20.08.2013 Views

Architecture and Best Practices - Recommendations for PI ... - OSIsoft

Architecture and Best Practices - Recommendations for PI ... - OSIsoft

Architecture and Best Practices - Recommendations for PI ... - OSIsoft

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Replication of <strong>PI</strong> Server data<br />

CIP-002 Critical<br />

Cyber Assets<br />

<strong>PI</strong> – SCADA<br />

Interface<br />

Protected User<br />

Domain<br />

<strong>PI</strong> Server<br />

Electronic<br />

Security Perimeter<br />

DMZ<br />

<strong>PI</strong>-to-<strong>PI</strong><br />

Business User<br />

Domain<br />

<strong>PI</strong> Server<br />

Originator<br />

Time Series Data

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!