Specification Sheets - OT Cyber Security
Specification Sheets - OT Cyber Security
Data sheet
Cisco public
Model overview
Secure Firewall Model Firewall FW+AVC+IPS IPS Throughput Interfaces Optional interfaces
3110 18G 17G 17G 8 x RJ45, 8 x 1/10G SFP+ 10G SFP+
3120 22G 21G 21G 8 x RJ45, 8 x 1/10G SFP+ 10G SFP+
3130 42G 38G 38G 8 x RJ45, 8 x 1/10/25G SFP+ 10G/25G/40G SFP+, 4X40G NM
3140 49G 45G 45G 8 x RJ45, 8 x 1/10/25G SFP+ 10G/25G/40G SFP+, 4x40G NM
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Secure Firewall 3100 Series | 3
Data sheet
Cisco public
1 Throughput measured with 50% TLS 1.2 traffic with AES256-SHA with RSA 2048B keys.
NOTE: Performance will vary depending on features activated, and network traffic protocol mix, and packet size characteristics.
Performance is subject to change with new software releases. Consult your Cisco representative for detailed sizing guidance.
Table 3. Cisco Secure Firewall 3100 Series performance and capabilities, running on ASA software
1 Throughput measured with 1500B User Datagram Protocol (UDP) traffic measured under ideal test conditions.
2 “Multiprotocol” refers to a traffic profile consisting primarily of TCP-based protocols and applications like HTTP, SMTP, FTP, IMAPv4, BitTorrent, and DNS.
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Secure Firewall 3100 Series | 4
Data sheet
Cisco public
Hardware specifications
Table 4. Cisco Secure Firewall 3100 Series hardware specifications
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Secure Firewall 3100 Series | 5
Data sheet
Cisco public
Table 5. Cisco Secure Firewall 3100 Series NEBS, Regulatory, Safety, and EMC Compliance
Specification Description
Regulatory compliance Products comply with CE markings per directives 2004/108/EC and 2006/108/EC
Safety • UL 62368-1
• CAN/CSA-C22.2 No. 62368-1
• EN 62368-1
• IEC 62368-1
• IEC 60950-1
• AS/NZS 62368-1
• GB4943
EMC: emissions • FCC 47CFR15 Class A
• AS/NZS CISPR 32 Class A
• EN55032/CISPR 32 Class A
• ICES-003 Class A
• VCCI Class A
• KS C 9832 Class A
• CNS-13438 Class A
• EN61000-3-2 Power Line Harmonics
• EN61000-3-3 Voltage Changes, Fluctuations, and Flicker
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco Secure Firewall 3100 Series | 6
Data sheet
Cisco public
Specification Description
EMC: Immunity • IEC/EN61000-4-2 Electrostatic Discharge Immunity
• IEC/EN61000-4-3 Radiated Immunity
• IEC/EN61000-4-4 EFT-B Immunity
• IEC/EN61000-4-5 Surge
• IEC/EN61000-4-6 Immunity to Conducted Disturbances
• IEC/EN61000-4-11 Voltage Dips, Short Interruptions, and Voltage Variations
• KS C 9835
EMC: ETSI/EN • EN 300 386 Telecommunications Network Equipment (EMC)
• EN55032/CISPR 35 Multimedia Equipment (Emissions)
• EN55024/CISPR 24 Information Technology Equipment (Immunity)
• EN55035/CISPR 35 Multimedia Equipment (Immunity)
• EN61000-6-1 Generic Immunity Standard
Cisco Capital
Flexible payment solutions to help you achieve your objectives
Cisco Capital makes it easier to get the right technology to achieve your objectives, enable business transformation and help
you stay competitive. We can help you reduce the total cost of ownership, conserve capital, and accelerate growth. In more than
100 countries, our flexible payment solutions can help you acquire hardware, software, services and complementary third-party
equipment in easy, predictable payments. Learn more.
© 2022 Cisco and/or its affiliates. All rights reserved. Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list
of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a
partnership relationship between Cisco and any other company. C78-745072-02 08/22
Firewall (OT)
DeltaV Distributed Control System Product Data Sheet
October 2024
Emerson NextGen
Smart Firewall
The Emerson NextGen Smart Firewall protects the DeltaV ™ system with an easy-to-use perimeter defense solution.
www.emerson.com/deltav 2
Emerson NextGen Smart Firewall October 2024
Hardware Description
The Emerson NextGen Smart Firewall is a DIN rail, or rack mountable, 20-48 V DC device. It is a fanless device with rugged
convection cooled metal construction fit for industrial environments.
