Skip to main content
Powerfabric

Component

Industrial Edge & IIoT Gateways

Industrial edge gateways and IIoT bridges — Siemens IoT2050, Stratus ztC Edge, HMS Anybus, Litmus Edge, Cirrus Link MQTT — for OT-to-IT data flow with Sparkplug B and cloud connectors.

Cutaway of an industrial edge and IIoT gateway showing processor, memory, network ports, power supply, and links to PLCs and SCADA systems

Industrial Edge & IIoT Gateways: Engineering Guide

Industrial edge and IIoT gateways are the bridge between plant-floor automation networks and higher-level IT, cloud, analytics, and remote-service platforms. In practical terms, they collect data from PLCs, drives, meters, analyzers, and remote I/O; normalize and buffer that data; apply local rules or analytics; and publish it securely to SCADA, MES, historians, CMMS, or cloud services. For panel builders, automation engineers, and EPC teams, the gateway is no longer just a “protocol converter” — it is a compute node, cybersecurity boundary, and lifecycle-managed asset.

What an Industrial Edge / IIoT Gateway Is

An industrial gateway typically performs one or more of these functions:

  • Protocol translation, such as Modbus RTU to Modbus TCP, PROFINET to OPC UA, or EtherNet/IP to MQTT.
  • Data acquisition from PLCs, smart devices, and legacy serial equipment.
  • Store-and-forward buffering during WAN outages.
  • Local processing, filtering, event detection, and edge analytics.
  • Secure tunneling, remote access, or zero-trust connectivity to enterprise systems.
  • Containerized applications or scripts for custom logic.

Architecturally, a gateway sits between Level 0/1 OT devices and Level 2/3 supervisory systems. In many projects it is installed inside the control panel, on the machine skid, in a remote pump station cabinet, or in a telecom/utility enclosure with LTE/5G backhaul.

How It Works

A gateway polls field devices using native industrial protocols, maps data points into an internal model, and republishes them using one or more outbound transports. A common pattern is:

  1. Read registers/tags from PLCs, drives, energy meters, or remote I/O.
  2. Normalize units and quality flags.
  3. Apply local logic, deadbands, aggregation, or alarm rules.
  4. Buffer data in non-volatile memory if the WAN is unavailable.
  5. Publish to OPC UA, MQTT Sparkplug B, REST APIs, HTTPS, or historian connectors.

For example, a gateway may poll 250 Modbus TCP registers every 2 seconds, compress the values into 1-second events when an analog tag changes more than 1%, and publish to an MQTT broker using TLS 1.2 or better. In edge deployments, local compute can reduce bandwidth and latency while preserving operational continuity if cloud connectivity fails.

Main Vendors and Product Families Engineers Should Know

Vendor Product family Typical strengths
Siemens IOT2050, SIMATIC Industrial Edge, SIMATIC Cloud Connect 7 OT integration, Siemens ecosystem, industrial Linux/edge apps
Rockwell Automation Stratix 5200/5800 with industrial services, FactoryTalk Edge Gateway EtherNet/IP environments, OT/IT connectivity
Schneider Electric Harmony P6, EcoStruxure Edge Box, Modicon edge solutions Power/utility integration, EcoStruxure stack
Advantech UNO, ECU, Adam-6000/6200, Wise-Edge Broad hardware range, DIN-rail deployments, protocol flexibility
Moxa UC series, ThingsPro, IIoT Gateway portfolio Industrial networking, serial bridging, rugged design
HMS Networks Intesis, Ewon Flexy, Ewon Cosy+, Anybus Edge Remote access, protocol conversion, multi-vendor interoperability
Phoenix Contact TC Router, EPC series, PLCnext Control ecosystem Secure remote connectivity, modular automation integration
Red Lion FlexEdge, DA series, Sixnet RTUs Protocol conversion, rugged remote sites, utility applications
Cisco / Siemens Scalance / Aruba industrial lines Industrial routers, switches, edge compute platforms Network-centric architectures and secure segmentation

For engineers, the key distinction is whether the device is a simple protocol gateway, a remote access appliance, or a full edge computer with container support. Product families such as Siemens Industrial Edge, HMS Ewon Flexy, and Moxa UC series are often shortlisted because they cover both OT integration and IT security requirements.

