Professional Documents
Culture Documents
by Lawrence Miller
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Secure Remote Access for Industrial Machines For Dummies®,
2nd Ewon Special Edition
Published by: John Wiley & Sons, Ltd., The Atrium, Southern Gate Chichester, West Sussex,
www.wiley.com
© 2020 by John Wiley & Sons, Ltd., Chichester, West Sussex
Registered Office
John Wiley & Sons, Ltd., The Atrium, Southern Gate, Chichester, West Sussex, PO19 8SQ, United Kingdom
All rights reserved. No part of this publication may be reproduced, stored in a retrieval system or transmitted
in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except
as permitted by the UK Copyright, Designs and Patents Act 1988, without the prior written permission of the
Publisher. For information about how to apply for permission to reuse the copyright material in this book,
please see our website http://www.wiley.com/go/permissions.
Trademarks: Wiley, For Dummies, the Dummies Man logo, The Dummies Way, Dummies.com, Making
Everything Easier, and related trade dress are trademarks or registered trademarks of John Wiley & Sons,
Inc. and/or its affiliates in the United States and other countries, and may not be used without written
permission. Ewon is a trademark or registered trademark of HMS Industrial Networks. All other
trademarks are the property of their respective owners. John Wiley & Sons, Ltd., is not associated with any
product or vendor mentioned in this book.
LIMIT OF LIABILITY/DISCLAIMER OF WARRANTY: WHILE THE PUBLISHER AND AUTHOR HAVE USED
THEIR BEST EFFORTS IN PREPARING THIS BOOK, THEY MAKE NO REPRESENTATIONS OR WARRANTIES
WITH RESPECT TO THE ACCURACY OR COMPLETENESS OF THE CONTENTS OF THIS BOOK AND
SPECIFICALLY DISCLAIM ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE. IT IS SOLD ON THE UNDERSTANDING THAT THE PUBLISHER IS NOT ENGAGED
IN RENDERING PROFESSIONAL SERVICES AND NEITHER THE PUBLISHER NOR THE AUTHOR SHALL BE
LIABLE FOR DAMAGES ARISING HEREFROM. IF PROFESSIONAL ADVICE OR OTHER EXPERT ASSISTANCE
IS REQUIRED, THE SERVICES OF A COMPETENT PROFESSIONAL SHOULD BE SOUGHT.
For general information on our other products and services, or how to create a custom For Dummies book
for your business or organization, please contact our Business Development Department in the U.S. at
877-409-4177, contact info@dummies.biz, or visit www.wiley.com/go/custompub. For information about
licensing the For Dummies brand for products or services, contact BrandedRights&Licenses@Wiley.com.
10 9 8 7 6 5 4 3 2 1
Publisher’s Acknowledgments
We’re proud of this book and of the people who worked on it. For details on
how to create a custom For Dummies book for your business or organization,
contact info@dummies.biz or visit www.wiley.com/go/custompub. For
details on licensing the For Dummies brand for products or services, contact
BrandedRights&Licenses@Wiley.com.
Some of the people who helped bring this book to market include the following:
Project Editor: Martin V. Minner, Production Editor:
Carrie Burchfield-Leighton Tamilmani Varadharaj
Editorial Manager: Rev Mengle HMS/Ewon Special Help: Francis
Executive Editor: Katie Mohr Vander Ghinst, Hugues Villeret,
Dominique Blanc, Vivek Mano,
Business Development Blaise Ngung
Representative: Frazer Hossack
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Table of Contents
INTRODUCTION................................................................................................ 1
About This Book.................................................................................... 1
Foolish Assumptions............................................................................. 1
Icons Used in This Book........................................................................ 2
Beyond the Book................................................................................... 2
Where to Go from Here........................................................................ 2
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
CHAPTER 5: Exploring Remote Access Success Stories.............. 37
Manufacturing..................................................................................... 37
Food and Beverage............................................................................. 38
Bulk Material Handling....................................................................... 39
Cyclotron Machines............................................................................. 40
GLOSSARY .......................................................................................................... 45
iv Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Introduction
A
fter-sales service and support for industrial machines is
often costly and time consuming. Experienced engineers
and technicians often must travel to customer sites to
diagnose issues, answer questions, provide training, and resolve
problems. Wouldn’t it be awesome — for you and your customers —
if you could quickly and securely perform diagnostics and resolve
most of those issues remotely?
