Configuring CAE cybersecurity

Cybersecurity Admin Expert can be configured online or offline. CAE must be online to send and apply configuration to devices and view user accounts and devices in the network in real-time view.

Only user accounts assigned SECADM or SECAUD roles can access CAE. By default, the security administrator (SecurityAdmin) and Default Security Auditor (DefaultSecAud) user accounts have access.

See Installing CAE for information about installation, system requirements, and licensing.

Configuration checklist:

  • Record activities: Document actions according to your company’s policies and standards to keep a record of activities, usernames, and passwords.

Required for these procedures:

  • Security administrator (SecurityAdmin) log-in credentials.
Adding devices and certificates

Device certificates must use encrypted communication between devices in system networks.

Use this procedure to add devices and certificates one at a time.

To add multiple devices at a time, import a CSV file containing a list of devices from the SYSTEM EDITOR tab. The spreadsheet must contain one device per row, with the following information in cells: device name, device type as known by the system, firmware version, IP address, Ethernet port number for getting metadata (if blank, default is 9867).

To add devices and certificates:

  1. Open Cybersecurity Admin Expert.
  2. Select SYSTEM EDITOR tab > Add Device button. The Add a new device dialog opens.
  3. Enter values for the device and click Save.

    NOTE: Right-click on a device to edit or delete it.

  4. On the MANAGEMENT OF SYSTEM tab > click the Refresh icon . The New certificate(s) detected window opens if new device certificates are detected.
  5. Verify device certificates are valid > select certificates > click Accept.

    NOTE: You can also add a certificate in the SECURITY SETTINGS tab.

  6. Click Yes to accept addition to CAE Certificate Allowlist.
  7. Click OK to push certificates to CAE Certificate Allowlist.
  8. Confirm that all devices and certificates have been successfully discovered or found if added manually:
    IndicatorDescriptionAction
    Status Device successfully discovered. None
    Status Device has been discovered, but its information is different from the local device discovered.Go to System Editor and re-enter the correct device information.
    Status Device discovered in the network, but not declared in System Editor. Go to System Editor to add the device manually.
    Status Device has not been discovered over the network, but was added in System Editor.Review device IP Address and port. Confirm device is on. Restart may be required.
    Security version – Connection denied

    Device password refused or device user account is locked out.

    Right-click on device and select Log on. Enter specific device password or common password.

    Name Device certificate is in the CAE Allowlist.None
    Name Device certificate is not in the CAE Allowlist.Right-click on a device to get, send, or remove certificate.
    Name No certificate information found for device.Click the Refresh icon and accept certificate.
  9. Click Send Security Configuration. CAE stores accepted certificates in the CAE Allowlist and displays them on the Security Settings tab.

You can get, send, or remove certificates by right-clicking on a device in the MANAGEMENT OF SYSTEM tab.

You can edit, delete, or export accepted certificates by right-clicking on a device under Certificate Allowlist in the SECURITY SETTINGS tab.

Defining Authentication Configuration security settings

Authentication is the mechanism used to verify the identity of users. Use Authentication Configuration in CAE to define the authentication mode, for example, local or local then centralized, and other authentication security settings.

To define Authentication Configuration security settings:

  1. Open Cybersecurity Admin Expert.
  2. Select SECURITY SETTINGS tab > Authentication Configuration.
  3. Select the options you want.
  4. Radius server authentication protocol options:

    Radius DetailsDescription

    Mode

    RADIUS client mode of connection.
    IP addressThe IP address of the RADIUS Server.
    PortPort number used by RADIUS Server for communication with the Radius client.
    Shared secretText string password between the RADIUS client and the RADIUS server.
    Backup server IP addressIP address of second RADIUS Server (optional).
    Backup server portPort number used by second RADIUS Server for communication with the Radius client.
    Backup server shared secretText string password between the RADIUS client and the RADIUS server.
    Role attribute nameAttribute name in the Radius protocol accepted answer where the role assignment is stored.
    AoR attribute nameAttribute name in the Radius protocol accepted answer where the AoR assignment is stored.
    Date attribute nameAttribute name in the Radius protocol accepted answer where the date assignment is stored.
    Attribute separatorCharacter that splits the attributes if several attributes returned.
    DictionaryString storing contents of RADIUS dictionary.
    Parsing debugEnable or disable parsing debug.

    LDAP client-server protocol authentication protocol options:

    LDAP DetailsDescription

    Domain

    Domain name of the LDAP server, e.g. DC=MyDomain, DC=com.
    IP addressIP address of the LDAP server.
    PortPort number used by LDAP server for communication with the LDAP client.
    Group(s)Name of LDAP Group(s).

  5. Click Save.
(Optional) Adding Security Banners to device displays

To add Security Banners to device displays:

  1. Open Cybersecurity Admin Expert.
  2. Select SECURITY SETTINGS tab > Security Banners.
  3. Enter text for security banners.
  4. Click Save.
Sending and applying configuration to a device

Use this procedure to send and apply security configuration settings from CAE to a device.

At the end of this procedure, CAE will:

  • Create four XML files and send them to each device: user account file, role file, user file, and a security policy settings file. Sometimes, a Device Specific Settings file is created and sent.
  • Create a devices report CSV file.
  • Display the newest security configuration version number and name for Devices in the MANAGEMENT OF SYSTEM tab.

To send and apply configuration to a device:

  1. Open Cybersecurity Admin Expert.
  2. Select MANAGEMENT OF SYSTEM tab.
  3. Click the Send security Configuration button. The Push Security Configuration dialog box opens.
  4. Click Yes.
  5. Enter a name for the new version.
  6. Click Save. The Push configuration status dialog box opens.
(Optional) Importing a PFX key container file from a device

A key container is a part of the key database that contains public and private keys belonging to a device. Use this procedure to create a new key container in CAE that encrypts and decrypts information.

Required for this procedure:

  • P12 file stored in an accessible location.
  • Password for P12 file.
  • Device embeds CS brick 3.0 or upper.

To import a PFX key container file from a device:

  1. Open Cybersecurity Admin Expert.
  2. Select MANAGEMENT OF SYSTEM tab.
  3. Right-click on a device > Import a pfx.

    The Import a pfx file dialog box opens.

  4. Click Browse to navigate to the PFX file you want to import.
  5. Enter the PFX file password.
  6. Click Import.
  7. NOTE: PFX file is encrypted and password protected.

    PFX file is imported inside the device.

Viewing Configuration History

You can view Configuration History.

To view Configuration History:

  1. Open Cybersecurity Admin Expert.
  2. Select MANAGEMENT OF SYSTEM.
  3. Click the View History Configuration icon on the bottom right.