Authentication
All incoming data traffic is monitored and checked. As IP addresses can be falsified (IP spoofing), checking the IP address (of the client access) is not sufficient. In addition, Client PCs may have changing IP addresses. For this reason the authentication is performed by means of tried and tested VPN mechanisms.
Data encryption
Secure encryption is necessary to protect data communication from espionage and manipulation. This means that the data traffic remains incomprehensible to any eavesdropper in the network. To this end, the SOFTNET Security Client sets up VPN tunnels based on IPSec to other SCALANCE S security modules.
Performance data
System requirements (please note the descriptions under "Ordering data"):
Windows 7 Professional or Ultimate 32/64-bit
Windows XP Professional (32-bit) + SP3
Configuration
Using the associated configuration tool it is possible to handle setup and administration of security rules even without special IT knowledge. In the simplest case, only the SCALANCE S modules or SOFTNET security clients that are to communicate with one another are set up and configured. As soon as the SOFTNET Security Client knows the programmable controllers to be accessed, communication can be established.