Introduction, Cut & stop, Alarming – ADS-TEC IRF2000 User Manual User Manual

Page 10: Eventlog, Umts modem, 3 introduction, 1 cut & stop, 2 alarming, 3 eventlog, 4 umts modem

Advertising
background image

IRF2000 series

9

© ads-tec GmbH • Heinrich-Hertz-Str. 1 • 72622 Nürtingen

3 Introduction

The Industrial Firewall forms the link between the IT world and the automation system and meets the
requirements of IT security as well as of the maintenance personnel in the production facility. It allows
the network in plants and machines as well as access to this network to be monitored. Its fundamental
protective mechanism is situation-dependent and physical network disconnection. It additionally
provides safe access for service purposes, allows traffic shaping and can use existing virus scanners.

Recommendation for use:

For the efficient online configuration of your ads-tec devices, it is possible to
download the current version of the free tool "IDA light" on the company's
homepage http://www.ads-tec.de. With this tool you can, for example, define
individual parameters or whole groups of parameters on a master device and
transfer them to a limited selection or to all ads-tec devices of same design and
version without having to make these time-consuming configurations on each
individual device. You can also assign sequential IP addresses for your ads-tec
devices in just a few steps.

With IDA light you can comfortably provide own groups of parameters
according to your specific requirements and modify them at any time.

3.1 Cut & Stop

In critical start-up or production phases, the Ethernet uplink can be disconnected via a 24 V input. This
makes deliberate or inadvertent manipulation absolutely impossible.

The uplink is reconnected via the same input. This function makes integration in an automation concept
extremely easy.

3.2 Alarming

In the event of rule violation, the alarm signal is sent to the control system via an output. Necessary
measures can be automated directly.

Acoustic indicator lights can, for example, signal the alarm condition.

Automatically sent emails can warn of rule violation.

3.3 Eventlog

If the firewall is disconnected from the power supply, a non-volatile event log saves all events.

The event log can be read out both locally and via a central syslog server.

3.4 UMTS modem

Connection is possible via UMTS/GSM using the integrated UMTS modem.

Advertising