The 5G encrypted high-performance edge computing power gateway TG465 supports power protocol protocols IEC101, IEC104, DL/T645, IEC61850, MQTT, mainstream PLC protocols, and industrial control protocols. It can access equipment terminals such as microcomputer relay protection devices, transformer temperature controllers, multi-function electric quantity monitors, and distribution security intelligent monitoring units. Data acquisition is uploaded to the power management system or data center for remote monitoring, control, operation, and maintenance to ensure safe operation and efficient intelligent management of the power system. It is applicable to various power monitoring systems, industrial control energy consumption monitoring systems, photovoltaic power generation monitoring systems, energy consumption monitoring systems, and other scenarios.
|
Rich interfaces
3 * LAN, 1 * WAN Gigabit Ethernet port, 2 * WIFI6 interface, high-speed network smooth communication, 1 * HDMI supports 4K display, 1 * RS232 (reusing one RS485 channel), 6 * RS485, 2 * relays, 3 * DI interface meets acquisition and control requirements, SIM card dual card optional, 1 * USB 3.0, 1 * TF card, solid state drive NVMe SSD, meets large capacity storage requirements.
|
|
data security
5G encryption high-performance edge computing power gateway TG465 supports SM computing French encryption software and hardware encryption, APN/VPDN data security transmission, tunnel encryption of VPN protocols such as IPSec VPN, L2TP VPN, PPTP VPN, OPEN VPN, and multi-layer authentication encryption to ensure data security.
|
Verified through multiple tests, the performance is more stable
Including 5G speed testing, high and low temperature resistance, high humidity and harsh environment testing, long-term stability testing, high flow pressure testing, CPU occupancy testing, flash continuous read-write interference testing, power stability testing, EMC electromagnetic compatibility, mechanical vibration testing, etc.
|
Comprehensive network barrier and protection
Support SPI firewall, DoS attack, VPN traversal, access control, port mapping, DMZ mapping, access control function (ACL) and other functions to ensure system network security.
|
GPS positioning
GPS function is optional to achieve precise positioning and meet the demand for location information data in scenario applications.