instruction manual NetLinx Integrated Controllers (NI-2000, NI-3000, and NI-4000) (Firmware build 300 or higher) N e t L i n x C e n t ra l C o n t r o l l e r s a n d C a r d s
AMX Limited Warranty and Disclaimer AMX Corporation warrants its products to be free of defects in material and workmanship under normal use for three (3) years from the date of purchase from AMX Corporation, with the following exceptions: • Electroluminescent and LCD Control Panels are warranted for three (3) years, except for the display and touch overlay components that are warranted for a period of one (1) year.
Table of Contents Table of Contents Introduction ...............................................................................................................1 NI-2000 Specifications ...................................................................................................... 2 NI-3000 Specifications ...................................................................................................... 6 NI-4000 Specifications ......................................................................
Table of Contents Installation and Upgrading .................................................................................... 33 Installing NetLinx Control Cards (NI-4000 Only) ............................................................. 33 Setting the NetLinx Control Card Addresses (NI-4000 Only).......................................... 34 Device:Port:System (D:P:S)............................................................................................
Table of Contents Security Features ............................................................................................................ 68 Security - System Level Security page .................................................................................. 69 Setting the system security options for a NetLinx Master ...................................................... 72 ICSP Authentication ........................................................................................................
Table of Contents System Settings - Manage License............................................................................... 108 Adding a new license ........................................................................................................... 109 Removing a license.............................................................................................................. 109 System Settings - Manage NetLinx Devices .................................................................
Table of Contents Programming ........................................................................................................149 Converting Axcess Code to NetLinx Code .................................................................... 149 Master Send_Commands.............................................................................................. 149 Master IP Local Port Send_Commands ........................................................................ 151 Using the ID Button ..........
Table of Contents vi NetLinx Integrated Controllers
Introduction Introduction NetLinx Integrated Master Controllers can be programmed to control RS-232/422/485, Relay, IR/Serial, and Input/Output devices through the use of both the NetLinx programming language and the NetLinx Studio application (version 2.4 or higher). Another key feature of this products is the ability to easily access the configuration switches without having to remove a cover plate.
Introduction NI-2000 Specifications The front panel LEDs (FIG. 1) are grouped by control type and are labeled according to their corresponding port (connector) numbers on the rear of the unit. The back of the unit contains three RS-232/422/485, one Relay, one IR/Serial and one I/O connectors. In addition, this unit provides an ID pushbutton, AXlink LED, and other related connectors. FIG. 2 shows the front and rear of the NI-2000. FIG.
Introduction NI-2000 Specifications Dimensions (HWD): • 3.47" x 17.00" x 3.47" (8.81 cm x 43.18 cm x 8.82 cm) • 2 RU (rack unit) high Power requirements: • 700 mA @ 12 VDC Memory: • 32 MB SDRAM • 1 MB of Non-volatile Flash Compact Flash: • 32 MB Card (upgradeable). Refer to the Optional Accessories section on page 6 for more information. Weight: • 4.50 lbs (2.
Introduction NI-2000 Specifications (Cont.) Rear Panel Components: RS-232/422/485 (Ports 1 -3) • Three RS-232/422/485 control ports using DB9 (male) connectors with XON/XOFF (transmit On/transmit Off), CTS/RTS (clear to send/ready to send), and 300-115,200 baud.
Introduction NI-2000 Specifications (Cont.) Rear Panel Components (Cont.): IR/Serial (Ports 5-8) • Four IR/Serial control ports support high-frequency carriers up to 1.
Introduction NI-2000 Specifications (Cont.) Optional Accessories: • 2 Pin Black Male Phoenix Connector (3.5mm) (41-5026) • CC-NIRC IR cables (FG10-000-11) • CC-NSER IR/Serial cables (FG10-007-10) • CSB Cable Support Bracket (FG517) • NCK, NetLinx Connector Kit (FG2902) • NI-2000 Quick Start Guide (93-2105-01) • PSN2.8 12 VDC power supply (FG423-17) • PSN6.
