5 modbus tcp/ip to rtu gateway, 6 tls, Modbus tcp/ip to rtu gateway – Campbell Scientific NL200/NL201 Network Link Interface User Manual

Page 29

Advertising
background image

NL200/201 Network Link Interface

connection, and data received on the TCP connection will be forwarded to the

RS-232 port. This mode can be particularly useful when an RF base or serial

sensor is behind a firewall and needs to be the party responsible for initiating

the TCP socket connection to the data collection server.

The NL200/201 will attempt to open a connection with the remote server, and,

if the connection fails to open, the device will continue to retry at an interval of

60 seconds. If data arrives on the RS-232 port when no TCP connection exists,

the device will buffer the data (up to 1500 bytes) and immediately attempt to

open a connection to deliver the data. If the remote server closes the

connection due to error, the NL200/201 will make a best effort to save any data

that was in process and re-queue it to be sent on the next successfully-opened

TCP connection.

7.5 Modbus TCP/IP to RTU Gateway

The NL200/201 can serve as a Modbus TCP/IP to RTU Gateway. It will listen

for incoming Modbus TCP/IP connections from a Modbus TCP/IP master

client. The port number of the listening connection is specified in the

RS-232

Service Port Number setting and is typically set to a value of 502. The

NL200/201 will convert incoming Modbus TCP/IP frames to Modbus RTU

and forward them to the RS-232 port. The NL200/201 will wait for a response

from the Modbus RTU device and forward that response back to the remote

Modbus TCP/IP master client over the established TCP connection. The

Modbus RTU device is generally a datalogger, such as a CR200(X), connected

to the RS-232 port or a datalogger located remotely over a transparent radio

(for example, RF450) connection, but can be any Modbus RTU device. When

the NL200/201 is connected directly to a CR800 series, CR1000, or CR3000

being polled by a Modbus TCP/IP master client, the NL200/201 is most

commonly configured with Bridge Mode enabled instead of as a Modbus

TCP/IP to RTU Gateway.

7.6 TLS

The NL200/201 supports transport layer security (TLS) for proxy functions

including HTTPS. TLS versions 1.0 and 1.1. are supported. The TLS

implementation supports symmetric algorithms AES-256, AES-128, and RC4

and RSA keys up to 4096 bits. For any TLS connection, the unit will

preferentially use AES-256, then AES-128, and finally RC4. X.509 certificates

are supported, with the exception of v3 extensions. Certificates should be PEM

format. Up to 10 certificates can be chained. 20 KB of space is provided for

certificate storage. The Private Key should also be in PEM format and, if

encrypted, use AES-256 or AES-128 (SHA).

The implementation of TLS in the NL200/201 is provided so that secure,

encrypted communications can be established between a TLS client and the

NL200/201. With the TLS Proxy Server enabled, the NL200/201 can act as a

TLS proxy server for a datalogger. The NL200/201’s TLS Proxy Server

maintains a secure TLS connection with a remote TLS client and forwards data

onto a datalogger using a standard TCP connection thus enabling

communication with TLS clients. The TLS client can be a web browser using

HTTPS or other user-supplied TLS client. This offloads from the datalogger

the intensive computations that are necessary for a TLS server to perform.

Also, with the NL200/201 configured for TLS, it can establish a secure TLS

configuration session with DevConfig.

19

Advertising