2mGuard basics

The mGuard protects IP data links by combining the following functions:

Industrial security network router.

Depending on the model with built-in 3- or 4-port switch and DMZ port.

VPN router for secure data transmission via public networks (AES encryption, IPsec and OpenVPN protocol).

Configurable firewall for protection against unauthorized access. The dynamic pack­et filter inspects data packets using the source and destination address and blocks undesired data traffic.

2.1New device platform FL MGUARD 2000/4000

The FL MGUARD 2000/4000 series devices are gradually replacing the established Guard devices of the RS2000/RS4000 and PCI(E)4000 series.

The new devices with proven mGuard Security Technology are equipped with fast Gigabit Ethernet and are operated with the mGuard 10.x firmware version.

The devices are compatible with their predecessor models, can import existing configu­ration profiles (atv files), and can be configured via CGI and GAI interfaces.

The mGuard device manager (starting with version mdm 1.17.0) can be used to manage mGuard devices with firmware versions up to 10.5.x installed (see user manual "UM EN MDM 1.17" – 111024_en_xx).

 

inset_23.jpg 

Currently, some device functions from previous models cannot yet be supported on the new models (see Section 2.1.1).

 

2.1.1Functions that are no longer supported

Certain functions of the old device platform are no longer supported on the new device platform.

Hardware         

The new mGuard models of the FL MGUARD 2000/4000 series are offered without serial interface and without internal modem.

Firmware (functions)

Device functions that are not supported on the new device platform are listed in Table 2-1.

Table 2-1 Currently unsupported device functions

Functions currently not supported in the firmware mGuard 10.5.x

Network: Interfaces

PPPoE

PPTP

Secondary external interface

Network: Serial interface

Network: GRE tunnel (Generic Routing Encapsulation)

VPN redundancy

Quality of Services (QoS)

CIFS Integrity Monitoring

SEC-Stick

Update method „Online update“ (installation of package sets)

 

When transferring older device configurations to these new devices, care must therefore be taken to ensure that the functions described in Table 2-1 have been deactivated or reset to the default settings in the device configuration before export (see also Section 2.1.6).

2.1.2Added functions that were already available on the old device platform

Variables that were already present on the old device platform but had been removed in the meantime were added again on the new device platform.

Table 2-2 Newly added functions / variables / variable values

New function / variable / value

New function / Impact of migration

Firmware

(Added with firm­ware version)

[Deep Packet Inspection / Modbus TCP]

Menu: Network Security >> Deep packet Inspection >> Modbus TCP

Section: Rule Records

Variable: various

GAI variable:
MODBUS_RULESETS.x.FRIENDLY_NAME

MODBUS_RULESETS.x.SET.y.MODBUS_FUNCTION_CODE

MODBUS_RULESETS.x.SET.y.ADDRESS_RANGE

MODBUS_RULESETS.x.SET.y.TARGET

MODBUS_RULESETS.x.SET.y.COMMENT

MODBUS_RULESETS.x.SET.y.LOG

MODBUS_RULESETS.x.LOG_DEFAULT

 

The mGuard device can check packets of in­coming and outgoing Modbus TCP connec­tions (Deep Packet Inspection) and filter them if necessary.

Migration of older mGuard configurations

No effect.

Already configured variable values will be adopted.

10.5.0

[Deep Packet Inspection / OPC Inspector]

Menu: Network Security >> Deep packet Inspection >> OPC Inspector

Section: OPC Inspector

Variable: various

GAI variable:
IP_CONNTRACK_OPC

IP_CONNTRACK_OPC_SANITY

IP_CONNTRACK_OPC_TIMEOUT

 

Until now, the OPC Classic network protocol could only be used across firewalls if large port ranges were opened.

Activating the OPC Classic function allows this network protocol to be used easily with­out having to configure the mGuard device's firewall in an insecure way.

Migration of older mGuard configurations

No effect.

Already configured variable values will be adopted.

