SMG-1100/6100 User’s Manual

2021-07-26
●Introduction:
Thank you for using Moxa’s SMG-6100 IPSec Gateway and SMG-1100 MODBUS Gateway. These products help you easily establish the secured network communication with the IPSec protection and the protocol conversion between MODBUS/Serial and MODBUS/TCP. In this manual, you will learn how to configure and monitor theSMG-6100 and the SMG-1100 for your network communication.
The following topics are covered in this chapter:
■Overview
■Introduction to IPSec VPN Connectivity
▲IPSec VPN Requirements
▲Typical IPSec VPN Scheme
▲Planning IPSec VPNs
▲Configuring IPSec Tunnels
■Introduction to MODBUS Gateway
▲MODBUS Gateway Applications
▲MODBUS TCP Master
▲MODBUS RTU/ASCII Master
▲Managing MODBUS Gateway
■Overview:
The SMG-6100 can be used as a smart gateway with sophisticated Machine-to-Machine solutions to help construct a tunnel server (IPSec) and bi-directional IP communications. When used with Moxa’s SMG-1100, the SMG-6100 can serve as a secure networking host over IPSec to back-end host computers and MODBUS TCP Master/Slave devices.
In addition, the SMG-1100 features 2 software selectable RS-232/422/485 ports, 1 Ethernet port, and quad-band GPRS/EDGE 900/1800/850/1900 MHz for cellular communication.
The SMG-1100 series provides a sophisticated wireless M2M solution for distributed MODBUS devices. Implemented with protocol conversion functionality, the SMG-1100 can serve both serial masters and slaves and the built-in IPSec function guarantees that data transmission is encrypted in a wireless connectivity environment.
■Introduction to IPSec VPN Connectivity
This section describes how to use and manage IPSec VPN on the SMG-6100.
▲IPSec VPN Requirements
The following requirements must be met to use IPSec VPN on the SMG-6100:
You must have a fixed public IP address accessible to the Internet.
You must have a computer running Device Configuration Gateway (DCG) and SMG Manager to set up and monitor IPSec VPN for the SMG-6100.
▲Typical IPSec VPN Scheme
An SMG-6100 acting as an IPSec VPN gateway can create multiple IPSec VPN tunnels between its VPN subnet interface and remote mobile SMGs via the Internet. An IPSec VPN tunnel is created between the remote SMG-1100s and the SMG-6100. Computers on the same VPN subnet as the SMG-6100 can securely and mutually communicate with remote mobile SMGs via IPSec VPN tunnels.
▲Planning IPSec VPNs
The IPSec tunnel provides mobile operators with an independent solution that considers remote mobile SMGs part of the internal intranet, allowing several remote mobile SMGs to be implemented on the same subnet. In the example illustrated below, the SMG-1100 is assigned the IP address of 192.168.30.95 during LAN 1 port network configuration. After it is deployed to the remote site, its IP address does not need to be changed. This is convenient as it allows administrators to configure programs such as SCADA and remote device monitoring at the local field site with a fixed IP address.
▲Configuring IPSec Tunnels
To set up IPSec tunnels between the SMG-6100 and the remote mobile SMG (the SMG-1100), refer to the VPN(IPSec)section in the SMG Manager chapter of this manual. We strongly recommend that IPSec tunnels be configured from the SMG-6100 and deployed to the SMG-1100 at the same time via SMG Managerat the local site. When finished, the SMG-1100 can be moved to the remote field site.
■Introduction to MODBUS Gateway
The Moxa SMG-1100 is a secure mobile MODBUS gateway that provides IPSec tunnels between itself and the peer IPSec Gateway SMG-6100 via the Internet while transferring MODBUS messages. It features two RS -232/422/485 serial ports, one 10/100 Mbps Ethernet port, and a GPRS/EDGE wireless module for mobile connections.
▲MODBUS Gateway Applications
▲MODBUS TCP Master
In the MODBUS Gateway configuration for a MODBUS TCP master and MODBUS RTU/ASCII slave, programs running on the MODBUS TCP master can securely send MODBUS TCP request messages via the Internet to the MODBUS TCP slave. The MODBUS Gateway then sequentially converts MODBUS TCP request messages to MODBUS RTU/ASCII messages and sends the request messages to connected MODBUS RTU/ASCII slave devices through the serial port, based on specified slave ID values in the MODBUS request messages and settings in the MODBUS Gateway. When the slave devices receive MODBUS RTU/ASCII request messages, they reply with MODBUS RTU/ASCII response messages to the MODBUS Gateway. Once the MODBUS Gateway receives MODBUS RTU/ASCII response messages, they are converted to MODBUS TCP response messages and sent to the corresponding programs of the MODBUS TCP master.
▲MODBUS RTU/ASCII Master
In the MODBUS Gateway configuration for a MODBUS RTU/ASCII master and MODBUS TCP slave, the software running on each MODBUS RTU/ASCII master device sends MODBUS RTU/ASCII request messages to the MODBUS Gateway via its connected serial port. The MODBUS Gateway then converts the messages to MODBUS TCP request messages and securely sends them to MODBUS TCP slaves in MODBUS TCP slave devices via the Internet, based on slave ID values in the MODBUS request messages and settings in the MODBUS Gateway. After the slave devices receive MODBUS TCP request messages, they reply with MODBUS TCP response messages to the MODBUS Gateway. Once the MODBUS Gateway receives MODBUS TCP response messages, they are converted to MODBUS RTU/ASCII response messages and sent to the corresponding MODBUS RTU/ASCII master device.
▲Managing MODBUS Gateway
After the MODBUS Gateway application for each serial port is determined, the configuration of MODBUS Gateway can be set up via SMG Manager. Refer to MODBUS section for detailed MODBUS Gateway configuration instructions.

Moxa

SMG-1100SMG-6100

More

Part#

MODBUS GatewayGateway

More

More

User's Guide

More

More

Please see the document for details

More

More

English Chinese Chinese and English Japanese

January 2011

First Edition

5.8 MB

- The full preview is over. If you want to read the whole 43 page document,please Sign in/Register -
  • +1 Like
  • Add to Favorites

Recommend

All reproduced articles on this site are for the purpose of conveying more information and clearly indicate the source. If media or individuals who do not want to be reproduced can contact us, which will be deleted.

Contact Us

Email: