{"id":464959,"date":"2024-10-20T10:37:55","date_gmt":"2024-10-20T10:37:55","guid":{"rendered":"https:\/\/pdfstandards.shop\/product\/uncategorized\/bs-iec-61162-4602024\/"},"modified":"2024-10-26T19:36:45","modified_gmt":"2024-10-26T19:36:45","slug":"bs-iec-61162-4602024","status":"publish","type":"product","link":"https:\/\/pdfstandards.shop\/product\/publishers\/bsi\/bs-iec-61162-4602024\/","title":{"rendered":"BS IEC 61162-460:2024"},"content":{"rendered":"

PDF Catalog<\/h4>\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n\n
PDF Pages<\/th>\nPDF Title<\/th>\n<\/tr>\n
2<\/td>\nundefined <\/td>\n<\/tr>\n
4<\/td>\nCONTENTS <\/td>\n<\/tr>\n
8<\/td>\nFOREWORD <\/td>\n<\/tr>\n
10<\/td>\n1 Scope
2 Normative references <\/td>\n<\/tr>\n
11<\/td>\n3 Terms and definitions <\/td>\n<\/tr>\n
18<\/td>\n4 High-level requirements
4.1 Overview
4.2 Description
4.3 General requirements
4.3.1 Equipment and system requirements
Figures
Figure 1 \u2013 Functional overview of IEC 61162-460 applications <\/td>\n<\/tr>\n
19<\/td>\n4.3.2 Physical composition requirements
4.3.3 Logical composition requirements
4.4 Physical component requirements
4.4.1 450-Node <\/td>\n<\/tr>\n
20<\/td>\n4.4.2 460-Node
4.4.3 460-Switch
4.4.4 460-Forwarder <\/td>\n<\/tr>\n
21<\/td>\n4.4.5 460-Gateway and 460-Wireless gateway
4.5 Logical component requirements
4.5.1 Network monitoring function
4.5.2 System management function
4.6 System documentation requirements <\/td>\n<\/tr>\n
22<\/td>\n4.7 Secure area requirements
5 Network traffic management requirements
5.1 460-Node requirements
5.2 460-Switch requirements
5.2.1 Resource allocation <\/td>\n<\/tr>\n
23<\/td>\n5.2.2 Loop prevention
5.3 460-Forwarder requirements
5.3.1 Traffic separation <\/td>\n<\/tr>\n
24<\/td>\n5.3.2 Resource allocation
5.3.3 Traffic prioritization
Tables
Table 1 \u2013 Traffic prioritization with CoS and DSCP <\/td>\n<\/tr>\n
25<\/td>\n5.4 System design requirements
5.4.1 Documentation
5.4.2 Traffic
5.4.3 Connections between secure and non-secure areas <\/td>\n<\/tr>\n
26<\/td>\n6 Security requirements
6.1 Security scenarios
6.1.1 Threat scenarios
6.1.2 Internal threats
6.1.3 External threats <\/td>\n<\/tr>\n
27<\/td>\n6.2 Internal security requirements
6.2.1 General
6.2.2 Denial of service protection
6.2.3 REDS security <\/td>\n<\/tr>\n
28<\/td>\n6.2.4 Access control <\/td>\n<\/tr>\n
30<\/td>\n6.2.5 Executable and non-executable file security <\/td>\n<\/tr>\n
31<\/td>\n6.2.6 Recording of device management activities <\/td>\n<\/tr>\n
32<\/td>\n6.3 External security requirements
6.3.1 Overview
6.3.2 Firewalls
Figure 2 \u2013 460-Network with 460-Gateway <\/td>\n<\/tr>\n
33<\/td>\n6.3.3 Direct communication <\/td>\n<\/tr>\n
34<\/td>\n6.3.4 Node requirements for direct communication <\/td>\n<\/tr>\n
35<\/td>\n6.3.5 460-Gateway <\/td>\n<\/tr>\n
36<\/td>\n6.3.6 460-Wireless gateway <\/td>\n<\/tr>\n
37<\/td>\n6.4 Additional security issues <\/td>\n<\/tr>\n
38<\/td>\n6.5 Onboard software maintenance
6.5.1 General
6.5.2 Roll back to previous safe configuration <\/td>\n<\/tr>\n
39<\/td>\n6.5.3 Software maintenance in maintenance mode
6.5.4 Semi-automatic software maintenance by the crew onboard the vessel <\/td>\n<\/tr>\n
40<\/td>\n6.5.5 Remote software maintenance <\/td>\n<\/tr>\n
41<\/td>\n6.6 Secure software lifecycle management
