AMX NXC-ME260 instruction manual Adding a Group directory association

Page 61

NetLinx Security and Web Server

Adding a Group directory association

1.Click on the Security tab. By default this tab is blank until a security option is selected from the left of the browser window. Refer to the Security tab - Group Directory Associations page section on page 41 for more detailed descriptions on the security configuration options.

2.Click the Directory Associations link (on the left of the browser window) to populate the Security tab with the directory associations assigned to the selected group (FIG. 41).

Directory pathnames present on the target Master

FIG. 41 Security tab - showing the Group Directory Associations fields

3.Click the down arrow from the Select Group field to open a drop-down listing of authorized groups. Initially, administrator is listed as a default group.

The Add Association field displays the current directory folders that currently reside within the target Master. These can consist of G3 HTML project folders, data file folders, etc.

4.Enter a new directory association path into the Adding Association field. This character string can range from 1 - 128 alpha-numeric characters. This string is case sensitive. This information is the path to the file or directory to which you want to grant access. A single '/' is sufficient to grant access to all files and directories in the user directory and it's subdirectory. The '/*' wildcard can also be added to enable access to all files. All entries should start with a '/'. Here are some examples of valid entries:

Valid Directory Association Entries

Path

Description

 

 

/

Enables access to the user directory and all files and

 

subdirectories in that user directory.

 

 

/*

Enables access to the user directory and all files and

 

subdirectories in that user directory.

 

 

/user1

If user1 is a file in the user directory, only the file is granted

 

access. If user1 is a subdirectory of the user directory, all files in

 

the user1 and its sub-directories are granted access.

 

 

/user1/

user1 is a subdirectory of the user directory. All files in the

 

user1 and its sub-directories are granted access.

 

 

/Room1/iWebControlPages/*

/Room1/iWebControlPages is a subdirectory and all files and

 

its subdirectories are granted access.

 

 

NetLinx Integrated Controllers

55

 

 

 

 

