EC: Tunneller v4.0

Software - Applications: MarikonOPC Tunneller is the fastest, most trusted way to connect to remote OPC Servers. Whether connecting across different domains, through firewalls, or dealing with unreliable networks, OPC Tunneller has the application covered. This is a Control Engineering 2013 Engineers' Choice finalist.


MarikonOPC Tunneller is the fastest, most trusted way to connect to remote OPC Servers. Whether you need to connect across different domains, through firewalls, or deal with unreliable networks, OPC Tunneller has you covered This is a Control Engineering 2013 Engineers' Choice finalist.MatrikonOPC Tunneller solves 6 major issues encountered using OPC over DCOM:


1. Cross Domains and Workgroups Authentication difficulties make DCOM connections across different domains or workgroups extremely difficult or impossible. Leap past this limitation with MatrikonOPC Tunneller. Essentially, if you can ping the PC, you can get to it with MatrikonOPC Tunneller.


2. DCOM and OPC through firewalls DCOM uses a wide variety of ports, making it almost impossible to configure a firewall with. Not to mention, DCOM is a prime target for viruses and worms such as Blaster. MatrikonOPC Tunneller lets us firewall our PCs for maximum security against viruses and worms, yet still allows us all the benefits of OPC.


3. DCOM needs a lot of bandwidth DCOM works best in environments with low latency and high bandwidth; typical of an office LAN. This causes considerable difficulty when communicating over satellite, modems, radio, and other bandwidth-limited communication types. MatrikonOPC Tunneller features lossless data compression, which reduces load on networks and saves money when paying per MB of data.


4. Timeouts and Disconnections Plagued with timeouts? Need recovery faster than the unconfigurable 6 minute timeout that comes with DCOM? MatrikonOPC Tunneller has configurable timeouts to work best with your network and reconnects to OPC Servers in a fraction of the time.


5. Data Privacy MatrikonOPC Tunneller now features data stream encryption. "Man in the middle" type of attacks can now be thwarted, because the OPC data is not readable without the key. Encryption can be selected from 64, 96, or 128 bit AES. MatrikonOPC Tunneller can also limit client connections from only the IP addresses you define.


6. Easy Configuration Depending on your system, configuring DCOM just to the point of getting communication can take days! MatrikonOPC Tunneller reduces your integration time to minutes!



No comments
The Engineers' Choice Awards highlight some of the best new control, instrumentation and automation products as chosen by...
The System Integrator Giants program lists the top 100 system integrators among companies listed in CFE Media's Global System Integrator Database.
The Engineering Leaders Under 40 program identifies and gives recognition to young engineers who...
This eGuide illustrates solutions, applications and benefits of machine vision systems.
Learn how to increase device reliability in harsh environments and decrease unplanned system downtime.
This eGuide contains a series of articles and videos that considers theoretical and practical; immediate needs and a look into the future.
Choosing controllers: PLCs, PACs, IPCs, DCS? What's best for your application?; Wireless trends; Design, integration; Manufacturing Day; Product Exclusive
Variable speed drives: Smooth, efficient, electrically quite motion control; Process control upgrades; Mobile intelligence; Product finalists: Vote now; Product Exclusives
Machine design tips: Pneumatic or electric; Software upgrades; Ethernet advantages; Additive manufacturing; Engineering Leaders; Product exclusives: PLC, HMI, IO
This article collection contains the 5 most referenced articles on improving the use of PID.
Learn how Industry 4.0 adds supply chain efficiency, optimizes pricing, improves quality, and more.

Find and connect with the most suitable service provider for your unique application. Start searching the Global System Integrator Database Now!

Cyber security cost-efficient for industrial control systems; Extracting full value from operational data; Managing cyber security risks
Drilling for Big Data: Managing the flow of information; Big data drilldown series: Challenge and opportunity; OT to IT: Creating a circle of improvement; Industry loses best workers, again
Pipeline vulnerabilities? Securing hydrocarbon transit; Predictive analytics hit the mainstream; Dirty pipelines decrease flow, production—pig your line; Ensuring pipeline physical and cyber security