Cyber Security As critical infrastructure networks become smarter, automated and more connected, they are also more susceptible than ever to cyber threats. Communication networks of power grids, water systems, public transportation, and oil rigs are subjected to hundreds, sometimes thousands of cyber attacks per day. RAD’s secure-by-design Service Assured Networking solutions ensure that your operational network remains reliable and protected at all times. 3-Tier Electronic Security Perimeter (ESP) Protection Built-in cyber security for any critical infrastructure application Access Control SCADA FW Site-to-Site Data Encryption Multiservice Networking Node with x86 Megaplex-4 Device Connection Control (DCC) 802.1x network access control Secure Interactive Remote Access Intermediate system Malicious Communication Detection SCADA aware FW, IPS, anomaly detection Man-in-the-middle attack prevention Preventing spoofing and tampering Phase 2 MACsec and IPsec encryption Ruggedized SCADA-Aware Gateway/Switches and Routers SecFlow® Scan for cyber security video >>> Boosting NERC-CIP Compliance RAD’s SAN solutions are in line with recent North American Electric Reliability Corporation Critical Infrastructure Protection (NERC-CIP) directives to boost your cyber security and compliance levels: • Encryption and integrity for all communications outside ESP • Application (SCADA) aware firewall • Record/monitor all device connections in substations High Voltage/Medium Voltage (HV/MV) Substation Electronic Security Perimeter Access point Operational WAN Phase 2 Megaplex/SecFlow Multi-Layer Security-by-Design •• Strategically located to securely manage all electronic access to the substation’s ESP, and to protect the cyber assets within it from external and internal attacks: •• Device connection control (DCC) using IEEE 802.1x Network Access Control to ensure authenticated and authorized internal substation connections •• SCADA-aware security layer, including firewall, intrusion prevention, anomaly detection, and more •• Boost compliance level with NERC-CIP requirements for bulk electric systems (BES) protection •• Layered security approach addresses all vulnerability points including integrity, confidentiality (encryption), authentication, authorization, and auditing •• Access control, user authentication and privilegelevel associations for local and remote access using Secure Shell (SSH), TACACS or RADIUS •• IEEE 802.1AE (MACsec) and IPsec encryption and data integrity verification to prevent sourcespoofing, session hijacking, Man in the Middle and Distributed Denial of Service (DDoS) attacks www.rad.com Specifications are subject to change without prior notification. The RAD name, logo and logotype are registered trademarks of RAD Data Communications Ltd. RAD product names are trademarks of RAD Data Communications Ltd. ©2016 RAD Data Communications. All rights reserved. Catalog number 802715, Version 4/16 Your Network’s Edge