Assuming you have these things in place, let’s go ahead and walk through how to remotely access a PLC. The first step is to open up the communications software that you are using. In this example, we will be using RSLinx Classic. Once RSLinx is open, go ahead and click on the “Configure Drivers” button near the top of the screen:
On the next screen, make sure that “EtherNet/IP” is selected from the “Available Driver Types” list on the left side of the window. Then, find your specific PLC brand in the list of “Selectable Devices/Pools” on the right side of the window and select it:
Click “OK” when prompted about connecting to remote devices through Ethernet hub or switch. On rare occasions it may be necessary add an entry into your hosts file for this particular device; however, most times this isn’t necessary so we’ll skip over that part here. You should now see your newly added driver appear in RSLinx under comms Setup > Driver Selection:
If everything looks good up to this point, go ahead and click ‘Yes’ when prompted if want RSLinx classic start automatically scanning for new devices every time it starts up:
exit out of this window by clicking ‘OK’. Now that our driver is setup correctly within RSLinx Classic we can finally add our remote device! Go ahead and click on File > Configure Remote Devices from within RSLinx Classic:
this should bring up another window titled ‘Remote Device Manager’:
go ahead and press F5 or click on View > Refresh List from within this window until you see your newly added driver appear in blue text under Available EtherNet/IP Networks like so:
Select one more time (or double-click) on available network containing name of newly added driver which in our case would be ‘NIOT-ETH0208’. This should bring up yet another window called ‘Remote I/O Scanner Configuration’. Press F5 or click View > Refresh List again until you see all targets associated with selected network appear as green checkmarks indicating they are online like so (assuming all applicable industrial controllers associated with selected network happen be turned):
Exit out this window by clicking OK then select all online targets Check boxes except Default Gateway then press Add Selected Targets button followed by Close button get back main Remote Device Manager Window which should look something like following at bottom after adding various online targets one or more networks :
Finally select radio button next Serial Portplant Controller project close Remote Device Manager Window restart any Studio 5000 Logix Designer projects might currently have opened re-open project navigate offline tree controller project find fieldbus objects Node tab configure each object contain information required communicate specific target device created above specified EtherNet/IP Adapter ring adapter going mapped port number 0 slot number 2 fault tolerant not checked NOTE could also alternatively other type fieldbus object such Ethernet Modbus TCP§ Rockwell Automation Industrial Control Technical Information Center website $000293534Choose Add New menu item drop down menu displays dialog box allows creation properties node There many different ways create nodes property fields completed indicate syntax assigned node profile PROXY_SERIALization Protocol Event Buffers Read Model NVM Polled IO Database Memory Motion Safety$ Source $ A如何远程访问PLC？要想远程访问PLC，首先你的电脑上必须安装相应的软件，其次必须为PLC安装正确的驱动程序，最后你需要知道PLC的IP地址。 假设您已准备好了这些内容，我们来看看如何远程访问PLC。 第一步是打开您正在使用的通信软件。在本例中，我们将使用RSLinx Classic。打开RSLinx后，请单击屏幕顶部“驱动程序”按钮： 在下一个屏幕中，请从左侧“可用驱
1. From your laptop, tablet, or smartphone, connect to the internet using a cellular data connection or public Wi-Fi.
2. On your device, open the list of available Wi-Fi networks and select the name of your router. Enter the password for your network when prompted.
3. Once connected to your router, open a web browser and enter https://www.whatismyvpn.com/ into the address bar. This website will tell you what IP address has been assigned to your device by your ISP. Write this IP address down as you will need it later.
4a) If you are using Windows 10: On your taskbar, click the network icon (the one that looks like two computers with an arrow between them). A list of available networks will appear – hover over the one that says “Private Network” and click it; then click “Connect”. If prompted, enter in the shared key for your network and click “OK”. You should now be connected to your VPN! Skip to step 7 below.
4b) If you are using macOS: Click on the Apple logo in the top left corner of your screen and select “System Preferences”. In System Preferences, click on “Network”; then select the interface (with green text next to it) that represents your VPN connection – it will likely have the name of your provider in it such as “ExpressVPN” or something similar; finally, click “Connect”. You should now be connected to your VPN! Skip ahead to step 7 below.
