Shopping Cart

No products in the cart.

BS EN 61162-460:2015

$198.66

Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security

Published By Publication Date Number of Pages
BSI 2015 70
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

This part of IEC 61162 is an add-on to the IEC 61162‑450 standard where higher safety and security standards are needed, e.g. due to higher exposure to external threats or to improve network integrity. This standard provides requirements and test methods for equipment to be used in an IEC 61162‑460 compliant network as well as requirements for the network itself and requirements for interconnection from the network to other networks. This standard also contains requirements for a redundant IEC 61162‑460 compliant network.

This standard extends the informative guidance given in Annex D of IEC 61162‑450:2011 . It does not introduce new application level protocol requirements to those that are defined in IEC 61162‑450 .

PDF Catalog

PDF Pages PDF Title
7 CONTENTS
11 FOREWORD
13 1 Scope
2 Normative references
14 3 Terms and definitions
18 4 High-level requirements
4.1 Overview
19 4.2 Description
4.3 General requirements
4.3.1 Equipment and system requirements
Figures
Figure 1 – Functional overview of IEC 61162-460 requirement applications
20 4.3.2 Physical composition requirements
4.3.3 Logical composition requirements
4.4 Physical component requirements
4.4.1 450-Node
4.4.2 460-Node
21 4.4.3 460-Switch
4.4.4 460-Forwarder
4.4.5 460-Gateway and 460-Wireless gateway
4.5 Logical component requirements
4.5.1 Network monitoring function
4.5.2 System management function
22 4.6 System documentation requirements
4.7 Secure area requirements
5 Network traffic management requirements
5.1 460-Node requirements
23 5.2 460-Switch requirements
5.2.1 Resource allocation
5.2.2 Loop prevention
5.3 460-Forwarder requirements
5.3.1 Traffic separation
5.3.2 Resource allocation
24 5.3.3 Traffic prioritization
Tables
Table 1 – Traffic prioritization with CoS and DSCP
25 5.4 System design requirements
5.4.1 Documentation
5.4.2 Traffic
6 Security requirements
6.1 Security scenarios
6.1.1 Threat scenarios
6.1.2 Internal threats
26 6.1.3 External threats
6.2 Internal security requirements
6.2.1 General
6.2.2 Denial of service protection
27 6.2.3 REDS security
6.2.4 Access control
28 6.3 External security requirements
6.3.1 Overview
Figure 2 – 460-Network with 460-Gateway
29 6.3.2 Firewalls
6.3.3 Communication security
6.3.4 460-Node
30 6.3.5 460-Gateway
31 6.3.6 460-Wireless gateway
6.4 Additional security issues
7 Redundancy requirements
7.1 General requirements
7.1.1 General
32 7.1.2 Interface redundancy
7.1.3 Device redundancy
7.2 460-Node requirements
Figure 3 – An example of redundancy
33 7.3 460-Switch requirements
7.4 460-Forwarder requirements
7.5 460-Gateway and 460-Wireless gateway requirements
7.6 Network monitoring function requirements
7.7 System design requirements
8 Network monitoring requirements
8.1 Network status monitoring
8.1.1 460-Network
8.1.2 460-Node
34 8.1.3 460-Switch
8.1.4 460-Forwarder
8.1.5 460-Gateway and 460-Wireless gateway
8.2 Network monitoring function
8.2.1 General
35 8.2.2 Network load monitoring function
Figure 4 – Example of network status recording information
36 8.2.3 Redundancy monitoring function
8.2.4 Network topology monitoring function
8.2.5 Syslog recording function
37 8.2.6 Redundancy of network monitoring function
8.2.7 Alert management
9 Controlled network requirements
38 10 Methods of testing and required test results
10.1 Subject of tests
10.2 Test site
39 10.3 General requirements
10.4 450-Node
10.5 460-Node
10.5.1 Network traffic management
40 10.5.2 Security
42 10.5.3 Redundancy
10.5.4 Monitoring
10.6 460-Switch
10.6.1 Resource allocation
10.6.2 Loop prevention
43 10.6.3 Security
44 10.6.4 Monitoring
10.7 460-Forwarder
10.7.1 Traffic separation
10.7.2 Resource allocation
45 10.7.3 Traffic prioritisation
10.7.4 Security
46 10.7.5 Monitoring
47 10.8 460-Gateway
10.8.1 Denial of service behaviour
10.8.2 Access control to configuration setup
10.8.3 Communication security
10.8.4 Firewall
48 10.8.5 Application server
10.8.6 Interoperable access to file storage of DMZ
49 10.8.7 Additional security
10.8.8 Monitoring
10.9 460-Wireless gateway
10.9.1 General
10.9.2 Security
50 10.9.3 Monitoring
10.10 Controlled network
10.11 Network monitoring function
10.11.1 General
51 10.11.2 Network load monitoring function
10.11.3 Redundancy monitoring function
10.11.4 Network topology monitoring function
52 10.11.5 Syslog recording function
10.11.6 Alert management
53 10.12 System level
10.12.1 General
54 10.12.2 System management function
10.12.3 System design
56 10.12.4 Network monitoring function
10.12.5 Network load monitoring function
10.12.6 Redundancy monitoring function
10.12.7 Network topology monitoring function
57 Annex A (informative)Communication scenarios between an IEC 61162-460network and uncontrolled networks
A.1 General
A.2 Routine off-ship
Figure A.1 – Usage model for communication between a IEC 61162-450network and shore networks
58 A.3 Routine on-ship
A.4 460-Gateway usage for direct connection with equipment
59 Annex B (informative)Summary of redundancy protocols in the IEC 62439 series
B.1 Summary of redundancy protocols
B.2 RSTP recovery time
Table B.1 – Redundancy protocols and recovery times
61 Annex C (informative)Guidance for testing
C.1 Methods of test
C.2 Observation
C.3 Inspection of documented evidence
C.4 Measurement
62 C.5 Analytical evaluation
63 Annex D (informative)Some examples to use this standard
Figure D.1 – 460-Forwarder used between two networks
Figure D.2 – 460-Forwarder used between two networks
64 Figure D.3 – 460-Gateway used for e-Navigation services
Figure D.4 – 460-Gateway used for remote maintenance
65 Annex E (normative)IEC 61162 interfaces for the network monitoring function
Figure E.1 – Network monitoring function logical interfaces
Table E.1 – Sentences received by the network monitoring function
Table E.2 – Sentences transmitted by the network monitoring function
66 Bibliography
BS EN 61162-460:2015
$198.66