Selection Criteria with Sizing Rules

Selection should start with the data model, not the hardware brochure. Define protocol types, tag count, scan rate, storage duration, environmental class, and cybersecurity requirements.

1) Compute and memory sizing

A practical rule is to size CPU headroom so that average utilization stays below 50% and peak below 70% during normal operation. For lightweight protocol conversion, 1–2 cores and 1–2 GB RAM may be enough. For containerized analytics, historians, or vision/AI preprocessing, 4+ cores and 8 GB RAM is often a minimum.

Worked example: a gateway polls 1,200 tags every 1 second and publishes MQTT with local filtering. Assume 0.15 ms CPU per tag per cycle for polling, normalization, and publish overhead.

$$\text{CPU time per cycle} = 1200 \times 0.15\ \text{ms} = 180\ \text{ms}$$

At a 1-second cycle, CPU utilization is:

$$\text{Utilization} = \frac{180}{1000} = 18\%$$

Allowing 3× transient overhead for burst traffic, retries, and OS tasks gives about 54% peak utilization, so a 2-core industrial CPU is usually acceptable. If the same system also runs containers, remote access, and local buffering, move to a 4-core platform.

2) Network sizing

Estimate payload per tag. If each tag event averages 40 bytes after protocol overhead and compression, then 1,200 tags at 1 Hz produce:

$$1200 \times 40 = 48{,}000\ \text{bytes/s} \approx 384\ \text{kbit/s}$$

With retries, TLS, and overhead, design for at least 1 Mbit/s sustained uplink per gateway. For cellular backhaul, 5–10 Mbit/s with QoS margin is usually comfortable for multi-site fleets.

3) Storage and buffering

If you need store-and-forward for 8 hours and the gateway generates 20 MB/h of compressed telemetry, local storage must hold:

$$20 \times 8 = 160\ \text{MB}$$

In practice, specify at least 4–10 times the calculated buffer to cover log files, OS updates, certificates, and burst traffic. A 16–64 GB industrial SSD or eMMC is common.

4) Environmental and power sizing

Check ambient temperature, vibration, and power input. For panel-mounted devices, a conservative design target is 0 to 55°C unless the vendor provides derating curves. For remote outdoor cabinets, select -40 to 70°C or wider. Power consumption is often 5–20 W, but cellular and multi-radio devices can exceed this. Ensure the 24 VDC supply has margin for inrush and brownout; a 30% spare capacity rule is reasonable.

Where It Fits in Automation, Panel, SCADA, and Contracting Projects

In machine automation, the gateway often sits between PLC networks and plant historians or cloud dashboards. In panel building, it belongs on the network architecture drawing, power budget, heat-load calculation, and BOM. In SCADA projects, it can serve as a protocol concentrator for remote telemetry, especially where legacy serial devices must be integrated into OPC UA or MQTT environments. In EPC and contracting work, gateways are frequently part of the balance-of-plant scope, utility skids, pump stations, solar farms, water/wastewater assets, and distributed energy resources.

For procurement teams, the key deliverables are not only the hardware part number but also firmware lifecycle policy, remote management capability, certificate handling, and support for long-term spares.

