AMX NXC-ME260 instruction manual Accessing an SSL-Enabled Master via an IP Address

Page 74

NetLinx Security and Web Server

Accessing an SSL-Enabled Master via an IP Address

1.Enter the IP Address of the target Master (example: 198.198.99.99) into the web browser Address field.

2.Press the Enter key on your keyboard to begin the communication process between the target Master and your computer.

3.The user is then presented with a Security Alert popup window and Certificate information (FIG. 46).

FIG. 46 Security Alert and Certificate popups

The above alert will only appear if an SSL Server Certificate has been installed on the target Master, the SSL Enable options has been enabled, from within the Enable Security window of the Security tab, and there is a problem with the site’s certificate.

Problems with the certificate can result from:

A self generated and self-signed certificate that hasn’t been approved by a CA.

The self-generated certificate is not part of that computer’s web browser list of trusted sites. This changes after the certificate is installed into the user’s browser list of trusted sites.

The date period given to the certificate has expired. CA-approved certificates typically come with a 2 year window of validity. Self generate certificates come defaulted with a 30 year window of validity (see FIG. 46).

The name on the security certificate site information doesn’t match the domain name of the target Master.

4.Click the View Certificate button on the Security Alert popup to view more detailed information about the certificate. A secondary Certificate popup window is then displayed.

5.Review the information presented within the certificate and if you trust that both the site and certificate information are correct, click the Install Certificate button to begin installing the certificate into computer’s web browser list of trusted sites.

 

68

NetLinx Integrated Controllers

 

 

 

Image 74
Contents NXC-ME260 AMX Limited Warranty and Disclaimer Table of Contents Communication and Firmware Update NetLinx Security with a Terminal Connection Programming Input LED yellow Output LED red Status LED green Program port RS232 Ethernet 10/100 connectorFront and rear panel components Front RearSpecifications NXC-ME260 SpecificationsRear panel LEDs ICSNet/ICSHub Included AccessoriesOptional Accessories Rear panel LEDs EthernetProduct Information Baud Rate Settings Setting the Program Port DIP SwitchBaud rate settings Program Run Disable PRD modeRed Setting the Program Port DIP switchFaceplate Securing Baud rate DIP FaceplateModes and Front Panel LED Blink Patterns Wiring GuidelinesPreparing captive wires Modes and LED Blink PatternsWiring a 2-pin power connection Wiring length guidelinesWiring Length Guidelines @ 750 mA Using the 4-pin mini-Phoenix connector for data and powerPWR + Program Port Connections and WiringLocal +12 VDC power supply coming from the PSN power supply GNDPin Program port rear panel ICSNet RJ-45 Connections/WiringRS232 Program port front panel RJ-45 Pinout Information EIA/TIA 568 B ICSHub RJ-45 Connections/WiringICSHub in Pinouts and Signals ICSHub in portEthernet RJ-45 Pinouts and Signals Ethernet 10/100 Base-T RJ-45 Connections/WiringICSHub OUT Pinouts and Signals ICSHub OUT portEthernet Ports Used by the ME260 SPE Port Connection/WiringEthernet ports used by the ME260 Port type Description Standard Port #SPE Connector Pinouts and Signals SPE cable pinout informationMounting the NXS-NMS Into an Equipment Rack NXC-ME260 Installation and Mounting ProceduresMounting the ME260 into an NXS-NMS ProgramMaster Card slot on NXI rear panel Mounting the NXC-ME260 in an NXF CardFrame or NXIMaster card slot on NXF CardFrame rear panel Battery CR2032 type 20mm coin cell Socket Replacing the Lithium BatteriesInstallation and Wiring Communicating with the Master via the Program Port Before beginningAssigning Communication Settings and Baud Rates Verifying the current version of NetLinx Master firmwareShowing the current version of the NetLinx Studio Setting the System ValueSelect Diagnostics Device Addressing from the Main menu Press the System Connection button Working with multiple NetLinx MastersChanging the system value on the Modero panel Changing the Device Address on a Netlinx Device Device Addressing dialog changing the device valueAxcess Devices use Axcess standards Changing the device address on the Modero panelRecommended NetLinx Device numbers 301Resetting the Factory Default System and Device Values Obtaining the Master’s IP Address using DhcpNetwork Addresses dialog showing Get IP Used to assign an IP Address Select Diagnostics Network Addresses from the Main menuAssigning a Static IP to the NetLinx Master Assigning Communication Settings and TCP/IP Settings Communicating with the NetLinx Master via an IPInstalling New NetLinx Master Firmware via an IP System Number Selected Firmware fileFirmware download status Communication and Firmware Update Communication and Firmware Update OS Platform NetLinx Security web browser and feature supportSupported Browser and Feature Compatibility Safari YesNetLinx Security Terms New Master Firmware Security FeaturesNetLinx Security Terms Accessing the NetLinx Master via an IP Address WebControl TabDefault Security Configuration Default Security ConfigurationWebControl Tab Features Security Tab Security Tab FeaturesFeature Description System section Groups sectionSecurity tab Enable Security Security System FeaturesSecurity tab Add Group Administrator’s user passwordsDefault password can no longer be used to gain access Add Group EntriesSecurity tab Modify Group Modify Group EntriesAuthorized groups on the Master Security tab Group Directory AssociationsPress Delete to remove the selected group from the list Directories pathnames present on the target MasterPath Description Valid Directory Association EntriesGroup Directory Association Entries Add User Entries Security Config AccessSecurity tab Add User Sensitive and must be uniqueSecurity tab Modify User Modify User EntriesSecurity tab User Directory Associations Must be uniqueSubdirectories in that user directory Enables access to the user directory and all filesUser Directory Association Entries New user is selectedCommon Name can not be an IP Address Security tab SSL Server CertificateServer Certificate Entries Is an alpha-numeric string 1 50 characters in length Information from the certificate currently installed onSecurity configuration session, void any changes made to Create Request Takes the information entered intoSecurity tab Export Certificate Request Security tab Import CertificateNetwork Tab System TabShow Devices Tab Master Security Setup Procedures Security tab showing NetLinx Master security optionsAdding a Group and assigning their access rights Security tab showing the Add Group fieldsModifying an existing Group’s access rights Security tab showing the Modify Group access rights fieldsShowing a list of authorized Groups Deleting an existing GroupAdding a Group directory association Security tab showing the Group Directory Associations fieldsDeleting a directory association Confirming the new directory associationClick the Directory Associations link Adding a User and configuring their access rights NetLinx cannot be used since they already existModifying an existing User’s access rights Security tab showing the Modify User Configurations fieldsShowing a list of authorized Users Deleting a UserAdding a User directory association Security tab showing the User Directory Associations fieldsSSL Certificate Procedures Self-Generating a SSL Server Certificate Request City/province name must be fully spelled outCreating a Request for a SSL Server Certificate State/province name must be fully spelled outBefore importing a CA server certificate, you must YOU can not Request Another Certificate Until the PreviousDisplay SSL Server Certificate Information Regenerating an SSL Server Certificate RequestCommon Steps for Requesting a Certificate from a CA Before exiting the Master and beginning another sessionNetLinx Security and Web Server Accessing an SSL-Enabled Master via an IP Address Security Alert and Certificate popupsClick Next to proceed with the certificate store process Using your NetLinx Master to control the G4 panel Using your NetLinx Master to control the G3 panel ME260 cannot use firmware greater thenWhat to do when a Certificate Expires NetLinx Security Features NetLinx Security FeaturesInitial Setup via a Terminal Connection Establishing a Terminal connectionAccessing the Security configuration options Stop bits1, and Flow control None default is HardwareTerminal Option 2 Display system security options for NetLinx Master Command DescriptionSecurity Options Menu Option 3 Add userOption 4 Edit User Edit User MenuEdit User Menu Option 6 Show the list of authorized users Access Rights MenuOption 5 Delete user Option 7 Add GroupGranted to that file PathSubdirectories in the user directory Edit Group menu Delete directory association Option 8 Edit Group Option 9 Delete GroupOption 10 Show List of Authorized Groups Option 11 Set Telnet Timeout in secondsOption 12 Display Telnet Timeout in seconds Option 13 Make changes permanent by saving to flashMain Security Menu Main Security MenuAsked to verify this before the database is reset Help menu Help Menu OptionsLogging Into a Session Help Security Setup SecurityLogout Program Port Commands Program Port CommandsPC COM Port Communication Settings Displays the current time on the Master Card Prompts you to enter the new date for the Master CardMaster-to-Master systems Prompts you to enter the new time for the Master CardDisk Free To exit pass mode, type + + esc esc Reboots the Master Card or specified deviceReleases the Dhcp setting for the Master Card Or LinuxSets the Master-to-Master route mode Sends a command to a device. The device can be on any systemDisplays a list of any combined devices Example Displays a list of all devices present on the bus ExampleIf end is not entered, the last 20 messages will be shown Displays the log of messages stored in the Masters memoryMaster logs all internal messages and keeps the most recent Most recent ExampleSystems listed are in numerical order Example Desired from what device ExampleNetLinx masters ESC Pass Codes ESC Pass CodesWindows client programs Linux Telnet clientProgramming NXC-ME260 NetLinx Master-Ethernet Card/Module RevisionLast04/05/04
Related manuals
Manual 48 pages 57.87 Kb

