tunnel-TunnelService

This component provides a station server for application tunneling, where remote PCs with a tunnel client installed can use a legacy or vendor-specific PC application to access devices connected to one or more driver networks. A tunnel connection allows the remote client application to operate as it were directly attached to the driver network (via a virtual PC port).
 WARNING: While this service is available, you are strongly encouraged not to provide tunneling access to Lonworks devices. Tunneling is not a secure form of communication. If you use it, you provide an opening for malicious activity within your network. 

A client PC tunnels using an IP (LAN/WAN) connection, which is granted only after authentication as a station user (with admin write permissions for the particular child tunnel component accessed).

The LonTunnel child component provides support for tunneling Windows Lon-based applications. Other serial-based drivers may support a SerialTunnel child component.

In any station only one TunnelService is recommended. It can hold the required number (and types) of child tunnels.

Figure 49.   TunnelService properties
Image

To view these properties, expand Config > Services and double-click TunnelService.

In addition to the standard properties (Enabled, Status and Fault Cause), these properties are unique to this component.

Property Value Description
TLS Server Certificate tridium (default), Defines the server certificate from the User Key Store.
 NOTE: This certificate should be valid and signed. 
TLS Min Protocol TLSv1.0+ (default), TLS 1.1+, TLS 1.2 Selects the minimum accepted TLS (Transport Layer Security) version.
Cipher Suite Group drop-down list Controls which cipher suites can be used during TLS negotiation.

recommended is more secure than supported. Use it unless it causes compatibility issues with the client.

Server Port read-only
Reports the port used to monitor incoming client tunnel connections.
Connections read-only
Shows the number of active tunnel connections ranging from 0 (no active connection) to the number of child tunnel components.
 WARNING: While tunneling is available, you are strongly encouraged not to use it. Tunneling is not a secure form of communication.