Applicable Standards and Compliance Considerations

For Europe, the gateway is typically assessed as part of the machine or control system and must support CE-related obligations where applicable. Relevant references include:

  • IEC 62443-3-3: system security requirements and security levels for industrial automation and control systems.
  • IEC 62443-4-1 and IEC 62443-4-2: secure product development and technical security requirements for components.
  • EN 60204-1, especially Clause 4 (general requirements), Clause 7 (control circuits and control functions), and Clause 18 (equipment, wiring practices, and EMC-related installation considerations as applied in the machine electrical equipment context).
  • IEC 61000-6-2 and IEC 61000-6-4 for industrial immunity and emission environments.
  • IEC 61131-2 for compatibility with PLC I/O and industrial signal environments where relevant.
  • EU Machinery Directive 2006/42/EC, and for new projects, the Machinery Regulation transition should be checked by the responsible conformity team.
  • EU NIS2 requirements where the gateway is part of an essential or important entity’s security posture.

From a cybersecurity standpoint, insist on unique credentials, certificate-based authentication, secure boot where available, signed firmware, role-based access control, and logging. IEC 62443-3-3 SR 1 through SR 7 are the right design lens for authentication, use control, system integrity, data confidentiality, restricted data flow, timely response to events, and resource availability.

Installation Considerations

Wiring and segregation

Keep gateway Ethernet, serial, and radio cables segregated from power conductors in accordance with good panel wiring practice and EN 60204-1 principles. Route communication cabling away from VFD output cables, contactor coils, and high dV/dt circuits. Use shielded twisted pair where required, and bond shields according to the vendor’s EMC instructions and the panel’s equipotential bonding strategy.

EMC

Install ferrites or line filters only when justified by the EMC plan. Use industrial Ethernet switches and shielded connectors in noisy environments. If the gateway has cellular or Wi-Fi radios, verify antenna placement, ground plane requirements, and separation from high-current conductors.

Thermal

Calculate heat load from all panel devices. If the gateway dissipates 12 W, the internal cabinet heat load increases by 12 W. In sealed cabinets, this can be significant when combined with PLCs, power supplies, and managed switches. Provide ventilation, heat exchangers, or air conditioning as needed. Keep clearances around the device per the manufacturer’s datasheet and avoid mounting above hot drives or transformers.

Power quality and resilience

Use a regulated 24 VDC supply, surge protection where the site warrants it, and battery-backed UPS or DC ride-through if data continuity matters. For remote sites, select models with watchdog timers, dual SIM, or redundant WAN options.

Copy-Paste Specification Table

Item Project specification
Function Industrial edge gateway for protocol conversion, data buffering, and secure publish to SCADA/MQTT/OPC UA
Protocols Modbus RTU/TCP, PROFINET, EtherNet/IP, OPC UA client/server, MQTT Sparkplug B, HTTPS/REST
Compute Minimum 4-core CPU for containerized applications; 2-core acceptable for pure protocol gateway
Memory Minimum 4 GB RAM; 8 GB preferred for edge analytics
Storage Minimum 16 GB industrial storage; 64 GB preferred with store-and-forward
Power 24 VDC nominal, reverse polarity protection, brownout tolerance, power draw < 20 W unless otherwise specified
Environment 0 to 55°C minimum; -20 to 70°C preferred for harsh sites
EMC Conformity to IEC 61000-6-2 and IEC 61000-6-4 or project-specific EMC requirements
Cybersecurity IEC 62443-aligned controls, secure boot, TLS, certificate management, RBAC, audit logs
Mounting DIN rail or panel mount with manufacturer-specified clearances and vibration rating
Remote access VPN or zero-trust remote access; no exposed default services on WAN
Compliance docs CE technical file support, datasheet, firmware lifecycle policy, cybersecurity statement, test reports

In summary, industrial edge and IIoT gateways are now foundational infrastructure in modern automation. The best choice is the one that matches the data model, network model, environmental class, and security posture of the project — not simply the one with the most features.

Where it's used

Applicable standards

Frequently asked questions

How do I select an Industrial Edge or IIoT gateway for a PLC, SCADA, and cloud integration project?

Select the gateway based on required protocol support, data throughput, cybersecurity features, and environmental rating. For PLC and SCADA projects, confirm native support for common industrial protocols such as Modbus TCP, PROFINET, EtherNet/IP, OPC UA, and MQTT, and verify that the device can operate within the panel’s temperature, EMC, and power conditions per IEC 61000 and IEC 60204-1. If the gateway will connect to cloud or enterprise networks, prioritize role-based access, secure boot, certificate handling, and logging aligned with IEC 62443 and ISA/IEC 62443.

