AMX NXC-ME260 instruction manual Self-Generating a SSL Server Certificate Request

Page 68

NetLinx Security and Web Server

Self-Generating a SSL Server Certificate Request

1.Click on the Security tab (FIG. 45). Refer to the Security tab - SSL Server Certificate

page section on page 47 for more detailed descriptions on the security configuration options.

2.Click the Server Certificate link (on the left of the browser window) to display the Security tab with the fields necessary for developing a new certificate.

FIG. 45 Security tab - showing the Server Certificate creation fields

3.Click the down arrow from the Bit length field to open a drop-down listing of available public key lengths.

The three available public key lengths are: 512, 1024, and 2048. Higher selected key lengths result is increased certificate processing times. A larger the key length results in more secure certificates.

4.Enter the Domain Name.

Example: If the address being used is www.amxuser.com, that must be the Common name and format used in the Common Name field. This string provides a unique name for the desired user.

This domain name does not need to be resolvable URL Address when

self-generating a certificate.

5.Enter the name of the business or organization into the Organization Name field. This is an alpha-numeric string (1 - 50 characters in length).

6.Enter the name of the department using the certificate into the Organizational Unit field. This is an alpha-numeric string (1 - 50 characters in length).

7.Enter the name of the city where the certificate will reside into the City/Location field. This is an alpha-numeric string (1 - 50 characters in length).

8.Enter the name of the state or province where the certificate will reside into the State/Province field. This is an alpha-numeric string (1 - 50 characters in length).

The city/province name must be fully spelled out.

9.Click the down arrow from the Country Name field to open a drop-down listing of listing of currently selectable countries.

10.Click the down arrow from the Action field to open a drop-down listing of available certificate generation options.

 

62

NetLinx Integrated Controllers

 

 

 

