AMX NXC-ME260 instruction manual Master Security Setup Procedures

Page 57

NetLinx Security and Web Server

Master Security Setup Procedures

Setting the system security options for a NetLinx Master (Security Options Menu)

1.Enter the URL/IP Address of the target Master into the Address/URL field within the web browser. Refer to the Accessing the NetLinx Master via an IP Address section on page 35 for more detailed instructions on using your web browser to access your Master.

2.Click on the Security tab. By default this tab is blank until a security option is selected from the left of the browser window. Refer to the Security Tab section on page 37 for more detailed descriptions on the security configuration options.

3.Click the Enable Security link (on the left of the browser window) to populate the Security tab with NetLinx Master security options (FIG. 38) that can individually be enabled or disabled.

FIG. 38 Security tab - showing NetLinx Master security options

By default, Master Security and SSL Enable are disabled (unchecked), including the Master Security subcomponents: Terminal Access, HTTP Access, Telnet Access, and Security Configuration Access.

4.Click on the checkbox next to Master Security to enable the security on the target Master. Placing a check in this field allows you to alter the security properties for the remaining Master Security options (Terminal/HTTP/Telnet/Security Configuration). Refer to the Security tab - Enable Security page section on page 38 for more detailed field descriptions.

Each selection simply toggles the security setting from enabled to disabled. Click OK after making any changes to these features so that those alterations are then saved to the target Master.

5.Before enabling the SSL security, a user must first develop and then install a self-generated Certificate onto the Master. Refer to the Self-Generating a SSL Server Certificate Request section on page 62.

This initial installation allows users to then later install the different types of certificates (requested, self-generated, or regenerated).

NetLinx Integrated Controllers

51

 

 

 

 

