9security – ProSoft Technology ProSoft i-View User Manual
Page 81

ProSoft i-View ♦ Mobile Process Monitoring and Control Application
Security
Version 2.0.2
User Manual
ProSoft Technology, Inc.
Page 81 of 106
September 29, 2011
9
Security
In This Chapter
Validation Codes ................................................................................... 81
Background Task Processing ................................................................ 84
ProSoft i-View networking security is based on TCP/IP technology and depends in part
on the security features available in the router installed at the PLC location.
For local connections through WiFi, security is provided by the wireless network security
protocol in use. WPA and WPA2 with a strong password is the recommended security
protocol.
For remote connections, an iPhone or iPod touch is able to make use of secure data
tunnels by enabling VPN. If your router supports L2TP/IPSEC or PPTP, then you will be
able to create this kind of connection. Most medium to high-end DSL or Cable routers
support at least PPTP. VPNs Client connections are configured on the iPhone with the
General Settings App.
Some routers can be loaded with a SSL certificate and be configured to bridge incoming
SSL requests from the WAN to unencrypted TCP on the LAN side. ProSoft i-View
supports TLS-SSL encryption. You can activate TLS-SSL in ProSoft i-View to provide
communications confidentiality if your router supports SSL/TCP bridging.
For most protocols, ProSoft i-View provides an independent way to protect users from
undesired access by persons using uncontrolled ProSoft i-View copies. This is done by
setting a Validation Code both in the PLCs and ProSoft i-View which will prevent ProSoft
i-View from accessing PLCs unless both codes match. The next section describes
validation codes and how you can set them.up.
Finally, physical access can compromise security. It is relatively easy for an unauthorized
user to gain physical access to a device and run a remote monitoring application. To
prevent this from happening, ProSoft i-View's user accounts provide password-based
security. If you turn OFF the A
UTOMATIC LOGIN
switch in the ProSoft i-View Settings tab, a
password key will be requested each time the application is launched. Furthermore,
Apple provides a service for blocking lost or stolen devices so that no one is able to
access data or execute apps in them until the real owner reactivates them.
9.1
Validation Codes
For Allen Bradley EIP/Native and EIP/PCCC, ProSoft i-View requires a password code to
be held by the PLC, which is queried on each connection. This password must be stored
in your PLC as a 16-bit hexadecimal value (0 to FFFF) and must match the value
specified in Validation Code for connections to that PLC. In most cases, this security
measure alone is enough for simple applications.
Validation Codes are stored in PLCs in the following memory address or tag depending
on protocol.