Kaspersky IoT Secure Gateway 100 receives data from equipment residing within the internal enterprise network over the OPC UA protocol, which is described by the OPC Unified Architecture specification. You can read about the OPC UA protocol specification on the developer's website. Kaspersky IoT Secure Gateway 100 supports OPC UA protocol version 1.04.
The None
security profile in the Kaspersky IoT Secure Gateway 100 settings is the security profile that is most compatible with various types of industrial equipment for OPC UA connections.
When generating certificates for a connection between a client (Kaspersky IoT Secure Gateway 100) and the OPC UA server, make sure that the certificates comply with the following settings:
Kaspersky IoT Secure Gateway 100 uses the following folders to store certificates and keys for a connection with an OPC UA server:
You can configure the settings for receiving data from monitored objects over the OPC UA protocol in the OpcUaClientSettings-0.json configuration file.
To configure data acquisition using the OPC UA protocol:
All of the actions described next are performed within the OpcUaClientSettings-0.json file.
id
parameter, define the ID of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "id": 0
. name
parameter, define the name of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "name": "Kaspersky IoT Secure Gateway 100 OPC UA Client"
.description
parameter to enter a description of the OPC UA client that will receive data from the OPC UA server (industrial facility). For example, "description": "Collect data from CNC by Kaspersky IoT Secure Gateway 100"
.url
parameter. For example, "url": "opc.tcp://192.168.177.7:4840"
.readingCycle
parameter to define how frequently the gateway will read data. For example, "readingCycle": 1
.security
settings block:mode
parameter, indicate the security management mode for the connection of the client application that is being used on your OPC UA server. The following security management modes are available:Sign
means that the connection requires a digital signature for data.SignAndEncrypt
means that the connection requires both a digital signature and data encryption.None
means that the connection does not require a digital signature or data encryption. It is not recommended to use this mode because it does not ensure a secure connection between the OPC UA client and the OPC UA server.Any
means that the connection will use any of the listed modes that are supported by the server: Sign
, SignAndEncrypt
, None
.policy
field, specify the name of the security profile that is being used on your OPC UA server. The following security profile options are available:Basic128Rsa15
.Basic256
.Basic256Sha256
.None
.Any
means that any of the listed policies can be used (if supported by the server): Basic128Rsa15
, Basic256
, Basic256Sha256
, None
.clientPkiData
settings block:certificate
field, specify the name of the certificate file for the OPC UA client. For example, "certificate": "client.crt"
.privateKey
field, specify the name of the private key file for the OPC UA client certificate. For example, "privateKey": "client.key"
.The clientPkiData
settings block must be completed even if the None
value is set for the mode
and policy
fields.
trustList
field, specify the array that contains the names of trusted certificate files. For example, "trustList": ["server.crt"]
. If the OPC UA server configuration prescribes the use of a custom trusted list, add the client certificate to the list of trusted certificates of the server. If certificate verification is not required, indicate the AllowAll
value for this parameter. If you do not need to complete the mode
, policy
and clientPkiData
settings blocks, define the null
value for the security
settings block. The security mode will be set to None
in this case.
userCredentials
settings block:username
field, enter the name of the user account for authorization on the OPC UA server.password
field, enter the password of the user account for authorization on the OPC UA server.If you want to allow anonymous connection of the OPC UA client to the OPC UA server, define the null
value in the userCredentials
block. In this case, you do not need to fill in the username
and password
fields.
heartbeat
settings block, define the following settings:id
field. For example, "id": 0
.name
field. For example, "name": "Heartbeat"
.timeout
field, specify the time period (in seconds) between the generation of heartbeat signals. For example, "timeout": 60
. This field is optional. The default value for the time period between generated signals is 30 seconds.If you skip configuration of periodic heartbeat signal transmission or define "heartbeat": null
, no heartbeat signals will be transmitted.
nodes
settings block, specify the following parameters for each data node:id
field. name
field. nodeId
settings block, provide the following data:ns
(namespace index) fields
(string identifier) – string value for the data node ID. For example, "nodeId": "ns=1;s=Variable temperature"
.i
(numeric) – numerical value for the data node ID. For example, "nodeId": "ns=2;i=2045"
.The settings defined in the OpcUaClientSettings-0.json file will be applied the next time Kaspersky IoT Secure Gateway 100 is started.
Kaspersky IoT Secure Gateway 100 will receive data from industrial facilities within the internal enterprise network via the protocol that is described by the OPC Unified Architecture specification.
Page top