Being able to create and deploy the devices acting as dual-homes in a specific network
Building logical networks that share the same physical infrastructure
Allowing DCOM traffic to cross the firewall
Tunneling the DCOM traffic through TCP and putting the external OPC Proxy in a DMZ
Using the OPC-UA security model
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.