User Manual
IF1000series 7
©ads‐tecGmbH•Raiffeisenstr.14•70771Leinfelden‐Echterdingen
3 Introduction
TheIndustrialFirewallconstitutesalinkbetweentheITworldandautomation,therebymeetingthe
requirementsofITsecurityaswellasthosebytheproductionlinemaintenancepersonnel.Itenablesmonitoring
andcontroloftheplantsetupnetwork,andoftherelativeaccesspoints.Itsessentialsecurityprotection
mechanismis
constitutedbytheevent‐dependentandphysicalnetworkseparation.ThisFirewallfurthermore
offers,amongstothers,asecureaccessintheeventofserviceoperations;itenablestrafficshapingandis
capableofimplementingtheavailablevirusscanners.
Note:
Fortheefficientonlineconfigurationofyourads‐tecdevices,it
ispossibletodownload
thecurrentversionofthefreetool„IDAlight"onthecompany`shomepage
http://www.ads‐tec.de.Thetooloffersyouforexamplethepossibilityofdefining
individualparametersorwholegroupsofparametersataServerdeviceandtotransfer
yoursettingstoalimitedselectionand/orto
allads‐tecdevicesofsamedesignand
version,withouthavingtomaketheseconfigurationstime‐consumingateachindividual
device.YoualsohavethepossibilityofassigningsequentialIPaddressesforyourads‐tec
devices.
WithIDAlightyoucancomfortablyprovideowngroupsofparametersaccordingto
your
specificrequirementsandmodifythematanytime.
3.1 Cut&Stop
Duringcriticalstart‐uporproductionphases,theEthernetuplinkcanbephysicallydisconnectedi.e.via
hardware,througha24Vinput.Thiswillsafelyruleoutbothintentionalandunintentionalexternal
manipulation.
Theuplinkisreconnectedthroughthesameinput.Thisfunctionmakesintegrationintoanautomationconcept
verysimple.
3.2 Alarming
Intheeventthataruleisviolated,thealarmsignalisreportedtothecontrolcentrethroughanoutput.
Necessarymeasurescanbeautomateddirectly.Forexample,acousticindicatorlightscansignalthealarm
condition.
E‐mailscanbesentoutautomaticallytosignalarulesviolationevent.
3.3 Eventlog
Azero‐voltageeventlogbookwithretentivememorystoresalleventswheneverthefirewallisdisconnected
fromthepowersupply(NV‐RAMoption).
TheeventlogbookcanbereadouteitherlocallyorviaacentralSyslogserver.
3.4 Display/Keypad
Thebuilt‐indisplaycanbeusedtoconfiguretheessentialunitfunctions.Itisthuspossibletoobtainaquick
systemanalysis,e.g.ofthenetworkload,directlyfromthedisplay.
Thedisplayandkeyscanbepassword‐protectedagainstunauthorizedmanipulation










