369B1860G0028 Network Security Protection


Technical Parameters:

  • User defined tag-based programming for descriptive I/O naming
  • Simple-to-use instructions and Easy math to eliminate complex ladder logic rungs
  • Application tools for quick access to setup, programming, debugging and PAC control
  • Task Manager for quick and easy prioritization of Ladder Logic code
Categories: ,
Get a quote, please contact me immediately:
Simon Zhang
Phone/Whatsapp/Skype/Wechat: +86 133 6590 9307


369B1860G0028 Network Security Protection

369B1860G0028 Remote control of the special characteristics of the system requires a very high degree of system security and stability. Security is mainly to prevent intentional and unintentional breakthroughs from both inside and outside the system. Network security measures include channel encryption, source encryption, login protection, access protection, access protection, firewalls and so on. Stability means that the system can run 24 hours a day, even if there are hardware and software failures, the system can not interrupt the operation.

Monitoring center can be accessed through the public network, or to the mobile network access, using the public network access method is relatively low-cost, the enterprise does not need to rent a dedicated line, and the use of data line access, GSM data transmission equipment to be certified by the Radius server, the entire data transmission process is encrypted to protect the security of a higher level of security, can fully protect the speed and quality of network services. DTU ID number and password can be configured for each GSM data transmission device individually, and application layer authentication can be carried out by the monitoring center when it logs in, and other GSM devices that do not have the DTU ID number and password assigned by the center will not be able to log in and enter the system, which further enhances the security of the system.

369B1860G0028 APN data private network mode: APN servers are configured in the internal network of the enterprise, and mobile terminals use APN data private network. Due to the use of data private network, the server is isolated from the public Internet, which can effectively avoid illegal invasion. The uniqueness of SIM card is used to identify and authorize the user’s SIM card cell phone number, bind the SIM card number and APN on the network side, and delimit the range of users who can access a certain system, and only SIM card cell phone numbers belonging to the designated industry can access the dedicated APN, and the mobile terminals and the monitoring center use the special APN assigned by China Mobile and Unicom for wireless network access, and the SIM card number of ordinary cell phones can not call the special APN, so the mobile terminal and the monitoring center can not call the dedicated APN. SIM card number can not call the specialized APN.