»» What remote access is, how it has evolved, and the business
benefits of remote access (Chapter 1)
»» The basics of remote access environments (Chapter 2)
»» How to ensure secure and reliable remote access over the
Internet and in the cloud (Chapter 3)
»» Secure remote access solutions from Ewon (Chapter 4)
»» Real-world remote access use cases for different industries
(Chapter 5)
»» How to get started with the Ewon Cosy (Chapter 6)
There’s also a convenient glossary at the end of the book, in case
you get stumped by any technical acronyms or concepts.
Foolish Assumptions
In this book, I assume that you’re an automation engineer or
field technician working for a small or medium machine builder
or original equipment manufacturer (OEM). Thus, while you no
doubt have a strong understanding of the machines that you build
or support, you aren’t necessarily as comfortable with technolo-
gies such as the Internet, cloud computing, remote access, and
information security. As such, this book is written primarily for
“non-techie” readers.
Introduction 1
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Icons Used in This Book
Throughout this book, I occasionally use special icons to call
attention to important information. Here’s what to expect:
This icon points out information you should commit to your non-
volatile memory — along with anniversaries and birthdays.
These alerts point out the stuff your mother warned you about
(well, probably not), but they do offer practical advice to help you
avoid potentially costly or frustrating mistakes.
2 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Understanding why remote access is
necessary
Chapter 1
Making the Case for
Remote Access
I
n this chapter, you discover the need for and benefits of remote
access; the history, advantages, and disadvantages of different
remote access technologies; and the many business and techni-
cal benefits of remote access.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Connecting to a web camera for assistance
»» Supporting field technicians for commissioning
»» Improving responsiveness
»» Reducing the impact of emergencies
»» Optimizing engineers’ workloads
»» Maximizing machine uptime and productivity
»» Cutting travel costs
See Table 1-1 for a chart of cost savings when comparing site
visits with remote visits.
4 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Machine builders are also recognizing the opportunity that remote
access opens up for creating new, revenue-generating, proactive
and preventive services that can be offered to their customers.
Airfare $600
On-site diagnostics
and detection of
On-site missing parts
travel
FIGURE 1-1: Achieve greater efficiency and competitive advantage with
remote access.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Tracing the History of Remote Access
Early remote access to machines typically consisted of “out-of-
band” management using a terminal console connected via an
analog landline telephone and modem. These systems were slow,
often difficult to install, and costly to operate and maintain.
This approach avoids the need for a wired phone line or the need
to tap into the corporate IT network, though wireless signal avail-
ability in production areas can be an issue.
6 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Why is this capability important? First, the end-user may want to
prevent continual remote access to the machine. Disconnecting
the machine from the local area network (LAN) isn’t essential
for security, but it gives the end-user physical control over when
the machine is accessed and for how long. In this situation, the
machine is ordinarily disconnected from the LAN. The machine is
connected only when necessary or when requested by the machine
builder.
Outbound connections
Virtual private networks (VPNs) are an excellent solution from a
technical standpoint, but allowing proper inbound network access
while ensuring security can be a complex task. Every automation
vendor typically uses a different set of network ports, and negoti-
ating a clear path through a customer’s firewalls requires careful
configuration and sometimes delicate negotiations with resistant
IT departments. By relying on an outbound connection across the
factory LAN, you can resolve many firewall issues right off the
bat. Indeed, if no incoming connections are made, no ports must
be enabled in the corporate firewall for incoming connections, and
no IT or firewall changes are needed to establish communication.
Software-based solutions
Using the Internet, a supervisory local PC can be remotely
accessed and controlled using Virtual Network Computing (VNC)-
like technology or other PC-based remote access software. In this
scenario, software replicates and cedes control of the remotely
accessed operator interface computer. Although this type of solu-
tion may be acceptable for remotely connecting to a PC, it usually
provides the user with access to the entire network — which isn’t
acceptable, especially from a security perspective.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Router-based VPN solutions
Another solution is to rely on an on-demand VPN connection
using an industrial router and a cloud-based management infra-
structure. A Secure Sockets Layer (SSL) VPN connection typically
presents few issues for a customer’s IT department.