10.5.0

[Web access via HTTPS / Server certificate]

Menu: Management >> Web Settings >> Access

Section: HTTPS Web Access

Variable: HTTPS server certificate

GAI variable: HTTPS_SERVER_CERT_REF

 

 

 

inset_21.jpgIn previous firmware versions, the function was not officially available, but could be used as an unsupported expert function.

 

Instead of the self-signed web server certif­icate pre-installed on the mGuard device, a separate machine certificate can be up­loaded to the device and used. The device can use this certificate to authenticate itself to requesting clients.

The use of CA certificates in conjunction with a certificate chain of trust is possible.

 

 

10.5.0

 

Migration of older mGuard configurations

If an HTTPS server certificate is already in use, its use must be deactivated before mi­grating the configuration or updating the device.

Command on the command line:

gaiconfig --set HTTPS_SERVER_CERT_REF ""

You can now perform the migration/update again and use the certificate again (if it is valid).

If no HTTPS server certificate is used, the following applies:

No effect.

 

2.1.3Newly added functions

Variables have been added to the new device platform that are not available on the old device platform.

Table 2-3 Newly added functions / variables

New function / variable / value

New function / Impact of migration

Firmware

(Added with firm­ware version)

[TCP-Dump]

Menu: Support >> Advanced >> TCP Dump

Section: TCP Dump

Variable (Action):
(1) Starting tcpdump

(2) Stopping and downloading tcpdump

A packet analysis (tcpdump) can be used to analyze the content of network packets that are sent or received via a selected network interface.

Migration of older mGuard configurations

No effect.

 

10.5.0

[Logging]

Menu: Logging >> Settings

Section: Data protection

Variable: Maximum retention period for log entries (0 = unlimited)

GAI variable: LOGGING_MAX_DAYS

In order to comply with basic data protec­tion requirements, it is possible to save log entries on the device only for a limited pe­riod of time. After a configurable storage pe­riod has expired, log entries will be deleted automatically from the device.

Migration of older mGuard configurations

No effect

10.5.0

[Configuration profiles]

Menu: Management >> Configuration Profiles

Section: Configuration Profiles Signing

Variables:

Enable signed configuration profiles

Export certificate (machine certificate used to sign configuration profiles)

Import certificate (certificate used to validate signature of config­uration profiles)

GAI variables:

PROFILE_SECURE_ONLY

PROFILE_EXPORT_CERT

PROFILE_IMPORT_CERT

 

Configuration profiles can be signed using certificates. On devices configured accord­ingly, it is then only possible to upload con­figuration profiles to the device that have been signed with valid certificates.

Migration of older mGuard configurations

No effect

10.5.0

[OpenVPN Client]

Menu: OpenVPN Client >> Connections >> Tunnel Settings

Section: Data Encryption

Variable: Encryption algorithm

GAI variable: OPENVPN_CONNECTION.x.VPN_ENCRYPTION

The "Blowfish" encryption algorithm is no longer supported.

A total of six AES encryption algorithms can be selected instead of the previous three:

AES-128-GCM / AES-192-GCM / AES-256-GCM / AES-128-CBC / AES-192-CBC / AES-256-CBC

Migration of older mGuard configurations

After migrating a configuration from an older firmware version with the "Blowfish" en­cryption algorithm configured, the value of the variable is set to "AES-256-GCM".

The following applies to all other algorithms:

The value from the migrated configuration is adopted unchanged. The configured en­cryption algorithm will not be changed.

10.5.0

[HTTPS access]

Menu: Management >> Web Settings >> Access

Section: HTTPS Web Access

Variable: Lowest supported TLS version

GAI variable: TLS_MIN_VERSION

Some functions of the mGuard device use TLS encryption, e.g.:

Web server (HTTPS access)

OpenVPN Client

The used TLS version is negotiated between the remote peers. It is possible that a TLS version will be selected, that is no longer considered secure.

To prevent this, it can be specified which TLS version will be accepted by the mGuard device as the lowest TLS version. Connec­tions with lower TLS versions will be re­jected by the mGuard device.

