Access to your PLC’s around the world.

Our Services

Secure and redundant

Thanks to our secure and redundant connection, you have access to your PLC’s around the world for remote management and data collection.

Data collection

Even when the Internet connection is temporarily lost, it is possible to save data on its own internal storage, so that it can be used later.

Remote management

If a problem arises, the PLC Connect can be accessed remotely. Service parties can gain insight into the situation from their own location and may even be able to come up with solutions. However, they only get access to the parts of the system that are authorized for them.

PLC Connect in short

  • Provide remote access to the PLC

    On multiple secure tunnels for remote management and data collection.

  • Securing local networks against Internet dangers

    Because all incoming ports on the firewall are closed.

  • Outgoing ports of the Firewall can be closed

    With only the port open that the TunnelRouter uses.

  • Redudancy

    By installing a WiFi connector, a 4G adapter, LoRa/Sigfox or even a satellite Internet connection.

  • Remote access is independent of the connection and is automatically adjusted

    As the TunnelRouter switches to WiFi, 4G, LoRa, Sigfox or satellite.

How does PLC Connect work?

The TunnelRouter is crucial for PLC Connect. The TunnelRouter blocks all connections from the Internet. Thus, no connection is made by the user to the TunnelRouter, but rather from the TunnelRouter to the user. This secure connection is established through double encryption.

The TunnelRouter (TR) always takes the initiative to connect to TunnelConnectServer (TCS) via an ecrypted tunnel and gets a unique ID on the TCS. The TSC makes a new secure connection over the connection that the TR has made, a reversed encrypted tunnel.

The remote user who wants access to a device behind the TR makes a one key-based connection with the TCS. The TCS is needed to verify both the remote user and the PLC. In addition, since the TCS contains all the information and protocols for setting up connections, maintenance happens centrally instead of locally for each device of each individual remote user.

Now the remote user connects with the PLC behind the TR. This connection is realized on the basis of encryption keys between the device of the remote user and the TR. In this way peer-to-peer encryption is achieved and the secure connection is established.