SlideShare a Scribd company logo
Building Resilient Networks
November
Agenda
 Introductions
 Who is Westermo
 Defining Network Resiliency
 Hardware Redundancy
 Microsegmentation
 Configuration Backups
3
Introductions
Dakota Diehl
Network Application Engineer
dakota.diehl@westermo.us
847.453.3899
Benjamin Campbell
Technical Support Engineer
benjamin.campbell@westermo.us
847.453.3896
4
Westermo Group 2020
 Founded in 1975
 Industry leading software and hardware
development force
 Own production in Sweden with
state of the art process control
 Own sales and support units in 12 key countries,
distribution partners in many others
How To Build a Resilient
Network
6
 Resilience in computer networks is the “ability to provide and maintain an acceptable
level of service in the face of faults and challenges to normal operation.”
 This is a very wide definition, as it covers everything from packet loss to complete failure
of a node or link.
 Also includes the ability to defend against and respond to cybersecurity attacks, whether
malicious or unintended misconfigurations.
 The more resilient a network is, the more tolerant it is to faults or errors across the
network and can maintain uptime.
 Because of the wide definition, there are also a multitude of ways to improve your
network’s resilience.
Resiliency – What is it?
Hardware Redundancy
8
 One of the most straightforward ways to improve resiliency is to add redundancy
 If one node or link suffers a catastrophic failure, redundant connections keep the
network running without impacting performance.
 Unfortunately, not as simple as just dropping in another switch to the network!
 Layer 2 protocols such as FRNT or RSTP manage ring topologies, adding extra paths to
nodes without causing debilitating Broadcast Storms.
 Layer 3 protocols such as OSPF and VRRP can automatically designate a route between
networks and failover in the event of broken links.
Hardware Redundancy
9
 Built in functions to avoid uncontrolled broadcast storms.
 Link integrity control.
 Non-FRNT ports are not allowed to communicate with FRNT ports.
 Default FRNT alarm signaling via SNMP, LED, Digital-Out and Syslog.
 Very fast fail-over of Multicast traffic, no need to wait for IGMP timeouts.
 Supports different medias fiber optic, copper and SHDSL, although fiber optic links allows for best fail-
over performance.
 Extremely fast convergence time of 20ms means little impact to network in the event of a link failure.
This translates to high resilience!
Layer 2 Redundancy
FRNT
10
Layer 2 Redundancy: FRNT Ring Coupling
FRNT
Master
Ring
FRNT
Sub
Ring
FRNT
Sub
Ring
FRNT
Sub
Ring
11
Layer 2 Redundancy: FRNT Ring Coupling
X
X
X
FRNT
Master Ring
FRNT
Sub Ring
FRNT
Sub Ring
12
 Within the Network Layer, there are many options to add resiliency to a network:
 RIP
 OSPF
 VRRP
 RIP and OSPF are what are called “Dynamic Routing Protocols” which can automatically
determine best paths between networks, for automatic convergence in the event of a
network outage.
 VRRP or “Virtual Router Redundancy Protocol” will automatically designate a router as a
default gateway, with multiple routers configured as backups.
Layer 3 Resiliency: Routing Protocols
13
Routing Protocols create resiliency on L3, between L2 Networks
Dynamic Routing Protocols
FRNT
VRRP
VRRP VRRP
FRNT FRNT
OSPF
OSPF
OSPFOSPF
14
Combining Layer 2 and Layer 3 resilience functionality allows for
extremly high availablity.
FRNT Super Ring
FRNT Sub Ring FRNT Sub Ring
RiCo Node
RiCo Node RiCo Node
RiCo Node
CORE-Network
X
X
X
Link Failure
FRNT Ring Failover
Link Failure
Ring Coupling Failover X
X
Link Failure
FRNT Ring Failover
Link Failure
Ring Coupling Failover
FRNT Ring Failover
Distribution Layer,
Rack/Control rooms
Layer 3
Layer 2
XOSPF Failover OSPF Routing Protocol
Microsegmentation
16
Hybrid L2/L3 Network
L2 ring topology 20-30ms
re-convergence time
L3 routing and FW at each
node creates a Zone
X Dynamic routing protocol (OSPF) used to advertise
location of subnets only, not used for re-convergence
17
Efficient Routing to Minimize Network Delay
Network backbone
Router firewall Router firewall Router firewall
Messages are only ever routed twice
• Once into the backbone
• Second time when leaving backbone
• Messages pass though the FW when entering and leaving the network backbone
18
Multiple Zones
Backbone Fibre
ZONE 1
10.10.10.0/28
ZONE 2
10.20.20.0/28
Traffic cannot pass
between zones
unless it is allowed
to do so
XObject controller
/smart IO
19
Maintainer’s Sandbox Connection
Backbone Fibre
ZONE 1
10.10.10.0/28
ZONE 2
10.20.20.0/28
Traffic cannot pass
between zones
unless it is allowed
to do so
XObject controller
/smart IO
ZONE 3
192.20.20.0/28
Maintainers sandbox entry point,
access to network is FW, if 802.1x
configured only valid
users/machines can join the
network
Configuration Backups
21
Getting Control of the Assets
 Using common UN and PW are an open
door to cyber actors
 Maintainers leave taking the common
credentials with them
 Almost impossible to change UN and PW
across a large user population
 Maintaining a large user DB on each
device is equally difficult
 Solution is to use RADIUS or TACACS+
User Authentication
 Effort required initially, much tighter
control and lower ownership cost long-
term
Authentication
server
22

