![YASKAWA VIPA System SLIO Manual Download Page 191](http://html.mh-extra.com/html/yaskawa/vipa-system-slio/vipa-system-slio_manual_907132191.webp)
n
OPC UA
uses private and public keys to establish secure channels between client
and server
n
Once a secure connection is established, the client and server generate a shared pri-
vate key for signing and encrypting messages.
OPC UA
uses the following security policies to protect messages:
n
No security
All messages are unsecured. To use these security policies, connect to a "None" end-
point of a server.
n
Sign
All messages are signed. This allows the integrity of the received messages to be
checked. Manipulations are detected. To use these security policies, connect to a
"Sign" endpoint of a server.
n
Sign & encrypt
All messages are signed and encrypted. This allows the integrity of the received mes-
sages to be checked. Manipulations are detected. Due to the encryption, no attacker
can read the content of the message. To use these security policies, connect to a
"Sign & Encrypt" endpoint of a server.
The security guidelines are additionally named according to the algorithms used.
Example: "Basic256Sha256 - Sign & Encrypt" means: Secure Endpoint, supports a
set of algorithms for 256-bit hashing and 256-bit encryption.
Please note that the encryption of the communication can affect CPU
performance and therefore the response time of the entire system!
Secure Channel
Security policies
VIPA System SLIO
Deployment OPC UA
Basics OPC UA > Integrated security concept
HB300 | CPU | 013-CCF0R00 | en | 19-30
191