OT Networking Reference Architecture
OT Networking Reference Architecture
Reference Architecture
usa.siemens.com/industrial-networks
Table of Contents
1 Introduction 3
3 Components of an IT / OT Network 8
3.1 Hardware 8
3.1.1 Switches 8
3.1.2 Routers 8
3.1.3 Firewalls 9
3.1.4 Industrial Wireless Local Area Network (IWLAN) 10
3.2 Network Software 10
3.2.1 Network Management System (NMS) 10
3.2.2 Network Services Software 10
3.3 Cybersecurity Software 11
3.3.1 Secure Remote Access 11
3.3.2 SIEM 11
3.3.3 Intrusion Detection System/ Intrusion Prevention System (IDS/IPS) 11
3.3.4 Zero Trust Concept 11
5. Key Steps 21
Resources 22
Figure list
Figure 1 – The Evolved Network 6
Figure 2 – IT-OT Entangled Flat Network 7
Figure 3 – Small Network Reference Architecture 14
Figure 4 – Medium Network Reference Architecture 16
Figure 5 – Large Network Reference Architecture 18
2 Version 2, 03 -2023
The OT Networking Reference Architecture – Introduction
1. Introduction
Operations Technology (OT) networks require different structures and skills to properly design, deploy, maintain, protect,
and improve. These skills differ from standard Information Technology (IT) Networks due to the requirements of the OT
environment. These differences include how the data is used, expected lifecycles of the equipment, acceptable latencies
in data transfer, and operational reliability and availability requirements of an operating plant, and many more. This
document provides an overview of the steps needed to implement a cybersecure plant-wide OT network.
When discussing OT networking, it is important to understand the current state of the systems and the desired goals. With
this assessment, we can design a more complete solution that meets the needs with hardware, software, and services while
considering current and future roles and training for personnel. Commonly overlooked factors during network improvements
are the potential future requirements of the plant and broader enterprise. This is why we advocate building a scalable network
which considers not just the current needs but also creates a flexible solution that can easily adapt to future trends. By
building future-ready networks, we are prepared to embrace the latest advancements in technology, enabling easier
adoption of new manufacturing concepts, and at a lower total cost of ownership.
The purpose of this document is to inform on OT networking best practices and reference OT network architectures. Delving
into specific technologies and how to implement them is left to consultants, technical manuals, and further training.
Version 2, 03 -2023 3
The OT Networking Reference Architecture – Understanding the Current State
Every network begins by having a need for one system to communicate with another. In the past, this was accomplished by
implementing proprietary and physically complicated wiring schemes. The systems of today and of the future meet this need
with a network based on an open standard called Ethernet. By utilizing Ethernet, every vendor can enable their devices to
communicate with another vendor’s devices. It is on top of Ethernet that common industrial protocols like PROFINET, Modbus
TCP/IP, EtherNet/IP and EtherCAT function. The use of Ethernet creates a universal platform for automation. The architectures
proposed in this document support all standard Ethernet-based automation protocols.
Many standards and models have been created to provide best-practices in terms of cybersecurity. IEC 62443 is an
internationally recognized series of standards that provide a framework to design and operate cyber-secure Industrial
Automation and Control Systems (IACS). Another prevalent OT cybersecurity standard is NIST SP 800-82 which is used
more often in critical infrastructure industries (e.g., electrical power distribution, water/wastewater, oil and gas
pipelines), but is also being adopted in more typical manufacturing operations (e.g., chemicals, automotive, food &
beverage). Both standards have been in development, in various forms, for about two decades and are now very
similar in their basic recommendations. This document will rely most directly on IEC 62443 as it has a more general
applicability and greater adoption internationally. The architecture drawings included will make references to the
Purdue model as it provides a model that segments devices and equipment into hierarchical functions and layers.
This document discusses some of the technical controls for securing an OT or Industrial Control System (ICS) network.
However, it is extremely important to develop and implement a dedicated OT Cybersecurity Program to be able to
fully assess, design, implement, maintain, and continuously improve a secure OT network. While the design and
implementation of a cybersecurity program is beyond the scope of this document, the IEC 62443 standard series
contains a section (Part 2-1) which describes requirements for OT cybersecurity programs.
4 Version 2, 03 -2023
The OT Networking Reference Architecture – Understanding the Current State
If we think of how safety programs developed over the 1990s and 2000s, we realize that without a continuous
improvement program and a well-structured organization to carry out the program’s policies and procedures, a safety
program would quickly become an afterthought and the safety posture of your plant would quickly decline. The same
is sure to happen with new cybersecurity initiatives if there is no OT-specific cybersecurity program with dedicated
resources and well-defined management responsibilities.
