Skip to main content
InSource Solutions

Wonderware Multi-Network Architecture Guide


InSource_Logo_Transparent (1).png






Rufus Handsome

Publish Date 07/28/2014

Applies to Software

All Software

Applies to Version


Applies to System/Module


Article Version





Edit section

This article discusses the fundamental components of a multi-network architecture supporting a Wonderware based environment.  It also provides an illustration of a working example of how a multi-network could be implemented to support a Wonderware environment.  This article in no way advocates that this is the only way to implement a multi-network architecture, it is provided to show a fundamental example of how a typical multi-network architecture is laid out.


Edit section


There are many ways to implement a network architecture but regardless of the implementation, a multi-network environment will utilize some form of network switches, routers, and possibly firewalls to protect the backend systems.   Switches are used to concentrate the Ethernet connections coming from nodes such as PCs', PLC's, and Printers to a single point.  Routers are used to "route" packets of data to network address destinations designated in the packets, similar to how the US Postal Service routes mail to homes in different neighborhoods based on the address.  Firewalls help to protect the network from unwanted network traffic and intrusion.     


Multi-network architectures are often laid out in segments called subnets or "sub divided networks".  Subnets can be segregated based on area, function, systems, or even security.  For example in an industrial controls environment, there could be any combination of supervisory, PLC, administrative or business networks.  Each network type would represent a segment in the overall network.  As mentioned earlier, in order to connect these network segments together, a router is used to join all the network segments to a single point.  In general, a router is configured to connect to each network via an interface port that will connect directly to a network segment's switch.  Each interface port on the router is configured to be the "gateway" for a network segment.  A properly configured router knows about the other networks and how to route packets between the networks to their destinations


When the router has been connected to all of the network segments, then each router interface is configured to be a gateway with the appropriate IP Address of that network segment, i.e., means that the router is configured to be the gateway of network.  The router is traditionally designated to be the first node on a particular network, hence it is given .1 as it's last octet in it's IP Address, but this is not a rule.


Once systems on each network segment can successfully pass data packets between the networks (usually by "pinging" or using some other means of testing functionality), a firewall can then be put in place to further restrict the information flow to what is essential for normal day to day operations.  Careful consideration should be observed as to where and how many firewalls should be placed in the network architecture, what type of security model will be followed, and what ports will need to be opened or closed for normal network operations and security. 


Below are some common ports for a Wonderware based network that should be left opened:


For Historian and Application Servers

  1. 445/tcp         -File and printer sharing
  2. 1434/udp     -SQL Server Browser
  3. 1433/tcp       -SQL TCP
  4. 135/tcp         -DCOM
  5. 80/tcp           - Information Server Web Portal


For Wonderware DAServers

1. 102        DAS SI Direct

2. 502        DAS MBTCP

3. 2221, 2222, 2223      DAS ABTCP

4. 5413    SuiteLiink DAServers

5. 44818    DAS ABCIP





Diagrams and Layout

Figure 1 Fundamental Network Layout Example