05-6909A01 Orbit MCR Applications Guide
05-6909A01 Orbit MCR Applications Guide
These examples are designed for use via the Cell Interface. A properly provisioned SIM card will need to be
purchased from a cellular provider and installed before Cell configurations can be attempted.
Internet Protocol security (IPsec) uses cryptographic security services to protect communications over Internet Protocol (IP)
networks. IPsec supports network-level peer authentication, data origin authentication, data integrity, data confidentiality
(encryption), and replay protection.
IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet Protocol Suite, while some other
Internet security systems in widespread use, such as Transport Layer Security (TLS) and Secure Shell (SSH), operate in the
upper layers at Application layer. Hence, only IPsec protects any application traffics over an IP network. Applications can be
automatically secured by its IPsec at the IP layer. Without IPsec, the protocols of TLS/SSL must be inserted under each of
applications for protection.
Internet Key Exchange (IKE) Before secured data can be exchanged; a security agreement between two computers must
be established. In this security agreement, called a security association (SA), both agree on how to exchange and protect
information.
To build this agreement between the two computers, the Internet Engineering Task Force (IETF) has established a
standard method of security association and key exchange resolution named Internet Key Exchange (IKE) which:
Centralizes security association management, reducing connection time.
Generates and manages shared, secret keys that are used to secure the information.
This process not only protects communication between computers, it also protects remote computers that request secure
access to a corporate network. In addition, this process works whenever the negotiation for the final destination computer
(endpoint) is performed by a security gateway.
Network address translation (NAT) is a methodology of modifying network address information in Internet
Protocol (IP) datagram packet headers while they are in transit across a traffic routing device for the purpose of remapping
one IP address space into another. 1:1 NAT is a method so devices within the same Subnet (or overlapping Subnets) may
establish a secure connection.
Virtual private network (VPN) extends a private network across a public network, such as the Internet. It enables a
computer to send and receive data across shared or public networks as if it is directly connected to the private network,
while benefiting from the functionality, security and management policies of the private network. A VPN is created by
establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or
traffic encryptions.
Contents
Orbit to Orbit via Cell with Port Forwarding ...........................................................................................................................6
Orbit to Orbit via Cell with IPsec (1 Tunnel).............................................................................................................................8
Orbit to Orbit via Cell with IPsec (1 Tunnel) 1 to 1 NAT .................................................................................................. 10
PC to Orbit via Cell with IPsec (1 Tunnel) VPN..................................................................................................................... 12
PLC to Orbit via Cell via Port Forwarding Rules ................................................................................................................. 14
External Firewall to Orbit via Cell w/IPsec (2 Tunnels).................................................................................................... 16
External Firewall to ORBIT via Cell w/IPsec (3 Tunnels) ................................................................................................. 17
Orbit to Multiple Orbits via Cell w/Port Forwarding ........................................................................................................ 19
Orbit to Multiple Orbits via Cell w/IPsec Tunnel(s) ............................................................................................................ 22
Static NAT
Orbit-2
RTU
Cell Tower
Management PC
Orbit-1
PLC
Configure Port Forwarding Rules Destination NAT Orbit™ MCR | Port Forwarding
Orbit-2
RTU
Cell Tower
Orbit-1 KEY
Management PC IPSEC Tunnel
PLC
Orbit-2
RTU
Cell Tower
Orbit-1 KEY
Management PC IPSEC Tunnel
PLC
This configuration allows a PLC connected to Orbit-1 to communicate with the RTU
on the “LAN” side of Orbit-2 through a secure IPsec VPN Tunnel.
This also allows a Management PC to communicate with Orbit-1, Orbit-2, and the RTU
through a secure IPsec VPN Tunnel.
This configuration also allows both sides of the tunnel to have overlapping subnets.
Static NAT Static NAT Orbit™ MCR | Static NAT over IPsec VPN
Orbit-1
RTU
Cell Tower
Internet KEY
Management PC VPN/IPSEC Tunnel
Orbit-2
Orbit-1
Cell Tower
Internet
Ethernet Switch
Management
PC
PLC
Configure Port Forwarding Rules Destination NAT Orbit™ MCR | Port Forwarding
Orbit-1 Orbit-2
RTU RTU
Cell Tower
Management PC
Internet
Ethernet Switch
KEY
IPSEC Tunnel 1
IPSEC Tunnel 2 External Firewall
PLC
Orbit-1 Orbit-2
PLC RTU
Cell Tower
Management PC
Internet
Ethernet Switch
KEY
IPSEC Tunnel 1
IPSEC Tunnel 2 External Firewall
IPSEC Tunnel 3
Orbit-2
Orbit-3
RTU
RTU
Orbit-4
Orbit-1
Management
PC
PLC
Orbit to Multiple Orbits via Cell w/Port Forwarding
Manual Single topic YouTube
Configuration Steps
Section Channel Videos
Configure LAN side of Orbit to meet
Bridging Orbit™ MCR | Static IP Configuration
IP address requirements
Packet Filtering Orbit™ MCR 4G | Adding and Deleting
Configure Firewall Service Rules:
(Firewall) Firewall Rules
It is recommended to modify
IN_UNTRUSTED and
OUT_UNTRUSTED
Orbit™ MCR l Cellular Interface
Configure LOCAL-NETS:
Firewall and Nat Verification
LOCAL-NETS must match
Local Subnet(s)
Source Network
Orbit™ MCR l Network Address
Configure NAT to: Address
Translation NAT
Translation(NAT)
Change Source Address for outgoing
Cell traffic
Configure Port Forwarding Rules Destination NAT Orbit™ MCR | Port Forwarding
Orbit-2 Orbit-3
RTU
RTU
Orbit-4
RTU
Cell Tower
Orbit-1 KEY
IPSEC Tunnel 1
Management
IPSEC Tunnel 2
PC IPSEC Tunnel 3
PLC
Orbit to Multiple Orbits via Cell w/IPsec Tunnel(s)
Manual Single topic YouTube
Configuration Steps
Section Channel Videos
Configure LAN side of Orbit to meet
Orbit™ MCR | Static IP Configuration
IP address requirements
Packet Filtering Orbit™ MCR | Adding and Deleting
Configure Firewall Service Rules:
(Firewall) Firewall Rules
It is recommended to modify
IN_UNTRUSTED and
OUT_UNTRUSTED
Orbit™ MCR l Cellular Interface
Configure LOCAL-NETS:
Firewall and Nat Verification
LOCAL-NETS must match
Local Subnet(s)
REMOTE-NETS must match Remote
Subnet(s)
Configure IKE: VPN Refer to IPsec Videos
Allow IKE Destination Traffic IN
Need to Configure:
IKE Policy
IKE Peers (1 Peer MUST be
configured for each Tunnel)
IPsec Policy
IPsec Connections (1 Connection
MUST be configured for each
Tunnel)
References:
1. Kent, S.; Atkinson, R. (November 1998). IP Encapsulating Security Payload (ESP). IETF. RFC 2406.
GE MDS, LLC
175 Science Parkway
Rochester NY, 14610
Telephone: +1 585 242-9600
FAX: +1 585 242-9620
www.gemds.com