What sizing factors determine whether a gateway will handle the required tag count and data polling rate?

Gateway sizing should be based on the number of tags, polling frequency, protocol conversion load, local buffering needs, and analytics or edge-compute tasks running on the device. A gateway that only forwards data may need modest CPU and memory, but one performing protocol translation, store-and-forward, or local rules execution requires more processing headroom and faster non-volatile storage to avoid bottlenecks. For critical automation systems, confirm deterministic behavior and network load impact during FAT/SAT, especially where the gateway interfaces with SCADA or historian systems under IEC 62443 security controls.

Can an Industrial Edge gateway be installed inside a control panel, and what panel requirements apply?

Yes, most industrial gateways are designed for DIN-rail installation inside control panels, provided the thermal, clearance, and EMC requirements are met. The panel design should account for heat dissipation, segregation from noisy power circuits, and proper grounding and bonding in line with IEC 61439 for assemblies and IEC 60204-1 for machine electrical equipment. If the gateway has Ethernet or serial cabling entering the panel, maintain separation and shielding practices consistent with EN 50174 and IEC 61000-5-2 to reduce interference.

What cybersecurity features should EPC contractors require in an IIoT gateway specification?

At minimum, specify unique device identities, secure password or certificate-based authentication, encrypted communications, signed firmware, event logging, and the ability to disable unused services and ports. For European and global projects, the gateway should support network segmentation, least-privilege access, and secure remote maintenance aligned with IEC 62443-3-3 and IEC 62443-4-2. If the gateway bridges operational technology to IT or cloud networks, insist on documented patching, vulnerability management, and audit trails suitable for ISA/IEC 62443 compliance programs.

How should Industrial Edge gateways be integrated with SCADA and historian systems without creating a single point of failure?

Use the gateway as a data acquisition and normalization layer, not as the sole control path for critical interlocks or safety functions. For SCADA integration, publish data through standard interfaces such as OPC UA or MQTT to the historian or supervisory layer, while keeping PLC logic local and independent to preserve control continuity. Redundancy, buffering, and failover behavior should be tested so that temporary network loss does not interrupt process operation, consistent with good practice under IEC 61508 and IEC 62443.

What power supply and environmental ratings are important for gateways used in industrial panels and substations?

Check the input voltage range, power hold-up behavior, surge immunity, and temperature rating against the actual installation environment. Industrial gateways used in panels or harsh sites should be specified for the expected ambient temperature, vibration, and EMC conditions, with immunity levels verified against IEC 61000 series requirements and installation practices suited to the site. For projects in electrical rooms or substations, ensure the device’s insulation and grounding arrangements are compatible with the panel’s protective design and applicable IEC installation standards.

When should a gateway perform protocol conversion versus simple data pass-through?

Use protocol conversion only when the source device and destination system cannot communicate natively, such as converting serial Modbus RTU to OPC UA or MQTT for SCADA or cloud consumption. Simple pass-through is preferable when the PLC, SCADA, and historian already support a common protocol, because it reduces latency, configuration complexity, and cybersecurity exposure. Where conversion is required, validate mapping accuracy, timestamp handling, and error recovery during commissioning so the gateway does not distort process data.

What documentation should be included in a gateway submittal for a European industrial project?

The submittal should include datasheets, protocol list, cybersecurity features, environmental ratings, wiring diagrams, and conformity documentation such as CE-related declarations where applicable. For panel and automation projects, also request installation instructions, EMC test references, and any applicable compliance evidence to IEC 61131-2, IEC 61000, and IEC 62443 so the device can be evaluated against the project’s technical specification. EPC teams should also confirm lifecycle support, firmware update policy, and spare parts availability before approval.

Related knowledge