Image 57
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Front and rear panel components Program port RS232 Ethernet 10/100 connectorInput LED yellow Output LED red Status LED green Front RearNXC-ME260 Specifications SpecificationsOptional Accessories Included AccessoriesRear panel LEDs ICSNet/ICSHub Rear panel LEDs EthernetProduct Information Baud rate settings Setting the Program Port DIP SwitchBaud Rate Settings Program Run Disable PRD modeFaceplate Securing Baud rate DIP Setting the Program Port DIP switchRed FaceplatePreparing captive wires Wiring GuidelinesModes and Front Panel LED Blink Patterns Modes and LED Blink PatternsWiring Length Guidelines @ 750 mA Wiring length guidelinesWiring a 2-pin power connection Using the 4-pin mini-Phoenix connector for data and powerLocal +12 VDC power supply coming from the PSN power supply Program Port Connections and WiringPWR + GNDICSNet RJ-45 Connections/Wiring RS232 Program port front panelPin Program port rear panel ICSHub in Pinouts and Signals ICSHub RJ-45 Connections/WiringRJ-45 Pinout Information EIA/TIA 568 B ICSHub in portICSHub OUT Pinouts and Signals Ethernet 10/100 Base-T RJ-45 Connections/WiringEthernet RJ-45 Pinouts and Signals ICSHub OUT portEthernet ports used by the ME260 SPE Port Connection/WiringEthernet Ports Used by the ME260 Port type Description Standard Port #SPE cable pinout information SPE Connector Pinouts and SignalsMounting the ME260 into an NXS-NMS NXC-ME260 Installation and Mounting ProceduresMounting the NXS-NMS Into an Equipment Rack ProgramMounting the NXC-ME260 in an NXF CardFrame or NXI Master card slot on NXF CardFrame rear panelMaster Card slot on NXI rear panel Replacing the Lithium Batteries Battery CR2032 type 20mm coin cell SocketInstallation and Wiring Before beginning Communicating with the Master via the Program PortVerifying the current version of NetLinx Master firmware Assigning Communication Settings and Baud RatesSetting the System Value Select Diagnostics Device Addressing from the Main menuShowing the current version of the NetLinx Studio Working with multiple NetLinx Masters Changing the system value on the Modero panelPress the System Connection button Device Addressing dialog changing the device value Changing the Device Address on a Netlinx DeviceRecommended NetLinx Device numbers Changing the device address on the Modero panelAxcess Devices use Axcess standards 301Obtaining the Master’s IP Address using Dhcp Resetting the Factory Default System and Device ValuesNetwork Addresses dialog showing Get IP Select Diagnostics Network Addresses from the Main menu Assigning a Static IP to the NetLinx MasterUsed to assign an IP Address Communicating with the NetLinx Master via an IP Assigning Communication Settings and TCP/IP SettingsInstalling New NetLinx Master Firmware via an IP Selected Firmware file Firmware download statusSystem Number Communication and Firmware Update Communication and Firmware Update Supported Browser and Feature Compatibility NetLinx Security web browser and feature supportOS Platform Safari YesNew Master Firmware Security Features NetLinx Security TermsNetLinx Security Terms WebControl Tab Accessing the NetLinx Master via an IP AddressDefault Security Configuration WebControl Tab FeaturesDefault Security Configuration Feature Description System section Security Tab FeaturesSecurity Tab Groups sectionSecurity System Features Security tab Enable SecurityDefault password can no longer be used to gain access Administrator’s user passwordsSecurity tab Add Group Add Group EntriesModify Group Entries Security tab Modify GroupPress Delete to remove the selected group from the list Security tab Group Directory AssociationsAuthorized groups on the Master Directories pathnames present on the target MasterValid Directory Association Entries Group Directory Association EntriesPath Description Security tab Add User Security Config AccessAdd User Entries Sensitive and must be uniqueModify User Entries Security tab Modify UserMust be unique Security tab User Directory AssociationsUser Directory Association Entries Enables access to the user directory and all filesSubdirectories in that user directory New user is selectedSecurity tab SSL Server Certificate Server Certificate EntriesCommon Name can not be an IP Address Security configuration session, void any changes made to Information from the certificate currently installed onIs an alpha-numeric string 1 50 characters in length Create Request Takes the information entered intoSecurity tab Import Certificate Security tab Export Certificate RequestSystem Tab Show Devices TabNetwork Tab Security tab showing NetLinx Master security options Master Security Setup ProceduresSecurity tab showing the Add Group fields Adding a Group and assigning their access rightsSecurity tab showing the Modify Group access rights fields Modifying an existing Group’s access rightsDeleting an existing Group Showing a list of authorized GroupsSecurity tab showing the Group Directory Associations fields Adding a Group directory associationConfirming the new directory association Click the Directory Associations linkDeleting a directory association NetLinx cannot be used since they already exist Adding a User and configuring their access rightsSecurity tab showing the Modify User Configurations fields Modifying an existing User’s access rightsDeleting a User Showing a list of authorized UsersSecurity tab showing the User Directory Associations fields Adding a User directory associationSSL Certificate Procedures City/province name must be fully spelled out Self-Generating a SSL Server Certificate RequestState/province name must be fully spelled out Creating a Request for a SSL Server CertificateYOU can not Request Another Certificate Until the Previous Before importing a CA server certificate, you mustRegenerating an SSL Server Certificate Request Display SSL Server Certificate InformationBefore exiting the Master and beginning another session Common Steps for Requesting a Certificate from a CANetLinx Security and Web Server Security Alert and Certificate popups Accessing an SSL-Enabled Master via an IP AddressClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel ME260 cannot use firmware greater then Using your NetLinx Master to control the G3 panelWhat to do when a Certificate Expires Initial Setup via a Terminal Connection NetLinx Security FeaturesNetLinx Security Features Establishing a Terminal connectionStop bits1, and Flow control None default is Hardware Accessing the Security configuration optionsTerminal Security Options Menu Command DescriptionOption 2 Display system security options for NetLinx Master Option 3 Add userEdit User Menu Option 4 Edit UserEdit User Menu Option 5 Delete user Access Rights MenuOption 6 Show the list of authorized users Option 7 Add GroupPath Subdirectories in the user directoryGranted to that file Edit Group menu Delete directory association Option 9 Delete Group Option 8 Edit GroupOption 12 Display Telnet Timeout in seconds Option 11 Set Telnet Timeout in secondsOption 10 Show List of Authorized Groups Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help Menu Options Help menuLogging Into a Session Setup Security LogoutHelp Security Program Port Commands PC COM Port Communication SettingsProgram Port Commands Master-to-Master systems Prompts you to enter the new date for the Master CardDisplays the current time on the Master Card Prompts you to enter the new time for the Master CardDisk Free Releases the Dhcp setting for the Master Card Reboots the Master Card or specified deviceTo exit pass mode, type + + esc esc Or LinuxSends a command to a device. The device can be on any system Sets the Master-to-Master route modeDisplays a list of all devices present on the bus Example Displays a list of any combined devices ExampleMaster logs all internal messages and keeps the most recent Displays the log of messages stored in the Masters memoryIf end is not entered, the last 20 messages will be shown Most recent ExampleDesired from what device Example NetLinx mastersSystems listed are in numerical order Example ESC Pass Codes ESC Pass CodesLinux Telnet client Windows client programsProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.