NXC-ME260 specifications

The AMX NXC-ME260 is a cutting-edge piece of machinery designed to meet the demands of modern industrial environments. This equipment stands out due to its superior performance, enhanced efficiency, and innovative technologies, making it suitable for a wide range of applications.

One of the primary features of the NXC-ME260 is its robust design. Built with high-quality materials, this machine is engineered to withstand rigorous operating conditions, ensuring durability and longevity. The compact structure allows it to fit seamlessly into various workspaces, making it an ideal choice for operations with limited space.

Equipped with a powerful motor, the NXC-ME260 delivers exceptional speed and torque. This enables it to handle demanding tasks with ease, resulting in increased productivity. The machine’s advanced control system ensures precise operation, making it user-friendly and efficient. Its intuitive interface allows operators to quickly adapt to its functionalities, minimizing training time and boosting operational efficiency.

The NXC-ME260 integrates state-of-the-art technologies that enhance its performance. One of the standout features is its energy-efficient design, which reduces power consumption without compromising output. This makes the machine not only cost-effective but also an environmentally responsible choice for companies looking to reduce their carbon footprint.

Another significant technology incorporated in the NXC-ME260 is its intelligent monitoring system. This system provides real-time data on machine performance, allowing operators to make informed decisions and perform proactive maintenance. By predicting potential issues before they arise, the NXC-ME260 minimizes downtime and maintenance costs, ensuring uninterrupted operations.

Safety is paramount in any industrial setting, and the NXC-ME260 excels in this regard. It is equipped with multiple safety features, including emergency stop mechanisms and overload protection, ensuring operator safety and reducing the risk of accidents.

In summary, the AMX NXC-ME260 represents a convergence of power, efficiency, and safety-focused design. Its robust construction, advanced motor performance, intelligent monitoring system, and energy-efficient operation make it an invaluable asset for any industrial operation. Whether in manufacturing, logistics, or other sectors, the NXC-ME260 is engineered to enhance productivity while ensuring a safe working environment. Overall, this machine exemplifies the future of industrial equipment, bringing together technology and efficiency for optimal performance.