- People, technology, and operating methods
- TCP session modelling
- Being able to create and deploy the devices acting as dual-homes in a specific network
- Building logical networks that share the same physical infrastructure
- Allowing DCOM traffic to cross the firewall
- Tunneling the DCOM traffic through TCP and putting the external OPC Proxy in a DMZ
- Using the OPC-UA security model
..................Content has been hidden....................
You can't read the all page of ebook, please click
here login for view all page.