How Industrial Wireless Routers Power Automation (part 5)

Transcript: 

[0m:00s] Hey, I’m Mitchell. Welcome to another video in the RSP Education Series. What if your factory’s wireless router could spot a cyberattack before it even starts? In this video, we’re diving into zero trust architecture—a cutting-edge cybersecurity approach where nothing and no one gets a free pass, not even your own PLCs. We’ll break down how the Semtech AirLink XR60 uses zero trust to stop ransomware in its tracks, lock down rogue devices, and keep your industrial network secure. From real-world examples to key best practices, we’ll show how this compact router delivers advanced protection for operational technology systems. If your network trusts too easily, it’s already vulnerable. Let’s fix that. If you like this kind of content and want more educational videos, please like and subscribe. This video is for educational purposes only. Always consult a professional for your application. RSP Supply is not liable for any misuse of this information. With that said, let’s get right into it.

[1m:06s] Zero trust architecture is built on one simple principle—never trust anything by default. That means you don’t automatically trust any device, user, or data, even if it’s already inside the network. Every connection attempt must be verified before access is granted. In industrial routers, zero trust is applied through several layers of security. The first is device identity verification. The router must confirm who or what is trying to connect—whether it’s a PLC, sensor, or HMI—using methods like digital certificates, MAC filtering, or encrypted protocols such as TLS and IPSec. Second, continuous monitoring ensures that devices aren’t just checked once. The router keeps verifying activity and flags anything suspicious. For example, if a PLC suddenly starts sending data to an unknown IP address, the router can block it immediately.

[1m:57s] Another layer is microsegmentation. The network is divided into small, isolated zones so that if an intrusion occurs in one area, it cannot spread across the entire system. For instance, if a hacker gains access to a sensor network, they won’t be able to reach the PLC or SCADA zones. Encryption is also critical. All communications should be protected with modern standards like VPNs or TLS 1.3 to ensure that data in transit cannot be intercepted or altered.

[2m:27s] Zero trust also enforces the concept of least privilege access—devices and users are given only the permissions they need, nothing more. A temperature sensor, for example, should only communicate with its SCADA system, not with every device on the network. Routers enforce this using role-based access control to manage who can access specific areas or functions.  Zero trust matters because it stops cyberattacks before they can spread. It blocks ransomware, isolates compromised devices, and prevents intruders from moving laterally within the OT network. It also helps organizations meet security standards like IEC 62443. For example, in a factory, a zero-trust router would verify every PLC before allowing Modbus TCP traffic, block fake devices pretending to be HMIs, and alert operators if a sensor starts transmitting unusual data.

[3m:26s] To wrap up, zero trust in industrial routers means “never trust, always verify.” It ensures that only verified, approved, and secure devices can communicate on the network. The Semtech AirLink XR60 brings zero trust to life through device identity checks, real-time monitoring, microsegmentation, encrypted communication, and least privilege access. In the world of industrial automation, this approach leads to safer networks, fewer breaches, and tighter control over who and what connects to your system. Whether you’re protecting a remote pump station or an entire production line, zero trust with the AirLink XR60 ensures your system only talks to what it’s supposed to—and nothing else. For a full line of Semtech AirLink XR60 routers and hundreds of thousands of other industrial automation products, visit RSPSupply.com, the internet’s top source for industrial hardware.