On multiple secure tunnels for remote management and data collection.
PLC Connect in short
How does PLC Connect work?
The TunnelRouter is crucial for PLC Connect. The TunnelRouter blocks all connections from the Internet. Thus, no connection is made by the user to the TunnelRouter, but rather from the TunnelRouter to the user. This secure connection is established through double encryption.
The TunnelRouter (TR) always takes the initiative to connect to TunnelConnectServer (TCS) via an ecrypted tunnel and gets a unique ID on the TCS. The TSC makes a new secure connection over the connection that the TR has made, a reversed encrypted tunnel.
The remote user who wants access to a device behind the TR makes a one key-based connection with the TCS. The TCS is needed to verify both the remote user and the PLC. In addition, since the TCS contains all the information and protocols for setting up connections, maintenance happens centrally instead of locally for each device of each individual remote user.
Now the remote user connects with the PLC behind the TR. This connection is realized on the basis of encryption keys between the device of the remote user and the TR. In this way peer-to-peer encryption is achieved and the secure connection is established.