These networks (as depicted in Figure 1) are characterized by a mix of multiple architectures (line, star, ring) and
typically have little to no redundancy, often with multiple single points of failure which could bring down large
portions of the network. These networks also often contain unmanaged switches which limit diagnostics and
security capabilities. Additionally, evolved OT networks may be physically separate (also known as air-gapped) from
the business network but are more typically connected via a single firewall controlled by IT. Documentation is also
often lacking and typically out of date.
QUICK SIDE NOTE on the myth of security via “Air Gapped” Networks: There really is no such thing as security by
air gap in industry. Any control system requires maintenance, updates, and probably expansion. Any time a USB
flash drive or laptop from a non-dedicated source is connected to the network or a device on the network it
represents a breach of the air gap. Due to the lack of documentation and the freeform nature of these networks,
they are difficult to troubleshoot and require significant additional time and effort to expand or modify. They
often exhibit intermittent connectivity or data throughput issues with no efficient methods to detect the exact
location or cause of the issues.
Version 2, 03 -2023 5
The OT Networking Reference Architecture – Understanding the Current State
Enterprise Network
Core
Direct Connection to
Business Network
Main OT
Main Control Room
Switch
Operator
Stations
Servers
Control Room
Production Backbone
Switch
Distribution
Operator Operator
Station Station
Line 3 Backbone
Switch Switch
Ring
Switch Switch
Production Network
Cell 1-1-1 Cell 2-1-1 Cell 2-1-2 Cell 3-1-1 Cell 3-1-2
Firew
Tree
Switch Switch
Switch Switch Switch
Production Cells
HRP
Access
Switch Switch
These flat networks may be well designed but use IT-style line or star topologies which can be more efficient
from a cabling and port count perspective but lack the resiliency of a ring style. Because it is one big network,
the OT devices are often intertwined with the IT devices. A flat network presents challenges to both the OT and
IT users as problems on one type of equipment can directly affect the other types. Additionally, IT typically
enforces IT-centric policies and procedures across the full network. This is because there is no segregation which
would allow the OT areas to be managed differently.
6 Version 2, 03 -2023
The OT Networking Reference Architecture – Understanding the Current State
Flat networks can cause production equipment slowdowns and outages due to non-OT traffic (e.g. video or
large file transfers), network reconfigurations, or firmware updates. Broadcast storms are more common on
large non-segmented networks and can act like a Denial-of-Service (DoS) attack. It is also easier to inadvertently
create a loop in a large flat network which could then also cause communication issues even taking down parts
of the network until resolved. Identifying, isolating, and resolving issues is an immense challenge as the lack of
segmentation forces troubleshooting efforts to consider the entire system rather than smaller sections.
Another underlying issue with IT managed OT networks can be the service level agreements (or lack thereof)
between OT and IT. If a switch goes down or a network problem is suspected during non-office hours there may
be no quick route to troubleshooting and repair of the network. As production relies more and more on Ethernet
based networks, it is imperative that support structures be created which meet the near instant response times
required on the production floor.
Enterprise Network
Core
Direct Connection to
Business Network
Operator IT Workstation
Stations ERP/Email/Web
Servers
Control Room
Production Backbone
Switch
Distribution
Operator Operator
Station Station
Line 3 Backbone
Manufacturing Office
ANDON Board
Production Network
Cell 1-1-1 Cell 2-1-1 Cell 2-1-2 Cell 3-1-1 Cell 3-1-2
Switch Switch
Switch Switch Switch
Production Cells
HRP
Access
Switch Switch
Switch
Operator Operator
Station Station
Version 2, 03 -2023 7
The OT Networking Reference Architecture – Components of an IT/OT Network
3.1 Hardware
The functions of networking components commonly found in plant-wide OT networks are outlined below along with the
recommended Siemens offering.
3.1.1 Switches
There are two main categories of switches, unmanaged and managed. Unmanaged switches offer simple connection of
Ethernet devices with little or no configuration options, but this simple operation comes with significant opportunity
cost. Their unmanaged nature means network diagnostics, security, and network redundancy features are unavailable.
Unmanaged switches are not recommended in a plant-wide network for the reasons above.
