{"id":240031,"date":"2024-10-19T15:42:28","date_gmt":"2024-10-19T15:42:28","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-iec-61162-4602018-tc\/"},"modified":"2024-10-25T10:25:36","modified_gmt":"2024-10-25T10:25:36","slug":"bs-en-iec-61162-4602018-tc","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-iec-61162-4602018-tc\/","title":{"rendered":"BS EN IEC 61162-460:2018 – TC"},"content":{"rendered":"

IEC 61162-460:2018 is also available as \/2 which contains the International Standard and its Redline version, showing all changes of the technical content compared to the previous edition. IEC 61162-460:2018 is an add-on to IEC 61162-450 where higher safety and security standards are needed, for example due to higher exposure to external threats or to improve network integrity. This document provides requirements and test methods for equipment to be used in an IEC 61162-460 compliant network as well as requirements for the network itself and requirements for interconnection from the network to other networks. This document also contains requirements for a redundant IEC 61162-460 compliant network. This document does not introduce new application level protocol requirements to those that are defined in IEC 61162-450. This second edition of IEC 61162-460 cancels and replaces the first edition published in 2015. This edition constitutes a technical revision. This edition includes the following significant technical changes with respect to the previous edition: a) 460-Switches and 460-Forwarders are required to implement IGMP snooping; b) connection between secure and non-secure areas requires a 460-Forwarder as an isolation element; c) SFI collision detection added as function of network monitoring; d) 460-Gateway and 460-Wireless gateway are no longer required to report to the network monitoring; e) all alerts from network monitoring have standardized alert identifiers.<\/p>\n

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
83<\/td>\nundefined <\/td>\n<\/tr>\n
88<\/td>\nEnglish
CONTENTS <\/td>\n<\/tr>\n
92<\/td>\nFOREWORD <\/td>\n<\/tr>\n
94<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
95<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
101<\/td>\n4 High-level requirements
4.1 Overview
4.2 Description <\/td>\n<\/tr>\n
102<\/td>\n4.3 General requirements
4.3.1 Equipment and system requirements
4.3.2 Physical composition requirements
Figures
Figure 1 \u2013 Functional overview of IEC 61162-460 requirement applications <\/td>\n<\/tr>\n
103<\/td>\n4.3.3 Logical composition requirements
4.4 Physical component requirements
4.4.1 450-Node
4.4.2 460-Node <\/td>\n<\/tr>\n
104<\/td>\n4.4.3 460-Switch
4.4.4 460-Forwarder
4.4.5 460-Gateway and 460-Wireless gateway
4.5 Logical component requirements
4.5.1 Network monitoring function
4.5.2 System management function <\/td>\n<\/tr>\n
105<\/td>\n4.6 System documentation requirements
4.7 Secure area requirements
5 Network traffic management requirements
5.1 460-Node requirements <\/td>\n<\/tr>\n
106<\/td>\n5.2 460-Switch requirements
5.2.1 Resource allocation
5.2.2 Loop prevention
5.3 460-Forwarder requirements
5.3.1 Traffic separation <\/td>\n<\/tr>\n
107<\/td>\n5.3.2 Resource allocation
5.3.3 Traffic prioritization
Tables
Table 1 \u2013 Traffic prioritization with CoS and DSCP <\/td>\n<\/tr>\n
108<\/td>\n5.4 System design requirements
5.4.1 Documentation
5.4.2 Traffic
5.4.3 Connections between secure and non-secure areas <\/td>\n<\/tr>\n
109<\/td>\n6 Security requirements
6.1 Security scenarios
6.1.1 Threat scenarios
6.1.2 Internal threats
6.1.3 External threats <\/td>\n<\/tr>\n
110<\/td>\n6.2 Internal security requirements
6.2.1 General
6.2.2 Denial of service protection
6.2.3 REDS security <\/td>\n<\/tr>\n
111<\/td>\n6.2.4 Access control <\/td>\n<\/tr>\n
112<\/td>\n6.3 External security requirements
6.3.1 Overview
6.3.2 Firewalls
6.3.3 Direct communication
Figure 2 \u2013 460-Network with 460-Gateway <\/td>\n<\/tr>\n
113<\/td>\n6.3.4 460-Node
6.3.5 460-Gateway <\/td>\n<\/tr>\n
114<\/td>\n6.3.6 460-Wireless gateway <\/td>\n<\/tr>\n
115<\/td>\n6.4 Additional security issues
7 Redundancy requirements
7.1 General requirements
7.1.1 General <\/td>\n<\/tr>\n
116<\/td>\n7.1.2 Interface redundancy
7.1.3 Device redundancy
7.2 460-Node requirements
Figure 3 \u2013Example of redundancy <\/td>\n<\/tr>\n
117<\/td>\n7.3 460-Switch requirements
7.4 460-Forwarder requirements
7.5 460-Gateway and 460-Wireless gateway requirements
7.6 Network monitoring function requirements
7.7 System design requirements
8 Network monitoring requirements
8.1 Network status monitoring
8.1.1 460-Network
8.1.2 460-Node <\/td>\n<\/tr>\n
118<\/td>\n8.1.3 460-Switch
8.1.4 460-Forwarder
8.2 Network monitoring function
8.2.1 General <\/td>\n<\/tr>\n
119<\/td>\n8.2.2 Network load monitoring function
