AMX NXC-ME260 NetLinx Security web browser and feature support, OS Platform, Safari Yes

Page 39

NetLinx Security and Web Server

NetLinx Security and Web Server

NetLinx ME260 Masters (installed with firmware build 139 incorporate new built-in security and SSL certificate verification capabilities. By using both SSL certificate verification and secured HTTP access, this new NetLinx firmware provides users with a more convenient web-based method of securing both the Master and the incoming and outgoing information.

Terminal setup and security configuration is still valid and supported in the new build of NetLinx Master firmware. New Terminal security features include the use of two new commands: ssl security enable and ssl security disable.

SSL (Secure Sockets Layer) is a protocol that works by encrypting data that is transferred over the SSL connection. URLs that require an SSL connection begin with https: instead of http: in the browser’s Address field. These security capabilities are configured to function via a web session within your browser.

After the installation of build 139 to your Master, Telnet security configuration access is disabled. This new build migrates the NetLinx Master security setup from a TELNET environment to a web-based application.

The new NetLinx Web Server used to power the Master security and SSL certificate features on AMX Masters, not only provides user name/password security for the target Master, but also a new level of secure encryption through the use of a unique server certificate.

The first layer of security for the Master is an on-screen HTTP user name and password field that prompts a user to provide correct security information before gaining access to a target Master. The second layer of protection is an SSL Certificate (specifically identifying the target Master) that can either be requested or self-generated. This certificate is then installed onto the target Master and added to the trusted site certificate listing within the computer’s Internet browser.

NetLinx Security web browser and feature support

The following table describes the web browsers (associated to each operating system) recommended for use with the new NetLinx Security features on the NXC-ME260.

Supported Browser and Feature Compatibility

OS Platform

Recommended Browser

NetLinx Security

G3 Web Panel

G4 Web Panel

 

 

Feature support

Control support

Control support

 

 

 

 

 

Windows©

Internet Explorer®

Yes

Yes

Yes

 

6.0 or higher

 

Sun Java must be

 

 

 

 

 

 

 

 

installed

 

 

 

 

 

 

MAC©

Safari®

Yes

Yes

No

 

- (see note below)

 

 

 

 

 

 

 

 

Linux©

Mozilla®

Yes

 

 

 

 

- (see note below)

 

 

 

 

 

 

 

When using Safari on a MAC machine, certificates must be externally requested from the Server Certificate’s page. Self-generated certificates do not allow access back to the target Master and will display an invalid certificate message.

NetLinx Integrated Controllers

33

 

 

 

 

