Edge Devices come as part of the machines. They are attached to a machine and runs its own firewall software, to restrict traffic from/to the local network. In addition to using the local network, Edge Devices can also establish their own wifi network to easily integrate additional wireless equipment.
Integrating the symmedia Hub platform into an existing IT infrastructure
In order to make the most of the symmedia Hub features, it is important to make sure that the technical requirements regarding network connections are met.
In this section we assume, for the sake of simplicity, that the organization using the symmedia Hub has split its networking into (at least) two network segments:
The organization’s office network
The organization's machine network
Office Network
- The office network is assumed to contain all office computers that are run outside of the shopfloor (i.e. management, sales, procurement etc.).
- The primary use case of the symmedia Hub is assumed to be using the portal app to i.e. track Service Cases, upload and maintain machine documents etc.
- It is assumed that a general access to the internet is possible and that no URL restrictions are in place (through i.e. proxy or firewall rules).
Please consult the table below to make sure that all required URLs are reachable from the computers in the office network that need to access symmedia Hub’s portal application.
Machine Network
The machine network is assumed to contain all the OT equipment on the shop floor (HMIs, Edge Devices etc.). It is further assumed that additional restrictions are in place that limit the kinds of network traffic to and from the network.
Firewall Configuration
The Edge Device requires connectivity to the internet, in order to establish a connection to the symmedia Hub’s cloud platform.
Endpoint | IP address | Port / Protocol | Description |
---|---|---|---|
20.31.126.39 | 22552 | Unify STAGING | |
20.76.82.231 | 22552 | Unify PRODUCTION | |
20.76.82.231 | 443 | certificate provisioning on PROD | |
20.76.82.231 | 443 | certificate provisioning on STAGING | |
20.43.44.164 | 443 | Fallback Azure | |
20.43.44.164 | 5671 | Fallback Azure | |
20.43.44.164 | 8883 | Fallback Azure | |
8.8.8.8 | 8.8.8.8 | ICMP | Internet connectivity check ICMP |
8.8.8.8 | 8.8.8.8 | 53 | Fallback DNS used by Docker |