Skip to content
Protocol Encyclopedia | | | 7 min read

PROFINET - industrial real-time Ethernet. RT and IRT classes, security and segmentation

PROFINET per IEC 61158 - classes NRT, RT (EtherType 0x8892) and IRT. Cycles from 31.25 µs, PROFIsafe, DCP and attack vectors. Segmentation recommendations.

J
Józef Sulwiński
PROFINETIEC 61158layer 2OT
PROFINET - industrial real-time Ethernet. RT and IRT classes, security and segmentation

PROFINET (Process Field Network) is an industrial communication standard based on Ethernet, governed by the PROFIBUS & PROFINET International (PI) organisation. The protocol is standardised under IEC 61158 (Type 10) and IEC 61784 and is one of the two dominant industrial Ethernet protocols in Europe (alongside EtherCAT), as well as the primary communication technology in the Siemens ecosystem.

PROFINET’s key design decision - using Ethernet frames directly with a dedicated EtherType 0x8892 for real-time traffic - means the protocol bypasses the TCP/IP stack and achieves deterministic cycle times, but at the same time few layer 3/4 security mechanisms are applicable to it.

Communication classes

PROFINET IO defines three communication classes with increasing levels of determinism:

ClassTransport channelTypical cycleUse
NRT (Non-Real-Time)TCP/IP (UDP)≥100 msConfiguration, diagnostics, parameter files
RT (Real-Time)Ethernet L2, EtherType 0x8892250 µs - 512 msCyclic I/O data exchange
IRT (Isochronous Real-Time)Ethernet L2 with reserved time slots31.25 µs - 1 msMulti-axis synchronisation, Motion Control

RT skips the TCP/IP stack, reducing overhead and transmission time. IRT additionally requires switches supporting bandwidth reservation and a common clock - the maximum cycle jitter is 1 µs.

RT packet structure

A PROFINET RT packet is encapsulated directly in an Ethernet frame without IP/UDP headers. After the Ethernet header (with EtherType 0x8892) comes:

FieldLengthPurpose
FrameID2 bytesFrame type identifier (RT, alarm, DCP, PTCP)
IO DatavariableI/O exchange data
IOPS (Provider Status)1 byte per submoduleSender status
IOCS (Consumer Status)1 byte per submoduleReceiver status
Cycle Counter2 bytesCycle counter
Data Status1 byteData validity
Transfer Status1 byteTransmission status

Device roles

PROFINET IO distinguishes three roles:

  • IO Controller - typically a PLC, initiates communication, reads inputs and writes outputs
  • IO Device - peripheral device (I/O module, drive, sensor) with cyclically exchanged data
  • IO Supervisor - engineering workstation (e.g. TIA Portal) for configuration and diagnostics

Device configuration is based on a GSDML file (XML describing modules, parameters and diagnostic messages).

PROFIsafe

PROFIsafe (PROFIsafe Specification / IEC 61784-3-3) is an extension of PROFINET for functionally safe communication (Safety Integrity Level up to SIL 3 per IEC 61508). The protocol uses a black channel - the safety layer is independent of transport medium reliability, allowing the same network to carry both standard and safety traffic.

PROFIsafe mechanisms:

  • Sequence number (protection against loss and replay)
  • Timeout (protection against delay)
  • Unique sender and receiver ID (protection against incorrect addressing)
  • Safety layer CRC (in addition to the Ethernet CRC)

DCP - Discovery and Configuration Protocol

PROFINET DCP uses FrameIDs in the range 0xFEFC-0xFEFF (0xFEFC = Hello, 0xFEFD = Get/Set, 0xFEFE = Identify Request, 0xFEFF = Identify Response). The protocol discovers devices on the segment and assigns network parameters (name, IP address), but provides no authentication - any device on the segment can send a DCP Set demanding a change of another device’s name or IP.

WARNING

A DCP attack consists of sending a DCP SET to an IO Device with a new name or address. The IO Device accepts the command without any authorisation. The result: the device becomes unavailable to the PLC (production outage) or ends up duplicated (address conflict). Tools such as PROFIshark or Scapy scripts can carry out such an attack in seconds.

