Remote Maintenance Service

The Brightlayer Remote Maintenance service enables user to set up and securely manage remote maintenance groups. The service allows to establish and control VPN connections between Gateway devices and Users.

Overview

Note: At a time, one GW device can only be connect to one User device.

One RM Service consists of a group of GW devices, User Devices and their connections.

Users could have access to several RM services. So user can see the Gateway devices, User devices and Connections associated with a RM Service by selecting it in dropdown.

The following sections will walk you through all functionalities of the Remote Maintenance service. For your convenience find an overview on the content of this document below.

SectionContent
Accessing the Remote Maintenance serviceActivate single sign on feature
Managing gateway devicesAdd GW devices to RM service, Special settings for Gateway devices
Managing user devicesAdd user device, OpenVPN Client for remote maintenance and connect to a GW device, Configuration Files for the OpenVPN Client, delete the User Device
Managing connectionsConnection status of Gateway device, User Device and Connections

Accessing the Remote Maintenance service

When a Remote Maintenance service has been added to a subscription and users have been given access rights to it. Each user needs to activate the single sign on feature for this service:

When clicking on “Remote Maintenance” in the main drawer for the first time users would only see the “activation” icon in the main window.

Clicking on this icon will bring the user to an OpenVPN registration page where he has to simply click on Single Sign On (SSO) button.

Upon successful authorization, the user is enrolled in the RM Service, and upon refreshing the portal main window page, they get access to the Remote Maintenance Page.

When the RM service is created, it contains at least one Connection by default.

One connection in the Brightlayer RM service is an end-to-end connection between a GW device and a User device. The Subscription Admin can add additional connections to the RM service (currently limited to three (3) connections).

Managing gateway devices

Adding GW devices to RM services

There are two (2) different options of adding a GW device to a remote maintenance service:

The subscriber has signed a Dashboard service

In this case it is recommended to create the GW device from an existing device in the Dashboard service.

If the device has not yet been created in the dashboard service it is recommended to create the device using the Device Configuration.

Afterwards dashboard device can be chosen from a list of existing devices in the Remote Maintenance service.

The subscriber has not signed a Dashboard service

In this case a new device would be created.

Important: Usually devices can be synchronized between the Dashboard services and the RM services. If devices are created only within the RM service (e.g. because the subscription has not yet signed a Dashboard service) there are restrictions that have to be considered:

Special settings for Gateway devices

Tick box: Allow embedded IP:

When Allow Embedded IP is active for a gateway then devices in the gateway’s local network can accessed from the User via the remote maintenance connection. To access such a device, the IP address of the device needs to be known. The URL that needs to be entered into the browser to access the device is the following: 

URL to access the device .. 

Example: “192-168-20-2.mygateway.rm.machinery-monitoring.com” 

Tick box: Allow Gateway Device to establish TCP/UDP connection to User Device

The Allow Gateway Device to establish TCP/UDP connection to User Device option controls if a device in the Gateway’s local network can establish a payload connection to a User Device. Payload connection here means any TCP/UDP connection within the already established VPN tunnel. i.e. this option has no influence on the VPN tunnel direction and/or who can establish the tunnel.

  

If the Allow Gateway Device to establish TCP/UDP connection to User Device option is not activated then a connection can be established 

The firewall on the VPN server will recognize that a connection is initialized and will block it. 

If the Allow Gateway Device to establish TCP/UDP connection to User Device option is activated then a connection can be established 

Security Note

It should be noted that for security reasons the option Allow Gateway Device to establish TCP/UDP connection to User Device should only be added when really required for the communications intended. 

FTP Connection

Active FTP communication require the Allow Gateway Device to establish TCP/UDP connection to User Device to be set for a successfull communication. Passive FTP communication will not work regardless of whether this option is used, due to the way how Passive FTP protocol establishes the data connection.

Gateway service restriction

For all new Gateway device that are added it is possible to restrict the access to certain Eaton tools that may be installed within the application. 

Gateway Configuration

Network Topology

GW configuration can be done in 2 ways:

  1. Import Configuration on Gateway

  2. Manual configuration

1. Import Configuration on Gateway

  1. Download: nubisnet_config.cup

  2. Upload .cup file on Nubisnet portal:

  3. Password for .cup file is Nubisnet12!@

  4. Update MQTT message:

    a. Open NubisNet web configuration tool and enter credentials

    b. Navigate to Settings section, select Settings tab → PLC → Messages

    c. In the Receive messages section, click on Edit button and fill out the form with following values to create the MQTT (Un)Connect message.

    NameValueComment
    Active<TRUE>Keep it as is.
    Channel - Topics/dsKepp it as is.
    Channel - Text511,<DEVICE_NAME>,"{"id":"<DEVICE_ID>","etn_openvpn":{"connect":{"value":%vpn_connect%}}}"With <DEVICE_NAME> the name of the device in the device name field on device configuration page.
    With <DEVICE_ID> the ID of the device in the device id on device configuration page.
  5. To update MQTT connection setting see Configure Mqtt Messages Client.