8 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Working out the details of computer
networking
Chapter 2
Looking at Remote
Access Environments
I
n this chapter, I give you the basics about computer networking
technology, the Internet, and cloud computing, as well as
Programmable Logic Controllers (PLCs), automation, and Human
Machine Interfaces (HMIs).
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
LAN devices in machines such as programmable logic controllers
(PLCs), panels, human machine interfaces (HMIs), computers,
and other automation devices (for example, peripheral input/
output equipment and drives) are typically connected via hubs
or switches using Ethernet cables (wired connections). The
most common LANs use the Transmission Control Protocol and
Internet Protocol (TCP/IP) to communicate with other devices and
networks. Every device on a TCP/IP network must have a unique
IP address. The current version of IP (IP version 4) uses a 32-bit
numeric address that’s divided into four octets, for example:
5.39.46.101. This example is shown in Figure 2-1.
5 39 46 101
00000101 00100111 00101110 01100101
10 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
0+0+32+0+0+4+2+1. See whether you can apply this logic to obtain
the values in the third and fourth octets of Figure 2-1.
The subnet mask is a 32-bit address (like the IP address) that masks
the IP address to compute the network address. Computers use a
subnet mask to know whether a recipient IP address belongs to
its network or not. If the computer and the recipient IP address
belong to the same network, they can communicate to each
other directly. If they don’t, they must communicate through the
gateway.
Gateway
A B C
D E F
Network 1
IP_ADR_A = 10 . 0 . 0 . 67 IP_ADR_B = 10 . 0 . 0 . 85
A Mask_A = 255 . 255 . 255 . 0 B Mask_B = 255 . 255 . 255 . 0
Gateway_A = 10 . 0 . 0 . 2 Gateway_B = 10 . 0 . 0 . 2
FIGURE 2-2: Two devices communicating within the same network.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
10 . 1 . 0 . 19
Gateway
A B C
D E F
Network 1
Network 2
10 . 0 . 0 . 2
10 . 1 . 0 . 24
IP_ADR_A = 10 . 0 . 0 . 67 IP_ADR_E = 10 . 1 . 0 . 19
A Mask_A = 255 . 255 . 255 . 0 E Mask_E = 255 . 255 . 255 . 0
Gateway_A = 10 . 0 . 0 . 2 Gateway_E = 10 . 1 . 0 . 24
FIGURE 2-3: Two devices communicating on different networks.
Factory
Factory Machine
LAN LAN
INTERNET
Firewall
Machine
Router
12 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Network address translation (NAT) maps private IP addresses to
public IP addresses for outbound traffic to the Internet. NAT is
usually performed by a router.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Today, the Internet (and the World Wide Web) is ubiquitous, con-
necting networks and devices to vast amounts of information
and resources around the world. For millennials, it’s practically
a basic life necessity!
14 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
You can think of the Internet as a route and the cloud (as well as
the World Wide Web) as destinations on the Internet.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
PLCs’ FAMILY HISTORY
Although PLCs are common in many industries today, the first PLCs
were invented for American automobile manufacturers. Previously, car-
makers controlled their manufacturing processes with a variety of hard-
wired relays and timers. These old-school devices got the job done, but
every time a manufacturing process was redesigned, thousands of
them had to be rewired — a costly and time-consuming task.
16 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Looking at the dark side of the Internet
Chapter 3
Ensuring Security
and Reliability
A
lthough the Internet enables remote access to networks
and machines around the world with many business
benefits, it also affords an opportunity for malicious
activity — cyberattacks — that have become all too common today.
In this chapter, you find out the basics of Internet security and
how Ewon protects your machines and data with its Talk2M
defense-in-depth security architecture.
The 2013 data breach of U.S. retailer Target was the result of an
attacker compromising Target’s corporate network via a con-
nected heating, ventilation, and air conditioning (HVAC) main-
tenance system.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Hacker groups motivated by a political or social cause may also try
to damage industrial machines connected to the Internet. Perhaps
the most significant threats arise from nation-states that may
attack machines to achieve various objectives.
18 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
However, all inbound traffic that is not explicitly associated
with an outbound request is blocked by default. To allow certain
inbound traffic from the Internet, firewall rules must be config-
ured to allow the specific type of traffic, from a specific source to
a specific destination.
