Preview

M2M Remode_access

Good Essays
Open Document
Open Document
1084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
M2M Remode_access
General Communications Architecture

The Transformer Substations monitor the distributed MCUs using the Gridkey Protocol implemented over TCP/IP (PRIME). TCP/IP Prime Modems are installed at the Substations and at each remote MCU location.

Communications from the Transformer Substation to central server is based on GPRS.

A central M2M Gateway manages both security and routing between any configured VPN tunnels.

A number of options are available for the locations of the central M2M Gateway. These options are discussed later.

Communications Protocols

A number of different protocols are used to link the different sub-systems with the project architecture.

Gridkey Protocol :- this is used to link the MCUs to the USP-020 in the Transformer Substation.

DNP3.0 :- This is used to exchange information between he USP-020 and the TapCon Controller.

IEC870-104 :- All information exchange between the Transformer Substation and the Central HMI/Visualisation is based on the IEC-104 Protocol.

General M2M Set-up Requirements

At it's minimum the M2M Gateway requires these settings

One public IP address for M2M Gateway
SSH port (default 22) unblocked for incoming connections to M2M Gateway from the remote network

The M2M Gateway is recommended to be connected to a DMZ of a firewall. This way the M2M Gateway can have public or private IP address depending on the firewall configuration. When placed in DMZ the firewall protects efficiently against any unauthorized access to the M2M Gateway.

In the minimal configuration only incoming SSH connections are required to have access to DMZ zone. Services other than SSH are optional – however they are required in that case to provide access for monitoring of the HMI and for engineering /configuration purposes.

If the M2M Gateway is located in the DMZ and it has a private IP address the firewall has to support port forwarding or destination network address translation (DNAT).

You May Also Find These Documents Helpful

  • Satisfactory Essays

    With a DMZ, there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Cisco Unified WAN Services: Services, Security, Resiliency, and Intelligence - Cisco. (n.d.). Retrieved from http://www.cisco.com/en/US/prod/collateral/routers/ps9343/solution_overview_c22-450358_ps9343_Products_White_Paper.html…

    • 681 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Constant stream of multimedia traffic between offices – average file size 25MB; file transfers less than 5 seconds…

    • 468 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    nt1210 lab3

    • 324 Words
    • 2 Pages

    (Copper, wires ect) Defines the mechanical procedures that are required to establish and maintain physical links.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    When you have a DMZ there are two firewalls to protect the internal network from external threats. The necessary servers can be placed between the two in order to allow access from either side through strict firewalls while still allowing very little external traffic into the internal zone. The outermost firewall can allow a certain set of traffic to come in and access the servers. The inner most firewall blocks access into the intranet while allowing internal users to access the information on the servers.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    MANAGEMENT: Devices dedicated to the management and control of other network resources should be placed in the MANAGEMENT security zone. These devices typically connect to dedicated management ports on other network resources. These connections to allow managers to remotely access a device, modify its configurations or perform administrative tasks on the resource. Additionally, network resources may be configured to send log files, periodic status messages or notifications to an administrator or management device across these…

    • 598 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Is3350 Unit 2 Assignment

    • 4385 Words
    • 18 Pages

    Please read this document and the accompanying SSAPguide very carefully for everything you need to know about the unit.…

    • 4385 Words
    • 18 Pages
    Powerful Essays
  • Good Essays

    lab 4

    • 527 Words
    • 3 Pages

    1. Automatically chooses the MDI or MDIX configuration to properly match the other end of the link.…

    • 527 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Default gateways, also known as routers, serve the purpose of allowing message transmission across networks. When an Ethernet frame from a source host is wishing to be sent to a host off network, the source will instead send it to the default gateway, using the router’s MAC address. The default gateway will then forward the message to the intended destination host or the next closest default gateway if still not directly…

    • 538 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Terminal Services Gateway (TS Gateway) adds to TS web Access functionality by allowing a secure, encrypted connection using ____.…

    • 103696 Words
    • 415 Pages
    Powerful Essays
  • Satisfactory Essays

    unit 7 security threats

    • 449 Words
    • 2 Pages

    The bundle provides software for monitoring, configuring and testing along with fault detection and avoidance software…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Items covered in the lecture include the history of the system, differences between the main system and the deployable system. Also covered is consideration to be taking in siting the set-up, setting up the system and functionality.…

    • 522 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT 2580

    • 520 Words
    • 3 Pages

    a. 172.30.0.1 But I couldn’t get this to work while on my network so I change my VM’s to Bridged so each got their own IP and then ran the software. Before that change I was having major problems trying to get them all to both send and receive the pings to all the other machines.…

    • 520 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    ADP Architecture Update Report C-1 ANNEX D - Remote Access Service (Dial-Up) Instructions (IMO’s) D-1 ANNEX E – Procedures for Processing Work Orders on a ASOCNet computer (All Users) E-1 ANNEX F – Procedures for Installs or Moves of ASOCNet computers (IMO’s) F-1 ANNEX G – Current hardware and software requirements G-1 ANNEX H – Automation Security and Safeguards (All) H-1 ANNEX I – Risk Management Review (IMO’s) I-1…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Hacking2E Lab03 AW

    • 563 Words
    • 3 Pages

    This tool is used to identify the path that must be followed to reach one system from another. It…

    • 563 Words
    • 3 Pages
    Satisfactory Essays