Overview
This chapter provides information on how to configure a connection to a MySQL database.
MySQL Software Components
The following SQL components are required to establish a connection to a MySQL database:
-
SQL server (not supplied by Schneider Electric):
-
SQL client (not supplied by Schneider Electric)
-
MySQL database created with the SQL client
Supported Data Types
The following data types are supported for MySQL:
Category
|
Data types
|
Integer
|
-
TINYINT
-
SMALLINT
-
MEDIUMINT
-
INT
-
BIGINT
-
BIT
|
Real
|
|
Text
|
-
CHAR
-
VARCHAR
-
TINYTEXT
-
TEXT
|
Temporal
|
-
DATE
-
TIME
-
YEAR
-
DATETIME
-
TIMESTAMP
|
Other
|
|
Considerations Concerning Cybersecurity for MySQL Connections
For MySQL connections, consider the following:
-
Secured connections over TLS (Transport Layer Security) / SSL (Secure Socket Layer) are supported between the SQL Gateway and the MySQL database. If you configure these connections properly, the database may be located outside your industrial network.
-
Windows authentication is not supported.
-
Communication should only be performed inside your industrial network, isolated from other networks inside your company and from the Internet.
NOTE: Schneider Electric adheres to industry best practices in the development and implementation of control systems. This includes a "Defense-in-Depth" approach to secure an Industrial Control System. This approach places the controllers behind one or more firewalls to restrict access to authorized personnel and protocols only.
WARNING
|
|
UNAUTHENTICATED ACCESS AND SUBSEQUENT UNAUTHORIZED MACHINE OPERATION
-
Evaluate whether your environment or your machines are connected to your critical infrastructure and, if so, take appropriate steps in terms of prevention, based on Defense-in-Depth, before connecting the automation system to any network.
-
Limit the number of devices connected to a network to the minimum necessary.
-
Isolate your industrial network from other networks inside your company.
-
Protect any network against unintended access by using firewalls, VPN, or other, proven security measures.
-
Monitor activities within your systems.
-
Prevent subject devices from direct access or direct link by unauthorized parties or unauthenticated actions.
-
Prepare a recovery plan including backup of your system and process information.
Failure to follow these instructions can result in death, serious injury, or equipment damage.
|
For more information on organizational measures and rules covering access to infrastructures, refer to ISO/IEC 27000 series, Common Criteria for Information Technology Security Evaluation, ISO/IEC 15408, IEC 62351, ISA/IEC 62443, NIST Cybersecurity Framework, Information Security Forum - Standard of Good Practice for Information Security.