Factory
Cloud
Factory Machine
LAN LAN
Firewall Firewall
Service engineer Machine
Router
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
However, if the VPN server is hosted by an independent orga-
nization in a cloud as a Software as a Service (SaaS) offering, as
I discuss in Chapter 2, it can be shared among several machine
builders, each having a private account, and they can individually
configure their users and machines. This solution reduces the web
infrastructure cost for individual machine builders and OEMs, and
can spread the cost over several machine builders.
20 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 3-2: Ewon’s defense-in-depth strategy.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
authorized devices on the LAN. Specific controls include four
key aspects:
22 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
• High: Access to only explicitly listed Ewon LAN-connected
devices; port restrictions are also possible.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Talk2M network infrastructure: Ewon regularly assesses
the Talk2M architecture as part of its risk management
framework. Appropriate controls are implemented for
maximum security effectiveness and compliance with
applicable regulatory requirements.
Ewon is contracted with several hosting companies that
meet the following requirements:
24 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To provide the best possible business continuity, two service
offerings are available to customers:
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
SAVING THE WORLD — AND MORE
Thanks to Talk2M, users have avoided an incredible amount of
support site travel, saving massive carbon emissions by using
millions of VPN connections.
Ewon devices are currently used in 156 countries around the world
(see the figure in this sidebar).
Talk2M has even saved some marriages! Wonder how many? Check
out real-time facts and figures at www.talk2m-live.ewon.biz.
26 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Introducing Ewon Cosy (remote access
router)
Chapter 4
Understanding the Ewon
Remote Access Solution
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
How Ewon Cosy Works
The Ewon Cosy router establishes a secure virtual private net-
work (VPN) connection from the machine to anywhere via Ewon’s
cloud-based remote connectivity solution, Talk2M (see Chapter 3).
The router seamlessly communicates on the local area network
(LAN) with the PLC and the HMI, using either an Ethernet four-
port switch, a universal serial bus (USB) link, or a serial link (for
legacy PLCs with serial ports). On the machine side, an Ewon Cosy
must to be installed and will be connected to a PLC, an industrial
PC, or any automated device. Together, the solution allows remote
connection with a PC, laptop, tablet, or smartphone.
28 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
On the user side, you simply install a client software application,
called eCatcher, on a PC running Microsoft Windows. eCatcher
establishes a VPN connection over the Internet between your PC
and Talk2M.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
different speeds (3G, or 4G), but signal coverage may be
limited or unreliable in some remote areas. Also, data usage
charges on a cellular network can be very high and cellular
technology — for example, Code Division Multiple Access
(CDMA) and Global System for Mobile Communications
(GSM) — varies around the world, potentially requiring
different Subscriber Identity Module (SIM) cards to be
installed in the machine routers. LAN or Wi-Fi connections
are typically preferred if they’re available.
30 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Connecting the User to Talk2M
When the user starts the eCatcher software on a PC, the first step
is for the user to authenticate himself or herself using the follow-
ing information:
After authentication, you can access a list of all the Ewon devices
registered to an account. The Ewon list provides the following:
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
When you click on any Ewon device listed, if its connection status
is marked “Online” (meaning a VPN connection is up and run-
ning), eCatcher creates a VPN tunnel to the assigned Ewon device.
32 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
To reach the machine side of the Ewon, your PC needs to know
that all traffic containing a destination IP address in the Ewon
LAN IP address range should be forwarded through its virtual
interface. To allow this, eCatcher automatically adds a route when
a VPN connection is opened and automatically deletes the route
when the VPN connection is closed, as shown in Figure 4-3. The
eCatcher software knows the Ewon’s LAN IP address because it
is provided when each Ewon registers itself in a Talk2M account.
If you want to connect to another Ewon, eCatcher automatically
deletes the previous route and adds a new route with the appro-
priate destination address range.
On the machine side, the traffic coming through the VPN tunnel is
forwarded to the LAN (machine) side of the Ewon automatically.
For a machine on the LAN side to communicate back to the PC,
you have two options:
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Capabilities of the Ewon Flexy include
34 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
»» Talk2M API: Employ the API for enterprise integration of
third-party software and cloud solutions (for example, Ewon
IIoT Partners, Amazon Web Services, Microsoft Azure,
Siemens MindSphere, IBM Bluemix, and others).
