Industrial security routers enable secure, reliable and location-independent communication between machines and systems as well as application-specific segmentation to secure the network. They contribute to the optimization and security of network operation.
Our routers with integrated firewall and VPN technology are ideally suited for secure remote access to components and systems in remote networks. They have either a wired or mobile internet connection and support the u-link remote access service. This means that remote access systems can be set up quickly and easily without specialized IT knowledge. The industrial routers are designed for use in industrial environments, i.e. they are robust, shockproof and temperature-resistant. They fulfill the highest requirements for reliable and flexible industrial Ethernet communication.
Industrial routers enable, among other things: Integration of subnets, network connection with static and dynamic routing, increased network security, network segmentation, multiple network interfaces, protocol support, secure remote maintenance and DMZ setup.
Shape the future with industrial security routers from Weidmuller.
With firewall, VPN and extensive network segmentation – all in one device
Scalable from pure remote access to modular system networks
Layer 2 and 3 Stateful Packet Inspection Firewall – Offers extensive functions to make networks secure
The remote maintenance of machines and plants is often complex and time-consuming. A targeted and safe functional connection to the associated IT systems is also essential.
For many users, these two issues make connecting plants around the world a major obstacle.
With u-link software, remote maintenance is child’s play – easy – secure – efficient
Every production network is set up differently and every system has specific communication parameters. To ensure adequate cyber security, a network should be segmented with routers (and firewalls).
IP and port forwarding forwards data traffic from a specific IP address or port to another destination. This enables external access to internal services such as web servers or cameras behind a firewall or router.
Configuration:
(1) Access to the router: Log in to the router admin panel.
(2) Find port forwarding: Navigate to the port forwarding or NAT settings.
(3) Create rule: Enter the internal IP address, the external port and the internal port.
(4) Save: Confirm and save the configuration.
With Weidmuller devices, you can determine specifically which services are available where via an intuitive web interface.
Firewall or packet filter rules protect networks by controlling data traffic based on defined criteria such as IP addresses, ports and protocols. They prevent unwanted or harmful data traffic and only allow authorized connections.
Configuration:
(1) Access control: Determine which traffic should be allowed or blocked (inbound/outbound).
(2) Create rules: Define IP addresses, ports and protocols for each rule.
(3) Set priorities: Set rules in the order of their application.
(4) Monitoring: Check logs regularly to verify effectiveness and security. Make sure to create specific and precise rules to avoid security gaps.
With the Weidmuller routers, you can use an intuitive web interface to individually determine which communication is permitted.
1:1 NAT (Network Address Translation) assigns an external IP address to an internal IP address so that all data traffic for the external IP address is forwarded to the internal IP address. This provides a direct, transparent connection.
Port forwarding only forwards data traffic from certain ports of an external IP address to certain ports of an internal IP address. It enables access to specific services such as web servers or cameras behind a router or firewall.
Difference: 1:1 NAT addresses all connections, while port forwarding is configured for specific ports and services.
The Weidmuller routers offer both functions so that you retain full flexibility.
Static routes are required to direct data traffic via specific network routes if automatic routing protocols are not sufficient or if specific network paths are required. They are useful for defining customized routes and efficiently controlling network traffic.
Configuration:
(1) Access: Log in to the router or firewall.
(2) Add route: Go to the routing settings and add a new route.
(3) Target network: Enter the target network address and the subnet mask.
(4) Gateway: Define the IP address of the next router (gateway).
(5) Save: Accept and save the configuration.
In addition to static routes, Weidmuller routers also offer dynamic routing protocols such as OSPF or RIP.
Customer Service - USA
Technical Support - USA