{"id":239135,"date":"2024-10-19T15:38:14","date_gmt":"2024-10-19T15:38:14","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-en-61162-4602015\/"},"modified":"2024-10-25T10:20:02","modified_gmt":"2024-10-25T10:20:02","slug":"bs-en-61162-4602015","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-en-61162-4602015\/","title":{"rendered":"BS EN 61162-460:2015"},"content":{"rendered":"
This part of IEC 61162<\/span> <\/span> is an add-on to the IEC 61162\u2011450<\/span> <\/span> standard where higher safety and security standards are needed, e.g. due to higher exposure to external threats or to improve network integrity. This standard provides requirements and test methods for equipment to be used in an IEC 61162\u2011460<\/span> <\/span> compliant network as well as requirements for the network itself and requirements for interconnection from the network to other networks. This standard also contains requirements for a redundant IEC 61162\u2011460<\/span> <\/span> compliant network.<\/p>\n This standard extends the informative guidance given in Annex D of IEC 61162\u2011450:2011<\/span> <\/span>. It does not introduce new application level protocol requirements to those that are defined in IEC 61162\u2011450<\/span> <\/span>.<\/p>\n Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security<\/b><\/p>\nPDF Catalog<\/h4>\n
\n
\n PDF Pages<\/th>\n PDF Title<\/th>\n<\/tr>\n \n 7<\/td>\n CONTENTS <\/td>\n<\/tr>\n \n 11<\/td>\n FOREWORD <\/td>\n<\/tr>\n \n 13<\/td>\n 1 Scope
2 Normative references <\/td>\n<\/tr>\n\n 14<\/td>\n 3 Terms and definitions <\/td>\n<\/tr>\n \n 18<\/td>\n 4 High-level requirements
4.1 Overview <\/td>\n<\/tr>\n\n 19<\/td>\n 4.2 Description
4.3 General requirements
4.3.1 Equipment and system requirements
Figures
Figure 1 \u2013 Functional overview of IEC\u00a061162-460 requirement applications <\/td>\n<\/tr>\n\n 20<\/td>\n 4.3.2 Physical composition requirements
4.3.3 Logical composition requirements
4.4 Physical component requirements
4.4.1 450-Node
4.4.2 460-Node <\/td>\n<\/tr>\n\n 21<\/td>\n 4.4.3 460-Switch
4.4.4 460-Forwarder
4.4.5 460-Gateway and 460-Wireless gateway
4.5 Logical component requirements
4.5.1 Network monitoring function
4.5.2 System management function <\/td>\n<\/tr>\n\n 22<\/td>\n 4.6 System documentation requirements
4.7 Secure area requirements
5 Network traffic management requirements
5.1 460-Node requirements <\/td>\n<\/tr>\n\n 23<\/td>\n 5.2 460-Switch requirements
5.2.1 Resource allocation
5.2.2 Loop prevention
5.3 460-Forwarder requirements
5.3.1 Traffic separation
5.3.2 Resource allocation <\/td>\n<\/tr>\n\n 24<\/td>\n 5.3.3 Traffic prioritization
Tables
Table 1 \u2013 Traffic prioritization with CoS and DSCP <\/td>\n<\/tr>\n\n 25<\/td>\n 5.4 System design requirements
5.4.1 Documentation
5.4.2 Traffic
6 Security requirements
6.1 Security scenarios
6.1.1 Threat scenarios
6.1.2 Internal threats <\/td>\n<\/tr>\n\n 26<\/td>\n 6.1.3 External threats
6.2 Internal security requirements
6.2.1 General
6.2.2 Denial of service protection <\/td>\n<\/tr>\n\n 27<\/td>\n 6.2.3 REDS security
6.2.4 Access control <\/td>\n<\/tr>\n\n 28<\/td>\n 6.3 External security requirements
6.3.1 Overview
Figure 2 \u2013 460-Network with 460-Gateway <\/td>\n<\/tr>\n\n 29<\/td>\n 6.3.2 Firewalls
6.3.3 Communication security
6.3.4 460-Node <\/td>\n<\/tr>\n\n 30<\/td>\n 6.3.5 460-Gateway <\/td>\n<\/tr>\n \n 31<\/td>\n 6.3.6 460-Wireless gateway
6.4 Additional security issues
7 Redundancy requirements
7.1 General requirements
7.1.1 General <\/td>\n<\/tr>\n\n 32<\/td>\n 7.1.2 Interface redundancy
7.1.3 Device redundancy
7.2 460-Node requirements
Figure 3 \u2013 An example of redundancy <\/td>\n<\/tr>\n\n 33<\/td>\n 7.3 460-Switch requirements
7.4 460-Forwarder requirements
7.5 460-Gateway and 460-Wireless gateway requirements
7.6 Network monitoring function requirements
7.7 System design requirements
8 Network monitoring requirements
8.1 Network status monitoring
8.1.1 460-Network
8.1.2 460-Node <\/td>\n<\/tr>\n\n 34<\/td>\n 8.1.3 460-Switch
8.1.4 460-Forwarder
8.1.5 460-Gateway and 460-Wireless gateway
8.2 Network monitoring function
8.2.1 General <\/td>\n<\/tr>\n\n 35<\/td>\n 8.2.2 Network load monitoring function
Figure 4 \u2013 Example of network status recording information <\/td>\n<\/tr>\n\n 36<\/td>\n 8.2.3 Redundancy monitoring function