4c) If you are using Linux: Open up a terminal window and type in `nmcli` – this stands for Network Manager Command Line Interface; press Enter. Type `help`and press Enter again; this will give you a list of all available commands within nmcliNow we’re going to use nmcli’s `connection` command which lets usManage network connectionsa perfect fit for our needs! To see more information about this particular command (and any other command), simply type in `connection [command] –help`, so for us that would look like `connection –help`. When ready, go ahead and type out`sudo nmcli connection up id “[name_of_your_vpn]” iface “[interface]”`, making sure tobetween double quotes around both ‘[name_of_your_vpn]’ placeholder (replacing [name_of_your_vpn] with actual Name given by Your vpn provider eg.”us936obfuscated”). So an example might look like sudo nmcli con up id “ExpressVPN Boston” iface “wlp3s0”’ wlp3s0 being my wifi adapter’. Replacenamewith whatever instead of yours given By vpn provider After execution You Should Be Connected To Vpn ! skip ahead TO STEP 7 BELOW
5) If none of the above applies to you or if you are still having trouble connecting: try contacting customer support from Your chosen vpn Provider They Would gladly help walk You through correct process OF Setting Up OR Troubleshoot any current issues BACK TO OUR REGULARLY SCHEDULED PROGRAMMING 🙂 . . .
6) Now That We Are All Connected To The Same Vpn let US go Ahead And Access It Remotely ShAll We ? following Steps Below :
7) Head Over Too https://dashboard.[YourVpnProviderDomainName].com & Log In With Credentials Given By Vpn Provider
8 ) Once Logged In , Navigate Too The Section Of The Dashboard That Says “Remote Users” Or Something Similar Where You Will Be Able To Add New Devices/Users etcetera **Follow Any Additional Instructions Given Here By Your Specific Vpn Provider As They May slightly Differ But For The Most Part They All Follow These Rough Guidelines**
9 ) Select An Appropriate Device Group under Which This New User/Device fall intogenerated list Of Local Networks & Subnets Or generate A Custom Policy With More Fine-tuning Options Available Optionally configure split tunneling policiesClick save changes at bottomWhen satisfied with settings generated fill out user details along with 2FA(two factor authentication) TokenIf Using RADIUS Authentication server Filling Only Username&Password Is Sufficient base SASL Security Settings Are PrepopulatedBut Can Be Customized per needs Algorithm used Is md5change only If Particularly preferred Default Connection Method set Is sslenter custom port number only IF differentthan 443 leave rest defaults Click Next When ReadyUser certificate not required but can be generated on demand OR imported from existing PFX Certificate Request format compatible With Microsoft Certification AuthorityIs also readable Offline Through Browser Intermediates&root CA certificates automatically downloadedIf Imported Manually Verify they Have proper read permissions applied before proceeding nextstep Verifying 200 OK HTTP Status Assigned Address Space check subnetaddresses againstRouting table verifythey match target remote notesdelete automatichostnames unless neededproxy configuration is optional download files section includes profile XML filesfor specific devices iOS & Android Profile Also Compatible With 3rd Party OpenVPN clientsample configurations provided AS wellFor Windows There already IS client side software no needto install anything else than what came bundledjust run executable fileAnd input login credentialsselect profileXML fileclick connectProblems establishing contact Check WAN firewall bookAnd opening correct portsUDP 500–1194TCP 443Verify server reachable internallyby pingingHostnameOr IpAddressassigned verifying DNSresolves correctlyErrors bootstrappingCheck event viewerfor problems during service startupCheck logs C:ProgramDataOpenVPNServiceslogs\debug
Setting up a VPN connection to your Synology NAS can be done in a few simple steps. First, you’ll need to create a new user account specifically for VPN access. Next, open the DSM (DiskStation Manager) web interface and go to Control Panel > External Access > VPN. Select OpenVPN from the list of available protocols and click ‘Create’.
Now enter a name for your new connection and fill in the required information such as server address, port number, encryption method, etc. You can also specify which users will have access to this connection by clicking ‘Permissions’. When finished, click ‘OK’ to save your changes.
The final step is to download and install the OpenVPN client on your computer or mobile device. Once installed, launch the client and enter the same login credentials that you used when creating the user account earlier. After connecting successfully, you should now be able to access your Synology NAS as if you were on your local network!
Thank your for reading!