
Modbus protocol filtering protects industrial IoT
The Floodgate Modbus Protocol filter provides the critical missing layer of security for Modbus/TCP devices. Integrated into the device, Floodgate Modbus Protocol filtering relies on deep packet inspection to enforce virtual network segmentation and to control packets processed based upon source network address, function code, and packet data contents.
(function($) { $(‘head’).append(”); })(jQuery);
(function($) {$(function() {$(“#ad-gallery_cke_qil9i4we_slideShow”).on(“click”,”.ad-image”,function(){var imgObj =$(this).find(“img”);var isrc=imgObj.attr(“src”);var ititle=null;var idesc=null;var iname=isrc.split(‘/’);iname=iname[iname.length-1];var imgdescid=$(this).find(“.ad-image-description”);if(imgdescid){ititle=$(this).find(“.ad-description-title”);if(ititle)ititle=ititle.text();if(ititle!=”)ititle=’‘+ititle+’‘;idesc=$(this).find(“span”);if(idesc)idesc=idesc.text();if(idesc!=”){if(ititle!=”)ititle=ititle+’
‘;idesc=’‘+idesc+’‘;}}$.fancybox.open({href:isrc,beforeLoad:function(){this.title=ititle+idesc;},});});});})(jQuery);
(function($) { $(‘head’).append(”); })(jQuery);
(function($) {$(function() { var galleries = $(‘#ad-gallery_cke_qil9i4we_slideShow’).adGallery({loader_image: ‘/sites/all/modules/ckeditor/plugins/slideshow/3rdParty/ad-gallery/loader.gif’, width:false, height:300, start_at_index: 0, animation_speed: 500, update_window_hash: false, effect: ‘resize’, slideshow: { enable: true, autostart: true, start_label: ‘Start’, stop_label: ‘Stop’, speed: 5000}});});})(jQuery);
It is an extension of the Floodgate Firewall, an endpoint firewall solution designed for embedded and RTOS-based systems. The solution integrates with the native TCP/IP stack on the device and provides control over the packets processed by the device. The Modbus Protocol filtering extension provides control over the Modbus packets processed by the device based upon Modbus function code, originating IP address, or Modbus packet content. Integration with the Floodgate Agent enables detection and reporting of malicious traffic.
Visit Icon Laboratories at www.iconlabs.com
