Should Your Industrial Network Be a Software-Defined Network?
As nearly every other aspect of industrial technology goes digital, so too are industrial networks. And not just the communications that travel across these networksâwhich have long been digitizedâbut the networks themselves.
SDN differs from traditional networks that use routers and switches to control network traffic. Instead, SDN creates a virtual network to control traditional network hardware via software.
âEssentially, it transforms network operations to make it more like cloud management instead of physically maneuvering hardware switches, gateways, firewalls and other network appliances, said Chiradeep BasuMallick in an article posted by SpiceWorks.
With SDNâs ability to control the routing of data packets through a centralized server, businesses can âsegment different virtual networks within a single physical network or connect devices on different physical networks to create a single virtual network,â according to VMWare. This is a key aspect of using SDN to secure industrial networks.
Why SDN?
At the 2023 Industry of Things World event in San Diego, Jeffrey Smith, chief technology officer at Dynics, discussed using SDN to address industrial cybersecurity. Dynics is a supplier of cybersecurity tools and industrial automation hardware and software.
Another benefit of SDNs, according to Smith, is that itâs impossible to create problematic loops when connecting Ethernet cables to device ports.
Jessica Forguites, technical platform lead at Rockwell Automation, noted that SDN provides additional flexibility to networks when it comes to adding or removing devices or moving devices to different areas of a network. SDN provides âautomated network responses to common operations conditions, such as devices being taken out of service for maintenanceâwhich necessitate new communication paths to be establishedâor establishing connectivity for devices that are moving to different locations of the network,â she said. âSDN helps reduce the workload for network operations teams that manage and monitor networks and it improves response to stakeholders that need to use the network.â
Despite the perception that SDN deployments can be difficult at brownfield sites, Smith noted that his teams have deployed numerous SDN networks in brownfield environments and that implementation was âsignificantly easier in that [brownfield] situation than any other type of segmentation project for existing systems.â He added that âwe deployed in a brownfield about two months ago and it only took two hours from starting to move cables to the new system and configuring the controller to having a fully productive system. We went from a flat network with zero security to having a fully micro-segmented network that was production ready in two hours.â
Smith noted that âeven with the advantages inherent in SDN, previous attempts to deploy enterprise SDN solutions in the OT space have been challenging to deploy and often failed. But SDN solutions which are designed for the OT space and include functionality designed with OT in mind, are very successful.â
Smith noted that moves toward SDN in the OT space represent a big shift for plant floor networks because SDN is ânot traditional cybersecurity.â
Non-traditional cybersecurity
âI donât believe zero trust is totally achievable today or at any time within the confines of todayâs networking technology,â said Smith, adding that âSDN gets you closer to zero trust than anything else.â
Smithâs reasoning here is based on how SDN microsegments a network, thus rendering VLANs unnecessary. In an SDN, allowed communications are called âflowsâ and are endpoint device centric.
âWith SDN, the network is segmented lower than the physical levelâmuch more so than can be done using other methods,â said Smith. He added that SDNs are âdeny by defaultâ because they donât allow communications between devices outside of permitted flows between specific devices. This level of allowance is why Smith contends that SDN delivers the most zero trust possible network communications.
Another benefit of SDNâs permitted communications is that âif you lose the path between two end points, the flows are recalculated and redeployed to allow continued communication,â said Smith.
This means that keeping track of which ports are used on a device doesnât matter in SDN, according to Smith. Essentially, âif devices are allowed to talk to each other on network, theyâre allowed to talk,â he said.
Forguites added that âit is critical to ensure that policies for network access are monitored and maintainedâ with any network configuration. âRockwell incorporates CIP Security across many of our products to help equipment designers/maintainers do this with their control system applications using FactoryTalk Policy Manager,â she said.
OT challenges addressed by SDN
SDN on its own addresses many OT networking and cybersecurity issues, but not all. This is because âSDN networks are configured the way OT folks think about network assets,â Smith said.
A few key capabilities of SDN relevant to an OT perspective include:
- Ability to allow or prevent network device updates based on permissions.
- No network expertise is required of OT personnel to create secure systems. âYou can put the controller in learn mode and restrict actions that you see on a list of communications taking place on the network,â Smith said.
- Manage remote access to devices on the OT network.
For example, engineers âoften have trouble with certificate exchanges between controllers and I/O,â said Smith. âBut SDN levels the playing field because itâs endpoint centric.â Regardless of what vendor devices youâre using, SDN allows one device to communicate with another as directed by SDN.
Any time communications are attempted outside of approved flows, the SDN provides nearly real time notification because the network fabric itself is making the notification, not an auxiliary device or software.    Â
This means there are no issues with installing new equipment if thatâs allowed in your SDN architecture, he added.
âSDN controls the connections and protocols while maintaining a security posture,â said Smith. âIf [new equipment additions are] allowed, youâll get notifiedâwithin millisecondsâof the change with an information-rich visual network topology and an updated list of end point assets.â
As noted by David Smit of system integrator Interstates in a column written for Automation World, âPlant controls engineers might be change-averse, but SDNâs policy-based rules are attractive to people who are constantly having to engage IT to reconfigure devices to different switches or ports. With user-friendly SDN, devices can be moved to other switches or networks by the controls engineers, giving them more freedom.âÂ
Forguites added that she sees software-defined WANs (wide area networks) being used heavily for WAN connectivity in industry. âThis carries a lot of benefit due to the dynamic nature of WAN connectivity,â she said. âAlso, for applications that require wireless connectivity, these concepts are being leveraged for end device mobility needs and the benefits associated with the use of common policies for connectivity as devices get moved around.â
Despite its configuration and cybersecurity advantages, Smith cautioned that SDN should not be viewed as a âsilver bulletâ when it comes to network security as it does not provide for access controlâan aspect of network cybersecurity thatâs becoming more popular across industry.
Access control is not supported by SDN because SDN canât tell who is logged into someoneâs laptop accessing the network. âHowever, [tools such as] Veracityâs SDN Controller for OT adds functionality that helps facilitate more user-centric control,â Smith noted. âYou can stop and prevent what shouldnât happen before it happens.â




