{"id":552,"date":"2020-03-26T14:53:00","date_gmt":"2020-03-26T14:53:00","guid":{"rendered":"http:\/\/opcconnect.integrationobjects.com\/?p=552"},"modified":"2026-04-03T16:24:03","modified_gmt":"2026-04-03T16:24:03","slug":"secure-file-transfer-industrial-network","status":"publish","type":"post","link":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/","title":{"rendered":"Remote work requirements during COVID-19 outbreak: Secure File Transfer Across Industrial Networks and DMZ Environments"},"content":{"rendered":"\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Transferring files between an industrial control network and the outside world sounds straightforward until you consider what&#8217;s at stake. Industrial networks running SCADA, DCS, or other OT systems are deliberately isolated from corporate IT networks and the internet. That isolation is a core security principle. But operations still need files to move: historian exports, configuration backups, firmware updates, reports, log files, and more.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">When that transfer is handled carelessly via USB drives, open FTP, uncontrolled VPN access, or direct network connections that bypass the DMZ, the security boundary that protects your control network is compromised. A single insecure file transfer path into an OT network is enough to introduce malware, enable unauthorized access, or become the entry point for a targeted attack on critical infrastructure.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This article explains the specific challenge of secure file transfer in industrial environments, what a purpose-built solution looks like, and how <a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-secure-file-transfer\/file-tunneller\/\">File Tunneller<\/a> addresses the requirements that generic file transfer tools simply cannot meet.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Why secure file transfer in industrial networks is different<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">In enterprise IT, <a href=\"https:\/\/www.pnnl.gov\/main\/publications\/external\/technical_reports\/pnnl-20776.pdf\">secure file transfer<\/a> typically means encryption in transit and authentication. Those are necessary but in industrial environments, they are not sufficient on their own.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">OT networks operate under a fundamentally different security model. The Purdue Model and IEC 62443 both define clear zone boundaries between the industrial control network (Level 2\u20133), the DMZ (Level 3.5), and the enterprise IT network (Level 4). The principle is strict: nothing should cross these boundaries without explicit, controlled authorization. Direct, persistent connections between the OT network and corporate or external networks are not permitted under this model.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">This creates a specific set of requirements that file transfer in industrial environments must satisfy:<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>No persistent open connections into the OT network.<\/strong> A file transfer solution that requires an always-on inbound connection to the control network violates the zone separation principle and creates a permanent attack surface.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Firewall traversal through a single, defined port.<\/strong> Industrial firewalls are configured to allow only specific, known traffic. A solution that requires multiple ports, dynamic port negotiation, or protocol inspection exceptions is operationally difficult to approve and audit.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Support for DMZ-based architectures.<\/strong> Many industrial sites route all IT\/OT data exchange through a DMZ. The file transfer solution must be able to operate correctly in a multi-hop topology: OT network \u2192 DMZ \u2192 IT network, without establishing a direct path between the two zones.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Encryption and authentication as baseline requirements.<\/strong> Files crossing from an OT network may contain sensitive process data, configuration files, or intellectual property. Encryption in transit is non-negotiable. Authentication ensures only authorized systems and users can initiate or receive transfers.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Resilience to network disruptions.<\/strong> OT networks &#8211; especially at remote sites connected via VSAT, WAN, or radio links &#8211; experience intermittent connectivity. A file transfer solution must handle connection drops gracefully, resuming or retrying transfers without data loss or corruption.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Scheduling and automation.<\/strong> Operations teams cannot be expected to manually initiate every file transfer. Scheduled, automated transfers triggered by time or event, are essential for historian exports, log archiving, and configuration backups.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Common approaches to industrial file transfer and their risks<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Understanding why generic solutions fall short helps clarify what a purpose-built tool needs to do.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>USB drives and removable media.<\/strong> Still the most common method at many industrial sites, and one of the highest-risk. USB drives are a well-documented malware vector the Stuxnet attack, which caused physical damage to industrial equipment, was introduced via USB. Removable media also has no audit trail, no encryption enforcement, and no way to prevent unauthorized copies of sensitive data.