More Related Content

PPTX
Webinar how to prepare for the sunset of 2G and 3G cellular communications
PPTX
Westermo webinar: Learning the Basics of Ethernet Networking
PPTX
How to secure your industrial network using segmentation and segregation
PDF
Computer Networking Solutions for Energy Systems
PDF
Westermo solutions for onboard rail networks
PPTX
The Basics of Industrial Ethernet Communications
PDF
Westermo solutions for trackside networks
PPTX
How to migrate legacy serial devices to IP broadband
Webinar how to prepare for the sunset of 2G and 3G cellular communications
Westermo webinar: Learning the Basics of Ethernet Networking
How to secure your industrial network using segmentation and segregation
Computer Networking Solutions for Energy Systems
Westermo solutions for onboard rail networks
The Basics of Industrial Ethernet Communications
Westermo solutions for trackside networks
How to migrate legacy serial devices to IP broadband

What's hot (20)

PPTX
Introducing the next generation industrial switch platform
PPTX
4 Easy Steps for Increased Industrial Cybersecurity
PDF
SELTA Access Network Portfolio
PDF
Profibus commissioning and maintenance - Richard Needham
PDF
Ap8163 datasheet
PDF
SIS_LineCard_2016
PDF
ComNet NWK3 Data Sheet
PDF
Copper cables an alternative to fibre - Extending Industrial Ethernet
PDF
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
PPT
Siemens & TPP Collaboration
PPTX
ZTE Intelligent Campus Network Solution
PDF
Zte channel marketing product reference guide 201505(read version)
PDF
PROFINET network diagnostics and support - May 2020 - Peter Thomas
PPTX
Jio practical training
PDF
PI UK Seminar (Nov 2021) - Update on APL
PDF
RUGGEDCOM WIN5100 wimax
PDF
Ap 6511 ss_0610
PDF
Profinet implementation and testing - Dave Tomlin and Xing Ye
PPT
Wifi wimax
PPTX
Chapter 14 : vlan
Introducing the next generation industrial switch platform
4 Easy Steps for Increased Industrial Cybersecurity
SELTA Access Network Portfolio
Profibus commissioning and maintenance - Richard Needham
Ap8163 datasheet
SIS_LineCard_2016
ComNet NWK3 Data Sheet
Copper cables an alternative to fibre - Extending Industrial Ethernet
PI UK Seminar (Nov 2021) - PROFINET Implementation and Testing
Siemens & TPP Collaboration
ZTE Intelligent Campus Network Solution
Zte channel marketing product reference guide 201505(read version)
PROFINET network diagnostics and support - May 2020 - Peter Thomas
Jio practical training
PI UK Seminar (Nov 2021) - Update on APL
RUGGEDCOM WIN5100 wimax
Ap 6511 ss_0610
Profinet implementation and testing - Dave Tomlin and Xing Ye
Wifi wimax
Chapter 14 : vlan
Ad

Similar to How to build resilient industrial networks (20)

DOCX
Lan network with Redundancy
PPT
Resilient Network Design Concepts Educat
PDF
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Internet Resilience
PPTX
Lan Network with Redundancy.ppt
PPTX
Lan Network with Redundancy
PDF
Routing In Fat Trees
PPTX
Build Redundant and Resilient Networks with Micro-Segmentation
PDF
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
PPT
Chapter05
PDF
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
PPTX
End to End Convergence
PDF
Network Level Redundancy for Campus LAN
PDF
RIFT A New Approach to Building DC Fabrics
PPT
Top network design for infrastructure for it
PDF
8 Common Network Topologies & Where to Use Them
PDF
Application Engineered Routing Enables Applications and Network Infrastructur...
PDF
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
PPTX
How to Keep Business Always On
PDF
Building a Small Datacenter
PDF
SF Ceph Users Jan. 2014
Lan network with Redundancy
Resilient Network Design Concepts Educat
4th ICANN APAC-TWNIC Engagement Forum and 39th TWNIC OPM: Internet Resilience
Lan Network with Redundancy.ppt
Lan Network with Redundancy
Routing In Fat Trees
Build Redundant and Resilient Networks with Micro-Segmentation
Learn How to Configure Cisco Data Center Core Networking(Handouts).pdf
Chapter05
2 fhrp,hsrp,vrrp,gblp,ntp,nat glbp
End to End Convergence
Network Level Redundancy for Campus LAN
RIFT A New Approach to Building DC Fabrics
Top network design for infrastructure for it
8 Common Network Topologies & Where to Use Them
Application Engineered Routing Enables Applications and Network Infrastructur...
Benchmarking Failure Recovery Time in MPLS FRR with Link Protection
How to Keep Business Always On
Building a Small Datacenter
SF Ceph Users Jan. 2014
Ad