Figure 4 \u2013 Example of network status recording information <\/td>\n<\/tr>\n
120<\/td>\n8.2.3 Redundancy monitoring function
8.2.4 Network topology monitoring function <\/td>\n<\/tr>\n
121<\/td>\n8.2.5 Syslog recording function <\/td>\n<\/tr>\n
122<\/td>\n8.2.6 Redundancy of network monitoring function
8.2.7 Alert management
Table 2 \u2013 Summary of alert of network monitoring <\/td>\n<\/tr>\n
123<\/td>\n9 Controlled network requirements <\/td>\n<\/tr>\n
124<\/td>\n10 Methods of testing and required test results
10.1 Subject of tests
10.2 Test site
10.3 General requirements <\/td>\n<\/tr>\n
125<\/td>\n10.4 450-Node
10.5 460-Node
10.5.1 Network traffic management <\/td>\n<\/tr>\n
126<\/td>\n10.5.2 Security <\/td>\n<\/tr>\n
127<\/td>\n10.5.3 Redundancy <\/td>\n<\/tr>\n
128<\/td>\n10.5.4 Monitoring
10.6 460-Switch
10.6.1 Resource allocation
10.6.2 Loop prevention <\/td>\n<\/tr>\n
129<\/td>\n10.6.3 Security <\/td>\n<\/tr>\n
130<\/td>\n10.6.4 Monitoring
10.7 460-Forwarder
10.7.1 Traffic separation <\/td>\n<\/tr>\n
131<\/td>\n10.7.2 Resource allocation
10.7.3 Traffic prioritisation <\/td>\n<\/tr>\n
132<\/td>\n10.7.4 Security <\/td>\n<\/tr>\n
133<\/td>\n10.7.5 Monitoring
10.8 460-Gateway
10.8.1 Denial of service behaviour
10.8.2 Access control to configuration setup
10.8.3 Communication security <\/td>\n<\/tr>\n
134<\/td>\n10.8.4 Firewall <\/td>\n<\/tr>\n
135<\/td>\n10.8.5 Application server
10.8.6 Interoperable access to file storage of DMZ
10.8.7 Additional security
10.9 460-Wireless gateway
10.9.1 General
10.9.2 Security <\/td>\n<\/tr>\n
136<\/td>\n10.10 Controlled network
10.11 Network monitoring function
10.11.1 General <\/td>\n<\/tr>\n
137<\/td>\n10.11.2 Network load monitoring function
10.11.3 Redundancy monitoring function
10.11.4 Network topology monitoring function <\/td>\n<\/tr>\n
138<\/td>\n10.11.5 Syslog recording function
10.11.6 Alert management <\/td>\n<\/tr>\n
139<\/td>\n10.12 System level
10.12.1 General <\/td>\n<\/tr>\n
140<\/td>\n10.12.2 System management function
10.12.3 System design <\/td>\n<\/tr>\n
142<\/td>\n10.12.4 Network monitoring function
10.12.5 Network load monitoring function
10.12.6 Redundancy monitoring function
10.12.7 Network topology monitoring function <\/td>\n<\/tr>\n
143<\/td>\nAnnexes
Annex A (informative) Communication scenarios between an IEC 61162-460 network and uncontrolled networks
A.1 General
A.2 Routine off-ship
Figure A.1 \u2013 Usage model for communication between a IEC 61162-460 network and shore networks <\/td>\n<\/tr>\n
144<\/td>\nA.3 Routine on-ship
A.4 460-Gateway usage for direct connection with equipment <\/td>\n<\/tr>\n
145<\/td>\nAnnex B (informative) Summary of redundancy protocols in IEC 62439 (all parts)
Table B.1 \u2013 Redundancy protocols and recovery times <\/td>\n<\/tr>\n
146<\/td>\nAnnex C (informative) Guidance for testing
C.1 Methods of test
C.2 Observation
C.3 Inspection of documented evidence
C.4 Measurement <\/td>\n<\/tr>\n
147<\/td>\nC.5 Analytical evaluation <\/td>\n<\/tr>\n
148<\/td>\nAnnex D (informative) Some examples to use this document
Figure D.1 \u2013 460-Forwarder used between two networks
Figure D.2 \u2013 460-Forwarder used between two networks <\/td>\n<\/tr>\n
149<\/td>\nFigure D.3 \u2013 460-Gateway used for e-Navigation services
Figure D.4 \u2013 460-Gateway used for remote maintenance <\/td>\n<\/tr>\n
150<\/td>\nFigure D.5 \u2013 460-Forwarder used to separate an INS system based on its own controlled network from a network of -460 devices <\/td>\n<\/tr>\n
151<\/td>\nFigure D.6 \u2013 460-Forwarder used to separate a radar system based on its own controlled network from a network of -460 devices <\/td>\n<\/tr>\n
152<\/td>\nAnnex E (normative) IEC 61162 interfaces for the network monitoring function
Figure E.1 \u2013 Network monitoring function logical interfaces
Table E.1 \u2013 Sentences received by the network monitoring function
Table E.2 \u2013 Sentences transmitted by the network monitoring function <\/td>\n<\/tr>\n
153<\/td>\nAnnex F (informative) Distribution of functions around 460-Network
Table F.1 \u2013 Distribution of functions around 460-Network <\/td>\n<\/tr>\n
154<\/td>\nTable F.2 \u2013 Equipment standards referencing IEC 61162-460 <\/td>\n<\/tr>\n
155<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Tracked Changes. Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2020<\/td>\n157<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":240035,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-240031","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/240031","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/240035"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=240031"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=240031"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=240031"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}