Emerson NextGen Smart Firewall all copper Ethernet (TX) model. Emerson NextGen Smart Firewall dimensions.
Recovery Port – serial port to access Command Line L2.5 and the DeltaV Security Zone
Interface (CLI) for same role based configuration access as
The Emerson NextGen Smart Firewall is specifically
the WebUI.
designed to be installed at the perimeter of the DeltaV
External Local Area Network (LAN) Connection – system and help manage external communication
network connection for external LAN. connections between the plant LAN or DMZ (demilitarized
zone) and DeltaV workstations. Locating the firewall
DeltaV Connection – network connection to the L2.5
between DeltaV workstations and external plant networks
on the DeltaV workstations.
creates a network that needs to be treated as part of the
Status Indicator LEDs – provides visual indication of DeltaV security zone.
firewall status.
This network is architecturally located between the level
Power Inputs and Supplies: Bringing power from two 2 control network and the level 3 external network and is
different sources increases overall availability. referred to as the “L2.5.”
USB Drive: Stores configuration for quick firewall
replacement if option is enabled by the user.
www.emerson.com/deltav 3
Emerson NextGen Smart Firewall October 2024
Installing the Emerson NextGen Smart Firewall effectively All communications allowed through the firewall should
locates the boundary of the DeltaV system at the external be tightly managed to permit only data flows and remote
output of the firewall. The firewall and the networks below user access necessary to manage the system and export or
the firewall should be treated as high security zones. import process information.
Plant/Enterprise LAN
Level 3 LAN
www.emerson.com/deltav 4
Emerson NextGen Smart Firewall October 2024
Ideally, each DeltaV system should have a dedicated Emerson NextGen Smart Firewall Setup
Emerson NextGen Smart Firewall for ease of management and Management
and maintenance. L2.5 should only contain computers
and devices that are dedicated to support the single DeltaV The Emerson NextGen Smart Firewall management
system connected to the DeltaV side of the firewall port. interface has several sections that group
Computers that will be accessed by other DeltaV systems similar functionality.
or other control systems should be in the DMZ. Access to the information in the tabs is user access
controlled, so changes to the firewall settings can be
Secure Configuration assigned based on user roles.
The user interface of the Emerson NextGen Smart Firewall
encourages a more secure environment where adding Easy-to-Configure Communications Access
new connections or new external computers to the system The “smart” part of the Emerson NextGen Smart Firewall lies
require deliberate action by the firewall administrator. in the pre-loaded list of DeltaV application rules increasing
This prevents unauthorized users from easily gaining configuration simplicity.
access to the DeltaV control system without the knowledge
The list includes application rule information for all
of the firewall administrator.
the standard DeltaV applications that are designed to
communicate with applications located on the L3/DMZ
The Firewall Configuration Interface
Network computers or above.
The Emerson NextGen Smart Firewall is configured from
The UI shows all communication paths through the firewall
a built-in web-based interface (WebUI) that can be accessed
that are currently being used.
from any workstation on the DeltaV network with network
access to the firewall. The WebUI is password-protected Pre-loaded application rules are part of the configuration
with granular access control that allows for four different and can be managed by the user to delete rules that would
levels of user access (and one deny-list). never be used in a specific system, to reduce the size of the
list and, to configure custom rules.
Firewall User Roles
Applications can also be disabled or deleted so that they do
There are different levels of user access: Administrator, not appear in the application list when creating authorized
Engineer, Auditor and Guest. Administrator has access communications. This allows the administrator to delegate
to all functions for viewing and configuring the the ability to create a very limited set of communications to
firewall configuration. a user assigned the “engineer” access role.
Engineer can configure some features (enable/disable Rules can be renamed to fit the context of a specific
protection rules) but cannot manage other users. site’s nomenclature.
