Kaspersky IoT Secure Gateway 100 receives data from equipment residing within the internal enterprise network over the OPC UA protocol, which is described by the OPC Unified Architecture specification. You can read about the OPC UA protocol specification on the developer's website. Kaspersky IoT Secure Gateway 100 supports OPC UA protocol version 1.04.
The None security profile in the Kaspersky IoT Secure Gateway 100 settings is the security profile that is most compatible with various types of industrial equipment for OPC UA connections.
When generating certificates for a connection between a client (Kaspersky IoT Secure Gateway 100) and the OPC UA server, make sure that the certificates comply with the following settings:
Kaspersky IoT Secure Gateway 100 uses the following folders to store certificates and keys for a connection with an OPC UA server:
You can configure the settings for receiving data from monitored objects over the OPC UA protocol in the OpcUaClientSettings-0.json configuration file.
To configure data acquisition using the OPC UA protocol:
All of the actions described next are performed within the OpcUaClientSettings-0.json file.
id parameter, define the ID of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "id": 0. name parameter, define the name of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "name": "Kaspersky IoT Secure Gateway 100 OPC UA Client".description parameter to enter a description of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "description": "Collect data from CNC by Kaspersky IoT Secure Gateway 100".url parameter. For example, "url": "opc.tcp://192.168.177.7:4840".readingCycle parameter to define how frequently the gateway will read data. For example, "readingCycle": 1.security settings block:mode parameter, indicate the security management mode for the connection of the client application that is being used on your OPC UA server. The following security management modes are available:Sign means that the connection requires a digital signature for data.SignAndEncrypt means that the connection requires both a digital signature and data encryption.None means that the connection does not require a digital signature or data encryption. It is not recommended to use this mode because it does not ensure a secure connection between the OPC UA client and the OPC UA server.Any means that the connection will use any of the listed modes that are supported by the server: Sign, SignAndEncrypt, None.policy field, specify the name of the security profile that is being used on your OPC UA server. The following security profile options are available:Basic128Rsa15.Basic256.Basic256Sha256.None.Any means that any of the listed policies can be used (if supported by the server): Basic128Rsa15, Basic256, Basic256Sha256, None.clientPkiData settings block:certificate field, specify the name of the certificate file for the OPC UA client. For example, "certificate": "client.crt".privateKey field, specify the name of the private key file for the OPC UA client certificate. For example, "privateKey": "client.key".The clientPkiData settings block must be completed even if the None value is set for the mode and policy fields.
trustList field, specify the array that contains the names of trusted certificate files. For example, "trustList": ["server.crt"]. If the OPC UA server configuration prescribes the use of a custom trusted list, add the client certificate to the list of trusted certificates of the server. If certificate verification is not required, indicate the AllowAll value for this parameter. If you do not need to complete the mode, policy and clientPkiData settings blocks, define the null value for the security settings block. The security mode will be set to None in this case.
userCredentials settings block:username field, enter the name of the user account for authorization on the OPC UA server.password field, enter the password of the user account for authorization on the OPC UA server.If you want to allow anonymous connection of the OPC UA client to the OPC UA server, define the null value in the userCredentials block. In this case, you do not need to fill in the username and password fields.
heartbeat settings block, define the following settings:id field. For example, "id": 0.name field. For example, "name": "Heartbeat".timeout field, specify the time period (in seconds) between the generation of heartbeat signals. For example, "timeout": 60. This field is optional. The default value for the time period between generated signals is 30 seconds.If you skip configuration of periodic heartbeat signal transmission or define "heartbeat": null, no heartbeat signals will be transmitted.
nodes settings block, specify the following parameters for each data node:id field. name field. nodeId settings block, provide the following data:ns (namespace index) fields (string identifier) – string value for the data node ID. For example, "nodeId": "ns=1;s=Variable temperature".i (numeric) – numerical value for the data node ID. For example, "nodeId": "ns=2;i=2045".The settings defined in the OpcUaClientSettings-0.json file will be applied the next time Kaspersky IoT Secure Gateway 100 is started.
Kaspersky IoT Secure Gateway 100 will receive data from industrial facilities within the internal enterprise network via the protocol that is described by the OPC Unified Architecture specification.
Page top