  6. To update OpenVpn connection settings see Configure OpenVPN Client.

2. Manual configuration

Configure OpenVPN Client (Un)Connect Signal Processing

Create OpenVPN Connection State Variable

This section creates PLC boolean variables. The following table describes the variables

NameDescription
vpn_connectThis variable stores the current connection state which the OpenVPN client should have. A value of 1 means the OpenVPN client should connect to the server, a value of 0 means the OpenVPN client should disconnect from sever.
vpn_runningThis variable is 1 when the OpenVPN client is running, 0 otherwise.
vpn_connectedThis variable is 1 when the OpenVPN client is connected to the server, 0 otherwise.

Create the variable by applying following steps

Create Receive MQTT Messages

Setup PLC Program

In above diagram Recv Msg 9 is the MQTT (Un)Connect message. Send Msg 2 and Send Msg 3 are the Confirm Command Received and Confirm Command Successful messages, respectively. The index of all three messages has to be adapted to the correct message index as defined in the MQTT messages list.

The upper part of the diagram takes care to acknowledge and returning successful processing of the receiving the MQTT (Un)Connect message from dashboard tenant.

Configure IP forwarding:
NameValueComment
Enable IP forwarding:TrueTo access network below the GW. IP forwarding should be enabled.

Configure OpenVPN Client

Configure Mqtt Messages Client

Managing user devices

All subscribers have the ability to create a user device within the RM service. However, each user can only have one user device created in any of the RM services they have access to. Additionally, a single user device in the RM service can establish a connection to only one GW (Gateway) device within the same RM service.

In the User Device tab the list of existing user devices in the respective RM service is shown. Four activities are possible in this tab:

  1. Add User Device button. Clicking on that button will open the Add User Device page.

    On this page a name has to be assigned to the User Device. Afterwards a user can be selected from the drop down User Name. This drop down would show the e-mail address of all users that have access to the service.

    After these fields have been filled in, the User Device can be added by clicking the Add button. 

  2. Download OpenVPN Client button. Clicking on this button will start a download of the OpenVPN Client application to the download folder of the computer. To utilize the remote maintenance feature and establish a remote connection to a GW device, you must install the client application. 

  3. In the context menu (3 dots) of each User Device the Configuration Files for the OpenVPN Client can be downloaded. After Download the Configuration files have to be uploaded to the OpenVPN Client that is installed on the computer of the User Device. 

  4. In the context menu (3 dots) there is also an option to delete the User Device

Managing connections

In all 3 tabs (Gateway device, User Device, Connections) the connection status is indicated behind each device or connection: 

Best Network Practices

Best practices to manage VPN

  1. Access Control: Implement strict access controls to restrict VPN access to authorized users or devices. Utilize robust authentication methods such as username-password pairs, digital certificates, or two-factor authentication (2FA) to ensure only legitimate users can establish VPN connections. This helps prevent unauthorized access to your network.

    Check regularly whether all users still have a legitimate interest in using the VPN network or whether, for example due to a change in the user’s tasks, an access right is no longer necessary or should be excluded. Consistently delete users with expired access rights.


    Access control is the first line of defense against unauthorized access to your network. By enforcing strong authentication, you ensure that only trusted individuals or devices can connect to your network through the VPN.
  2. Firewall Rules: Configure firewall rules on the VPN server to control incoming and outgoing traffic. Explicitly define what traffic is allowed and what should be blocked. Follow the principle of least privilege, allowing only the minimum necessary access to resources.


    Firewall rules act as a gatekeeper for your network, preventing unwanted traffic from entering and protecting sensitive resources. Properly configured firewall rules are essential to secure your network and VPN.
  3. Network Segmentation: Isolate the VPN network from other networks as much as possible. Avoid connecting the gateway machine’s network to other networks without appropriate network devices, such as firewalls, routers, or switches, to ensure proper isolation and security.


    Network segmentation helps contain potential threats within specific segments of your network, reducing the risk of lateral movement by attackers. Connecting networks without proper isolation can expose your entire network to vulnerabilities.
  4. Encryption: Implement strong encryption for data transmitted over the VPN connection. OpenVPN typically uses SSL/TLS for encryption. Configure encryption settings to use strong ciphers and key exchange methods to safeguard data privacy and prevent eavesdropping.


    Encryption ensures that data traveling over the VPN tunnel remains confidential and secure. It protects sensitive information from interception and unauthorized access.
  5. Logging and Monitoring: Set up logging and monitoring tools to track VPN traffic and server activities. Regularly review logs to detect and respond to any suspicious or anomalous behavior. Monitoring helps in identifying security incidents promptly.


    Logging and monitoring are crucial for identifying security breaches, troubleshooting issues, and maintaining the overall security of your VPN infrastructure. They provide visibility into network activities.
  6. User Training: Educate users on secure VPN usage practices. Instruct them on how to choose strong passwords, recognize phishing attempts, and follow company policies for remote access. User awareness is an essential part of network security.


    Users can inadvertently introduce security risks if they are not aware of best practices. Training helps users become security-conscious and reduce the likelihood of security incidents caused by human error.
  7. Incident Response Plan: Establish an incident response plan that outlines steps to take in the event of a security incident or breach related to the VPN. Define roles and responsibilities for incident management.


    Having a well-defined incident response plan ensures that your organization can respond effectively to security incidents, minimizing potential damage and downtime.