8.2.4 Network topology monitoring function
8.2.5 Syslog recording function <\/td>\n<\/tr>\n\n 37<\/td>\n 8.2.6 Redundancy of network monitoring function
8.2.7 Alert management
9 Controlled network requirements <\/td>\n<\/tr>\n\n 38<\/td>\n 10 Methods of testing and required test results
10.1 Subject of tests
10.2 Test site <\/td>\n<\/tr>\n\n 39<\/td>\n 10.3 General requirements
10.4 450-Node
10.5 460-Node
10.5.1 Network traffic management <\/td>\n<\/tr>\n\n 40<\/td>\n 10.5.2 Security <\/td>\n<\/tr>\n \n 42<\/td>\n 10.5.3 Redundancy
10.5.4 Monitoring
10.6 460-Switch
10.6.1 Resource allocation
10.6.2 Loop prevention <\/td>\n<\/tr>\n\n 43<\/td>\n 10.6.3 Security <\/td>\n<\/tr>\n \n 44<\/td>\n 10.6.4 Monitoring
10.7 460-Forwarder
10.7.1 Traffic separation
10.7.2 Resource allocation <\/td>\n<\/tr>\n\n 45<\/td>\n 10.7.3 Traffic prioritisation
10.7.4 Security <\/td>\n<\/tr>\n\n 46<\/td>\n 10.7.5 Monitoring <\/td>\n<\/tr>\n \n 47<\/td>\n 10.8 460-Gateway
10.8.1 Denial of service behaviour
10.8.2 Access control to configuration setup
10.8.3 Communication security
10.8.4 Firewall <\/td>\n<\/tr>\n\n 48<\/td>\n 10.8.5 Application server
10.8.6 Interoperable access to file storage of DMZ <\/td>\n<\/tr>\n\n 49<\/td>\n 10.8.7 Additional security
10.8.8 Monitoring
10.9 460-Wireless gateway
10.9.1 General
10.9.2 Security <\/td>\n<\/tr>\n\n 50<\/td>\n 10.9.3 Monitoring
10.10 Controlled network
10.11 Network monitoring function
10.11.1 General <\/td>\n<\/tr>\n\n 51<\/td>\n 10.11.2 Network load monitoring function
10.11.3 Redundancy monitoring function
10.11.4 Network topology monitoring function <\/td>\n<\/tr>\n\n 52<\/td>\n 10.11.5 Syslog recording function
10.11.6 Alert management <\/td>\n<\/tr>\n\n 53<\/td>\n 10.12 System level
10.12.1 General <\/td>\n<\/tr>\n\n 54<\/td>\n 10.12.2 System management function
10.12.3 System design <\/td>\n<\/tr>\n\n 56<\/td>\n 10.12.4 Network monitoring function
10.12.5 Network load monitoring function
10.12.6 Redundancy monitoring function
10.12.7 Network topology monitoring function <\/td>\n<\/tr>\n\n 57<\/td>\n Annex\u00a0A (informative)Communication scenarios between an IEC\u00a061162-460network and uncontrolled networks
A.1 General
A.2 Routine off-ship
Figure\u00a0A.1 \u2013 Usage model for communication between a IEC\u00a061162-450network and shore networks <\/td>\n<\/tr>\n\n 58<\/td>\n A.3 Routine on-ship
A.4 460-Gateway usage for direct connection with equipment <\/td>\n<\/tr>\n\n 59<\/td>\n Annex\u00a0B (informative)Summary of redundancy protocols in the IEC\u00a062439 series
B.1 Summary of redundancy protocols
B.2 RSTP recovery time
Table B.1 \u2013 Redundancy protocols and recovery times <\/td>\n<\/tr>\n\n 61<\/td>\n Annex\u00a0C (informative)Guidance for testing
C.1 Methods of test
C.2 Observation
C.3 Inspection of documented evidence
C.4 Measurement <\/td>\n<\/tr>\n\n 62<\/td>\n C.5 Analytical evaluation <\/td>\n<\/tr>\n \n 63<\/td>\n Annex\u00a0D (informative)Some examples to use this standard
Figure D.1 \u2013 460-Forwarder used between two networks
Figure D.2 \u2013 460-Forwarder used between two networks <\/td>\n<\/tr>\n\n 64<\/td>\n Figure D.3 \u2013 460-Gateway used for e-Navigation services
Figure D.4 \u2013 460-Gateway used for remote maintenance <\/td>\n<\/tr>\n\n 65<\/td>\n Annex\u00a0E (normative)IEC\u00a061162 interfaces for the network monitoring function
Figure E.1 \u2013 Network monitoring function logical interfaces
Table E.1 \u2013 Sentences received by the network monitoring function
Table E.2 \u2013 Sentences transmitted by the network monitoring function <\/td>\n<\/tr>\n\n 66<\/td>\n Bibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":" \n\n
\n Published By<\/td>\n Publication Date<\/td>\n Number of Pages<\/td>\n<\/tr>\n \n BSI<\/b><\/a><\/td>\n 2015<\/td>\n 70<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":239140,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-239135","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/239135","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/239140"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=239135"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=239135"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=239135"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}