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Sealing the deal for manufacturing
Chapter 5
Exploring Remote Access
Success Stories
Manufacturing
Based in Chicago, MAAC specializes in manufacturing thermo-
forming machinery and other companion products. MAAC prod-
ucts are used around the world and serve many industry sectors,
such as aerospace, medical, and automotive.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
The secure VPN connection that Ewon technology provides offers
full integration of IT security standards. Ewon’s unique remote
access solution allows MAAC to connect to machines in the field
with the same ease and flexibility as a machine in the company’s
shop.
38 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
equipment racks). The structure works online and can provide
remote supervision of the machine to the operator through a
secure VPN connection.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
traveling can be better used by our people and downtime at our
customers is very expensive. Further, we often encounter issues
where the customer has a difficult time describing the exact
nature of the problem.”
Cyclotron Machines
IBA develops high-precision solutions for the diagnosis and
treatment of cancer — for example, cyclotrons. IBA selected Ewon
and Talk2M technology to deliver remote service on a global scale.
Faults are resolved for the customer from the control room based
on the information provided by the status of indicator lights and
the displays. “However, the information escalated from the con-
trol room is very fragmented,” stressed Delcour. Before using
Ewon, when a problem occurred, the customer’s operator had to
call an IBA hotline.
40 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
IN THIS CHAPTER
»» Creating and configuring your Talk2M
account
Chapter 6
Five Easy Steps to
Get Started with
Ewon Cosy
If you don’t yet own an Ewon Cosy, but are looking to get one,
please visit www.ewon.biz/contact to find a distributor in your
area/country.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
2. On the login page, create your account by clicking Create
a Free+ Account.
Create a unique account name, provide your name and email
address, and create a password. You also need to activate
your account by clicking the link sent to your email address.
Click Check Availability to verify that you have selected a
unique account name.
3. Log in to eCatcher and add your Ewon by clicking the Add
button.
This step is shown in Figure 6-1.
Proceed by following the “Launch Setup Wizard.” Select your
Ewon Cosy version (Ethernet, Wi-Fi, or Cellular) and fill in the
additional information. At this step, you have the chance to
change the LAN IP address (default 10.0.0.53) and set the
WAN for DHCP or a static IP address. When prompted, insert
a USB flash drive/SD card to save the configuration. After
you’ve finished, close the eCatcher application.
42 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 6-2: Identifying the WAN port on your Ewon.
When the PWR LED is green and the USR is blinking green, as
shown in Figure 6-3, insert your configured USB flash drive/
SD card into your Ewon Cosy. The USR LED will begin a fast
blinking orange pattern, indicating that a valid file configura-
tion has been detected.
FIGURE 6-3: The LED pattern when you plug in the USB and the file is
successful.
After the USR LED turns solid green, the file has been
successfully loaded. You can remove the USB stick or the
SD card, and your Ewon Cosy will now reboot. If the USR LED
turns red, you have an error in your configuration. These
patterns are shown in Figure 6-4.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
FIGURE 6-4: Wait until the USR LED becomes fixed green (success) or red
(error).
FIGURE 6-5: The Talk2M LED is lit up, indicating the configuration process is
complete.
44 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Glossary
2G: Commercially introduced in 1991 and based on GSM, the second
generation of wireless telecommunications technology enabled digital
data services for mobile, notably SMS text messages. See also Global
System for Mobile Communications (GSM) and Short Message Service
(SMS).
Glossary 45
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
certification authority (CA): An entity that issues digital certificates
and certifies the ownership of a public key by the subject named on the
certificate.
46 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
firewalls are frequently used to prevent unauthorized Internet users
from accessing private networks connected to the Internet.
Glossary 47
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
machine-to-machine (M2M): Wired or wireless communication that
occurs directly between two devices.
48 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
ping: A software utility used to test the reachability of a host (such as a
device or machine on an IP network).
Glossary 49
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Short Message Service (SMS): A text messaging service.
50 Secure Remote Access for Industrial Machines For Dummies, 2nd Ewon Special Edition
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
wide area network (WAN): A telecommunications or computer
network that extends over a large geographical distance.
Glossary 51
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
Notes
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
These materials are © 2020 John Wiley & Sons, Ltd. Any dissemination, distribution, or unauthorized use is strictly prohibited.
WILEY END USER LICENSE AGREEMENT
Go to www.wiley.com/go/eula to access Wiley’s ebook EULA.