PROFINET Security

PI released the PROFINET Security specification in 2020 (updated in 2024), introducing three security classes:

ClassScope
Security Class 1Integrity of DCP and RPC communication via HMAC-SHA2
Security Class 2Class 1 + configuration encryption (AES-GCM)
Security Class 3Class 2 + encryption of RT traffic

Deployment requires devices compliant with the specification. At the end of 2025, support is mainly limited to the latest controller generations (typically SIMATIC S7-1500 with the newest firmware) - the precise list of supported hardware should be verified with the vendor. Most of the installed PROFINET base does not support any security class and will not do so without hardware replacement.

Attack vectors

AttackEffect
DCP SET spoofingChange of device name/IP, loss of communication with the PLC
Alarm injectionInjection of forged alarms into the PLC, forcing an HMI reaction
IO Data manipulationModification of cyclic values between PLC and I/O (without PROFIsafe)
Profinet-IO scanningEnumeration of PROFINET topology (e.g. Metasploit scripts, PROFIshark)
PTCP abuseManipulation of time synchronisation (IRT) - degradation of determinism

An attack on RT cyclic data between a PLC and a drive (without PROFIsafe) can, for example, craft the control frame so the drive receives a full-speed rotation command while reporting normal values to the PLC. The operator sees no anomaly while the machine operates outside specification.

Segmentation recommendations

  1. Dedicated OT zone for PROFINET - physical or logical separation from the IT network. PROFINET running directly at layer 2 is not filterable by a standard layer 3/4 firewall.
  2. No routing of PROFINET RT outside the segment - frames with EtherType 0x8892 should not leave the production zone. This is a simple rule on the edge switch.
  3. PROFIsafe for safety traffic - mandatory for SIL-rated elements. The black channel allows coexistence with standard traffic.
  4. Industrial IDS monitoring - Claroty, Nozomi and Dragos can decode PROFINET and detect anomalies (DCP SET, PLC mode change, unknown devices).
  5. PROFINET Security where possible - in new installations with controllers supporting the specification, enabling Security Class 1 is worth doing as a minimum.
  6. Engineering workstations on a separate VLAN - PLC access through TIA Portal should be restricted to specific IPs and authorised stations.

TIP

In Wireshark the filter pn_rt || pn_dcp shows all PROFINET traffic. The presence of DCP SET frames from an unexpected MAC address is an immediate flag - no standard engineering tool sends DCP SET outside planned configuration activity.

Analysis and monitoring tools

Wireshark decodes PROFINET natively:

Wireshark filterUse
pn_rtAll PROFINET Real-Time traffic
pn_dcpDiscovery and Configuration Protocol
pn_ioPROFINET IO (cyclic data + alarms)
pn_ptcpPrecision Transparent Clock Protocol (IRT synchronisation)

PROFINET traffic samples for learning and dissector testing:

Zeek parsers (CISA ICSNPP):

Production anomaly monitoring supporting PROFINET (passive OT IDS):

  • Nozomi Networks Guardian - 200+ protocols, including PROFINET IO/DCP
  • Dragos Platform - 600+ protocols with deep layer 7 analysis
  • Claroty CTD / xDome - 450+ CPS protocols, operational anomaly detection

Open source passive mapping tools:

  • nsacyber/GRASSMARLIN - NSA Cybersecurity tool for passive mapping of ICS/SCADA topology (note: repository archived in April 2023, last release v3.2.1 from June 2017 - compatibility with newer protocols should be verified)

Summary

PROFINET is a mature protocol, dominant in European industrial installations and, in its typical configuration, almost entirely without security mechanisms. PROFINET Security from 2020 changes this, but adoption is slow. Until Security Classes 1-3 are widely deployed, the main line of defence remains physical segmentation and anomaly monitoring.

Related articles: EtherCAT (IEC 61158), PRP/HSR (IEC 62439-3).

Sources

Need help in this area?

Our experts will help you assess the risk and plan next steps.

Talk to an expert

We'll discuss scope, methodology, and timeline.

+48 22 292 32 23 Talk to an expert