Creating new firewall users and assigning one of the preset Customer-specific (custom) rules can easily be created
roles is easy. and added to the list to support non-DeltaV applications
that will communicate through the firewall.
www.emerson.com/deltav 5
Emerson NextGen Smart Firewall October 2024
*For the Rackmount Kit, the power supplies are rated at a max operating temperature of 55°C.
www.emerson.com/deltav 6
Emerson NextGen Smart Firewall October 2024
Capacities
Max Throughput Up to 1 Gbps (1000 Mbps)
Max VPN Sessions 64 max VPN Tunnels possible
Max Concurrent VPN Connections 16 max active sessions
www.emerson.com/deltav 7
Emerson NextGen Smart Firewall October 2024
Ordering Information
Emerson NextGen Smart Firewall - Copper Internal Ports, Copper External L2.5 Port VE6206TX
Emerson NextGen Smart Firewall - Copper Internal Ports, SFP Fiber External L2.5 Port. VE6206SFP
A Fiber Optic SFP Transceiver is required (and not included).
DeltaV Bulk Power Supply 100-240 V AC to 24 V DC, 5A. This option is available if VE5138
you want to order the power supply component as a standalone. Otherwise, for the
complete “KIT”, reference VE6206XX-KIT part numbers below.
Rackmount Adapter for use with Emerson NextGen Smart Firewall. This option VE6206RM
is available if you want to order the power supply component as a standalone.
Otherwise, for the complete “KIT”, reference VE6206XX-KIT part numbers below.
www.emerson.com/deltav 8
Emerson NextGen Smart Firewall October 2024
Rackmount Kit
The Emerson NextGen Smart Firewall is available in a 2U, 19inch x 8.5inch Rackmount Kit that consists of: one firewall,
two 24V DC power supplies, and a 2U rack mount.
Rackmount Kit: Emerson NextGen Smart Firewall, SFP and Copper Ethernet Ports; VE6206SFP-KIT
Two 24V DC Power Supplies*, and 1 Rackmount Adapter. Does not include power
cabling. A Fiber Optic SFP Transceiver is required (and not included).
*Power supplies max operating temperature 55°C
Fiber Optic SFP Transceivers for use in Emerson NextGen Smart Firewall
The Gigabit transceivers can be used only in the gigabit WAN port of the VE6026SFP model.
The transceiver VE6050T011 cannot be used when certain certifications are required such as: KCC.
Note: The Emerson NextGen Smart Firewall must use the transceiver modules indicated below. It is not compatible with other brands of transceiver modules.
Transceiver for Emerson NextGen Smart Firewall: 1 Gigabit Ethernet; Multi-mode, VE6050T07
for up to 550 meters of fiber-optic cable (M-SFP-SX/LC EEC).
www.emerson.com/deltav 9
Continuous Threat Detection
(CTD)
Industrial
SOLUTION OVERVIEW
Claroty Continuous Threat Detection (CTD) was created to help • Provides a contextualized
operational and/or cyber practitioners overcome the challenges of root-cause analysis and risk-
cyber-physical connectivity. Achieving resilience is far from impossible – based scoring for all alerts
and it requires a robust set of requirements that cannot be satisfied by • Integrates with Claroty xDome
traditional IT-centric solutions. Powered by an unmatched library of CPS Secure Access to enhance
communication protocols and in-depth industry knowledge, remote session incident
CTD provides superior visibility to OT environments. This enables the response and investigation
further implementation of core cybersecurity controls that span the
• Leverages existing IT
entire cyber-physical security journey. These controls cover:
infrastructure such as SIEM,
• Exposure Management Firewalls, SOAR, CMDB tools
to extend core cybersecurity
• Threat Detection
capabilities to industrial
• Remote Incident Response
environments
This multi-spectral approach helps to uncover parts of the network that are not suitable for a single discovery
method and results in unmatched visibility into CPS environments. This depth of discovery is seen across three
This multi-spectral
aspects of visibility: approach helps to uncover parts of the network that are not suitable for a single
discovery method and results in unmatched visibility into CPS environments. This depth of discovery is
1.seen
Breadth of three
across Discovery: Employ
aspects distinct, highly flexible methods that can be combined or used separately to
of visibility:
1. Breadth
create of Discovery:
comprehensive Employ distinct, highly flexible methods that can be combined or used
asset profiles
separately to create comprehensive asset profiles
2. Zone-Based Mapping: Leverage in-depth asset profiles and communication monitoring to automate virtual
2. Zone-Based Mapping: Leverage in-depth asset profiles and communication monitoring to
segmentation
automateof virtual
the OTsegmentation
network into Virtual
of the Zones.