Managed switches allow the connection and networking of ethernet devices in a manner that can be configured and
monitored to fit the needs of the network in a secure manner. Noteworthy management functions include redundancy
mechanisms (RSTP, ring networks, etc.), security functions (disabling ports, MAC or IP filtering, and user management),
network segmentation through VLANs, and some managed switches even support Network Address Translation (NAT)
to allow integration of devices into differing IP network structures. In addition to management, monitoring functions
allow users to access diagnostic information that assist in troubleshooting and network optimization. Managed
switches are recommended to be used in a plant-wide network. All switches shown in the figures below are managed.
The recommended Siemens switches are the SCALANCE XC-200, XC-300, XR-300, XM-400 (layer 3 capable), and
XR-500 (layer 3 capable).
Click here for information on SCALANCE X
3.1.2 Routers
Routers move network traffic between different Internet Protocol (IP) subnets and Virtual Local Area Networks (VLANs).
Network segmentation (using VLANs and/or subnetting) is highly recommended in plant-wide networks as it creates
different security cells that can only be accessed with the help of a router or firewall. Routers enable communication
across different subnets and VLANs when one area of the network needs to communicate with a separate segment of
the network. For example, a server may need access to many different production lines that are segmented – in this
case a router will be needed to traverse these boundaries. Routers are recommended and generally required in the
upper layers of the plant-wide network. Routers are placed in the production backbone in the figures below.
The recommended Siemens Layer 3 switches with routing capabilities are the SCALANCE XM-400 and XR-500.
Click here for information on SCALANCE X
8 Version 2, 03 -2023
The OT Networking Reference Architecture – Components of an IT/OT Network
3.1.3 Firewalls
Firewalls are utilized for restricting communication and access to various areas of the network. A firewall restricts
access by following a set of user-defined rules which describe the allowed communication between specific
devices (IP Addresses) or segments (VLANs or subnets) in the network. Most firewalls can also act as routers
allowing communication between network segments while restricting which specific IP addresses can
communicate to each other and which protocols may be used. Another commonly used function is Network
Address Translation (NAT).
The most common area firewalls will be found are between the internet and the company network. This is
to protect the company network from threats existing on the internet. In a plant-wide network, firewalls are
recommended between the OT and IT network divide and between the various cells / lines and the backbone
for zone/area protection. Recommended types of firewalls are as follows.
Siemens firewalls are capable of both Layer 2 and Layer 3 functionality. The recommended Siemens
firewalls are the SCALANCE S615, SCALANCE SC-600, and SCALANCE M-800 (the M-800 series are Mobile
devices meaning they have wireless interfaces in addition to the wired connections).
Click here for information about Siemens Firewalls
For Next Generation Firewalls, Siemens has partnered with leaders like Fortinet, Palo Alto and CheckPoint
to offer their best-in-class software solutions with Siemens’ hardware.
Click here for information about Next Generation Firewalls
Version 2, 03 -2023 9
The OT Networking Reference Architecture – Components of an IT/OT Network
The recommended Siemens solution for industrial wireless are the SCALANCE W family of radios.
Click here for information about SCALANCE W
The recommended Siemens NMS solution is SINEC NMS – industrial NMS for OT networks.
Click here for information about SINEC NMS
10 Version 2, 03 -2023
The OT Networking Reference Architecture – Components of an IT/OT Network
The recommended Siemens solution is SINEMA Remote Connect – secure remote access for OT networks.
Click here for information about SINEMA RC
3.3.2 SIEM
Security Information and Event Management systems monitor log data (typically in a Syslog server) and look for
specific Indicators of Compromise (IoCs), send alerts when suspicious activity is detected, and in some versions may
provide playbooks and integrations to helpdesk ticketing systems to help organize the response to an incident.
An IPS is an expansion in functionality of an IDS. The “prevention” occurs by responding to a “detected” network
threat by blocking or dropping the packets from the network.
For IDS/IPS, Siemens has partnered with leaders like Nozomi, Claroty, SecureNOK, Palo Alto and Fortinet to offer their
best-in-class solution running on Siemens hardware.
Click here for information about Next Generation Firewalls
Version 2, 03 -2023 11
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
The goal of this document is to provide an overview of the technical controls one should incorporate when designing a future-ready
OT network. We will be summarizing the requirements of different maturity and security levels for the following three network sizes:
1. Small – where connecting systems is the highest priority
2. Medium – where building a scalable platform is the highest priority
3. Large – where protecting against advanced threats is the highest priority
Every network will inherently go through phases and transformations throughout its lifetime. It is for this reason that we must
always begin with proper planning. We want to design a scalable system that can adapt to the changes without requiring a
complete redesign.
The core of our network will be used to connect multiple production cells, which will typically increase in number over time.
