Provide remote access to the PLC
On multiple secure tunnels for remote management and data collection.
Thanks to our secure and redundant connection, you have access to your PLC’s around the world for remote management and data collection.
Even when the Internet connection is temporarily lost, it is possible to save data on its own internal storage, so that it can be used later.
If a problem arises, the PLC Connect can be accessed remotely. Service parties can gain insight into the situation from their own location and may even be able to come up with solutions. However, they only get access to the parts of the system that are authorized for them.
The TunnelRouter is crucial for PLC Connect. The TunnelRouter blocks all connections from the Internet. Thus, no connection is made by the user to the TunnelRouter, but rather from the TunnelRouter to the user. This secure connection is established through double encryption.
The TunnelRouter (TR) always takes the initiative to connect to TunnelConnectServer (TCS) via an ecrypted tunnel and gets a unique ID on the TCS. The TSC makes a new secure connection over the connection that the TR has made, a reversed encrypted tunnel.
The remote user who wants access to a device behind the TR makes a one key-based connection with the TCS. The TCS is needed to verify both the remote user and the PLC. In addition, since the TCS contains all the information and protocols for setting up connections, maintenance happens centrally instead of locally for each device of each individual remote user.
Now the remote user connects with the PLC behind the TR. This connection is realized on the basis of encryption keys between the device of the remote user and the TR. In this way peer-to-peer encryption is achieved and the secure connection is established.