Selecting HMI Remote Access Options - LEKULE

Breaking

8 Oct 2019

Selecting HMI Remote Access Options




There are two leading methods exist for establishing mobile HMI connectivity, with one providing more cybersecurity.

Jonathan Griffith, product manager for Industrial Communications & Power Supplies at AutomationDirect, wrote an article for the September 2019 issue of Control Engineering titled Selecting HMI Remote Access Options. Here’s a summary, click on the link above for the full text.
Mobile human-machine interface (HMI) access has become a necessity for many industrial automation applications, with users expecting the same level of access whether they are remote or local. There are two typical methods for providing this access:
  • Standard router without VPN
  • Cloud-hosted VPN router
Although the cloud-hosted solution requires a subscription fee, it outperforms the standard solution with respect to security and features.
Remote access to local automation components using a standard router is not recommended due to cybersecurity risks.

Standard Router

This is the low-cost conventional option but requires careful management and introduces cybersecurity risks since port forwarding opens “holes” in the firewall and exposes the network to external threats. Remote PC users can connect to a PC or HMI that is on-site, or they may us a mobile app.
Jonathan points out shortcomings of the standard router approach:
AutomationDirect’s StrideLinx cloud-hosted VPN offers secure connectivity for mobile HMI applications hosted on laptops, smartphones and tablets.
The main concern with this approach is the security risk associated with port forwarding in mobile and PC-based applications. It’s easy for a hacker to determine which ports are open on a firewall, thereby gaining entrance to the corporate or plant network through the router. While port forwarding can be extremely efficient and useful when done within a corporate or plant network, it is extremely dangerous to use this functionality at an internet-corporate interface.

Organizations should avoid this approach for new installations, and should convert existing installations to a more secure method.

Cloud-Hosted VPN Router

stride hmi remote access
These AutomationDirect StrideLinx VPN routers provide the pre-configured functionality needed for cloud-based connectivity, simplifying implementation. They include 5GB of free VPN data exchange per month, sufficient for most troubleshooting, monitoring, and programming needs.
This method creates an encrypted connection from the local VPN router to the cloud-hosted VPN router, allowing remote users to securely connect via the cloud. Typical cloud-hosted VPN options include a local VPN router, a cloud-hosted VPN server, a VPN client, and connected automation components.
The local router establishes a connection to the cloud-hosted VPN server upon startup, using outbound connections which usually require no corporate IT action. Remote users connect only upon verified request. Once both connections are made, all data passing through the VPN tunnel are secure.

Simple Router Configuration

Cloud-hosted VPNs are offered with preconfigured routers and a predefined cloud server, so non-IT staff can easily install them, as long as they know the local area network IP addresses. Other built-in advanced features such as cloud data logging and alarm notification are available.

App-Based Access in Action


hmi remote access app
AutomationDirect’s C-more HMI mobile app works securely when used in conjunction with the secure StrideLinx VPN router. It’s available for iOS and Android devices.


The StrideLinx service also comes with mobile apps so users can easily access the cloud-based logged data, and use widgets to configure dashboards for viewing live data. The C-more HMI mobile app works securely in conjunction with the StrideLinx service.

Cloud-Based VPN Security


Access to local HMIs and automation systems by mobile devices and laptops is a necessity for many OEMs and other companies. Using a cloud-hosted VPN to provide this access results in a secure system with simple installation, configuration, and maintenance.

No comments: