Shopping Cart

No products in the cart.

BS IEC 61162-460:2024

$215.11

Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security

Published By Publication Date Number of Pages
BSI 2024 94
Guaranteed Safe Checkout
Categories: ,

If you have any questions, feel free to reach out to our online customer service team by clicking on the bottom right corner. We’re here to assist you 24/7.
Email:[email protected]

PDF Catalog

PDF Pages PDF Title
2 undefined
4 CONTENTS
8 FOREWORD
10 1 Scope
2 Normative references
11 3 Terms and definitions
18 4 High-level requirements
4.1 Overview
4.2 Description
4.3 General requirements
4.3.1 Equipment and system requirements
Figures
Figure 1 – Functional overview of IEC 61162-460 applications
19 4.3.2 Physical composition requirements
4.3.3 Logical composition requirements
4.4 Physical component requirements
4.4.1 450-Node
20 4.4.2 460-Node
4.4.3 460-Switch
4.4.4 460-Forwarder
21 4.4.5 460-Gateway and 460-Wireless gateway
4.5 Logical component requirements
4.5.1 Network monitoring function
4.5.2 System management function
4.6 System documentation requirements
22 4.7 Secure area requirements
5 Network traffic management requirements
5.1 460-Node requirements
5.2 460-Switch requirements
5.2.1 Resource allocation
23 5.2.2 Loop prevention
5.3 460-Forwarder requirements
5.3.1 Traffic separation
24 5.3.2 Resource allocation
5.3.3 Traffic prioritization
Tables
Table 1 – Traffic prioritization with CoS and DSCP
25 5.4 System design requirements
5.4.1 Documentation
5.4.2 Traffic
5.4.3 Connections between secure and non-secure areas
26 6 Security requirements
6.1 Security scenarios
6.1.1 Threat scenarios
6.1.2 Internal threats
6.1.3 External threats
27 6.2 Internal security requirements
6.2.1 General
6.2.2 Denial of service protection
6.2.3 REDS security
28 6.2.4 Access control
30 6.2.5 Executable and non-executable file security
31 6.2.6 Recording of device management activities
32 6.3 External security requirements
6.3.1 Overview
6.3.2 Firewalls
Figure 2 – 460-Network with 460-Gateway
33 6.3.3 Direct communication
34 6.3.4 Node requirements for direct communication
35 6.3.5 460-Gateway
36 6.3.6 460-Wireless gateway
37 6.4 Additional security issues
38 6.5 Onboard software maintenance
6.5.1 General
6.5.2 Roll back to previous safe configuration
39 6.5.3 Software maintenance in maintenance mode
6.5.4 Semi-automatic software maintenance by the crew onboard the vessel
40 6.5.5 Remote software maintenance
41 6.6 Secure software lifecycle management
7 Redundancy requirements
7.1 General requirements
7.1.1 General
7.1.2 Interface redundancy
Figure 3 – Example of redundancy
42 7.1.3 Device redundancy
7.2 460-Node requirements
7.3 460-Switch requirements
7.4 460-Forwarder requirements
7.5 460-Gateway and 460-Wireless gateway requirements
43 7.6 Network monitoring function requirements
7.7 System design requirements
8 Network monitoring requirements
8.1 Network status monitoring
8.1.1 460-Network
8.1.2 460-Node
8.1.3 460-Switch
44 8.1.4 460-Forwarder
8.2 Network monitoring function
8.2.1 General
45 8.2.2 Network load monitoring function
Figure 4 – Example of network status recording information
46 8.2.3 Redundancy monitoring function
47 8.2.4 Network topology monitoring function
49 8.2.5 Syslog recording function
50 8.2.6 Redundancy of network monitoring function
8.2.7 Alert management
Table 2 – Summary of alert of network monitoring
51 9 Controlled network requirements
52 10 Methods of testing and required test results
10.1 Subject of tests
10.2 Test site
53 10.3 General requirements
10.4 450-Node
10.5 460-Node
10.5.1 Network traffic management
54 10.5.2 Security
57 10.5.3 Redundancy
10.5.4 Monitoring
10.6 460-Switch
10.6.1 Resource allocation
58 10.6.2 Loop prevention
10.6.3 Security
61 10.6.4 Monitoring
62 10.7 460-Forwarder
10.7.1 Traffic separation
10.7.2 Resource allocation
63 10.7.3 Traffic prioritisation
10.7.4 Security
64 10.7.5 Monitoring
65 10.8 460-Gateway
10.8.1 Denial of service behaviour
10.8.2 Access control to configuration setup
10.8.3 Communication security
66 10.8.4 Firewall
67 10.8.5 Application services
10.8.6 Interoperable access to file storage of DMZ
68 10.8.7 Additional security
10.9 460-Wireless gateway
10.9.1 General
10.9.2 Security
10.10 Controlled network
69 10.11 Network monitoring function
10.11.1 General
10.11.2 Network load monitoring function
70 10.11.3 Redundancy monitoring function
10.11.4 Network topology monitoring function
71 10.11.5 Syslog recording function
10.11.6 Alert management
72 10.12 System level
10.12.1 General
73 10.12.2 System management function
10.12.3 System design
75 10.12.4 Network monitoring function
10.12.5 Network load monitoring function
10.12.6 Redundancy monitoring function
10.12.7 Network topology monitoring function
76 Annexes
Annex A (informative) Communication scenarios between an IEC 61162-460 network and uncontrolled networks
A.1 General
A.2 Routine off-ship
Figure A.1 – Usage model for communication between a IEC 61162-460network and shore networks
77 A.3 Routine on-ship
A.4 460-Gateway usage for direct connection with equipment
78 Annex B (informative) Summary of redundancy protocols in IEC 62439 (all parts)
Table B.1 – Redundancy protocols and recovery times
79 Annex C (informative) Guidance for testing
C.1 Methods of test
C.2 Observation
C.3 Inspection of documented evidence
C.4 Measurement
80 C.5 Analytical evaluation
81 Annex D (informative) Some examples to use this document
Figure D.1 – 460-Forwarder used between two networks
Figure D.2 – 460-Forwarder used between two networks
82 Figure D.3 – 460-Gateway used for e-Navigation services
Figure D.4 – 460-Gateway used for remote maintenance
83 Figure D.5 – 460-Forwarder used to separate an INS system based on its owncontrolled network from a network of -460 devices
84 Figure D.6 – 460-Forwarder used to separate a radar system based on its own controlled network from a network of -460 devices
85 Annex E (normative) IEC 61162 interfaces for the network monitoring function
Figure E.1 – Network monitoring function logical interfaces
Table E.1 – Sentences received by the network monitoring function
Table E.2 – Sentences transmitted by the network monitoring function
86 Annex F (informative) Distribution of functions around 460-Network
Table F.1 – Distribution of functions around 460-Network
87 Table F.2 – Equipment standards referencing IEC 61162-460
88 Annex G (normative) USB class codes
Table G.1 – USB class codes
89 Annex H (informative) Cross reference between IACS UR E26/E27 and IEC 61162460
Table H.1 – Cross reference between IACS UR E26/E27 and IEC 61162-460
92 Bibliography
BS IEC 61162-460:2024
$215.11