Default: TLS 1.2

Migration of older mGuard configurations

The variable will be configured with the value TLS 1.0/1.1. All TLS versions from TLS 1.0 are accepted by the mGuard device.

 

10.5.0

[Web access via HTTPS / Server certificate]

Menu: Management >> Web Settings >> Access

Section: HTTPS Web Access

Variable: HTTPS server certificate

GAI variable: HTTPS_SERVER_CERT_REF

 

 

inset_14.jpgIn previous firmware versions, the function was not officially available, but could be used as an unsupported expert function.

 

Instead of the self-signed web server certif­icate pre-installed on the mGuard device, a separate machine certificate can be up­loaded to the device and used. The device can use this certificate to authenticate itself to requesting clients.

The use of CA certificates in conjunction with a certificate chain of trust is possible.

 

 

10.5.0

 

Migration of older mGuard configurations

If an HTTPS server certificate is already in use, its use must be deactivated before mi­grating the configuration or updating the device.

Command on the command line:

gaiconfig --set HTTPS_SERVER_CERT_REF ""

You can now perform the migration/update again and use the certificate again (if it is valid).

If no HTTPS server certificate is used, the following applies:

No effect.

 

[LINK mode]

Menu: Network >> Interfaces >> General

Section: Network Status / Network Mode

Variable: LINK mode

GAI variable: ROUTER_MODE_LINK

The mGuard device can use the device "CELLULINK" available from Phoenix Con­tact to establish a mobile data connection to other networks or the Internet (e.g. via the 4G network).

If LINK mode is activated, a hyperlink to the web-based management of the device "CELLULINK" is displayed in the WBM area of the mGuard device.

Migration of older mGuard configurations

No effect.

 

10.5.0

[OpenVPN Client]

Menu: OpenVPN Client >> Connections >> Tunnel Settings

Section: Data Encryption

Variable: Hash algorithm (HMAC authentication)

GAI variable: OPENVPN_CONNECTION.x.VPN_AUTH_HMAC

 

 

The hash function used to calculate the checksum can be configured.

Migration of older mGuard configurations

After migrating a configuration from an older firmware version, the value of the newly added variable is set to "SHA-1".

10.4.0

[Update Server]

Menu: Management >> Update >> Update

Section: Update Servers

Variable: Server certificate

GAI variable: PSM_REPOSITORIES.x.REMOTE_CERT_REF

 

 

To ensure that a secure HTTPS connection is established to the configured update server, a server certificate for the update server can be installed on the mGuard device.

This can be used by the mGuard device to check the authenticity of the update server.

Migration of older mGuard configurations

After migrating a configuration from an older firmware version, the value of the newly added variable is set to "Ignore".

10.3.0

[Alarm Output]

Menu: Management >> Service I/O >> Alarm Output

Section: Operation Supervision

Variable: Passwords not configured

GAI variable: PASSWORD_CHECK

 

 

A configurable alarm "Passwords not con­figured" for default passwords that have not been changed (admin/root) has been added to the device.

The alarm triggers the alarm output via I/Os and the corresponding FAIL LED.

Migration of older mGuard configurations

After migrating a configuration from an older firmware version, the value of the newly added variable is set to "Supervise".

10.3.0

2.1.4Changed default settings

In a few cases, the default settings of existing variables on the old and new device plat­form differ.

Table 2-4 Changed default settings

Function

Changed default settings / Impact of migration

Firmware

(Added with firm­ware version)

[OpenVPN Client]

Menu: OpenVPN Client >> Connections >> Tunnel Set­tings

Section: Data Encryption

Variable: Encryption algorithm

GAI variable: OPENVPN_CONNECTION.x.VPN_EN­CRYPTION

In the default settings, the encryption algorithm "AES-256-GCM" is used instead of "AES-256-CBC" as before.

Migration of older mGuard configurations

After migrating a configuration from an older firm­ware version with the "Blowfish" encryption algo­rithm configured, the value of the variable is set to "AES-256-GCM".

The following applies to all other algorithms:

The value from the migrated configuration is ad­opted unchanged. The configured encryption algo­rithm will not be changed.

 

10.5.0

[OpenVPN Client]

Menu: OpenVPN Client >> Connections >> Tunnel Set­tings

Section: Data Encryption

Variable: Hash algorithm (HMAC authentication)

GAI variable: OPENVPN_CONNECTION.x.VPN_AU­TH_HMAC

In the default settings, the hash algorithm "SHA-256" is used instead of "SHA-1" as before.

Migration of older mGuard configurations

The value from the migrated configuration is ad­opted unchanged. The configured hash algorithm will not be changed.

 

10.5.0

[E-Mail]

Menu: Management >> System Settings >> E-Mail

Section: E-Mail

Variable: Encryption mode for the e-mail server

GAI variable: EMAIL_RELAY_TLS

In the default settings, the encryption algorithm "TLS Encryption" is used instead of "No encryption" as before.

Migration of older mGuard configurations

The value from the migrated configuration is ad­opted unchanged. The configured encryption mode will not be changed.

 

10.5.0

[Network Address Translation]

Menu: Network >> NAT >> Masquerading

Section: Network Address Translation/IP Masquerading

Variable: Outgoing on interface / From IP

 

 

In default settings, a table row/rule with the follow­ing variable values is added:

Outgoing on interface: External

From IP: 0.0.0.0/0

IP masquerading is thus activated for all packets that are routed from the internal network (LAN) to the external network (WAN) (LAN --> WAN).

Migration of older mGuard configurations

The values from the migrated configuration are ad­opted unchanged. A new table row/rule will not be added.

10.3.0

[Network Settings]

Menu: Network >> Interfaces >> General

Section: Network Mode

Variable: Network mode

 

All devices of the new device generation are deliv­ered in the network mode "Router".

The external WAN interface receives its IP configu­ration via DHCP. In the default setting, however, the firewall prevents remote access to the device via the WAN interface.

The device can be accessed from the LAN network via the internal LAN interface under the network address 192.168.1.1/24. Devices connected to the LAN interface can obtain their IP configuration via the DHCP server of the mGuard device.

Migration of older mGuard configurations

The values from the migrated configuration are ad­opted unchanged. The configured network mode will not be changed.

10.3.0

2.1.5Changed variable values

In a few cases, variable values are no longer available on the new device platform and are replaced by other values.

Table 2-5 Changed variable values

Function

Changed variable values / Impact of migration

Firmware

(Added with firm­ware version)

[OpenVPN Client]

Menu: OpenVPN Client >> Connections >> Tunnel Set­tings

Section: Data Encryption

Variable: Encryption algorithm

GAI variable: OPENVPN_CONNECTION.x.VPN_EN­CRYPTION

The "Blowfish" encryption algorithm is no longer supported.

A total of six AES encryption algorithms can be se­lected instead of the previous three:

AES-128-GCM / AES-192-GCM / AES-256-GCM / AES-128-CBC / AES-192-CBC / AES-256-CBC

Migration of older mGuard configurations

After migrating a configuration from an older firm­ware version with the "Blowfish" encryption algo­rithm configured, the value of the variable is set to "AES-256-GCM".

The following applies to all other algorithms:

The value from the migrated configuration is ad­opted unchanged. The configured encryption algo­rithm will not be changed.

 

10.5.0

[Shell access]

Menu: Management >> System Settings >> Shell Access

Section: Maximum Number of Concurrent Sessions per Role

Variable: Admin / Netadmin / Audit

GAI variables:
SSH_ADMIN_LOGIN_ALLOWED_MAX

SSH_NETADMIN_LOGIN_ALLOWED_MAX

SSH_AUDIT_LOGIN_ALLOWED_MAX

The "Maximum Number of Concurrent Sessions per Role" is limited to 10.

Migration of older mGuard configurations

Applies to all configured values <= 10:

The value from the migrated configuration is adopted unchanged. The configured maximum number of concurrent sessions per role will not be changed.

The following applies to configured values > 10:

After the migration, the value of the vari­able "Maximum Number of Concurrent Sessions per Role" will be set to 10 in each case.

 

10.5.0

[Multicast]

Menu: Network >> Ethernet >> Multicast

Section: General Multicast Configuration

Variable: IGMP snooping

To ensure that data in "Static multicast groups" is forwarded correctly to the configured ports, "IGMP snooping" must be activated

Migration of older mGuard configurations

After a migration, the value of the variable will be changed as follows:

Enabled: If "Static Multicast Groups" are con­figured.

Enabled: If "IGMP snooping" is enabled in the old configuration.

Deactivated: If no "Static Multicast Groups" are configured and "IGMP snooping" is deacti­vated in the old configuration.

10.3.0

 

2.1.6Migration of the device configuration

Migrating the configuration of older mGuard devices can be done via web-based manage­ment (WBM) or via SD card (ECS).

Requirements

If device functions of the device whose configuration is to be migrated are not available on the new device, the variables must be reset to the default settings before the configu­ration on the old device is exported (see Table 2-1).

The exact procedure for device migration is described in document 111259_en_xx (AH EN MGUARD MIGRATE 10), available at phoenixcontact.com/product/1357875.

2.2Basic properties

The mentioned properties are not guaranteed properties, as they are basically dependent on the respective device.

Unless otherwise stated, when the FL MGUARD 4302 and FL MGUARD 4305 devices are mentioned in this document, the 4302/KX and 4305/KX variants are also included.

Network features

Stealth (auto, static, multi), router (static, DHCP client)

DMZ

VLAN

DHCP server/relay on the internal and external network interfaces

DNS cache on the internal network interface

Dynamic routing (OSPF)

Administration via HTTPS and SSH

LLDP

MAU management

SNMP

Firewall features

Stateful packet inspection

Anti-spoofing

IP filter

L2 filter (only in stealth mode)

NAT with FTP, and IRC support (only in “Router” network mode)

1:1 NAT (only in “Router” network mode)

Port forwarding (not in “Stealth” network mode)

Individual firewall rules for different users (user firewall)

Individual rule records as action (target) of firewall rules (apart from user firewall or VPN firewall)

Deep Packet Inspection for Modbus TCP

Protective device for PROFIsafe network cells (in accordance with IEC 61784-3-3).

VPN features (IPsec)

Protocol: IPsec (tunnel and transport mode, XAuth/Mode Config)

IPsec encryption with DES (56 bits), 3DES (168 bits), and AES (128, 192, 256 bits)

Packet authentication: MD5, SHA-1, SHA-265, SHA-384, SHA-512

Internet Key Exchange (IKE) with main and quick mode

Authentication via:

Pre-shared key (PSK)

X.509v3 certificates with public key infrastructure (PKI) with certification au­thority (CA), optional certificate revocation list (CRL), and the option of filtering by subject

or

Remote certificate, e.g., self-signed certificates

Detection of changing peer IP addresses via DynDNS

NAT traversal (NAT-T)

Dead Peer Detection (DPD): detection of IPsec connection aborts

IPsec/L2TP server: connection of IPsec/L2TP clients

IPsec firewall and IPsec NAT

Default route via VPN tunnel

Data forwarding between VPNs (hub and spoke)

Up to 250 active VPN tunnels (depending on the device)

VPN features (OpenVPN)

OpenVPN client

OpenVPN encryption with AES (128, 192, 256 bits) (Block cipher modes: GCM and CBC)

HMAC authentication: SHA-1, SHA-256, SHA-512

Dead Peer Detection (DPD)

Authentication via user identifier, password or X.509v3 certificate

Detection of changing peer IP addresses via DynDNS

OpenVPN firewall and 1:1 NAT

Routes via VPN tunnels can be configured statically and learned dynamically

Data forwarding between VPNs (hub and spoke)

Up to 250 VPN tunnels

Additional features

Remote Logging

Administration using SNMP v1-v3 and mGuard device manager (FL MGUARD DM UNLIMITED) 

PKI support for HTTPS/SSH remote access

Can act as an NTP and DNS server via the LAN interface

Plug-n-Protect technology

Compatible with mGuard Secure Cloud (mSC)

Support

In the event of problems with your mGuard, please contact your supplier.