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Standard FTP \/ SFTP.<\/strong> FTP in any form is unsuitable for industrial networks it transmits credentials in plain text and requires multiple ports. SFTP is more secure but is still a general-purpose protocol that requires opening inbound SSH access to a host on or near the OT network. In most OT security policies, direct SSH access into the control network zone is not permitted.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>VPN-based file transfer.<\/strong> VPN extends the corporate network across the tunnel, which is convenient but problematic from a zone-separation standpoint. A compromised endpoint on the VPN has lateral movement access into the OT network. For site-to-site file transfer between defined systems, VPN is architecturally over-privileged.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Manual copy via a jump host or bastion server.<\/strong> Operationally complex, requires human intervention for every transfer, creates bottlenecks, and is difficult to audit consistently. Suitable for ad-hoc access by engineers but not for automated, recurring transfers.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">What industrial environments need is a solution designed specifically for this architecture: TCP-based, firewall-friendly, DMZ-aware, encrypted, authenticated, and capable of operating unattended on a schedule.<\/p>\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">How File Tunneller addresses industrial file transfer security<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><a class=\"underline underline underline-offset-2 decoration-1 decoration-current\/40 hover:decoration-current focus:decoration-current\" href=\"https:\/\/integrationobjects.com\/sioth-opc\/sioth-secure-file-transfer\/file-tunneller\/\">File Tunneller<\/a> is Integration Objects&#8217; purpose-built solution for secure file transfer across industrial networks, DMZ environments, and wide-area connections. It was designed from the ground up for the specific constraints of OT environments not adapted from a general-purpose enterprise tool.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Single TCP port communication<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">All File Tunneller traffic moves through a single, user-configurable TCP port. This makes firewall rules simple, predictable, and auditable. Your firewall team approves one port. There are no dynamic port negotiations, no protocol inspection exceptions, and no need to open a broad range of ports that increases the attack surface.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">DMZ-compatible architecture<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">File Tunneller supports multi-hop topologies, allowing it to be deployed in a proper DMZ architecture where no direct connection exists between the OT network and the IT network. The DMZ host acts as an intermediary files pass from the OT side to the DMZ host, and from the DMZ host to the IT side, without ever creating a routed path between the two zones.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Encryption and user authentication<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">All file transfers are encrypted in transit, ensuring confidentiality and integrity of the data regardless of the network path. User authentication ensures that only authorized systems and accounts can initiate or receive transfers preventing unauthorized access even if a network segment is compromised.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Resilience and automatic retry<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">File Tunneller maintains reliability over unreliable links including VSAT, WAN, VPN, and NAT environments. If a transfer is interrupted by a network disruption, it automatically retries and resumes, ensuring files arrive intact without requiring manual intervention.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Scheduled and automated transfers<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">Transfers can be scheduled on a daily, weekly, or monthly basis, or configured to run at a custom interval. This enables fully automated workflows &#8211; historian exports, configuration backups, log archiving &#8211; without requiring an operator to be present or manually trigger each transfer.<\/p>\r\n<h3 class=\"text-text-100 mt-2 -mb-1 text-base font-bold\">Multiple simultaneous connections<\/h3>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\">F<a href=\"https:\/\/integrationobjects.com\/blog\/category\/opc-tunneling\/\">ile Tunneller<\/a> supports multiple concurrent client connections and simultaneous file transfers, making it suitable for multi-site deployments where several remote locations transfer files to a central historian or data repository.<\/p>\r\n\r\n\r\n\r\n<div class=\"wp-block-image\">\r\n<figure class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-559 aligncenter\" src=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Integration-Objects-File-tunneller.jpg\" alt=\"Integration Objects' File tunneller\" width=\"471\" height=\"362\" srcset=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Integration-Objects-File-tunneller.jpg 691w, https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Integration-Objects-File-tunneller-300x231.jpg 300w\" sizes=\"auto, (max-width: 471px) 100vw, 471px\" \/><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<h2 class=\"text-text-100 mt-3 -mb-1 text-[1.125rem] font-bold\">Typical use cases for secure industrial file transfer<\/h2>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Historian data export to IT.