|
*|MC:SUBJECT|*
*|MC_PREVIEW_TEXT|*
Product Highlight:
APR-3100N Series
- Industrial 802.11a/b/g/n Wireless AP/VPN/Router
- WEP / WPA / WPA-PSK (TKIP, AES) / WPA2 / WPA2-PSK (TKIP, AES) / IEEE 802.1x / RADIUS Support
- Redundant Power Inputs: 12 ~ 48VDC on Terminal Block
- Supports AP, Client, Bridge, Router, and Repeater Mode
- Supports Watchdog and Auto Reboot
- Supports Spanning Tree Protocol (STP)
|
|
APPLICATION:
Virtual Private Networks
|
|
In an ideal secured network environment, corporate resources are developed on a private network – separating it from the public network. This establishes a more secure system of controls for who has access to the private resources, such as Human Machine Interfaces (HMI), Programmable Logic Controllers (PLCs), and other private corporate resources. But how would you gain access to these controllers and sensors in the event that a critical situation occurred and you were not physically there?
Enter the world of virtual private networks (VPNs). A VPN can extend a private network across a public network. It allows employees to securely access a private corporate network without having to physically be in the office. VPNs provide a great deal of functionality, such as security and management. An individual could VPN into their companies’ network and check to see what was going on with their PLCs or HMIs while still at home or even at a coffee shop! A VPN is created using a virtual point-to-point connection through a dedicated tunneling encryption protocol. The process circumvents geo-restrictions and allows resources to be accessed remotely.
VPNs can vastly increase privacy and security when configured to do so. Typically, VPN tunnels are encrypted and utilize authentication methods to provide confidentiality and integrity across the tunneled connection. Some of the protocols used to establish this level of security are Internet Protocol Security (IPsec), OpenVPN, Transport Layer Security (SSL/TLS), and Point-to-Point Tunneling Protocol (PPTP). Another key point of security in VPNs is authentication. A VPN connection must be authenticated before a VPN tunnel can be established. Methods of authentication include the use of passwords, biometrics, two-factor authentication, or other cryptographic encryptions.
Antaira’s APR-3100N(-T) series router provides VPN services, including IPsec, OpenVPN, PPTP, and L2TP. The APR-3100N(-T) can be configured as a VPN server to provide a tunneled connection to a private network or as a client device to connect to an already established VPN network. The device also supports 802.11 a/b/g/n wireless.
|
|
|
|
|
|
|
|