 

inset_0.jpg 

For additional information on the device as well as release notes and software updates, visit: phoenixcontact.net/products/<item number>.

2.3Typical application scenarios

This section describes various application scenarios for the mGuard.

“Stealth mode (Plug-n-Protect)”

“Network router”

“DMZ” (Demilitarized Zone)

“VPN gateway”

“WLAN via VPN” tunnel

“Resolving network conflicts”

2.3.1Stealth mode (Plug-n-Protect)

In stealth mode, the mGuard can be positioned between an individual computer and the rest of the network.

The settings (e.g., for firewall and VPN) can be made using a web browser under the URL https://1.1.1.1/.

No configuration modifications are required on the computer itself.

7961a003.jpg

Figure 2-1 Stealth mode (Plug-n-Protect)

2.3.2Network router

When used as a network router, the mGuard can provide the Internet connection for sev­eral computers and protect the company network with its firewall.

For computers in the Intranet, the mGuard must be specified as the default gateway.

7961a004.jpg

Figure 2-2 Network router

2.3.3DMZ

A DMZ (demilitarized zone) is a protected network that is located between two other net­works. For example, a company's website may be in the DMZ so that new pages can only be copied to the server from the Intranet via FTP. However, the pages can be read from the Internet via HTTP.

IP addresses within the DMZ can be public or private, and the mGuard, which is con­nected to the Internet, forwards the connections to private addresses within the DMZ by means of port forwarding.

A DMZ scenario can be established either between two mGuards (see Figure 2-3) or via a dedicated DMZ port of some mGuard devices, e. g. the FL MGUARD 4305.

The DMZ port is only supported in router mode and requires at least one IP address and a corresponding subnet mask. The DMZ does not support any VLANs.

7961a005.jpg

 

Figure 2-3 DMZ

2.3.4VPN gateway

The VPN gateway provides company employees with encrypted access to the company network from home or when traveling. The mGuard performs the role of the VPN gateway.

IPsec-capable VPN client software must be installed on the external computers or failing that, the computer is equipped with an mGuard.

7961a006.jpg

Figure 2-4 VPN gateway

2.3.5WLAN via VPN

WLAN via VPN is used to connect two company buildings via a WLAN path protected using IPsec. The adjacent building should also be able to use the Internet connection of the main building.

7961a007.jpg

Figure 2-5 WLAN via VPN

In this example, the mGuards were set to router mode and a separate network with 172.16.1.x addresses was set up for the WLAN.

To provide the adjacent building with an Internet connection via the VPN, a default route is set up via the VPN:

Tunnel configuration in the adjacent building

Connection type

Tunnel (network <-> net­work)

Address of the local network

192.168.2.0/24

Address of the remote network

0.0.0.0/0

In the main building, the corresponding counterpart is configured:

Tunnel configuration in the main building

Connection type

Tunnel (network <-> net­work)

Local network

0.0.0.0

Address of the remote network

192.168.2.0/24

The default route of an mGuard usually uses the WAN port. However, in this case the In­ternet can be accessed via the LAN port:

Default gateway in the main building:

IP address of the default gateway

192.168.1.253

 

2.3.6Resolving network conflicts

Section0200014.jpg

Resolving network conflicts

In the example, the networks on the right-hand side should be accessible to the network or computer on the left-hand side. However, for historical or technical reasons the net­works on the right-hand side overlap.

The 1:1 NAT feature of the mGuard can be used to translate these networks to other net­works, thereby resolving the conflict.

(1:1 NAT can be used in normal routing, in IPsec tunnels, and in OpenVPN connections.)