<\/strong> Process historians on the OT network generate large volumes of time-series data that analytics teams, business intelligence tools, and ERP systems need. File Tunneller automates the scheduled export of historian files from the OT zone to the IT zone without creating a persistent data connection between them.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Firmware and software updates into the OT network.<\/strong> Applying updates to PLCs, RTUs, and SCADA servers requires getting files from the IT network into the OT network in a controlled, auditable way. File Tunneller provides a one-way or bidirectional transfer path that keeps the firewall configuration clean and the transfer logged.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Configuration backups from control devices.<\/strong> Regular backup of PLC and DCS configuration files to a secure off-network repository is a core OT resilience practice. File Tunneller can automate these backups on a schedule, ensuring current configuration files are always available for disaster recovery.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Log and alarm file archiving.<\/strong> Industrial systems generate operational logs and alarm histories that must be preserved for compliance, incident investigation, and performance analysis. Automating their transfer to long-term storage in the IT zone eliminates the manual effort and the security risk of removable media.<\/p>\r\n<p class=\"font-claude-response-body break-words whitespace-normal leading-[1.7]\"><strong>Remote site to central office data consolidation.<\/strong> For organizations operating multiple industrial sites &#8211; refineries, substations, offshore platforms, water treatment facilities &#8211; File Tunneller provides a consistent, secure mechanism for consolidating data from geographically distributed OT environments to a central location.<\/p>\r\n<h2><span class=\"TextRun SCXW15312799 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"none\"><span class=\"NormalTextRun SCXW15312799 BCX0\" data-ccp-parastyle=\"heading 2\">Frequently asked questions about secure file transfer in industrial networks<\/span><\/span><span class=\"EOP SCXW15312799 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:299,&quot;335559739&quot;:299}\">\u00a0<\/span><\/h2>\r\n<style>#sp-ea-1803 .spcollapsing { height: 0; overflow: hidden; transition-property: height;transition-duration: 300ms;}#sp-ea-1803.sp-easy-accordion>.sp-ea-single {margin-bottom: 10px; border: 1px solid #e2e2e2; }#sp-ea-1803.sp-easy-accordion>.sp-ea-single>.ea-header a {color: #444;}#sp-ea-1803.sp-easy-accordion>.sp-ea-single>.sp-collapse>.ea-body {background: #fff; color: #444;}#sp-ea-1803.sp-easy-accordion>.sp-ea-single {background: #eee;}#sp-ea-1803.sp-easy-accordion>.sp-ea-single>.ea-header a .ea-expand-icon { float: left; color: #444;font-size: 16px;}.sp-easy-accordion .sp-ea-single .ea-header a{\r\n  display: block;\r\n    text-decoration: none;\r\n    cursor: pointer;\r\n    font-weight: 600;\r\n    color: #444;\r\n    font-size: 16px;\r\n    line-height: 1;\r\n  box-shadow: none;}<\/style><div id=\"sp_easy_accordion-1775232782\"><div id=\"sp-ea-1803\" class=\"sp-ea-one sp-easy-accordion\" data-ea-active=\"ea-click\" data-ea-mode=\"vertical\" data-preloader=\"\" data-scroll-active-item=\"\" data-offset-to-scroll=\"0\"><div class=\"ea-card ea-expand sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18030\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18030\" aria-controls=\"collapse18030\" href=\"#\" aria-expanded=\"true\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-minus\"><\/i> What is the safest way to transfer files from an OT network? <\/a><\/h3><div class=\"sp-collapse spcollapse collapsed show\" id=\"collapse18030\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18030\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW114908356 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW114908356 BCX0\">The safest approach uses a purpose-built, TCP-based file transfer solution that\u00a0<\/span><span class=\"NormalTextRun SCXW114908356 BCX0\">operates<\/span><span class=\"NormalTextRun SCXW114908356 BCX0\">\u00a0through a single defined port, supports DMZ-based architectures, encrypts all traffic in transit, and authenticates both ends of the connection. This avoids the risks of USB media, open FTP, or VPN-based access that extends the attack surface into the OT zone.<\/span><\/span><span class=\"EOP SCXW114908356 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18031\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18031\" aria-controls=\"collapse18031\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Can I use SFTP for file transfer in an industrial control network? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18031\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18031\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW258585801 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW258585801 BCX0\">SFTP is more secure than FTP, but it is a general-purpose protocol that typically requires inbound SSH access into the host machine. In most OT security policies, opening direct SSH access into a control network zone is not\u00a0<\/span><span class=\"NormalTextRun SCXW258585801 BCX0\">permitted<\/span><span class=\"NormalTextRun SCXW258585801 BCX0\">. Purpose-built industrial file transfer solutions\u00a0<\/span><span class=\"NormalTextRun SCXW258585801 BCX0\">operate<\/span><span class=\"NormalTextRun SCXW258585801 BCX0\">\u00a0over a single configurable TCP port and are designed to work within DMZ architectures without requiring direct inbound access to OT systems.