Establish a DMZ between the Enterprise and Manufacturing Zones.
Keep FactoryTalk applications and Services Platform within the
Manufacturing Zone.
Keep replicated services such as Active Directory within the
Manufacturing Zone.
Utilize a team consisting of IT, operations and engineering professionals
to define a security policy to address manufacturing needs:
- DMZ information convergence - firewall and trust policies
- Remote access for engineers and partners
Use application data replication within the DMZ to converge Manufacturing
and Enterprise Zone information.
Utilize external network and security services (see note 12).
Cisco is the worldwide leader in networking that transforms how people connect, communicate and collaborate. Information about Cisco can be found at www.cisco.com.
For ongoing news, please go to http://newsroom.cisco.com. Cisco equipment in Europe is supplied by Cisco Systems International BV, a wholly owned subsidiary of Cisco
Systems, Inc.
www.cisco.com
Americas Headquarters
Cisco Systems, Inc.
San Jose, CA
Europe Headquarters
Cisco Systems International BV
Amsterdam, The Netherlands
Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco Website at www.cisco.com/go/offices.
CCDE, CCENT, Cisco Eos, Cisco Lumin, Cisco Nexus, Cisco StadiumVision, Cisco TelePresence, Cisco WebEx, the Cisco logo, DCE, and Welcome to the Human Network are trademarks; Changing the Way We Work, Live, Play,
and Learn and Cisco Store are service marks; and Access Registrar, Aironet, AsyncOS, Bringing the Meeting To You, Catalyst, CCDA, CCDP, CCIE, CCIP, CCNA, CCNP, CCSP, CCVP, Cisco, the Cisco Certified Internetwork Expert
logo, Cisco IOS, Cisco Press, Cisco Systems, Cisco Systems Capital, the Cisco Systems logo, Cisco Unity, Collaboration Without Limitation, EtherFast, EtherSwitch, Event Center, Fast Step, Follow Me Browsing, FormShare,
GigaDrive, HomeLink, Internet Quotient, IOS, iPhone, iQuick Study, IronPort, the IronPort logo, LightStream, Linksys, MediaTone, MeetingPlace, MeetingPlace Chime Sound, MGX, Networkers, Networking Academy, Network
Registrar, PCNow, PIX, PowerPanels, ProConnect, ScriptShare, SenderBase, SMARTnet, Spectrum Expert, StackWise, The Fastest Way to Increase Your Internet Quotient, TransPath, WebEx, and the WebEx logo are registered
trademarks of Cisco Systems, Inc. and/or its affiliates in the United States and certain other countries.
All other trademarks mentioned in this document or website are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (0809R)
FactoryTalk, Integrated Architecture, RSLinx, Enterprise, RSLogix, RSNetWorx, are trademarks of Rockwell Automation, Inc.
Rockwell Automation is a leading provider of power, control and information solutions that enable customers to get products to market faster, reduce their total cost of ownership,
better utilize plant assets, and minimize risks in their manufacturing environments.
www.rockwellautomation.com
Americas:
Rockwell Automation
1201 South Second Street
Milwaukee, WI 53204-2496 USA
Tel: (1) 414.382.2000, Fax: (1) 414.382.4444
Asia Pacific:
Rockwell Automation
Level 14, Core F, Cyberport 3
100 Cyberport Road, Hong Kong
Tel: (852) 2887 4788, Fax: (852) 2508 1846
2009 Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved.
Europe/Middle East/Africa:
Rockwell Automation
Vorstlaan/Boulevard du Souverain 36
1170 Brussels, Belgium
Tel: (32) 2 663 0600, Fax: (32) 2 663 0640