On-Premises KTIO Network Block
About This Architecture
On-premises KTIO network block connects to AWS via redundant IPSec/IKEv2 VPN tunnels through a Palo Alto gateway. The DRIV2 application polls data from four internal sources—CTS database (10.150.247.11:1433), HMI interface (10.162.2.135:443), Agilion cluster (10.162.32.11/.20/.12:4000), and Hastus system (10.184.57.6:8810)—while pushing processed data to Expert2 via SMB, Kerberos, and LDAP protocols. This architecture demonstrates secure hybrid connectivity for operational technology environments requiring low-latency data synchronization between on-premises industrial systems and cloud analytics platforms. Fork this diagram on Diagrams.so to customize IP ranges, add monitoring components, or adapt the VPN topology for your hybrid network design. Export as .drawio, .svg, or .png for network documentation and change management workflows.
People also ask
How do I design a secure hybrid network connecting on-premises operational technology systems to AWS using redundant VPN tunnels?
This diagram shows an on-premises KTIO network connected to AWS via Palo Alto VPN gateway with dual IPSec/IKEv2 tunnels for redundancy. DRIV2 polls data from four internal sources (CTS, HMI, Agilion, Hastus) and pushes to Expert2, demonstrating secure hybrid connectivity for OT environments.
- Domain:
- Networking
- Audience:
- Network engineers managing hybrid cloud VPN connectivity
Generated by Diagrams.so — AI architecture diagram generator with native Draw.io output. Fork this diagram, remix it, or download as .drawio, PNG, or SVG.