我們的品牌

Impact-Company-Logo-English Black-01-177x54

歡迎造訪施耐德電機全球網站

歡迎訪問我們的網站
		
我们今天能为您提供什么帮助?
Firewall Configuration to Allow Server-Server Communications

DISCLAIMER

The example below is intended to demonstrate one or more features or methods and is presented as a configuration example only. Schneider Electric assumes no liability for the use or application of this example or any portion thereof.



On a redundant system (Hot-Standby, Triple Standby, with or without Permanent Standby servers) you need to configure the firewall so that it allows connections to be made between the partner servers. Before showing which ports are used in such connections, let's talk about how the "Server to Server" connections are established.

Server to Server connections



For all non-web client applications, a connection to a server is established like this:

  • The currently main server makes a connection to the partner server by creating a connection to the partner's incoming port (port 5481 by default, see below). The main server uses this connection to send information to the partner server including, for example, synchronization of data and configuration.
  • Standby servers make connections to the main server by creating a connection to the main server's incoming port (5481 by default, see below). The standby server uses this connection to send requests such as control requests and proxied actions.
  • ClearSCADA servers will check the status of their partner servers by establishing a connection to their standby servers on the partner's incoming port (5481 by default, see below).
  • ClearSCADA servers will check the status of their partner servers' hardware by performing an ICMP poll. This is designed to check for hardware failure of the partner device of intermediate network infrastructure.

Firewalls must be configured to allow ClearSCADA partners to establish connections on the incoming port (5481 by default, see below) and to perform ICMP polling.

NoteAs DMZ Permanent Standby Server are designed not to perform controls or proxied actions on the server, they do not establish links from the DMZ Permanent Standby Server to the main server. They also do not perform ICMP polling of the main server. As such firewalls must allow traffic on the incoming port (port 5481 by default, see below) and via ICMP from the Main to the DMZ standby, but not the other way around.


Summary of Port Usage



The table below shows which ports are used by the server (by default). The information is categorized under these headings:

  • Protocol - Indicates the protocol used by the port (TCP, UDP or ICMP)
  • Port(s) - Shows the port or ports that are used by the server. The table shows the numbers for the default ports (you can configure your system to use different ports)
  • Incoming Connection - Indicates the component that receives the connection request
  • Outgoing Connection - Indicates the component that attempts to open the connection
Protocol Port(s) Incoming Connection Outgoing Connection Description
TCP5481 by defaultMain, Standby and Permanent Standby ServerPartnerUsed for sending synchronization data from main to standby, for proxying controls and other actions from standby to main and for checking the status of partner servers. This port number can be configured under the Server Configuration's Global Parameters -> Advanced
ICMPN/AMain, Standby and Permanent Standby ServerPartnerUsed for checking the status of partner server hardware

施耐德電機Taiwan

探索更多
產品:
探索更多
產品:
  • 產品文檔
  • 軟體下載
  • 產品選型工具
  • 產品替代和替換
  • 幫助和聯絡中心
  • 尋找我們的辦公室
  • 取得報價
  • 施耐德電機社群
  • 人才招募
  • 公司簡介
  • 舉報不當行為
  • 無障礙
  • 新聞中心
  • 投資者
  • 專業洞察
  • 台灣施耐德電機學院
  • 綠色影響力落差調查
  • Schneider Go Green 2025
  • 隱私政策
  • Cookie通告
  • 使用條款
  • Change your cookie settings