7 Redundancy requirements
7.1 General requirements
7.1.1 General
7.1.2 Interface redundancy
Figure 3 \u2013 Example of redundancy <\/td>\n<\/tr>\n
42<\/td>\n7.1.3 Device redundancy
7.2 460-Node requirements
7.3 460-Switch requirements
7.4 460-Forwarder requirements
7.5 460-Gateway and 460-Wireless gateway requirements <\/td>\n<\/tr>\n
43<\/td>\n7.6 Network monitoring function requirements
7.7 System design requirements
8 Network monitoring requirements
8.1 Network status monitoring
8.1.1 460-Network
8.1.2 460-Node
8.1.3 460-Switch <\/td>\n<\/tr>\n
44<\/td>\n8.1.4 460-Forwarder
8.2 Network monitoring function
8.2.1 General <\/td>\n<\/tr>\n
45<\/td>\n8.2.2 Network load monitoring function
Figure 4 \u2013 Example of network status recording information <\/td>\n<\/tr>\n
46<\/td>\n8.2.3 Redundancy monitoring function <\/td>\n<\/tr>\n
47<\/td>\n8.2.4 Network topology monitoring function <\/td>\n<\/tr>\n
49<\/td>\n8.2.5 Syslog recording function <\/td>\n<\/tr>\n
50<\/td>\n8.2.6 Redundancy of network monitoring function
8.2.7 Alert management
Table 2 \u2013 Summary of alert of network monitoring <\/td>\n<\/tr>\n
51<\/td>\n9 Controlled network requirements <\/td>\n<\/tr>\n
52<\/td>\n10 Methods of testing and required test results
10.1 Subject of tests
10.2 Test site <\/td>\n<\/tr>\n
53<\/td>\n10.3 General requirements
10.4 450-Node
10.5 460-Node
10.5.1 Network traffic management <\/td>\n<\/tr>\n
54<\/td>\n10.5.2 Security <\/td>\n<\/tr>\n
57<\/td>\n10.5.3 Redundancy
10.5.4 Monitoring
10.6 460-Switch
10.6.1 Resource allocation <\/td>\n<\/tr>\n
58<\/td>\n10.6.2 Loop prevention
10.6.3 Security <\/td>\n<\/tr>\n
61<\/td>\n10.6.4 Monitoring <\/td>\n<\/tr>\n
62<\/td>\n10.7 460-Forwarder
10.7.1 Traffic separation
10.7.2 Resource allocation <\/td>\n<\/tr>\n
63<\/td>\n10.7.3 Traffic prioritisation
10.7.4 Security <\/td>\n<\/tr>\n
64<\/td>\n10.7.5 Monitoring <\/td>\n<\/tr>\n
65<\/td>\n10.8 460-Gateway
10.8.1 Denial of service behaviour
10.8.2 Access control to configuration setup
10.8.3 Communication security <\/td>\n<\/tr>\n
66<\/td>\n10.8.4 Firewall <\/td>\n<\/tr>\n
67<\/td>\n10.8.5 Application services
10.8.6 Interoperable access to file storage of DMZ <\/td>\n<\/tr>\n
68<\/td>\n10.8.7 Additional security
10.9 460-Wireless gateway
10.9.1 General
10.9.2 Security
10.10 Controlled network <\/td>\n<\/tr>\n
69<\/td>\n10.11 Network monitoring function
10.11.1 General
10.11.2 Network load monitoring function <\/td>\n<\/tr>\n
70<\/td>\n10.11.3 Redundancy monitoring function
10.11.4 Network topology monitoring function <\/td>\n<\/tr>\n
71<\/td>\n10.11.5 Syslog recording function
10.11.6 Alert management <\/td>\n<\/tr>\n
72<\/td>\n10.12 System level
10.12.1 General <\/td>\n<\/tr>\n
73<\/td>\n10.12.2 System management function
10.12.3 System design <\/td>\n<\/tr>\n
75<\/td>\n10.12.4 Network monitoring function
10.12.5 Network load monitoring function
10.12.6 Redundancy monitoring function
10.12.7 Network topology monitoring function <\/td>\n<\/tr>\n
76<\/td>\nAnnexes
Annex A (informative) Communication scenarios between an IEC 61162-460 network and uncontrolled networks
A.1 General
A.2 Routine off-ship
Figure A.1 \u2013 Usage model for communication between a IEC 61162-460network and shore networks <\/td>\n<\/tr>\n
77<\/td>\nA.3 Routine on-ship
A.4 460-Gateway usage for direct connection with equipment <\/td>\n<\/tr>\n