Image 61
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Front and rear panel components Program port RS232 Ethernet 10/100 connectorInput LED yellow Output LED red Status LED green Front RearNXC-ME260 Specifications SpecificationsOptional Accessories Included AccessoriesRear panel LEDs ICSNet/ICSHub Rear panel LEDs EthernetProduct Information Baud rate settings Setting the Program Port DIP SwitchBaud Rate Settings Program Run Disable PRD modeFaceplate Securing Baud rate DIP Setting the Program Port DIP switchRed FaceplatePreparing captive wires Wiring GuidelinesModes and Front Panel LED Blink Patterns Modes and LED Blink PatternsWiring Length Guidelines @ 750 mA Wiring length guidelinesWiring a 2-pin power connection Using the 4-pin mini-Phoenix connector for data and powerLocal +12 VDC power supply coming from the PSN power supply Program Port Connections and WiringPWR + GNDRS232 Program port front panel ICSNet RJ-45 Connections/WiringPin Program port rear panel ICSHub in Pinouts and Signals ICSHub RJ-45 Connections/WiringRJ-45 Pinout Information EIA/TIA 568 B ICSHub in portICSHub OUT Pinouts and Signals Ethernet 10/100 Base-T RJ-45 Connections/WiringEthernet RJ-45 Pinouts and Signals ICSHub OUT portEthernet ports used by the ME260 SPE Port Connection/WiringEthernet Ports Used by the ME260 Port type Description Standard Port #SPE cable pinout information SPE Connector Pinouts and SignalsMounting the ME260 into an NXS-NMS NXC-ME260 Installation and Mounting ProceduresMounting the NXS-NMS Into an Equipment Rack ProgramMaster card slot on NXF CardFrame rear panel Mounting the NXC-ME260 in an NXF CardFrame or NXIMaster Card slot on NXI rear panel Replacing the Lithium Batteries Battery CR2032 type 20mm coin cell SocketInstallation and Wiring Before beginning Communicating with the Master via the Program PortVerifying the current version of NetLinx Master firmware Assigning Communication Settings and Baud RatesSelect Diagnostics Device Addressing from the Main menu Setting the System ValueShowing the current version of the NetLinx Studio Changing the system value on the Modero panel Working with multiple NetLinx MastersPress the System Connection button Device Addressing dialog changing the device value Changing the Device Address on a Netlinx DeviceRecommended NetLinx Device numbers Changing the device address on the Modero panelAxcess Devices use Axcess standards 301Obtaining the Master’s IP Address using Dhcp Resetting the Factory Default System and Device ValuesNetwork Addresses dialog showing Get IP Assigning a Static IP to the NetLinx Master Select Diagnostics Network Addresses from the Main menuUsed to assign an IP Address Communicating with the NetLinx Master via an IP Assigning Communication Settings and TCP/IP SettingsInstalling New NetLinx Master Firmware via an IP Firmware download status Selected Firmware fileSystem Number Communication and Firmware Update Communication and Firmware Update Supported Browser and Feature Compatibility NetLinx Security web browser and feature supportOS Platform Safari YesNetLinx Security Terms New Master Firmware Security FeaturesNetLinx Security Terms WebControl Tab Accessing the NetLinx Master via an IP AddressWebControl Tab Features Default Security ConfigurationDefault Security Configuration Feature Description System section Security Tab FeaturesSecurity Tab Groups sectionSecurity System Features Security tab Enable SecurityDefault password can no longer be used to gain access Administrator’s user passwordsSecurity tab Add Group Add Group EntriesModify Group Entries Security tab Modify GroupPress Delete to remove the selected group from the list Security tab Group Directory AssociationsAuthorized groups on the Master Directories pathnames present on the target MasterGroup Directory Association Entries Valid Directory Association EntriesPath Description Security tab Add User Security Config AccessAdd User Entries Sensitive and must be uniqueModify User Entries Security tab Modify UserMust be unique Security tab User Directory AssociationsUser Directory Association Entries Enables access to the user directory and all filesSubdirectories in that user directory New user is selectedServer Certificate Entries Security tab SSL Server CertificateCommon Name can not be an IP Address Security configuration session, void any changes made to Information from the certificate currently installed onIs an alpha-numeric string 1 50 characters in length Create Request Takes the information entered intoSecurity tab Import Certificate Security tab Export Certificate RequestShow Devices Tab System TabNetwork Tab Security tab showing NetLinx Master security options Master Security Setup ProceduresSecurity tab showing the Add Group fields Adding a Group and assigning their access rightsSecurity tab showing the Modify Group access rights fields Modifying an existing Group’s access rightsDeleting an existing Group Showing a list of authorized GroupsSecurity tab showing the Group Directory Associations fields Adding a Group directory associationClick the Directory Associations link Confirming the new directory associationDeleting a directory association NetLinx cannot be used since they already exist Adding a User and configuring their access rightsSecurity tab showing the Modify User Configurations fields Modifying an existing User’s access rightsDeleting a User Showing a list of authorized UsersSecurity tab showing the User Directory Associations fields Adding a User directory associationSSL Certificate Procedures City/province name must be fully spelled out Self-Generating a SSL Server Certificate RequestState/province name must be fully spelled out Creating a Request for a SSL Server CertificateYOU can not Request Another Certificate Until the Previous Before importing a CA server certificate, you mustRegenerating an SSL Server Certificate Request Display SSL Server Certificate InformationBefore exiting the Master and beginning another session Common Steps for Requesting a Certificate from a CANetLinx Security and Web Server Security Alert and Certificate popups Accessing an SSL-Enabled Master via an IP AddressClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel ME260 cannot use firmware greater then Using your NetLinx Master to control the G3 panelWhat to do when a Certificate Expires Initial Setup via a Terminal Connection NetLinx Security FeaturesNetLinx Security Features Establishing a Terminal connectionStop bits1, and Flow control None default is Hardware Accessing the Security configuration optionsTerminal Security Options Menu Command DescriptionOption 2 Display system security options for NetLinx Master Option 3 Add userEdit User Menu Option 4 Edit UserEdit User Menu Option 5 Delete user Access Rights MenuOption 6 Show the list of authorized users Option 7 Add GroupSubdirectories in the user directory PathGranted to that file Edit Group menu Delete directory association Option 9 Delete Group Option 8 Edit GroupOption 12 Display Telnet Timeout in seconds Option 11 Set Telnet Timeout in secondsOption 10 Show List of Authorized Groups Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help Menu Options Help menuLogging Into a Session Logout Setup SecurityHelp Security PC COM Port Communication Settings Program Port CommandsProgram Port Commands Master-to-Master systems Prompts you to enter the new date for the Master CardDisplays the current time on the Master Card Prompts you to enter the new time for the Master CardDisk Free Releases the Dhcp setting for the Master Card Reboots the Master Card or specified deviceTo exit pass mode, type + + esc esc Or LinuxSends a command to a device. The device can be on any system Sets the Master-to-Master route modeDisplays a list of all devices present on the bus Example Displays a list of any combined devices ExampleMaster logs all internal messages and keeps the most recent Displays the log of messages stored in the Masters memoryIf end is not entered, the last 20 messages will be shown Most recent ExampleNetLinx masters Desired from what device ExampleSystems listed are in numerical order Example ESC Pass Codes ESC Pass CodesLinux Telnet client Windows client programsProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.