Benefit and operation of Sox tunneling

A key benefit provided by Sox tunneling is the ability to establish a Workbench client session with one or more devices that are hidden from public access. This is done by allowing the requesting Workbench platform (client) to communicate (or “tunnel”) through an intermediate station (JACE or a Supervisor) with networked Sedona Framework devices. The station acts as a proxy server to those targeted devices.

Figure 1. Example of Sox tunneling communications


Example of Sox tunneling communications

An example use of this feature would be where IP connected Sedona Framework devices are networked under JACEs in a building. You may want to have the ability to "tunnel" the Sox connection so that when you are outside the facility you can access the devices for programming changes without having to expose the IP address of each Sedona Framework device. If you network many devices "under" a JACE, your IT department may not allow exposure of dozens or more control devices to the Internet.

NoteIf a Sedona Framework device is networked to the JACE via the secondary IP/LAN port on the JACE, the ability to tunnel Sedona (Sox) may be the only solution to make a Workbench client connection.

Sedona Framework stations and devices serve in the following roles to comprise the typical points of reference in a tunneling scenario: