How to Implement Secure, Remote Access to an Industrial Automation System
- Option 1: Hosted VPN. Hosted VPNs provide a secure connection with simple setup and network configuration. Typical...
- Hosted VPN design considerations. Those considering this solution must have a high level of trust in the hosted VPN...
- Option 2: Traditional VPN. This option requires a local VPN...
Full Answer
How can remote users access Automation Components connected to the local router?
Once connected, remote users can access automation components connected to the local router through the VPN tunnel. Unlike option 1, there is no cloud server between the two devices with either method of connection: VPN router to VPN router, or VPN router to VPN software client.
Why choose FactoryTalk for remote access for industrial equipment?
From multi-factor authentication and encrypted protocols to local access control and more, you can make security a priority. FactoryTalk Remote Access software is part of Remote Access for Industrial Equipment, a complete solution, which also includes the Stratix® 4300 Remote Access Router hardware.
Why should you consider remote access to service equipment?
With remote access, you don’t need costly travel time and expenses to help. Customers will appreciate this – and so will your bank account. When you can service customer equipment on-demand, you’re poised to fast-track fixes, reduce downtime and maximize productivity. Protecting your work is serious business.
What is the Stratix 4300 remote access router used for?
Our Stratix® 4300 Remote Access Router helps enable connectivity to remote systems and applications. See this diagram to learn how FactoryTalk Remote Access software and the Stratix 4300 Remote Access Router work together to enable connectivity to your remote equipment.
What is FactoryTalk software?
FactoryTalk Remote Access software is part of Remote Access for Industrial Equipment, a complete solution, which also includes the Stratix® 4300 Remote Access Router hardware. Together, these products enable secure access to industrial machines, skids, and assets wherever you are.
What is a Stratix 4300?
Our Stratix® 4300 Remote Access Router helps enable connectivity to remote systems and applications.
What is FactoryTalk Remote Access?
With FactoryTalk Remote Access software, you can provide installation support, programming upgrades, break-fix applications, remote services, and diagnostics – right where you are.
Is FactoryTalk Remote Access only a support solution?
Think remote access is only a support solution? Think again! Whether it’s virtual commissioning or remote firmware management, FactoryTalk Remote Access software can help you reimagine the way you support your customers.
Is FactoryTalk remote access secure?
We know that security is a critical issue. With FactoryTalk Remote Access software, you can initiate and maintain secure connections, from anywhere.
Do you need travel time for remote access?
With remote access, you don’t need costly travel time and expenses to help. Customers will appreciate this – and so will your bank account.
Is security a priority?
Protecting your work is serious business. From multi-factor authentication and encrypted protocols to local access control and more, you can make security a priority.
Why is VPN important?
An important safety feature for the VPN router is a digital input for a switch to locally enable or disable communications , preventing remote control of a machine during maintenance periods.
How to secure remote access?
The two main ways to implement secure remote access are with a hosted VPN and with a traditional VPN.
How does a router work?
The router initiates communication to the server via an outbound connection through standard ports that are typically open, such as HTTPS. This usually requires no changes to the corporate IT firewall, and satisfies IT security concerns. By contrast, traditional VPNs require inbound firewall ports to be opened, which requires IT involvement and oversight.
Why does hosted VPN not require IT support?
The hosted VPN solution does not require an IT team for support, because it is simple to implement and maintain, and most companies accept it as secure. Those companies that do not accept a hosted VPN solution for security reasons would likely not accept a traditional VPN either because of its required firewall changes.
What is the advantage of a hosted VPN?
Another advantage to a hosted VPN is the router configuration is extremely simple. Because the secure router (figure 3) is connected to a predefined cloud server, the router comes preconfigured, requiring only the most basic network information from the user.
What is a hosted VPN?
Hosted VPNs provide a secure connection with simple setup and network configuration. Typical hosted VPN solutions include a VPN router, a hosted VPN server, a VPN client, and connected automation system components (figure 2). A secure connection between the VPN client and the router is established after the router and VPN client each make ...
How does machine builder work?
The machine builder can use widgets to create dashboard screens that many different users can view on remote devices. When full control and monitoring is required, it can be done by installing a lightweight software client on a PC, which can connect to the cloud from any location worldwide.
Meaningful Mobile
Mobile connectivity takes on many forms. Users can connect to PLCs, HMIs, or other intelligent devices. This may be performed only on-site, or worldwide via the cloud. They may use solutions like AutomationDirect StrideLinx, or they may connect via other providers such as Microsoft Azure®.
Who Uses Mobile?
Operations personnel can use mobile access on a daily basis to monitor and control systems. Subject matter experts, located anywhere in the world, can respond to calls for assistance with mobile access. And maintenance techs can act quickly on trouble notifications delivered via mobile.
Cybersecurity is a Leading Concern
Despite the benefits, some end users have not yet implemented mobile access. Among those who haven’t, 80% cited security concerns. This is why AutomationDirect has gone to great lengths to ensure necessary security features are built in to devices, and secure communication protocols and services are available.
Mobile Access Lets End Users Hit the Road
It is clear that the industrial automation sector is progressively adopting mobile technologies, especially as cybersecurity, performance, and ease-of-use concerns are addressed.