<\/span><\/span><span class=\"EOP SCXW258585801 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559685&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18032\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18032\" aria-controls=\"collapse18032\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What is a DMZ in industrial network architecture? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18032\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18032\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW148849295 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW148849295 BCX0\">In industrial cybersecurity (based on standards like IEC 62443 and the Purdue Model), a\u00a0<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">DMZ (Demilitarized Zone)<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">\u00a0is a buffer network segment between the OT (operational technology) zone and the IT (information technology) zone. It prevents direct connections between the two zones while allowing controlled,\u00a0<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">monitored<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">\u00a0data exchange. Any file transfer solution for industrial environments should be able to\u00a0<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">operate<\/span><span class=\"NormalTextRun SCXW148849295 BCX0\">\u00a0correctly in a DMZ topology routing files through the DMZ intermediary rather than creating a direct path between OT and IT.<\/span><\/span><span class=\"EOP SCXW148849295 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18033\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18033\" aria-controls=\"collapse18033\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Why is using a USB drive to transfer files in an OT environment a security risk? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18033\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18033\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW225100003 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW225100003 BCX0\">USB drives are a primary malware vector for industrial environments.\u00a0\u00a0<\/span><span class=\"NormalTextRun SCXW225100003 BCX0\">They<\/span><span class=\"NormalTextRun SCXW225100003 BCX0\">\u00a0bypass network security controls entirely and can introduce malicious software directly onto OT systems. They also provide no encryption, no audit trail, and no access control. High-profile attacks on industrial infrastructure, including Stuxnet, were delivered via removable media. Most modern OT cybersecurity policies and standards (including IEC 62443) recommend\u00a0<\/span><span class=\"NormalTextRun SCXW225100003 BCX0\">eliminating<\/span><span class=\"NormalTextRun SCXW225100003 BCX0\">\u00a0removable media use in control network zones.<\/span><\/span><span class=\"EOP SCXW225100003 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18034\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18034\" aria-controls=\"collapse18034\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> How does File Tunneller handle network disruptions during a transfer? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18034\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18034\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW189575482 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW189575482 BCX0\">File Tunneller is designed for resilience over unreliable links including VSAT, WAN, and NAT environments. If a connection is interrupted mid-transfer, it automatically retries and resumes the transfer from where it left off, ensuring files are delivered intact without requiring manual re-initiation.<\/span><\/span><span class=\"EOP SCXW189575482 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18035\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18035\" aria-controls=\"collapse18035\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> Does File Tunneller support automated, scheduled transfers? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18035\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18035\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW123232957 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW123232957 BCX0\">Yes. File Tunneller supports configurable scheduling daily, weekly, monthly, or at a custom interval. This enables fully automated workflows such as historian exports, configuration backups, and log archiving, without requiring operator involvement for each transfer.<\/span><\/span><span class=\"EOP SCXW123232957 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><div class=\"ea-card sp-ea-single\"><h3 class=\"ea-header\"><a class=\"collapsed\" id=\"ea-header-18036\" role=\"button\" data-sptoggle=\"spcollapse\" data-sptarget=\"#collapse18036\" aria-controls=\"collapse18036\" href=\"#\" aria-expanded=\"false\" tabindex=\"0\"><i aria-hidden=\"true\" role=\"presentation\" class=\"ea-expand-icon eap-icon-ea-expand-plus\"><\/i> What is the difference between File Tunneller and a standard FTP solution for industrial use? <\/a><\/h3><div class=\"sp-collapse spcollapse \" id=\"collapse18036\" data-parent=\"#sp-ea-1803\" role=\"region\" aria-labelledby=\"ea-header-18036\"> <div class=\"ea-body\"><p><span class=\"TextRun SCXW12534413 BCX0\" lang=\"EN-US\" xml:lang=\"EN-US\" data-contrast=\"auto\"><span class=\"NormalTextRun SCXW12534413 BCX0\">\u00a0Standard FTP transmits credentials in plain text and requires multiple ports both\u00a0<\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW12534413 BCX0\">disqualifying for<\/span><span class=\"NormalTextRun SCXW12534413 BCX0\">\u00a0industrial OT environments. File Tunneller uses a single configurable TCP port, encrypts all traffic, authenticates users, supports DMZ architectures, and handles network disruptions automatically. It is designed for the specific security and operational constraints of industrial networks, not adapted from a general enterprise tool.