
Table of Contents
63BSE037076-510 D
Read-only System ................................................................................................ 31
User Mapping ...................................................................................................... 31
Password Configuration ....................................................................................... 32
Remote Access Server Advanced Configuration.................................................32
Remote Access Client ..................................................................................................... 35
Overview ............................................................................................................ 35
Creation of a Remote Access Client .................................................................... 35
Remote Access Client Advanced Configuration ................................................. 38
Upload Configuration .......................................................................................... 41
Running Upload ................................................................................................... 46
Proxy Objects....................................................................................................... 51
Proxy Control Connection ................................................................................... 53
Proxy Log Configuration .....................................................................................53
Proxy Log Template............................................................................................. 53
Miscellaneous Configuration .......................................................................................... 53
Security Configuration......................................................................................... 53
Data Subscription................................................................................................. 54
Process Displays .................................................................................................. 56
Faceplates ............................................................................................................ 56
History and Trends............................................................................................... 57
Alarm and Events................................................................................................. 58
Enabling Point of Control ....................................................................................61
Upload Configuration .......................................................................................... 62
User Mapping ...................................................................................................... 63
Node Configuration ............................................................................................. 63
Asset Optimization.......................................................................................................... 64
Asset Optimization Aspects................................................................................. 64
Configuration ....................................................................................................... 65
HTTPS Communication Protocol........................................................................ 67
Limitations ...................................................................................................................... 72
Section 4 - Operation
Overview ......................................................................................................................... 75