You are on page 1of 1

Serial Port

(RS232/485)

Fieldbus
Connection

Ethernet
Connection
Through an
intermediate
computer
Training

Figure 4.3b
Respondents indicated a variety of device connectivity methods in use today.

If not directly connected to the device, you may need to


determine if you are connected to the correct device.
Verification that you have connected to the right device can be challenging.
Several methods include localized physical verification along with two-
level verifications. If the device can provide unique identifiers such as the
serial number or MAC address, this can provide a way to ensure the correct
device has been selected. If the device can provide this data over the
communication link, it eliminates manual inspection. If this is not available,
then communication with a local resource may be required.

It will be important to use a unique identifier that is difficult to change.


Using names can make it easy to locate a device but may not be as secure
when connected to networks. There are instances in which a name was used
for verification, however a device with the same name was used in another
location. If corporate networks are used, this can create issues. Additionally,
devices with a physical (24V DC) input can provide additional security
by ensuring the correct device or machine is the one connected via VPN
through a tunnel established by the device’s input. This requires someone to
be at the physical machine to enable the tunnel.

2021 I Practical Guide for Remote Access to Plant Equipment 52

You might also like