Remote configuration of PLCs and machines

29 April 2014

HMS Industrial Networks has added the Netbiter Remote Access to its existing range of remote management solutions.

Continue reading this article

Register now for free and access every article and to register for the print edition.

Remote Access is said to provide an instant, secure communication tunnel to remote equipment, allowing users to employ their usual PLC configuration software as if they were connected to the machine on site. This makes it possible to instantly take action in case an operational problem occurs and reduces the need to travel to the site.

Netbiter Remote Access enables machine builders, system integrators, OEMs and end-users to connect to devices, equipment or machines from any location.  The solution provides a secure communication tunnel for PC-based software applications and allows PLC programmers and machine owners to configure, reprogram and debug the machinery from any location saving both time and travel costs while improving customer service.

Users first need to connect a Netbiter EasyConnect 300-series gateway to the remote device or machine. By running the Netbiter QuickConnect software on a computer, a secure tunnel is created to the Netbiter gateway and the device/machine to which it is connected. PLC programmers or machine owners can simply open their regular configuration software and configure or debug as if they were on site.

The secure connection is established via the cloud-based Netbiter Argos data center, so there is no need for opening inbound ports in firewalls or setting up VPN connections on site. The result is a secure connection which is set up a matter of minutes.

Data is encrypted both to and from Netbiter Argos and it is also possible to choose a two-step verification method which ensures secure data connection to the remote equipment. Since the connection is made through the Netbiter Argos, which acts as a routing portal for all communication, there is no need to bother with fixed IP addresses or holes in the usersĀ“ firewalls.

Contact Details and Archive...

Print this page | E-mail this page