Abstract:
This disclosure provides an apparatus and method for use in industrial control systems and other systems. A method includes detecting, by a primary node, that a backup node is available and unconfigured. The method includes automatically replicating, by the primary node, the primary node to the backup node, including replicating a personality of the primary node to the backup node.
Abstract:
This disclosure provides an apparatus and method for use in industrial control systems and other systems. A method includes detecting, by a primary node, that a backup node is available and unconfigured. The method includes automatically replicating, by the primary node, the primary node to the backup node, including replicating a personality of the primary node to the backup node.
Abstract:
A method includes establishing, using a connection policy at a first device, a security association with a second device of an industrial process control and automation system. The method also includes, once the security association is established, activating a process data policy at the first device. The security association is established during first and second types of negotiations. The process data policy is activated during the second type of negotiation without the first type of negotiation. The second type of negotiation is faster than the first type of negotiation. The connection policy defines a communication channel between the devices using a non-process communication port of the first device. The process data policy defines a communication channel between the devices for real-time industrial process data. The first type of negotiation could include an IKE main mode negotiation, and the second type of negotiation could include an IKE quick mode negotiation.
Abstract:
A method includes establishing, using a connection policy at a first device, a security association with a second device of an industrial process control and automation system. The method also includes, once the security association is established, activating a process data policy at the first device. The security association is established during first and second types of negotiations. The process data policy is activated during the second type of negotiation without the first type of negotiation. The second type of negotiation is faster than the first type of negotiation. The connection policy defines a communication channel between the devices using a non-process communication port of the first device. The process data policy defines a communication channel between the devices for real-time industrial process data. The first type of negotiation could include an IKE main mode negotiation, and the second type of negotiation could include an IKE quick mode negotiation.