AMX NXC-ME260 Is an alpha-numeric string 1 50 characters in length, Changes the Master Key

Page 54

NetLinx Security and Web Server

Server Certificate Entries (Cont.)

City/Location

Name of the city where the certificate is used. This is an

 

alpha-numeric string (1 - 50 characters in length).

 

 

State/Province

Name of the state or province where the certificate is used. This

 

is an alpha-numeric string (1 - 50 characters in length).

 

 

Country Name

Provides a drop-down selection with a listing of currently

 

selectable countries.

 

 

Action

Provides a drop-down selection with a listing of available

 

certificate options:

 

• Display Certificate - Populates the Server Certificate fields with

 

the information from the certificate currently installed on the

 

Master. This action is used only to display the information

 

contained in the certificate on the target Master.

 

• Create Request - Takes the information entered into the

 

previous fields and formats the certificate so it can be exported

 

to the external Certificate Authority (CA) for later receipt of an

 

SSL Certificate. This action is used to request a certificate

 

from an external source.

 

• Self Generate Certificate - Takes the information entered into

 

the previous fields and generates its own SSL Certificate.

 

This action is used when no previous certificate has been

 

installed on the target Master, or a self-signed certificate is

 

desired.

 

• Regenerate Certificate - Takes the information entered into the

 

previous fields and regenerates an SSL Certificate. This action

 

changes the Master Key.

 

This method of certificate generation is used to modify or

 

recreate a previously existing certificate already on the

 

Master.

 

 

OK/Cancel/Delete

• Press OK to accept any changes made within this tab and

 

incorporate the information into the target Master.

 

• Press Cancel to void any changes made within this tab, disable

 

the security configuration session, void any changes made to

 

the Master, and return you to the empty Security tab.

 

 

If a certificate has been purchased from an external CA and then installed onto a specific Master, DO NOT regenerate the certificate or alter its properties

(ex: bit length, city, etc.).

If the purchased certificate is regenerated, it becomes invalid.

A certificate consists of two different Keys:

Master Key is generated by the Master and is incorporated into the text string sent to the CA during a certificate request. It is unique to a particular request made on a specific Master.

Public Key is part of the text string that is returned from the CA as part of an approved SSL Server Certificate. This public key is based off the submitted Master key from the original request.

Regenerating a previously requested and installed certificate invalidates that

certificate because the Master Key has been changed.

 

48

NetLinx Integrated Controllers

 

 

 

