Rich interfaces and easy deployment:
Support 4G, 3G, PPPoE, Wi Fi network, digital IO input and output, serial terminal communication, and provide different access schemes for different applications.
Intelligent analysis and efficient access:
Embedded protocol analyzer supports mainstream industrial control protocols (Modbus / PPI / MPI / PROFINET / DVP / OPC, etc.) and customized special protocols; Local computing is realized through policy rule calculation and application deployment and distribution, so as to improve the control ability and real-time performance of the equipment.
Pipeline transmission and data aggregation
The embedded Botong Bolian pipeline protocol WDCP realizes the standardized access of complex machine types on site, and gathers the data to the data center for calculation and storage. Support functions such as remote reading gateway status, remote control gateway, remote configuration devices and variables, remote deployment, remote reading device data and remote writing device data.
High reliability design
1) Link detection design: it supports real-time link detection, realizes automatic redial when dropped, and maintains long link connection.
2) Equipment fault self-healing design: embedded hardware watchdog and software watchdog technology, equipment operation fault self-healing, to ensure that the equipment maintains high availability.
3) System security guard: through the system security guard, the system status and application status are detected in real time to prevent and recover the unsafe and unstable nodes of the system.
1) Data transmission security: it supports L2TP, PPTP, IPSec VPN, open VPN and CA certificate to ensure safe data transmission.
2) Network protection security: the powerful firewall function can customize all-round protection strategies according to customers' needs, such as supporting SPI full state detection, secure shell (SSH), intrusion protection (Ping prohibition), DDoS Defense, attack defense, IP-MAC binding and other wall protection functions to protect the network from external attacks.