<\/span><\/span><span class=\"EOP SCXW12534413 BCX0\" data-ccp-props=\"{&quot;134233117&quot;:false,&quot;134233118&quot;:false,&quot;335551550&quot;:0,&quot;335551620&quot;:0,&quot;335559738&quot;:240,&quot;335559739&quot;:240}\">\u00a0<\/span><\/p><\/div><\/div><\/div><script type=\"application\/ld+json\">{ \"@context\": \"https:\/\/schema.org\", \"@type\": \"FAQPage\", \"@id\": \"sp-ea-schema-1803-69df90232f365\", \"mainEntity\": [{ \"@type\": \"Question\", \"name\": \"What is the safest way to transfer files from an OT network? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"The safest approach uses a purpose-built, TCP-based file transfer solution that\u00a0operates\u00a0through a single defined port, supports DMZ-based architectures, encrypts all traffic in transit, and authenticates both ends of the connection. This avoids the risks of USB media, open FTP, or VPN-based access that extends the attack surface into the OT zone.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Can I use SFTP for file transfer in an industrial control network? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"SFTP is more secure than FTP, but it is a general-purpose protocol that typically requires inbound SSH access into the host machine. In most OT security policies, opening direct SSH access into a control network zone is not\u00a0permitted. Purpose-built industrial file transfer solutions\u00a0operate\u00a0over a single configurable TCP port and are designed to work within DMZ architectures without requiring direct inbound access to OT systems.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What is a DMZ in industrial network architecture? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"In industrial cybersecurity (based on standards like IEC 62443 and the Purdue Model), a\u00a0DMZ (Demilitarized Zone)\u00a0is a buffer network segment between the OT (operational technology) zone and the IT (information technology) zone. It prevents direct connections between the two zones while allowing controlled,\u00a0monitored\u00a0data exchange. Any file transfer solution for industrial environments should be able to\u00a0operate\u00a0correctly in a DMZ topology routing files through the DMZ intermediary rather than creating a direct path between OT and IT.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Why is using a USB drive to transfer files in an OT environment a security risk? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"USB drives are a primary malware vector for industrial environments.\u00a0\u00a0They\u00a0bypass network security controls entirely and can introduce malicious software directly onto OT systems. They also provide no encryption, no audit trail, and no access control. High-profile attacks on industrial infrastructure, including Stuxnet, were delivered via removable media. Most modern OT cybersecurity policies and standards (including IEC 62443) recommend\u00a0eliminating\u00a0removable media use in control network zones.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"How does File Tunneller handle network disruptions during a transfer? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"File Tunneller is designed for resilience over unreliable links including VSAT, WAN, and NAT environments. If a connection is interrupted mid-transfer, it automatically retries and resumes the transfer from where it left off, ensuring files are delivered intact without requiring manual re-initiation.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"Does File Tunneller support automated, scheduled transfers? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"Yes. File Tunneller supports configurable scheduling daily, weekly, monthly, or at a custom interval. This enables fully automated workflows such as historian exports, configuration backups, and log archiving, without requiring operator involvement for each transfer.\u00a0\" } },{ \"@type\": \"Question\", \"name\": \"What is the difference between File Tunneller and a standard FTP solution for industrial use? \", \"acceptedAnswer\": { \"@type\": \"Answer\", \"text\": \"\u00a0Standard FTP transmits credentials in plain text and requires multiple ports both\u00a0disqualifying for\u00a0industrial OT environments. File Tunneller uses a single configurable TCP port, encrypts all traffic, authenticates users, supports DMZ architectures, and handles network disruptions automatically. It is designed for the specific security and operational constraints of industrial networks, not adapted from a general enterprise tool.\u00a0\" } }] }<\/script><\/div><\/div>\r\n","protected":false},"excerpt":{"rendered":"<p>Transferring files between an industrial control network and the outside world sounds straightforward until you consider what&#8217;s at stake. Industrial networks running SCADA, DCS, or<\/p>\n","protected":false},"author":1,"featured_media":1670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[185],"tags":[49],"class_list":["post-552","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-opc-tunneling","tag-opcnet-broker"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Secure File Transfer for Industrial Networks &amp; DMZ | File Tunneller<\/title>\n<meta name=\"description\" content=\"Learn how to securely transfer files across industrial control networks, DMZs, and firewalls without exposing your OT environment to cyber risk.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Secure File Transfer for Industrial Networks &amp; DMZ | File Tunneller\" \/>\n<meta property=\"og:description\" content=\"Learn how to securely transfer files across industrial control networks, DMZs, and firewalls without exposing your OT environment to cyber risk.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/\" \/>\n<meta property=\"og:site_name\" content=\"OPC Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Integration.Objects.OPC\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-26T14:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-03T16:24:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Remote-work-requirements-during-COVID-19-outbreak--1024x576.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"576\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"OPCBlogAdmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:site\" content=\"@IntegObjects\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"OPCBlogAdmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Secure File Transfer for Industrial Networks & DMZ | File Tunneller","description":"Learn how to securely transfer files across industrial control networks, DMZs, and firewalls without exposing your OT environment to cyber risk.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/","og_locale":"en_US","og_type":"article","og_title":"Secure File Transfer for Industrial Networks & DMZ | File Tunneller","og_description":"Learn how to securely transfer files across industrial control networks, DMZs, and firewalls without exposing your OT environment to cyber risk.","og_url":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/","og_site_name":"OPC Blog","article_publisher":"https:\/\/www.facebook.com\/Integration.Objects.OPC\/","article_published_time":"2020-03-26T14:53:00+00:00","article_modified_time":"2026-04-03T16:24:03+00:00","og_image":[{"width":1024,"height":576,"url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Remote-work-requirements-during-COVID-19-outbreak--1024x576.png","type":"image\/png"}],"author":"OPCBlogAdmin","twitter_card":"summary_large_image","twitter_creator":"@IntegObjects","twitter_site":"@IntegObjects","twitter_misc":{"Written by":"OPCBlogAdmin","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/","url":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/","name":"Secure File Transfer for Industrial Networks & DMZ | File Tunneller","isPartOf":{"@id":"https:\/\/integrationobjects.com\/blog-\/#website"},"primaryImageOfPage":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/#primaryimage"},"image":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/#primaryimage"},"thumbnailUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Remote-work-requirements-during-COVID-19-outbreak-.png","datePublished":"2020-03-26T14:53:00+00:00","dateModified":"2026-04-03T16:24:03+00:00","author":{"@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b"},"description":"Learn how to securely transfer files across industrial control networks, DMZs, and firewalls without exposing your OT environment to cyber risk.","breadcrumb":{"@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/#primaryimage","url":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Remote-work-requirements-during-COVID-19-outbreak-.png","contentUrl":"https:\/\/integrationobjects.com\/blog\/wp-content\/uploads\/2020\/03\/Remote-work-requirements-during-COVID-19-outbreak-.png","width":1920,"height":1080,"caption":"secure file transfer industrial network"},{"@type":"BreadcrumbList","@id":"https:\/\/integrationobjects.com\/blog\/secure-file-transfer-industrial-network\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/integrationobjects.com\/blog-\/"},{"@type":"ListItem","position":2,"name":"Remote work requirements during COVID-19 outbreak: Secure File Transfer Across Industrial Networks and DMZ Environments"}]},{"@type":"WebSite","@id":"https:\/\/integrationobjects.com\/blog-\/#website","url":"https:\/\/integrationobjects.com\/blog-\/","name":"OPC Blog","description":"OPC and related technologies news from Integration Objects","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/integrationobjects.com\/blog-\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/6efbaf488a07e418b93ff77f00af386b","name":"OPCBlogAdmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/integrationobjects.com\/blog-\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f2d787c3c48eb147d5b4d0c9d05c6f35a5946c7dc40af2eedbe64030e99ea299?s=96&d=mm&r=g","caption":"OPCBlogAdmin"}}]}},"_links":{"self":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/comments?post=552"}],"version-history":[{"count":13,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/552\/revisions"}],"predecessor-version":[{"id":1671,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/posts\/552\/revisions\/1671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media\/1670"}],"wp:attachment":[{"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/media?parent=552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/categories?post=552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/integrationobjects.com\/blog\/wp-json\/wp\/v2\/tags?post=552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}