Image 68
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Program port RS232 Ethernet 10/100 connector Front and rear panel componentsInput LED yellow Output LED red Status LED green Front RearSpecifications NXC-ME260 SpecificationsIncluded Accessories Optional AccessoriesRear panel LEDs ICSNet/ICSHub Rear panel LEDs EthernetProduct Information Setting the Program Port DIP Switch Baud rate settingsBaud Rate Settings Program Run Disable PRD modeSetting the Program Port DIP switch Faceplate Securing Baud rate DIPRed FaceplateWiring Guidelines Preparing captive wiresModes and Front Panel LED Blink Patterns Modes and LED Blink PatternsWiring length guidelines Wiring Length Guidelines @ 750 mAWiring a 2-pin power connection Using the 4-pin mini-Phoenix connector for data and powerProgram Port Connections and Wiring Local +12 VDC power supply coming from the PSN power supplyPWR + GNDPin Program port rear panel ICSNet RJ-45 Connections/WiringRS232 Program port front panel ICSHub RJ-45 Connections/Wiring ICSHub in Pinouts and SignalsRJ-45 Pinout Information EIA/TIA 568 B ICSHub in portEthernet 10/100 Base-T RJ-45 Connections/Wiring ICSHub OUT Pinouts and SignalsEthernet RJ-45 Pinouts and Signals ICSHub OUT portSPE Port Connection/Wiring Ethernet ports used by the ME260Ethernet Ports Used by the ME260 Port type Description Standard Port #SPE Connector Pinouts and Signals SPE cable pinout informationNXC-ME260 Installation and Mounting Procedures Mounting the ME260 into an NXS-NMSMounting the NXS-NMS Into an Equipment Rack ProgramMaster Card slot on NXI rear panel Mounting the NXC-ME260 in an NXF CardFrame or NXIMaster card slot on NXF CardFrame rear panel Battery CR2032 type 20mm coin cell Socket Replacing the Lithium BatteriesInstallation and Wiring Communicating with the Master via the Program Port Before beginningAssigning Communication Settings and Baud Rates Verifying the current version of NetLinx Master firmwareShowing the current version of the NetLinx Studio Setting the System ValueSelect Diagnostics Device Addressing from the Main menu Press the System Connection button Working with multiple NetLinx MastersChanging the system value on the Modero panel Changing the Device Address on a Netlinx Device Device Addressing dialog changing the device valueChanging the device address on the Modero panel Recommended NetLinx Device numbersAxcess Devices use Axcess standards 301Resetting the Factory Default System and Device Values Obtaining the Master’s IP Address using DhcpNetwork Addresses dialog showing Get IP Used to assign an IP Address Select Diagnostics Network Addresses from the Main menuAssigning a Static IP to the NetLinx Master Assigning Communication Settings and TCP/IP Settings Communicating with the NetLinx Master via an IPInstalling New NetLinx Master Firmware via an IP System Number Selected Firmware fileFirmware download status Communication and Firmware Update Communication and Firmware Update NetLinx Security web browser and feature support Supported Browser and Feature CompatibilityOS Platform Safari YesNetLinx Security Terms New Master Firmware Security FeaturesNetLinx Security Terms Accessing the NetLinx Master via an IP Address WebControl TabDefault Security Configuration Default Security ConfigurationWebControl Tab Features Security Tab Features Feature Description System sectionSecurity Tab Groups sectionSecurity tab Enable Security Security System FeaturesAdministrator’s user passwords Default password can no longer be used to gain accessSecurity tab Add Group Add Group EntriesSecurity tab Modify Group Modify Group EntriesSecurity tab Group Directory Associations Press Delete to remove the selected group from the listAuthorized groups on the Master Directories pathnames present on the target MasterPath Description Valid Directory Association EntriesGroup Directory Association Entries Security Config Access Security tab Add UserAdd User Entries Sensitive and must be uniqueSecurity tab Modify User Modify User EntriesSecurity tab User Directory Associations Must be uniqueEnables access to the user directory and all files User Directory Association EntriesSubdirectories in that user directory New user is selectedCommon Name can not be an IP Address Security tab SSL Server CertificateServer Certificate Entries Information from the certificate currently installed on Security configuration session, void any changes made toIs an alpha-numeric string 1 50 characters in length Create Request Takes the information entered intoSecurity tab Export Certificate Request Security tab Import CertificateNetwork Tab System TabShow Devices Tab Master Security Setup Procedures Security tab showing NetLinx Master security optionsAdding a Group and assigning their access rights Security tab showing the Add Group fieldsModifying an existing Group’s access rights Security tab showing the Modify Group access rights fieldsShowing a list of authorized Groups Deleting an existing GroupAdding a Group directory association Security tab showing the Group Directory Associations fieldsDeleting a directory association Confirming the new directory associationClick the Directory Associations link Adding a User and configuring their access rights NetLinx cannot be used since they already existModifying an existing User’s access rights Security tab showing the Modify User Configurations fieldsShowing a list of authorized Users Deleting a UserAdding a User directory association Security tab showing the User Directory Associations fieldsSSL Certificate Procedures Self-Generating a SSL Server Certificate Request City/province name must be fully spelled outCreating a Request for a SSL Server Certificate State/province name must be fully spelled outBefore importing a CA server certificate, you must YOU can not Request Another Certificate Until the PreviousDisplay SSL Server Certificate Information Regenerating an SSL Server Certificate RequestCommon Steps for Requesting a Certificate from a CA Before exiting the Master and beginning another sessionNetLinx Security and Web Server Accessing an SSL-Enabled Master via an IP Address Security Alert and Certificate popupsClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel Using your NetLinx Master to control the G3 panel ME260 cannot use firmware greater thenWhat to do when a Certificate Expires NetLinx Security Features Initial Setup via a Terminal ConnectionNetLinx Security Features Establishing a Terminal connectionAccessing the Security configuration options Stop bits1, and Flow control None default is HardwareTerminal Command Description Security Options MenuOption 2 Display system security options for NetLinx Master Option 3 Add userOption 4 Edit User Edit User MenuEdit User Menu Access Rights Menu Option 5 Delete userOption 6 Show the list of authorized users Option 7 Add GroupGranted to that file PathSubdirectories in the user directory Edit Group menu Delete directory association Option 8 Edit Group Option 9 Delete GroupOption 11 Set Telnet Timeout in seconds Option 12 Display Telnet Timeout in secondsOption 10 Show List of Authorized Groups Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help menu Help Menu OptionsLogging Into a Session Help Security Setup SecurityLogout Program Port Commands Program Port CommandsPC COM Port Communication Settings Prompts you to enter the new date for the Master Card Master-to-Master systemsDisplays the current time on the Master Card Prompts you to enter the new time for the Master CardDisk Free Reboots the Master Card or specified device Releases the Dhcp setting for the Master CardTo exit pass mode, type + + esc esc Or LinuxSets the Master-to-Master route mode Sends a command to a device. The device can be on any systemDisplays a list of any combined devices Example Displays a list of all devices present on the bus ExampleDisplays the log of messages stored in the Masters memory Master logs all internal messages and keeps the most recentIf end is not entered, the last 20 messages will be shown Most recent ExampleSystems listed are in numerical order Example Desired from what device ExampleNetLinx masters ESC Pass Codes ESC Pass CodesWindows client programs Linux Telnet clientProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.