AMX NXC-ME260 instruction manual Creating a Request for a SSL Server Certificate

Page 69

NetLinx Security and Web Server

11.Choose Self Generate Certificate from the drop-down list. When this request is submitted, the certificate is generated and installed into the Master in one step.

12.Click OK to save the new encrypted certificate information to the Master or click Cancel to void any changes made within this tab and exit without making changes to the target Master.

ONLY use the Regenerate certificate option when you have Self Generated your own certificate. DO NOT regenerate an external CA-generated certificate.

13.Click the Security tab > Enable Security link to return to the Enable Security page.

14.Place a checkmark into the SSL Enable selection box to enable the SSL security feature on the target Master. Activating this option creates a secure connection to and from the target

Master. It is recommended that a secure connection to the target Master be used when importing a CA server certificate.

Creating a Request for a SSL Server Certificate

1.Click on the Security tab. Refer to the Security tab - SSL Server Certificate page section on page 47 for more detailed descriptions on the security configuration options.

2.Click the Server Certificate link (on the left of the browser window) to display the Security tab with the fields necessary for generating a new certificate.

3.Click the down arrow from the Bit length field to open a drop-down listing of available public key lengths.

The three available public key lengths are: 512, 1024, and 2048. Higher selected key lengths result in increased certificate processing times. A longer key length results in more secure certificates.

4.Enter the used Domain Name.

Example: If the address being used is www.amxuser.com, that must be the Common name and format used in the Common Name field. This string provides a unique name for the desired user.

This domain name must be associated to a resolvable URL Address when creating a request for a purchased certificate. The address does not need to be resolvable when obtaining a free certificate.

5.Enter the name of the business or organization into the Organization Name field. This is an alpha-numeric string (1 - 50 characters in length).

6.Enter the name of the department using the certificate into the Organizational Unit field. This is an alpha-numeric string (1 - 50 characters in length).

7.Enter the name of the city where the certificate will reside into the City/Location field. This is an alpha-numeric string (1 - 50 characters in length).

8.Enter the name of the state or province where the certificate will reside into the State/Province field. This is an alpha-numeric string (1 - 50 characters in length).

The state/province name must be fully spelled out.

9.Click the down arrow from the Country Name field to open a drop-down listing of listing of currently selectable countries.

NetLinx Integrated Controllers

63

 

 

 

 