Image 39
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Front Rear Program port RS232 Ethernet 10/100 connectorFront and rear panel components Input LED yellow Output LED red Status LED greenNXC-ME260 Specifications SpecificationsRear panel LEDs Ethernet Included AccessoriesOptional Accessories Rear panel LEDs ICSNet/ICSHubProduct Information Program Run Disable PRD mode Setting the Program Port DIP SwitchBaud rate settings Baud Rate SettingsFaceplate Setting the Program Port DIP switchFaceplate Securing Baud rate DIP RedModes and LED Blink Patterns Wiring GuidelinesPreparing captive wires Modes and Front Panel LED Blink PatternsUsing the 4-pin mini-Phoenix connector for data and power Wiring length guidelinesWiring Length Guidelines @ 750 mA Wiring a 2-pin power connectionGND Program Port Connections and WiringLocal +12 VDC power supply coming from the PSN power supply PWR +ICSNet RJ-45 Connections/Wiring RS232 Program port front panelPin Program port rear panel ICSHub in port ICSHub RJ-45 Connections/WiringICSHub in Pinouts and Signals RJ-45 Pinout Information EIA/TIA 568 BICSHub OUT port Ethernet 10/100 Base-T RJ-45 Connections/WiringICSHub OUT Pinouts and Signals Ethernet RJ-45 Pinouts and SignalsPort type Description Standard Port # SPE Port Connection/WiringEthernet ports used by the ME260 Ethernet Ports Used by the ME260SPE cable pinout information SPE Connector Pinouts and SignalsProgram NXC-ME260 Installation and Mounting ProceduresMounting the ME260 into an NXS-NMS Mounting the NXS-NMS Into an Equipment RackMounting the NXC-ME260 in an NXF CardFrame or NXI Master card slot on NXF CardFrame rear panelMaster Card slot on NXI rear panel Replacing the Lithium Batteries Battery CR2032 type 20mm coin cell SocketInstallation and Wiring Before beginning Communicating with the Master via the Program PortVerifying the current version of NetLinx Master firmware Assigning Communication Settings and Baud RatesSetting the System Value Select Diagnostics Device Addressing from the Main menuShowing the current version of the NetLinx Studio Working with multiple NetLinx Masters Changing the system value on the Modero panelPress the System Connection button Device Addressing dialog changing the device value Changing the Device Address on a Netlinx Device301 Changing the device address on the Modero panelRecommended NetLinx Device numbers Axcess Devices use Axcess standardsObtaining the Master’s IP Address using Dhcp Resetting the Factory Default System and Device ValuesNetwork Addresses dialog showing Get IP Select Diagnostics Network Addresses from the Main menu Assigning a Static IP to the NetLinx MasterUsed to assign an IP Address Communicating with the NetLinx Master via an IP Assigning Communication Settings and TCP/IP SettingsInstalling New NetLinx Master Firmware via an IP Selected Firmware file Firmware download statusSystem Number Communication and Firmware Update Communication and Firmware Update Safari Yes NetLinx Security web browser and feature supportSupported Browser and Feature Compatibility OS PlatformNew Master Firmware Security Features NetLinx Security TermsNetLinx Security Terms WebControl Tab Accessing the NetLinx Master via an IP AddressDefault Security Configuration WebControl Tab FeaturesDefault Security Configuration Groups section Security Tab FeaturesFeature Description System section Security TabSecurity System Features Security tab Enable SecurityAdd Group Entries Administrator’s user passwordsDefault password can no longer be used to gain access Security tab Add GroupModify Group Entries Security tab Modify GroupDirectories pathnames present on the target Master Security tab Group Directory AssociationsPress Delete to remove the selected group from the list Authorized groups on the MasterValid Directory Association Entries Group Directory Association EntriesPath Description Sensitive and must be unique Security Config AccessSecurity tab Add User Add User EntriesModify User Entries Security tab Modify UserMust be unique Security tab User Directory AssociationsNew user is selected Enables access to the user directory and all filesUser Directory Association Entries Subdirectories in that user directorySecurity tab SSL Server Certificate Server Certificate EntriesCommon Name can not be an IP Address Create Request Takes the information entered into Information from the certificate currently installed onSecurity configuration session, void any changes made to Is an alpha-numeric string 1 50 characters in lengthSecurity tab Import Certificate Security tab Export Certificate RequestSystem Tab Show Devices TabNetwork Tab Security tab showing NetLinx Master security options Master Security Setup ProceduresSecurity tab showing the Add Group fields Adding a Group and assigning their access rightsSecurity tab showing the Modify Group access rights fields Modifying an existing Group’s access rightsDeleting an existing Group Showing a list of authorized GroupsSecurity tab showing the Group Directory Associations fields Adding a Group directory associationConfirming the new directory association Click the Directory Associations linkDeleting a directory association NetLinx cannot be used since they already exist Adding a User and configuring their access rightsSecurity tab showing the Modify User Configurations fields Modifying an existing User’s access rightsDeleting a User Showing a list of authorized UsersSecurity tab showing the User Directory Associations fields Adding a User directory associationSSL Certificate Procedures City/province name must be fully spelled out Self-Generating a SSL Server Certificate RequestState/province name must be fully spelled out Creating a Request for a SSL Server CertificateYOU can not Request Another Certificate Until the Previous Before importing a CA server certificate, you mustRegenerating an SSL Server Certificate Request Display SSL Server Certificate InformationBefore exiting the Master and beginning another session Common Steps for Requesting a Certificate from a CANetLinx Security and Web Server Security Alert and Certificate popups Accessing an SSL-Enabled Master via an IP AddressClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel ME260 cannot use firmware greater then Using your NetLinx Master to control the G3 panelWhat to do when a Certificate Expires Establishing a Terminal connection NetLinx Security FeaturesInitial Setup via a Terminal Connection NetLinx Security FeaturesStop bits1, and Flow control None default is Hardware Accessing the Security configuration optionsTerminal Option 3 Add user Command DescriptionSecurity Options Menu Option 2 Display system security options for NetLinx MasterEdit User Menu Option 4 Edit UserEdit User Menu Option 7 Add Group Access Rights MenuOption 5 Delete user Option 6 Show the list of authorized usersPath Subdirectories in the user directoryGranted to that file Edit Group menu Delete directory association Option 9 Delete Group Option 8 Edit GroupOption 13 Make changes permanent by saving to flash Option 11 Set Telnet Timeout in secondsOption 12 Display Telnet Timeout in seconds Option 10 Show List of Authorized GroupsMain Security Menu Main Security MenuAsked to verify this before the database is reset Help Menu Options Help menuLogging Into a Session Setup Security LogoutHelp Security Program Port Commands PC COM Port Communication SettingsProgram Port Commands Prompts you to enter the new time for the Master Card Prompts you to enter the new date for the Master CardMaster-to-Master systems Displays the current time on the Master CardDisk Free Or Linux Reboots the Master Card or specified deviceReleases the Dhcp setting for the Master Card To exit pass mode, type + + esc escSends a command to a device. The device can be on any system Sets the Master-to-Master route modeDisplays a list of all devices present on the bus Example Displays a list of any combined devices ExampleMost recent Example Displays the log of messages stored in the Masters memoryMaster logs all internal messages and keeps the most recent If end is not entered, the last 20 messages will be shownDesired from what device Example NetLinx mastersSystems listed are in numerical order Example ESC Pass Codes ESC Pass CodesLinux Telnet client Windows client programsProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.