Image 54
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Input LED yellow Output LED red Status LED green Program port RS232 Ethernet 10/100 connectorFront and rear panel components Front RearSpecifications NXC-ME260 SpecificationsRear panel LEDs ICSNet/ICSHub Included AccessoriesOptional Accessories Rear panel LEDs EthernetProduct Information Baud Rate Settings Setting the Program Port DIP SwitchBaud rate settings Program Run Disable PRD modeRed Setting the Program Port DIP switchFaceplate Securing Baud rate DIP FaceplateModes and Front Panel LED Blink Patterns Wiring GuidelinesPreparing captive wires Modes and LED Blink PatternsWiring a 2-pin power connection Wiring length guidelinesWiring Length Guidelines @ 750 mA Using the 4-pin mini-Phoenix connector for data and powerPWR + Program Port Connections and WiringLocal +12 VDC power supply coming from the PSN power supply GNDICSNet RJ-45 Connections/Wiring RS232 Program port front panelPin Program port rear panel RJ-45 Pinout Information EIA/TIA 568 B ICSHub RJ-45 Connections/WiringICSHub in Pinouts and Signals ICSHub in portEthernet RJ-45 Pinouts and Signals Ethernet 10/100 Base-T RJ-45 Connections/WiringICSHub OUT Pinouts and Signals ICSHub OUT portEthernet Ports Used by the ME260 SPE Port Connection/WiringEthernet ports used by the ME260 Port type Description Standard Port #SPE Connector Pinouts and Signals SPE cable pinout informationMounting the NXS-NMS Into an Equipment Rack NXC-ME260 Installation and Mounting ProceduresMounting the ME260 into an NXS-NMS ProgramMounting the NXC-ME260 in an NXF CardFrame or NXI Master card slot on NXF CardFrame rear panelMaster Card slot on NXI rear panel Battery CR2032 type 20mm coin cell Socket Replacing the Lithium BatteriesInstallation and Wiring Communicating with the Master via the Program Port Before beginningAssigning Communication Settings and Baud Rates Verifying the current version of NetLinx Master firmwareSetting the System Value Select Diagnostics Device Addressing from the Main menuShowing the current version of the NetLinx Studio Working with multiple NetLinx Masters Changing the system value on the Modero panelPress the System Connection button Changing the Device Address on a Netlinx Device Device Addressing dialog changing the device valueAxcess Devices use Axcess standards Changing the device address on the Modero panelRecommended NetLinx Device numbers 301Resetting the Factory Default System and Device Values Obtaining the Master’s IP Address using DhcpNetwork Addresses dialog showing Get IP Select Diagnostics Network Addresses from the Main menu Assigning a Static IP to the NetLinx MasterUsed to assign an IP Address Assigning Communication Settings and TCP/IP Settings Communicating with the NetLinx Master via an IPInstalling New NetLinx Master Firmware via an IP Selected Firmware file Firmware download statusSystem Number Communication and Firmware Update Communication and Firmware Update OS Platform NetLinx Security web browser and feature supportSupported Browser and Feature Compatibility Safari YesNew Master Firmware Security Features NetLinx Security TermsNetLinx Security Terms Accessing the NetLinx Master via an IP Address WebControl TabDefault Security Configuration WebControl Tab FeaturesDefault Security Configuration Security Tab Security Tab FeaturesFeature Description System section Groups sectionSecurity tab Enable Security Security System FeaturesSecurity tab Add Group Administrator’s user passwordsDefault password can no longer be used to gain access Add Group EntriesSecurity tab Modify Group Modify Group EntriesAuthorized groups on the Master Security tab Group Directory AssociationsPress Delete to remove the selected group from the list Directories pathnames present on the target MasterValid Directory Association Entries Group Directory Association EntriesPath Description Add User Entries Security Config AccessSecurity tab Add User Sensitive and must be uniqueSecurity tab Modify User Modify User EntriesSecurity tab User Directory Associations Must be uniqueSubdirectories in that user directory Enables access to the user directory and all filesUser Directory Association Entries New user is selectedSecurity tab SSL Server Certificate Server Certificate EntriesCommon Name can not be an IP Address Is an alpha-numeric string 1 50 characters in length Information from the certificate currently installed onSecurity configuration session, void any changes made to Create Request Takes the information entered intoSecurity tab Export Certificate Request Security tab Import CertificateSystem Tab Show Devices TabNetwork Tab Master Security Setup Procedures Security tab showing NetLinx Master security optionsAdding a Group and assigning their access rights Security tab showing the Add Group fieldsModifying an existing Group’s access rights Security tab showing the Modify Group access rights fieldsShowing a list of authorized Groups Deleting an existing GroupAdding a Group directory association Security tab showing the Group Directory Associations fieldsConfirming the new directory association Click the Directory Associations linkDeleting a directory association Adding a User and configuring their access rights NetLinx cannot be used since they already existModifying an existing User’s access rights Security tab showing the Modify User Configurations fieldsShowing a list of authorized Users Deleting a UserAdding a User directory association Security tab showing the User Directory Associations fieldsSSL Certificate Procedures Self-Generating a SSL Server Certificate Request City/province name must be fully spelled outCreating a Request for a SSL Server Certificate State/province name must be fully spelled outBefore importing a CA server certificate, you must YOU can not Request Another Certificate Until the PreviousDisplay SSL Server Certificate Information Regenerating an SSL Server Certificate RequestCommon Steps for Requesting a Certificate from a CA Before exiting the Master and beginning another sessionNetLinx Security and Web Server Accessing an SSL-Enabled Master via an IP Address Security Alert and Certificate popupsClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel Using your NetLinx Master to control the G3 panel ME260 cannot use firmware greater thenWhat to do when a Certificate Expires NetLinx Security Features NetLinx Security FeaturesInitial Setup via a Terminal Connection Establishing a Terminal connectionAccessing the Security configuration options Stop bits1, and Flow control None default is HardwareTerminal Option 2 Display system security options for NetLinx Master Command DescriptionSecurity Options Menu Option 3 Add userOption 4 Edit User Edit User MenuEdit User Menu Option 6 Show the list of authorized users Access Rights MenuOption 5 Delete user Option 7 Add GroupPath Subdirectories in the user directoryGranted to that file Edit Group menu Delete directory association Option 8 Edit Group Option 9 Delete GroupOption 10 Show List of Authorized Groups Option 11 Set Telnet Timeout in secondsOption 12 Display Telnet Timeout in seconds Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help menu Help Menu OptionsLogging Into a Session Setup Security LogoutHelp Security Program Port Commands PC COM Port Communication SettingsProgram Port Commands Displays the current time on the Master Card Prompts you to enter the new date for the Master CardMaster-to-Master systems Prompts you to enter the new time for the Master CardDisk Free To exit pass mode, type + + esc esc Reboots the Master Card or specified deviceReleases the Dhcp setting for the Master Card Or LinuxSets the Master-to-Master route mode Sends a command to a device. The device can be on any systemDisplays a list of any combined devices Example Displays a list of all devices present on the bus ExampleIf end is not entered, the last 20 messages will be shown Displays the log of messages stored in the Masters memoryMaster logs all internal messages and keeps the most recent Most recent ExampleDesired from what device Example NetLinx mastersSystems listed are in numerical order Example ESC Pass Codes ESC Pass CodesWindows client programs Linux Telnet clientProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.