...
- Simatic S-7 OPC UA Server
- Bernecker PLC embedded OPC UA Server
- Zenon OPC UA Server
- Prosoft EtherNet/IP to Modbus TCP/IP to OPC UA Server Gateway (PLX32-EIP-MBTCP-UA)
Forced disconnection: If all stations on the line are in the simulation mode or the communication is stopped for them, the line will be disconnected (the communication socket will be closed). If the simulation is disabled for at least one station and the communication is not stopped for it (the Parameters tab of the Station type object), the line will be connected again.
...
Parameter name | Meaning | Unit | Default value | ||||||
---|---|---|---|---|---|---|---|---|---|
| Type of used client (driver for OPC UA communication):
| Default Secure | Default | ||||||
| Session text identifier. The Session identifier should be unique within the client instance, making it possible to search problems faster in the client or server logs. | String | Kom process | ||||||
| The channel must be reopened before this time limit elapses. If the time is exceeded, the channel will be closed and unable to change data. | hh:mm:ss | 01:00:00 | ||||||
| Any message should be changed between client and server before this time limit elapses. If it is not sent, the sources within the session that are kept on the server are released. The primary work of this parameter is to remove the sessions that became inactive because of some unexpected reason. | mm:ss | 01:00 | ||||||
| Type of authentication used with the OPC UA server. Supported types are:
| Anonymous / Username | Anonymous | ||||||
| If Authentication type = Username, then the user name used in the authentication. If Authentication type = Certificate, then the path to the user certificate (e.g. D:\user_cert.der). | ||||||||
| If Authentication type = Username, then the password used in the authentication. If Authentication type = Certificate, then the path to the user private key (e.g. D:\user_private_key.pem). | ||||||||
| Security policy (only for Client Type = Secure; for Client Type = Default a security policy None is used):
| None Basic128Rsa15 Basic256 Basic256Sha256 Aes128Sha256RsaOaep Aes256Sha256RsaPss | None | ||||||
| A mode of message security in OPC UA communication (only for Client Type = Secure; for Client Type = Default a mode of message security None is used):
| None Sign Sign & Encrypt | None | ||||||
| Identifier of preferred Security Policy (only for Client Type = Default for password encryption). If the OPC UA offers several security policies, it is possible to select a specific one according to the identifier sent by the OPC server (the identifier can be found in the logs). Examples of an identifier (text form is in parentheses): PolicyId: 30 (0) PolicyId: 31 (1) PolicyId: 75 73 65 72 6E 61 6D 65 5F 62 61 73 69 63 31 32 38 52 73 61 31 35 (username_basic128Rsa15) PolicyId: 75 73 65 72 6E 61 6D 65 5F 62 61 73 69 63 32 35 36 53 68 61 32 35 36 (username_basic256Sha256) | - | - | ||||||
| Waiting after the connection is broken before the connection is re-established. | mm:ss.mss | 00:10.000 | ||||||
| Waiting after an unsuccessful connection attempt. | mm:ss.mss | 00:02.000 | ||||||
| Waiting after an unsuccessful attempt to create monitored items. If it is zero, the attempt is not repeated. If it is non-zero, the attempt is repeated after the defined wait. | sec | 0 | ||||||
| Terminating the connection after receiving a ServiceFault. | YES/NO | NO | ||||||
| It changes the number of information about communication. We recommend enabling the Extended/Full modes only when detecting the problems and debugging the communication. The "Full + Trace (Secure only)" mode is valid only for Client Type = Secure. | Normal/Extended/Full/ Full + Trace (Secure only) | Normal | ||||||
| The parameter defines the thread(s) that will send the debug info about the communication. | Receiving/Sending/Others treads/All threads | All threads |
Kotva | ||||
---|---|---|---|---|
|
- own - a directory with the KOM process's own certificate (file cert.der). If this file does not exist, it is generated
Warning - this automatically generated certificate will only be valid for 1 year, so we recommend replacing it with a certificate valid for a longer period! - private - a directory with a private key for the KOM process's own certificate (file private.pem)
- rejected - a directory with rejected certificates
- trusted - a directory with trusted certificates (the first time a connection is established to an OPC UA server, its certificate is stored in this directory)
...
Kotva | ||||
---|---|---|---|---|
|
...
The I/O tag configuration dialog window is used for setting the monitored objects.
...
OPC Foundation manuals are placed on available at http://www.opcfoundation.org.
...
- Ver. 1.0 – May 10, 2012
- Ver. 1.1 - December 17, 2018: Added browser dialog recycling and browsing of structured tags
- Ver. 1.2 - April 4, 2024: Added support for browsing all tag types
Info | ||
---|---|---|
| ||
Generating client certificates for OPC UA using OpenSSL. On Windows we used https://slproweb.com/products/Win32OpenSSL.html. Before generating, you need to create a file domain.ext with the following content: subjectKeyIdentifier=hash
Then generate a key (e.g. ProSoft PLX32-EIP-MBTCP-UA Multi-Protocol Gateway needed 2048-bit, other devices accepted 4096-bit): openssl genrsa -out private.pem 2048 and generate a certificate signing request (CSR): openssl req -new -key private.pem -out private.csr Then, you need to enter several parameters. Following the UaExpert, we only fill in Organization Name, Common Name, and Email Address, and instead of the other parameters, we enter a dot (so that they are empty). Country Name (2 letter code) [AU]:. Then generate a certificate valid for days (10000 corresponds to approximately 27 years). openssl x509 -req -days 10000 -in private.csr -signkey private.pem -out cert.crt -extfile domain.ext Convert the certificate cert.crt to der format: openssl x509 -inform pem -in cert.crt -outform der -out cert.der Copy the resulting certificate (cert.der) to the own directory and the private key (private.pem) to the private directory in the kom-opcua directory, see note. |
Info | ||
---|---|---|
| ||
...