Ixon - IXRouter

Ixon - IXRouter
Brand: Ixon
Product Code: IX2102
Availability: Call for P&A - 03 9544 0733
List-Price: AU$0.00
   - OR -   

Safe hardware

Keep your PLC and HMI out of harm's way.

The IXrouter is installed between the machine network (LAN) and the factory network (WAN). By default, the IXrouter is configured so that no communication is possible between the LAN and WAN side of the IXrouter. This network separation ensures that users with remote access can only access the LAN side of the network and not the rest of the network.

Our hardware uses the OpenWRT operating system, which has been specifically designed for routers. This Linux-based operating system is open source and is well-known worldwide for it's strong security and comprehensive firewall.

Access and permissions

The IXplatform features a powerful user management system. With a single click, users can be invited to access a particular machine. To keep the overview you can organize your devices into categories and manage users by creating user groups. A company account can have one or more administrators, who are permitted to change permissions for other users.

Events

Events like user invitations, configurations changes and connections to devices are all logged and can be viewed later on.

Remote access on or off?

If you need complete control over the accesibility of your machine the IXrouter can be extended with a switch that allows you to either enable or disable remote access manually with the flick of a switch.

Encryption

To communicate with the IXplatfrom, the IXagent (integrated into the IXrouter firmware) uses the proven encryption standard SSL / TLS. The required TLS key exchange, crucial for security, is done in accordance with the industry standard 2048-bit RSA with SHA-256. During the RSA handshake the public server keys are shared, with IXON's built-in Certificate Authorities the server's identity is verified. The IXagent does not use 3rd party Certificate Authorities which guarantees an up-to-date security for embedded devices. When setting up a VPN tunnel, the necessary security licenses are downloaded and the Blowfish or AES encrypted VPN tunnel is set up. Attacks like Man-in-the-middle, spoofing ARP and DNS hijacking will be detected immediately.