The latest release from Visual BACnet brings huge convenience and time saving for users with JACE controllers.
Now, you can capture BACnet data quickly and easily, sending it right from your JACE to Visual BACnet for analysis. There’s no additional hardware required, and no need to send staff on site.
The solution means that anyone with a JACE controller can capture the BACnet traffic they need with ease. All you need is a JACE running Niagara 4; Wireshark, or the Visual BACnet Capture Tool for Windows or Linux; a Visual BACnet account.
This technology allows you to capture BACnet data 100% remotely. If you capture using the Visual BACnet Capture Tool for Windows or Linux, your file will upload directly to Visual BACnet for analysis and diagnosis. You can even schedule or trigger captures remotely using the Windows or Linux Capture Tool, streaming from your JACE to Visual BACnet whenever you need.
Need help with your BACnet network? Want to improve your BACnet Network Health overall, so sudden issues don’t devastate the system?
Do you waste time on repetitive tasks, like entering in static IP addresses? Do you wait forever to get a block of IP addresses from IT that you can use?
Do you need help analyzing and solving a problematic BACnet network? Send your pcaps in, and our team of BACnet buffs will show you how they dig into files, from start to finish.
Visual BACnet is a powerful visualization tool for building automation system service providers.
BACnet is a widely used protocol for building networks that provides many benefits for connected building automation systems. But there are many issues that commonly plague BACnet networks.
Find out all the power and control you can get out of Optigo OneView.
What are MAC addresses, and how can you use them to help secure your network? Learn how OneClick Secure from Optigo OneView helps you secure your Operational Technology network in an instant.
An Operational Technology network can be made up of unmanaged switches, managed switches, or a centralized Network Management System (NMS). Learn about the differences between these different systems, and some of the pros and cons of each.
There are many protocols that make up the application layer of an IP network. Learn about some protocols you may have heard about, the roles they play on the application layer, and the importance of encryption.