OT network into Virtual Zones.
3. Identify Asset Changes: Additions to the network,
3. Identify Asset Changes: Additions to the network, configuration
configuration changes, changes, and anomalies
and anomalies are some ofare
the
some of the many variables monitors by xDome to support MoC programs
many variables monitored by CTD to support MoC programs
n Threat Detection
Threats to OT networks are often innovative yet can be deceptively simple, exploiting our compulsion toward
etworks are often innovative yet can be deceptively simple, exploiting our compulsion
process adherence to introduce risk. CTD utilizes multiple detection engines to automatically profile all
adherence to introduce risk. CTD utilizes multiple detection engines to automatically
assets, communications, and processes in OT networks, generate a behavioral baseline that characterizes
, communications, and processes in OT networks, generate a behavioral baseline that
legitimate traffic in order to weed out false positives, and alert users in real-time to anomalies and known,
gitimate traffic in order to weed out false positives, and alert users in real-time to
unknown, and emerging threats. Highlights:
nown, unknown, and emerging threats. Highlights:
• Detect Known and Unknown Threats: Characterize legitimate traffic to detect anomalous communications,
Known and Unknown Threats: Characterize legitimate traffic to detect anomalous
identify threat signatures, weed out false positives, and alert users in real-time to known, unknown, and
nications, identify threat signatures, weed out false positives, and alert users in real-time
emerging threats.
n, unknown, and emerging threats.
• Operational
onal Event EventContinuously
Alerting: Alerting: Continuously monitor
monitor criticalchange
critical change operations in thein
operations industry environment to
the industry
help ensure your process integrity and uptime, receiving alerts for actions like configuration downloads
ment to help ensure your process integrity and uptime, receiving alerts for actions like
which provide insights into the exact code changes within a file.
ation downloads which provide insights into the exact code changes within a file.
ATT&CK • MITRE
AlertATT&CK Alert Mapping:
Mapping: IncomingIncoming alerts
alerts arearemapped
mapped toto thethe
MITRE ATT&CK
MITRE for ICS Framework
ATT&CK for ICSto
help increase the context surrounding the event and assist in identifying known remediation measures.
ork to help increase the context surrounding the event and assist in identifying known
tion measures.
• Root Cause Analysis: Reduce network noise, false positives, and overall alert fatigue by correlating related
ause Analysis: Reduceinto
alerts and indicators network
a single noise, false positives,
chain-of-events, and overall
providing a consolidated alert
view of thefatigue by
activities
surrounding an alert.
ng related alerts and indicators into a single chain-of-events, providing a consolidated
he activities surrounding an alert.
Receive alerts and related Investigate remote user activity Respond to remote incident alerts
indicators for events during remote with access to remote logs, live with the ability to immediately
sessions directly within CTD monitoring, and recorded sessions disconnect remote sessions
Our solutions, paired with cloud-based or on-premises deployment modes, eliminate the need to purchase and
maintain multiple point products and provide the flexibility to choose the deployment approach that best suits
asset owners’ scalability needs, cost considerations, and compliance requirements. This dynamic approach to
CPS cybersecurity is why Claroty is able to help critical infrastructure enterprises reduce the cyber risk that
results from increased connectivity with the quickest time-to-value (TTV) and a lower total cost of ownership
(TCO)–regardless of the scale or maturity of the asset owners’ CPS cybersecurity program.
About Claroty
Claroty empowers organizations to secure cyber-physical systems across industrial, healthcare, commercial, and public sector environments:
the Extended Internet of Things (XIoT). The company’s unified platform integrates with customers’ existing infrastructure to provide a full
range of controls for visibility, exposure management, network protection, threat detection, and secure access.
Backed by the world’s largest investment firms and industrial automation vendors, Claroty is deployed by hundreds of organizations at
thousands of sites globally. The company is headquartered in New York City and has a presence in Europe, Asia-Pacific, and Latin America.
To learn more, visit claroty.com.