Advantech’s Security Pack

June 29, 2018
Advantech’s IIoT Automation is introducing its security pack, which defends users from malicious attacks and confidential information leakage.

Advantech’s IIoT Automation is introducing its security pack, which defends users from malicious attacks and confidential information leakage.

Common threats such as information theft, DNS spoofing, and denial-of-service attack can cause a tremendous loss. Unencrypted raw data, a lack of IP and MAC address control, and the short of network access authentication mechanism are usually the root cause. With Advantech’s Security Pack, data security can be highly enhanced because of the following features.

Access Control List (ACL)
Legal host with known IP and MAC addresses is bundled on a specific port to access the network.

Network Access Control: IEEE 802.1X
This feature provides an authentication mechanism to devices wishing to access a LAN or WLAN.

IP Security: DHCP Snooping
When DHCP servers are allocating IP addresses to clients on a LAN, DHCP snooping can be configured on LAN switches to prevent malicious or malformed DHCP traffic or communication with rogue DHCP servers.

IP Security: ARP Spoofing Prevention
ARP spoofing may allow an attacker to intercept data frames on a network or even modify or stop traffic. Often, this attack is used as an opening for other attacks, such as denial of service, man-in-the-middle, or session-hijacking attacks.

IP Security: IP Source Guard
Same as ACL, this feature permits IP traffic from known IP addresses, dropping all other traffic to prevent spoofing attacks.

Login Authentication
This feature provides a cryptographic network protocol for operating network services securely over an unsecured network.

All Advantech Managed Switches support Security Pack. For more information please click here.

Sponsored Recommendations

Food Production: How SEW-EURODRIVE Drives Excellence

Optimize food production with SEW-EURODRIVE’s hygienic, energy-efficient automation and drive solutions for precision, reliability, and sustainability.

Rock Quarry Implements Ignition to Improve Visibility, Safety & Decision-Making

George Reed, with the help of Factory Technologies, was looking to further automate the processes at its quarries and make Ignition an organization-wide standard.

Water Infrastructure Company Replaces Point-To-Point VPN With MQTT

Goodnight Midstream chose Ignition because it could fulfill several requirements: data mining and business intelligence work on the system backend; powerful Linux-based edge deployments...

The Purdue Model And Ignition

In the automation world, the Purdue Model (also known as the Purdue reference model, Purdue network model, ISA 95, or the Automation Pyramid) is a well-known architectural framework...