Image 69
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Front and rear panel components Program port RS232 Ethernet 10/100 connectorInput LED yellow Output LED red Status LED green Front RearNXC-ME260 Specifications SpecificationsOptional Accessories Included AccessoriesRear panel LEDs ICSNet/ICSHub Rear panel LEDs EthernetProduct Information Baud rate settings Setting the Program Port DIP SwitchBaud Rate Settings Program Run Disable PRD modeFaceplate Securing Baud rate DIP Setting the Program Port DIP switchRed FaceplatePreparing captive wires Wiring GuidelinesModes and Front Panel LED Blink Patterns Modes and LED Blink PatternsWiring Length Guidelines @ 750 mA Wiring length guidelinesWiring a 2-pin power connection Using the 4-pin mini-Phoenix connector for data and powerLocal +12 VDC power supply coming from the PSN power supply Program Port Connections and WiringPWR + GNDICSNet RJ-45 Connections/Wiring RS232 Program port front panelPin Program port rear panel ICSHub in Pinouts and Signals ICSHub RJ-45 Connections/WiringRJ-45 Pinout Information EIA/TIA 568 B ICSHub in portICSHub OUT Pinouts and Signals Ethernet 10/100 Base-T RJ-45 Connections/WiringEthernet RJ-45 Pinouts and Signals ICSHub OUT portEthernet ports used by the ME260 SPE Port Connection/WiringEthernet Ports Used by the ME260 Port type Description Standard Port #SPE cable pinout information SPE Connector Pinouts and SignalsMounting the ME260 into an NXS-NMS NXC-ME260 Installation and Mounting ProceduresMounting the NXS-NMS Into an Equipment Rack ProgramMounting the NXC-ME260 in an NXF CardFrame or NXI Master card slot on NXF CardFrame rear panelMaster Card slot on NXI rear panel Replacing the Lithium Batteries Battery CR2032 type 20mm coin cell SocketInstallation and Wiring Before beginning Communicating with the Master via the Program PortVerifying the current version of NetLinx Master firmware Assigning Communication Settings and Baud RatesSetting the System Value Select Diagnostics Device Addressing from the Main menuShowing the current version of the NetLinx Studio Working with multiple NetLinx Masters Changing the system value on the Modero panelPress the System Connection button Device Addressing dialog changing the device value Changing the Device Address on a Netlinx DeviceRecommended NetLinx Device numbers Changing the device address on the Modero panelAxcess Devices use Axcess standards 301Obtaining the Master’s IP Address using Dhcp Resetting the Factory Default System and Device ValuesNetwork Addresses dialog showing Get IP Select Diagnostics Network Addresses from the Main menu Assigning a Static IP to the NetLinx MasterUsed to assign an IP Address Communicating with the NetLinx Master via an IP Assigning Communication Settings and TCP/IP SettingsInstalling New NetLinx Master Firmware via an IP Selected Firmware file Firmware download statusSystem Number Communication and Firmware Update Communication and Firmware Update Supported Browser and Feature Compatibility NetLinx Security web browser and feature supportOS Platform Safari YesNew Master Firmware Security Features NetLinx Security TermsNetLinx Security Terms WebControl Tab Accessing the NetLinx Master via an IP AddressDefault Security Configuration WebControl Tab FeaturesDefault Security Configuration Feature Description System section Security Tab FeaturesSecurity Tab Groups sectionSecurity System Features Security tab Enable SecurityDefault password can no longer be used to gain access Administrator’s user passwordsSecurity tab Add Group Add Group EntriesModify Group Entries Security tab Modify GroupPress Delete to remove the selected group from the list Security tab Group Directory AssociationsAuthorized groups on the Master Directories pathnames present on the target MasterValid Directory Association Entries Group Directory Association EntriesPath Description Security tab Add User Security Config AccessAdd User Entries Sensitive and must be uniqueModify User Entries Security tab Modify UserMust be unique Security tab User Directory AssociationsUser Directory Association Entries Enables access to the user directory and all filesSubdirectories in that user directory New user is selectedSecurity tab SSL Server Certificate Server Certificate EntriesCommon Name can not be an IP Address Security configuration session, void any changes made to Information from the certificate currently installed onIs an alpha-numeric string 1 50 characters in length Create Request Takes the information entered intoSecurity tab Import Certificate Security tab Export Certificate RequestSystem Tab Show Devices TabNetwork Tab Security tab showing NetLinx Master security options Master Security Setup ProceduresSecurity tab showing the Add Group fields Adding a Group and assigning their access rightsSecurity tab showing the Modify Group access rights fields Modifying an existing Group’s access rightsDeleting an existing Group Showing a list of authorized GroupsSecurity tab showing the Group Directory Associations fields Adding a Group directory associationConfirming the new directory association Click the Directory Associations linkDeleting a directory association NetLinx cannot be used since they already exist Adding a User and configuring their access rightsSecurity tab showing the Modify User Configurations fields Modifying an existing User’s access rightsDeleting a User Showing a list of authorized UsersSecurity tab showing the User Directory Associations fields Adding a User directory associationSSL Certificate Procedures City/province name must be fully spelled out Self-Generating a SSL Server Certificate RequestState/province name must be fully spelled out Creating a Request for a SSL Server CertificateYOU can not Request Another Certificate Until the Previous Before importing a CA server certificate, you mustRegenerating an SSL Server Certificate Request Display SSL Server Certificate InformationBefore exiting the Master and beginning another session Common Steps for Requesting a Certificate from a CANetLinx Security and Web Server Security Alert and Certificate popups Accessing an SSL-Enabled Master via an IP AddressClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel ME260 cannot use firmware greater then Using your NetLinx Master to control the G3 panelWhat to do when a Certificate Expires Initial Setup via a Terminal Connection NetLinx Security FeaturesNetLinx Security Features Establishing a Terminal connectionStop bits1, and Flow control None default is Hardware Accessing the Security configuration optionsTerminal Security Options Menu Command DescriptionOption 2 Display system security options for NetLinx Master Option 3 Add userEdit User Menu Option 4 Edit UserEdit User Menu Option 5 Delete user Access Rights MenuOption 6 Show the list of authorized users Option 7 Add GroupPath Subdirectories in the user directoryGranted to that file Edit Group menu Delete directory association Option 9 Delete Group Option 8 Edit GroupOption 12 Display Telnet Timeout in seconds Option 11 Set Telnet Timeout in secondsOption 10 Show List of Authorized Groups Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help Menu Options Help menuLogging Into a Session Setup Security LogoutHelp Security Program Port Commands PC COM Port Communication SettingsProgram Port Commands Master-to-Master systems Prompts you to enter the new date for the Master CardDisplays the current time on the Master Card Prompts you to enter the new time for the Master CardDisk Free Releases the Dhcp setting for the Master Card Reboots the Master Card or specified deviceTo exit pass mode, type + + esc esc Or LinuxSends a command to a device. The device can be on any system Sets the Master-to-Master route modeDisplays a list of all devices present on the bus Example Displays a list of any combined devices ExampleMaster logs all internal messages and keeps the most recent Displays the log of messages stored in the Masters memoryIf end is not entered, the last 20 messages will be shown Most recent ExampleDesired from what device Example NetLinx mastersSystems listed are in numerical order Example ESC Pass Codes ESC Pass CodesLinux Telnet client Windows client programsProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.