BS EN 61162-460:2015
$198.66
Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security
Published By | Publication Date | Number of Pages |
BSI | 2015 | 70 |
This part of IEC 61162 is an add-on to the IEC 61162‑450 standard where higher safety and security standards are needed, e.g. due to higher exposure to external threats or to improve network integrity. This standard provides requirements and test methods for equipment to be used in an IEC 61162‑460 compliant network as well as requirements for the network itself and requirements for interconnection from the network to other networks. This standard also contains requirements for a redundant IEC 61162‑460 compliant network.
This standard extends the informative guidance given in Annex D of IEC 61162‑450:2011 . It does not introduce new application level protocol requirements to those that are defined in IEC 61162‑450 .
PDF Catalog
PDF Pages | PDF Title |
---|---|
7 | CONTENTS |
11 | FOREWORD |
13 | 1 Scope 2 Normative references |
14 | 3 Terms and definitions |
18 | 4 High-level requirements 4.1 Overview |
19 | 4.2 Description 4.3 General requirements 4.3.1 Equipment and system requirements Figures Figure 1 – Functional overview of IEC 61162-460 requirement applications |
20 | 4.3.2 Physical composition requirements 4.3.3 Logical composition requirements 4.4 Physical component requirements 4.4.1 450-Node 4.4.2 460-Node |
21 | 4.4.3 460-Switch 4.4.4 460-Forwarder 4.4.5 460-Gateway and 460-Wireless gateway 4.5 Logical component requirements 4.5.1 Network monitoring function 4.5.2 System management function |
22 | 4.6 System documentation requirements 4.7 Secure area requirements 5 Network traffic management requirements 5.1 460-Node requirements |
23 | 5.2 460-Switch requirements 5.2.1 Resource allocation 5.2.2 Loop prevention 5.3 460-Forwarder requirements 5.3.1 Traffic separation 5.3.2 Resource allocation |
24 | 5.3.3 Traffic prioritization Tables Table 1 – Traffic prioritization with CoS and DSCP |
25 | 5.4 System design requirements 5.4.1 Documentation 5.4.2 Traffic 6 Security requirements 6.1 Security scenarios 6.1.1 Threat scenarios 6.1.2 Internal threats |
26 | 6.1.3 External threats 6.2 Internal security requirements 6.2.1 General 6.2.2 Denial of service protection |
27 | 6.2.3 REDS security 6.2.4 Access control |
28 | 6.3 External security requirements 6.3.1 Overview Figure 2 – 460-Network with 460-Gateway |
29 | 6.3.2 Firewalls 6.3.3 Communication security 6.3.4 460-Node |
30 | 6.3.5 460-Gateway |
31 | 6.3.6 460-Wireless gateway 6.4 Additional security issues 7 Redundancy requirements 7.1 General requirements 7.1.1 General |
32 | 7.1.2 Interface redundancy 7.1.3 Device redundancy 7.2 460-Node requirements Figure 3 – An example of redundancy |
33 | 7.3 460-Switch requirements 7.4 460-Forwarder requirements 7.5 460-Gateway and 460-Wireless gateway requirements 7.6 Network monitoring function requirements 7.7 System design requirements 8 Network monitoring requirements 8.1 Network status monitoring 8.1.1 460-Network 8.1.2 460-Node |
34 | 8.1.3 460-Switch 8.1.4 460-Forwarder 8.1.5 460-Gateway and 460-Wireless gateway 8.2 Network monitoring function 8.2.1 General |
35 | 8.2.2 Network load monitoring function Figure 4 – Example of network status recording information |
36 | 8.2.3 Redundancy monitoring function 8.2.4 Network topology monitoring function 8.2.5 Syslog recording function |
37 | 8.2.6 Redundancy of network monitoring function 8.2.7 Alert management 9 Controlled network requirements |
38 | 10 Methods of testing and required test results 10.1 Subject of tests 10.2 Test site |
39 | 10.3 General requirements 10.4 450-Node 10.5 460-Node 10.5.1 Network traffic management |
40 | 10.5.2 Security |
42 | 10.5.3 Redundancy 10.5.4 Monitoring 10.6 460-Switch 10.6.1 Resource allocation 10.6.2 Loop prevention |
43 | 10.6.3 Security |
44 | 10.6.4 Monitoring 10.7 460-Forwarder 10.7.1 Traffic separation 10.7.2 Resource allocation |
45 | 10.7.3 Traffic prioritisation 10.7.4 Security |
46 | 10.7.5 Monitoring |
47 | 10.8 460-Gateway 10.8.1 Denial of service behaviour 10.8.2 Access control to configuration setup 10.8.3 Communication security 10.8.4 Firewall |
48 | 10.8.5 Application server 10.8.6 Interoperable access to file storage of DMZ |
49 | 10.8.7 Additional security 10.8.8 Monitoring 10.9 460-Wireless gateway 10.9.1 General 10.9.2 Security |
50 | 10.9.3 Monitoring 10.10 Controlled network 10.11 Network monitoring function 10.11.1 General |
51 | 10.11.2 Network load monitoring function 10.11.3 Redundancy monitoring function 10.11.4 Network topology monitoring function |
52 | 10.11.5 Syslog recording function 10.11.6 Alert management |
53 | 10.12 System level 10.12.1 General |
54 | 10.12.2 System management function 10.12.3 System design |
56 | 10.12.4 Network monitoring function 10.12.5 Network load monitoring function 10.12.6 Redundancy monitoring function 10.12.7 Network topology monitoring function |
57 | Annex A (informative)Communication scenarios between an IEC 61162-460network and uncontrolled networks A.1 General A.2 Routine off-ship Figure A.1 – Usage model for communication between a IEC 61162-450network and shore networks |
58 | A.3 Routine on-ship A.4 460-Gateway usage for direct connection with equipment |
59 | Annex B (informative)Summary of redundancy protocols in the IEC 62439 series B.1 Summary of redundancy protocols B.2 RSTP recovery time Table B.1 – Redundancy protocols and recovery times |
61 | Annex C (informative)Guidance for testing C.1 Methods of test C.2 Observation C.3 Inspection of documented evidence C.4 Measurement |
62 | C.5 Analytical evaluation |
63 | Annex D (informative)Some examples to use this standard Figure D.1 – 460-Forwarder used between two networks Figure D.2 – 460-Forwarder used between two networks |
64 | Figure D.3 – 460-Gateway used for e-Navigation services Figure D.4 – 460-Gateway used for remote maintenance |
65 | Annex E (normative)IEC 61162 interfaces for the network monitoring function Figure E.1 – Network monitoring function logical interfaces Table E.1 – Sentences received by the network monitoring function Table E.2 – Sentences transmitted by the network monitoring function |
66 | Bibliography |