By following the fundamentals outlined here for the foundational network, expanding the network in the future will proceed
in an efficient manner.
12 Version 2, 03 -2023
HOW FIT IS YOUR COMMUNICATION NETWORK?
Consider an Industrial
Network Health Check!
Industrial Network Health Checks typically include:
• Assessment of the current status of the network
• Benchmark testing to identify potential network issues like:
- Packet collisions
- Problematic network architecture
- Sub-optimal device configuration
• Creation of a network asset inventory
• A detailed report with recommendations to achieve a reliable network ready for
future challenges
Receive a free consultation by e-mailing us at siemensci.us@siemens.com
Version 2, 03 -2023 13
13
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
Enterprise Network
Core
IT / OT IT / OT
Firewalls Firewalls
Production Backbone
Network Management
SIEM and IDS/IPS Servers
Distribution
Router Router
Production Network
Redundant
Connections
Layer 3
VRRP NAT
Firewall
Firewall
Production Cells
Ring
Switch
Access
Switch Switch
Line
Industrial
WLAN
14 Version 2, 03 -2023
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
• Star Networks
o A star topology network is found in the Production Cell 1-3. A star network is typically less efficient than a ring
network and does not offer redundancy. This introduces many single points of failure into the network, which
include each cable, each end device, and the network devices aggregating the connections.
• Line Networks
o A line topology network is found in Production Cell 1-2. A line topology network offers the lowest possible
level of resiliency in a network due to interdependence on the upper-level devices in the line topology. For
example, if the first device in the line fails – all other devices downstream will lose connection. It is not
recommended to utilize a line topology when uptime is critical.
2) Redundancy
Several layers of redundancy are possible in an OT network that will improve resiliency and tolerance of failure
in the network. Redundancy is not necessary in all situations but is highly recommended in critical connections
that would impact operation if lost.
• Ring redundancy, highlighted in the “Topology” section above, is a form of connection redundancy and is
commonly used in industrial networks to mitigate loss of physical connections between devices.
• Virtual Router Redundancy Protocol (VRRP) can be configured for redundant communication between separate
subnets or VLANs, such as the connections seen between Production Cell 1-1 and the routers in the Production
Backbone routers. In the event of a failure in one router or physical connection, the remaining functional
connection will be detected and utilized as the communication path. VRRP is configured in the redundant router
pair – such as the firewalls in Production Cell 1-1, the routers in the Production Backbone, and the redundant
IT/OT firewalls between the Production Backbone and Enterprise Network.
3) Recommended Software
• Secure Remote Access software is recommended for small networks to enable access by OEMs, service providers,
or engineers to the systems when not physically present.
• NTP server software is recommended to synchronize time across the devices for efficient troubleshooting and
transparency in log timestamps.
Version 2, 03 -2023 15
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
Enterprise Network
Core
Router Firewall
IT
Servers
IT / OT IT / OT
Firewalls Firewalls
HMI and SCADA
Industrial DMZ
Production Backbone
Redundant
Connections Aggregation / Backbone
Distribution
Industrial
WLAN
Production Network
Redundant
Connections
Layer 3
VRRP
Firewall
Layer 3 NAT / Firewall
Firewall
Firewall Firewall Firewall Firewall
Tree / Star
Production Cells
Ring Ring
Switch
Access
The above medium reference network architecture will build on the key concepts of the small reference network architecture.
Each of the key considerations listed below are in addition or an expansion of the considerations covered in the small
network architecture
16 Version 2, 03 -2023
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
2) Redundancy
As the complexity and importance of the network continues to grow – various methodologies of redundant
communication will become necessary to maintain reliable operation.
• As mentioned above in ring networks, additional layers of redundancy will improve the overall resiliency of
the network by distributing the connections amongst several devices. This will reduce the impact on various
production cells that could be caused by a device failure.
• At this scale it is absolutely recommended to implement RSTP or redundant routing protocols to achieve:
o Redundant enterprise connections via IT/OT firewalls
o Redundant core routers in the Backbone / Aggregation layer
o Redundant ring network in the Backbone / Aggregation layer
• At this scale it is recommended to implement:
o Redundant connections from the Production Cell layer to the Backbone / Aggregation layer
3) Recommended Software
• Network Management software is recommended in medium scale networks to efficiently manage and monitor the
larger number of devices. The NMS system will also allow tracking of the user(s) changes to network configuration.
• RADIUS Server is recommended as it eliminates sharing of passwords and accounts. User actions are uniquely
identifiable and password policies are consistent across all devices.
