Isolating with Microwall (Firewall)

By Isolating withMicrowall Gigabit (Firewall), you increase security in your network – simply and effectively


The segmentation of individual machine islands is a consistent form of segmentation: Small firewalls, such as the Microwall, isolate machines in their own data network segment. All communication to and from this island will initially be stopped on a flat-rate basis. Connections with the outside world necessary for operation, such as receiving production orders or reporting status and error messages back to a monitoring system, are allowed. For this purpose, connection rules are recorded in a positive list.

By islanding with the Microwall (Firewall), systems and machines can be easily isolated from each other and thus protected. The configuration is done via an easy-to-use web interface and takes only a few minutes. When setup is complete, the interface can be permanently disabled, requiring physical device access to change the settings.

Whether it’s a machine tool, X-ray machine or elevator controller: Microwall Gigabit (Firewall) isolates vulnerable systems from the surrounding network. It controls, monitors and logs communication with this safe island using basic rules.

Safe Islands

The Microwall (Firewall) moves sensitive components or sub-networks into a separate island network and in that way separates it from the higher level corporate intranet. Connections over the Microwall (Firewall) must be given expressed release using rules based on source/destination IP and the needed TCP/UDP port numbers. Communication with documented and/or undesired services is prevented and damaging events such as overload, cyber-attacks or hacking are kept away from the island.