PLT Connectivity
PLTs rely on secured connectivity with the PLTcloud cloud backend, used for:
Receiving firmware, test plans from PLTcloud
Executing webhooks during tests execution
Sending test reports to PLTcloud
All communication between the PLT and AWS endpoints is encrypted with TLS, with authentication based on a private key securely managed by a hardware-based cryptographic element that prevents key extraction.
References
See also
Network Requirements
The Ethernet port of the PLT should be connected to a network with (outbound) Internet access.
DHCP
The PLT automatically obtains its IP address, subnet mask, default gateway, and optionally DNS and NTP server addresses via DHCP from the connected Ethernet network.
To assign a static IP address, configure the local DHCP server to reserve an IP for the PLT’s MAC address. The MAC address of the PLT can be found under under Menu → About this PLT.
Manual configuration of IP network settings (e.g., via the front-panel UI) is not supported.
Note
If MAC or IP spoofing is a concern, deploy PLTs on a dedicated LAN or VLAN with no user-accessible devices. Consider using switch-level security features such as port security or MAC address filtering to ensure only authorized devices can communicate on the network.
DNS
The DNS server specified by the DHCP server should be able to resolve:
*.pltcloud.com
*.amazonaws.com
*.ntp.org
Service |
Protocol |
Ports |
---|---|---|
DNS |
UDP, TCP (used for larger responses) |
53 |
Firewall Settings
TCP (outbound) and UDP traffic should be allowed to these AWS API endpoints:
Service |
Endpoint |
Ports |
---|---|---|
PLTcloud |
|
443 |
AWS IoT |
|
80, 443, 8883 |
AWS S3 |
|
80, 443 |
AWS S3 |
|
80, 443 |
Note
Ports 80 and 8883 are not actively used, but may be accessed in error handling of failed AWS IoT or S3 interactions.
NTP
UDP NTP traffic (port 123) should be allowed for these NTP Time servers:
Service |
Protocol |
NTP Time server |
Port |
---|---|---|---|
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
NTP |
UDP |
|
123 |
DHCP NTP Config
In enterprise environments with restricted outbound access, access to the default NTP servers may be blocked by perimeter firewalls or proxies.
Use DHCP option 42 to deliver internal NTP server IPs to PLT devices. This is supported by all major DHCP servers (Cisco IOS DHCP, Windows Server, ISC DHCP, dnsmasq, etc.).
References
Cisco IOS DHCP Server
For Cisco routers or switches acting as DHCP servers:
ip dhcp pool PLT-NETWORK
network 192.168.100.0 255.255.255.0
default-router 192.168.100.1
dns-server 192.168.100.53
netbios-name-server 192.168.100.54
option 42 ip 192.168.100.10 192.168.100.11
Replace 192.168.100.10
and 192.168.100.11
with your approved internal NTP server IPs.
Windows Server DHCP
Open DHCP Manager.
Navigate to your scope > Scope Options.
Click Action > Configure Options.
Enable Option 004 Time Server.
Enter the IP addresses of your corporate NTP servers (comma-separated).
ISC DHCP (Linux)
Edit /etc/dhcp/dhcpd.conf
:
subnet 192.168.100.0 netmask 255.255.255.0 {
option routers 192.168.100.1;
option domain-name-servers 192.168.100.53;
option ntp-servers 192.168.100.10, 192.168.100.11;
}
dnsmasq
Edit /etc/dnsmasq.conf
:
dhcp-option=42,192.168.100.10
Optional: Deploy a Local NTP Relay
If a dedicated NTP server is not available, consider deploying one internally (e.g., chronyd or ntpd on Linux) and sync it to a trusted corporate time source or GPS device.
Security
The PLT runs PLT-OS, a hardened Linux distribution that minimizes the system’s attack surface and reduces potential vectors for exploitation.
To protect both test asset deployment and secure reporting, the PLT includes a Secure Element (aka “crypto chip”) responsible for critical cryptographic operations. This hardware component implements the following security standards:
FIPS 186-3 ECDSA
FIPS SP800-56A ECDH
NIST Standard P256 Elliptic Curve
Secure Report Encryption and Transmission
Before being stored or transmitted, each report is cryptographically signed and encrypted:
The compressed report is hashed with SHA-256 and signed using the PLT’s Secure Element, ensuring authenticity and integrity.
A random AES-GCM key and IV are generated to encrypt the report. The AES key is then encrypted using a public key from a validated trust bundle specific to the organization.
Encrypted reports and their metadata are transmitted to PLTcloud over mutually authenticated TLS 1.2. If primary credentials are unavailable, the system can fall back to device-based credentials for reliable delivery.