• Syslog Server is recommended as it provides centralized logging and accountability across all devices. This can
greatly reduce troubleshooting time should any errors occur.
Version 2, 03 -2023 17
The OT Networking Reference Architecture – Categorizing Future-Ready OT Networks
Enterprise Network
. WAN External WAN Core External Internet
Core
Industrial DMZ
Servers
IT / OT IT / OT
Firewalls Firewalls
Routers Redundant
Routers
Connections
Production Backbone
Distribution
Redundant Connections
Aggregation 1 Aggregation 2
Ring Ring
Industrial
WLAN
Production Network
L3 Redundant
Connections
Redundant
Connections
Cell 1-1 Cell 1-2 Cell 1-3 Cell 1-4 Cell 2-1 Cell 2-2
Layer 3
VRRP Firewall
Firewall Firewall
Firewalls
Production Cells
Firewall Tree / Star
Firewall Firewall
Ring
Access
Tree / Star
The above large reference network architecture will build on the key concepts of the small and medium reference network
architecture. Each of the key considerations listed below are in addition or an expansion of the considerations covered in the
small and medium network architecture.
2) Redundancy
As the complexity and importance of the network continues to grow – various methodologies of redundant
communication will become necessary to maintain reliable operation.
• As mentioned above in ring networks, additional layers of redundancy will improve the overall resiliency of
the network by distributing the connections amongst several devices. This will reduce the impact on various
production cells that could be caused by a device failure.
• Several routers located in single or multiple Backbone rings manage the network traffic load efficiently across
many IP subnets. This also provides a higher level of redundancy in layer 3 communications.
• At this scale it is absolutely recommended to implement RSTP and redundant routing protocols to achieve:
o Redundant enterprise connections via IT/OT firewalls
o Highly redundant core routers in the Backbone layer
o Multiple redundant rings in the Aggregation layer
• At this scale it is recommended to implement:
o Redundant connections from the Aggregation layer to the Backbone layer
o Redundant connections from the Production Cell layer to the Aggregation layer
3) Recommended Software
An IDS should be part of the cybersecurity program. To be able to detect intrusions, network traffic is cloned by
using a managed switch’s port mirroring function. This mirrored traffic is ingested by detectors that can use
traffic signatures and anomaly-based detection to raise alarms. This information can be centralized in a controller
to allow for multi-site capabilities. From an architecture perspective, this system should operate on a physically
separate network in very large networks. It is common to have the central controller as the bridge to the rest of
the enterprise network.
Version 2, 03 -2023 19
The OT Networking Reference Architecture – Components of an IT/OT Network
Industrial Networks
Education
In our Industrial Networks Education program, you will learn the fundamental skills of planning,
implementation monitoring and securing of wired and wireless industrial data networks and
connect them to a corporate network. For those with a high degree of networking knowledge,
we also offer advanced classes to take you to the next level in your skill set.
usa.siemens.com/yourcertification
20 Version 2, 03 -2023
The OT Networking Reference Architecture – Five Next Steps
5. Next Steps
Now that the key considerations for each OT network size has been provided, do you feel confident that you can build a
Future-Ready Network?
While this document provides an overview of the possible considerations to make, determining how each consideration matters
to your specific application requires plenty of research. It is recommended that technical decision makers understand the
different technologies listed in this document. A great resource to start is with our 269-page technical overview of industrial
networking concepts.
If you are interested in the cybersecurity solutions mentioned in this document and would like to further delve into cybersecurity
considerations for large networks, please read through our Industrial Networking Security Architecture document.
If you’d like some help with making sure your network is Future-Ready, our experts are ready to schedule a free consultation.
Please fill out our form.
Version 2, 03 -2023 21
The OT Networking Reference Architecture – Resources
Resources
Further Readings
IT/OT Collaboration
www.usa.siemens.com/it-ot-collaboration-article
Industrial Wireless
www.usa.siemens.com/industrial-wireless
22 Version 2, 03 -2023
Legal Manufacturer This document contains a general description of available technical options
Siemens Industry, Inc. only, and its effectiveness will be subject to specific variables including field
100 Technology Drive conditions and project parameters. Siemens does not make representations,
Alpharetta, GA 30005 warranties, or assurances as to the accuracy or completeness of the content
United States of America contained herein. Siemens reserves the right to modify the technology and
product specifications in its sole discretion without advance notice.
Telephone: +1 (800) 241-4453
usa.siemens.com/industrial-networks
Order No. NTBR-REFARC-0323
Version 2, 03 -2023 23