Appendix B: Connection of the Data Logger to Internet
Ta treść nie jest jeszcze dostępna w Twoim języku.
Requirements for Internet Connection
Section titled “Requirements for Internet Connection”For connection of the data logger to Internet, use the following recommendations:
- Obtain a dedicated line with a static IP-address from internet provider (further referred to as “provider”)
- Inform the provider about the MAC-address of the data logger
Router Configuration
Section titled “Router Configuration”At connection of the data logger via a router (routing gateway):
-
Connect the provider’s cable to the router’s WAN slot (usually with a color indication without number, depending on the router manufacturer the indication can differ – see the router documentation)
-
Use the Ethernet cable supplied with the data logger for connection of the data logger to the router
-
Guided by the router manual, adjust the router for connection to Internet network according to the provider’s recommendations
-
In the router settings, switch on the port forwarding of incoming packages to the IP-Address of the data logger (factory setting – 192.168.0.2)
Accessing the Data Logger Remotely
Section titled “Accessing the Data Logger Remotely”At addressing the data logger in Internet network, you should use the IP-Address obtained from the provider (your static public IP address).
Common ports used by RPM-416:
- HTTP (Web-interface): Port 80 (default)
- Modbus TCP: Port 502 (default)
- FTP: Port 21 (default)
Configure your router to forward these ports to the data logger’s internal IP address (192.168.0.2).
Security Considerations
Section titled “Security Considerations”Security Recommendations
Section titled “Security Recommendations”- Change default passwords – Update the default “admin” password to a strong, unique password
- Use a firewall – Configure your router’s firewall to only allow connections from known IP addresses
- VPN connection – Consider using a VPN for remote access instead of direct internet exposure
- Regular monitoring – Monitor access logs for suspicious activity
- Keep firmware updated – Install firmware updates when available