More from Westermo Network Technologies (20)

PDF
Westermo Technologie Webinar WeOS4 und WeOS5
PDF
Westermo Webinar - Geroutete Redundanzen
PDF
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
PDF
Webinar WeConfig - State of the Art NCM
PDF
Webinar Serial-over-IP
PDF
Webinar - Protokollkonvertierung
PDF
OpenWRT - Überblick
PDF
Switchkonfiguration
PDF
PoE & Lösungen.pdf
PDF
VPN&Verschlüsselung
PDF
Mobilfunkanbindungen
PDF
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
PDF
Netzwerkmonitoring.pdf
PDF
WeOS 4.32.0 und WeConfig 1.15.pdf
PDF
Merlin - Die neue Mobilfunkrouterserie
PDF
We os 4.31.0 und weconfig 1.14.0
PDF
Layer 2 Redundanzen
Westermo Technologie Webinar WeOS4 und WeOS5
Westermo Webinar - Geroutete Redundanzen
Webinar - WeOS 4.33.0 und WeConfig 1.19.0.pdf
Webinar WeConfig - State of the Art NCM
Webinar Serial-over-IP
Webinar - Protokollkonvertierung
OpenWRT - Überblick
Switchkonfiguration
PoE & Lösungen.pdf
VPN&Verschlüsselung
Mobilfunkanbindungen
450 MHz – Das neue Medium in OT-Netzwerken der Energiewirtschaft
Netzwerkmonitoring.pdf
WeOS 4.32.0 und WeConfig 1.15.pdf
Merlin - Die neue Mobilfunkrouterserie
We os 4.31.0 und weconfig 1.14.0
Layer 2 Redundanzen

Recently uploaded (20)

PDF
PTS Company Brochure 2025 (1).pdf.......
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
AI in Product Development-omnex systems
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Which alternative to Crystal Reports is best for small or large businesses.pdf
PDF
wealthsignaloriginal-com-DS-text-... (1).pdf
PDF
Nekopoi APK 2025 free lastest update
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
PPTX
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
PDF
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
PPTX
history of c programming in notes for students .pptx
PPTX
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
PDF
top salesforce developer skills in 2025.pdf
PPTX
ai tools demonstartion for schools and inter college
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PDF
How Creative Agencies Leverage Project Management Software.pdf
PDF
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
PDF
medical staffing services at VALiNTRY
PDF
System and Network Administration Chapter 2
PTS Company Brochure 2025 (1).pdf.......
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
AI in Product Development-omnex systems
Wondershare Filmora 15 Crack With Activation Key [2025
Which alternative to Crystal Reports is best for small or large businesses.pdf
wealthsignaloriginal-com-DS-text-... (1).pdf
Nekopoi APK 2025 free lastest update
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
SAP S4 Hana Brochure 3 (PTS SYSTEMS AND SOLUTIONS)
Agentic AI Use Case- Contract Lifecycle Management (CLM).pptx
Addressing The Cult of Project Management Tools-Why Disconnected Work is Hold...
history of c programming in notes for students .pptx
Agentic AI : A Practical Guide. Undersating, Implementing and Scaling Autono...
top salesforce developer skills in 2025.pdf
ai tools demonstartion for schools and inter college
VVF-Customer-Presentation2025-Ver1.9.pptx
How Creative Agencies Leverage Project Management Software.pdf
Flood Susceptibility Mapping Using Image-Based 2D-CNN Deep Learnin. Overview ...
medical staffing services at VALiNTRY
System and Network Administration Chapter 2

How to build resilient industrial networks

  • 2. Agenda  Introductions  Who is Westermo  Defining Network Resiliency  Hardware Redundancy  Microsegmentation  Configuration Backups
  • 3. 3 Introductions Dakota Diehl Network Application Engineer dakota.diehl@westermo.us 847.453.3899 Benjamin Campbell Technical Support Engineer benjamin.campbell@westermo.us 847.453.3896
  • 4. 4 Westermo Group 2020  Founded in 1975  Industry leading software and hardware development force  Own production in Sweden with state of the art process control  Own sales and support units in 12 key countries, distribution partners in many others
  • 5. How To Build a Resilient Network
  • 6. 6  Resilience in computer networks is the “ability to provide and maintain an acceptable level of service in the face of faults and challenges to normal operation.”  This is a very wide definition, as it covers everything from packet loss to complete failure of a node or link.  Also includes the ability to defend against and respond to cybersecurity attacks, whether malicious or unintended misconfigurations.  The more resilient a network is, the more tolerant it is to faults or errors across the network and can maintain uptime.  Because of the wide definition, there are also a multitude of ways to improve your network’s resilience. Resiliency – What is it?
  • 8. 8  One of the most straightforward ways to improve resiliency is to add redundancy  If one node or link suffers a catastrophic failure, redundant connections keep the network running without impacting performance.  Unfortunately, not as simple as just dropping in another switch to the network!  Layer 2 protocols such as FRNT or RSTP manage ring topologies, adding extra paths to nodes without causing debilitating Broadcast Storms.  Layer 3 protocols such as OSPF and VRRP can automatically designate a route between networks and failover in the event of broken links. Hardware Redundancy
  • 9. 9  Built in functions to avoid uncontrolled broadcast storms.  Link integrity control.  Non-FRNT ports are not allowed to communicate with FRNT ports.  Default FRNT alarm signaling via SNMP, LED, Digital-Out and Syslog.  Very fast fail-over of Multicast traffic, no need to wait for IGMP timeouts.  Supports different medias fiber optic, copper and SHDSL, although fiber optic links allows for best fail- over performance.  Extremely fast convergence time of 20ms means little impact to network in the event of a link failure. This translates to high resilience! Layer 2 Redundancy FRNT
  • 10. 10 Layer 2 Redundancy: FRNT Ring Coupling FRNT Master Ring FRNT Sub Ring FRNT Sub Ring FRNT Sub Ring
  • 11. 11 Layer 2 Redundancy: FRNT Ring Coupling X X X FRNT Master Ring FRNT Sub Ring FRNT Sub Ring
  • 12. 12  Within the Network Layer, there are many options to add resiliency to a network:  RIP  OSPF  VRRP  RIP and OSPF are what are called “Dynamic Routing Protocols” which can automatically determine best paths between networks, for automatic convergence in the event of a network outage.  VRRP or “Virtual Router Redundancy Protocol” will automatically designate a router as a default gateway, with multiple routers configured as backups. Layer 3 Resiliency: Routing Protocols
  • 13. 13 Routing Protocols create resiliency on L3, between L2 Networks Dynamic Routing Protocols FRNT VRRP VRRP VRRP FRNT FRNT OSPF OSPF OSPFOSPF
  • 14. 14 Combining Layer 2 and Layer 3 resilience functionality allows for extremly high availablity. FRNT Super Ring FRNT Sub Ring FRNT Sub Ring RiCo Node RiCo Node RiCo Node RiCo Node CORE-Network X X X Link Failure FRNT Ring Failover Link Failure Ring Coupling Failover X X Link Failure FRNT Ring Failover Link Failure Ring Coupling Failover FRNT Ring Failover Distribution Layer, Rack/Control rooms Layer 3 Layer 2 XOSPF Failover OSPF Routing Protocol
  • 16. 16 Hybrid L2/L3 Network L2 ring topology 20-30ms re-convergence time L3 routing and FW at each node creates a Zone X Dynamic routing protocol (OSPF) used to advertise location of subnets only, not used for re-convergence
  • 17. 17 Efficient Routing to Minimize Network Delay Network backbone Router firewall Router firewall Router firewall Messages are only ever routed twice • Once into the backbone • Second time when leaving backbone • Messages pass though the FW when entering and leaving the network backbone
  • 18. 18 Multiple Zones Backbone Fibre ZONE 1 10.10.10.0/28 ZONE 2 10.20.20.0/28 Traffic cannot pass between zones unless it is allowed to do so XObject controller /smart IO
  • 19. 19 Maintainer’s Sandbox Connection Backbone Fibre ZONE 1 10.10.10.0/28 ZONE 2 10.20.20.0/28 Traffic cannot pass between zones unless it is allowed to do so XObject controller /smart IO ZONE 3 192.20.20.0/28 Maintainers sandbox entry point, access to network is FW, if 802.1x configured only valid users/machines can join the network
  • 21. 21 Getting Control of the Assets  Using common UN and PW are an open door to cyber actors  Maintainers leave taking the common credentials with them  Almost impossible to change UN and PW across a large user population  Maintaining a large user DB on each device is equally difficult  Solution is to use RADIUS or TACACS+ User Authentication  Effort required initially, much tighter control and lower ownership cost long- term Authentication server
  • 22. 22