Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on Cloud Connected vs On-Premise Services. Your feedback can help us shape the future of services.
Learn more about the survey or Click here to Launch the survey
Schneider Electric Services Innovation Team!

[Imported] Network Security - Common Questions

Remote Operations Forum

Support forum for Schneider Electric SCADA systems, radios and RTUs. From commissioning integration devices and software, to enhancing existing installations or troubleshooting.​

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • Remote Operations
  • Remote Operations Forum
  • [Imported] Network Security - Common Questions
Options
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Joel_Weder
Captain Joel_Weder Captain
76
BevanWeiss
Spock BevanWeiss
20
sbeadle
Kirk sbeadle Kirk
17
MartinChartrand
Captain MartinChartrand Captain
15
View All
Related Products
product field
Schneider Electric
Trio Licensed Radios

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Back to Remote Operations Forum
sbeadle
Kirk sbeadle Kirk
Kirk

Posted: ‎2019-10-25 03:33 PM

0 Likes
0
782
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2019-10-25 03:33 PM

[Imported] Network Security - Common Questions

>>Message imported from previous forum - Category:Trio Data Radios<<
User: joelw, originally posted: 2018-10-17 23:11:22 Id:128
This is a re-posting from the obsoleted (October 2018) "Schneider Electric Telemetry & SCADA" forum

-------------

**_jweder:_**
We often receive questions from those who don't know much about SCADA or Telemetry, but who have been tasked with evaluating our products for network security concerns. Here are a few such questions, along with my replies:

**1. Frequency hopping; How many freqs per second is the rotation?** This is configurable, between 4 and 20 hops (frequency changes) per second. (for J Series)

**2. Who sets the Key(s)? Do they change? Who maintains the keys?** Are you referring to AES encryption keys or to the frequency hopping pattern? I'll assume you are asking about the hopping pattern. With J Series radios the hopping pattern is a pseudo-random sequence that is generated automatically by the specific Access Point radio being used. (each Access Point will use a different pattern) If you had a Trio J Series radio and knew which Access Point was in use, however, you still could NOT configure a remote radio to talk to that AP without more information. You would need also to know the hopping interval (rate) and the Network ID. (name)

**3. Interfacing with the Network: We would be putting an asset on a maintenance VLAN, which would connect to the system. How does the radio system interface with the asset?** J Series radios have two standard 10/100 Mbps LAN connectors. (auto sensing) They act internally like an unmanaged switch.

**4. In the drawing, it shows a cable running from the KR900 (I presume you mean JR900 – the Ethernet frequency-hopping radio, as KR900 is serial-only!) to the computer. What methods are available for interfacing? I.e Wired/Wireless?** Trio radios do NOT include a WiFi or Bluetooth interface. You would use a standard Ethernet cable. Alternately, the radio's two serial ports can be enabled if necessary, and configured to transport various serial data protocols. Typically a 3 wire modem cable (straight-thru) is used for that.

**5. Can we enable and disable connection protocols?** On the LAN side, the Trio radios are protocol-agnostic. They act in a transparent manner, simply transporting the protocol, not getting "involved". If you enable one of (or both of) the serial ports, those however are more sensitive to the protocol used. Modbus, DNP3, DF1 half-duplex, and many other serial protocols can however be carried, depending on serial port configuration.

**6. Does the remote radio configuration support 2 factor Authentication methods?** No, our radios do not support Two Factor Authentication. This is something that no radios in our industry support. Two Factor Authentication appears to use both login username & password, as well as a device such as a key fob, a physical item that would have to be present to allow a user to log in. Certainly that would be complex to implement in order to enable communication traffic on an ongoing basis. Could be done to allow login to the radio for configuration purposes, yes. But again, nobody in our industry is doing that at this time. Also, it would preclude the possibility of over-the-air remote configuration which is a feature many of our customers demand.

**7. I read something about AES 256 bit encryption. AES 256 encryption may optionally be enabled in the J Series radios.** The key is manually configured.

**8. Data: What types of data are actually being transferred? Can we control what data is transferred?** As noted above, the J Series radios act in a transparent manner, very much like an unmanaged switch. There is however a simple filter that can be enabled to block broadcasts & some multicast traffic, and even ARP messages. And also optionally the radio can be configured to only allow traffic to be initiated by a specific MAC address. (or up to 4 MAC addresses)

**9. Mitigation: If radio encryption is broken, what data are we actually losing?** Can they be changed to be able to disrupt the machines, or other malicious activity? I can't answer "what data are we actually losing?" That is totally up to you (or the users of the radio system) and the data that is being sent over the network. But more importantly, I have never heard of anyone breaking AES 256 bit encryption, not even the proverbial "Men in Black." Communication devices are susceptible to complex attacks such as "Man in the Middle" types, and Trio radios are no exception. You need a more complex security-capable communication device to protect against ALL such attacks. But remember that the hacker would need to know multiple things to access the radio network: The hopping pattern, the network ID and the hopping interval. If they were able to gain access to all of that information it really means you've got a deeper problem (eg an "inside job") that would be almost impossible to protect against.

**10. Interfacing with the network, are the devices able to be configured for permissions, set to read only, or such?** Our radios do include user login capability (username and password) for access to the configuration interface. Also, HTTPS (secure web browser) can be enabled and regular HTTP blocked. In such cases a security certificate would be shared by the radio and computer. (generated either by the radio itself or by a 3rd party & uploaded)

**11. Do the devices ONLY read data from the machines?** Our radios do NOT typically get involved in an active way to read data from end devices. They are simply transport layer devices, passing messages from the polling device (a computer, a PLC or an RTU) thru to a remote device, then passing the reply back the other way. Only in the case of serial data transport (over a J Series system) would the attached devices possibly communicate directly to the radio. The radio would convert the Ethernet protocol to a serial protocol, acting as a gateway. But even then, the radios are not actively doing anything, just transporting the messages.

------------------------

bevanweiss:
Is there any intention of Trio radios supporting RADIUS authentication? Then you could claim two-factor authentication also 🙂
Since certain RADIUS servers can be setup with two-factor 'passwords'.

------------------------

**_jweder:
There definitely has been work in support of adding Radius authentication. It's on the Roadmap for the near future, but can't give you a date. Most likely it would appear in the Q licensed radio first, then J Series license-free later.
If you know of any specific project(s) being lost due to lack of this feature please do let us know, as that can definitely influence the development timeline._**

Labels
  • Labels:
  • Radio
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic
Replies 0
To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of