Networking best practices for integrating the Thyssenkrupp plugin with Security Center - Thyssenkrupp 3.2.0

Thyssenkrupp Plugin Guide 3.2.0

Applies to
Thyssenkrupp 3.2.0
Last updated
2021-09-17
Content type
Guides > Plugin and extension guides
Language
English
Product
Thyssenkrupp
Version
3.2

For optimal performance, the Thyssenkrupp plugin should be hosted on an expansion server with two network interface cards. Not following the recommended configuration can have an adverse effect on all parts of Security Center.

Server recommendations

The server must meet the recommended server specifications as described in the system requirements. It must also be running a compatible version of Security Center.

Network settings

The Thyssenkrupp elevator network should be isolated from the Security Center network to prevent disruptions to the elevator network.

The network ranges used by Security Center should not overlap with network ranges used by the Thyssenkrupp system. For more information on the network ranges used by the Thyssenkrupp system, contact your technical representative from Thyssenkrupp.

Configuring your network interface cards (NIC)

Your server must be configured with two network interface cards.

By default, the Thyssenkrupp network expects the plugin server (referred to as the "security system") to be configured using the networking information outlined in the table below.
NIC 1 NIC 2
Communicates with the private Thyssenkrupp elevator network. Communicates with the Security Center network.
Fixed local IP address (typical): 192.168.0.250 IP address: as normal, but not in the 192.168.0.x range1
Subnet mask: 255.255.255.0 Subnet mask: as normal
Gateway address: none Gateway address: as normal

1You cannot use the 192.168.0.x IP range for the Security Center network because it is inaccessible.