78<\/td>\nAnnex B (informative) Summary of redundancy protocols in IEC 62439 (all parts)
Table B.1 \u2013 Redundancy protocols and recovery times <\/td>\n<\/tr>\n
79<\/td>\nAnnex C (informative) Guidance for testing
C.1 Methods of test
C.2 Observation
C.3 Inspection of documented evidence
C.4 Measurement <\/td>\n<\/tr>\n
80<\/td>\nC.5 Analytical evaluation <\/td>\n<\/tr>\n
81<\/td>\nAnnex D (informative) Some examples to use this document
Figure D.1 \u2013 460-Forwarder used between two networks
Figure D.2 \u2013 460-Forwarder used between two networks <\/td>\n<\/tr>\n
82<\/td>\nFigure D.3 \u2013 460-Gateway used for e-Navigation services
Figure D.4 \u2013 460-Gateway used for remote maintenance <\/td>\n<\/tr>\n
83<\/td>\nFigure D.5 \u2013 460-Forwarder used to separate an INS system based on its owncontrolled network from a network of -460 devices <\/td>\n<\/tr>\n
84<\/td>\nFigure D.6 \u2013 460-Forwarder used to separate a radar system based on its own controlled network from a network of -460 devices <\/td>\n<\/tr>\n
85<\/td>\nAnnex E (normative) IEC 61162 interfaces for the network monitoring function
Figure E.1 \u2013 Network monitoring function logical interfaces
Table E.1 \u2013 Sentences received by the network monitoring function
Table E.2 \u2013 Sentences transmitted by the network monitoring function <\/td>\n<\/tr>\n
86<\/td>\nAnnex F (informative) Distribution of functions around 460-Network
Table F.1 \u2013 Distribution of functions around 460-Network <\/td>\n<\/tr>\n
87<\/td>\nTable F.2 \u2013 Equipment standards referencing IEC 61162-460 <\/td>\n<\/tr>\n
88<\/td>\nAnnex G (normative) USB class codes
Table G.1 \u2013 USB class codes <\/td>\n<\/tr>\n
89<\/td>\nAnnex H (informative) Cross reference between IACS UR E26\/E27 and IEC 61162460
Table H.1 \u2013 Cross reference between IACS UR E26\/E27 and IEC 61162-460 <\/td>\n<\/tr>\n
92<\/td>\nBibliography <\/td>\n<\/tr>\n<\/table>\n","protected":false},"excerpt":{"rendered":"

Maritime navigation and radiocommunication equipment and systems. Digital interfaces – Multiple talkers and multiple listeners. Ethernet interconnection. Safety and security<\/b><\/p>\n\n\n\n\n
Published By<\/td>\nPublication Date<\/td>\nNumber of Pages<\/td>\n<\/tr>\n
BSI<\/b><\/a><\/td>\n2024<\/td>\n94<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":464966,"template":"","meta":{"rank_math_lock_modified_date":false,"ep_exclude_from_search":false},"product_cat":[792,2641],"product_tag":[],"class_list":{"0":"post-464959","1":"product","2":"type-product","3":"status-publish","4":"has-post-thumbnail","6":"product_cat-47-020-70","7":"product_cat-bsi","9":"first","10":"instock","11":"sold-individually","12":"shipping-taxable","13":"purchasable","14":"product-type-simple"},"_links":{"self":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product\/464959","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/types\/product"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media\/464966"}],"wp:attachment":[{"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/media?parent=464959"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_cat?post=464959"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/pdfstandards.shop\/wp-json\/wp\/v2\/product_tag?post=464959"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}