Introduction RS-232/422/485 TX/RX LEDs (red/yellow) Link/Active-Status-Output-Input Relay LEDs (red) IR/Serial LEDs (red) I/O LEDs (yellow) Front ICSNet (2) Rear RS-232/422/485 (Ports 1-7) Relays (Port 8) ICSHub Out IR/Serial (Ports 9-16) I/O (Port 17) Program port AXLink LED (green) Ethernet DIP switch AXLink port PWR ID Pushbutton FIG. 4 NI-3000 front and rear panel components NI-3000 Specifications (Cont.) Dimensions (HWD): • 3.47" x 17.00" x 3.47" (8.81 cm x 43.18 cm x 8.
Introduction NI-3000 Specifications (Cont.) Front Panel Components (Cont.
Introduction NI-3000 Specifications (Cont.) Rear Panel Components (Cont.): Digital I/O (Port 17) • Eight-channel binary I/O port for contact closure • Each input is capable of voltage sensing. Input format is software selectable. • Interactive power sensing for IR ports • Channel range = 1-8 • All inputs are assigned to respective IR/Serial ports for "automatic" power control through the use of software commands. Power control is provided via commands such as: ’PON’, ’POF’, ’POD’, ’DELAY’, I/O Link etc.).
Introduction NI-3000 Specifications (Cont.) Rear Panel Components (Cont.): ID pushbutton • Provides the NetLinx ID (D:S) assignment for the device. Refer to the Changing the Device Address of a NetLinx Device section on page 44. • The D notation is used to represent a device number. • The S notation is used to represent the System number of the Master. Ethernet port • Single RJ-45 port for 10/100 Mbps communication.
Introduction NI-4000 Specifications The front LEDs (FIG. 5) are grouped by control type, and are labeled according to their corresponding port (connector) numbers on the rear of the unit. The back of the this unit contains RS-232/422/485, Relay, IR/Serial and I/O connectors. In addition, this unit provides an ID pushbutton, AXlink LED, NetLinx Card slots, and other related connectors. FIG. 6 shows the front and rear of the NI-4000. FIG.
Introduction NI-4000 Specifications Dimensions (HWD): • 5.21" x 17.00" x 9.60" (13.23 cm x 43.18 cm x 24.27 cm) • 3 RU (rack unit) high Power requirements: • 900 mA @ 12 VDC (no cards) Memory: • 32 MB SDRAM • 1 MB of Non-volatile Flash Compact Flash: • 32 MB Card (upgradeable). Refer to the Optional Accessories section on page 15 for more information. Weight: • 9.15 lbs (4.
Introduction NI-4000 Specifications (Cont.) Rear Panel Components: RS-232/422/485 (Ports 1 -7) • Seven RS-232/422/485 control ports using DB9 (male) connectors with XON/XOFF (transmit on/transmit off), CTS/RTS (clear to send/ready to send), and 300-115,200 baud.
Introduction NI-4000 Specifications (Cont.) Rear Panel Components (Cont.): IR/Serial (Ports 9-16) • Eight IR/Serial control ports support high-frequency carriers up to 1.142 MHz • Each output is capable of two electrical formats: IR or Serial • Eight IR/Serial data signals can be generated simultaneously.
Introduction NI-4000 Specifications (Cont.) Included Accessories: • Two CC-NIRC IR Emitters (FG10-000-11) • One 10-pin 3.5 mm mini-Phoenix (female) I/O connector (41-5107) • Two 8-pin 3.5 mm mini-Phoenix (female) Relay connector (41-5083) • One 4-pin 3.5 mm mini-Phoenix (female) AXlink connector (41-5047) • One 2-pin 3.
Introduction 16 NetLinx Integrated Controllers
Quick Setup and Configuration Overview Quick Setup and Configuration Overview Installation Procedures These are the steps involved with the most common installation procedures of these devices: Carefully unpack the contents of the box. Confirm the contents of box (page 3 thru page 14). Familiarize yourself with the units’ connectors and wiring configurations (Connections and Wiring section on page 19).
Quick Setup and Configuration Overview Update the Controller and Control Card Firmware Before using your new Integrated Controller, you must FIRST update your NetLinx Studio to the most recent release. Upgrade the on-board Master firmware through an IP Address via the Ethernet connector (Upgrading the On-board Master Firmware via an IP section on page 52) (IP recommended).
Connections and Wiring Connections and Wiring Setting the Configuration DIP Switch (for the Program Port) Prior to installing the Controller, use the Configuration DIP switch to set the baud rate used by the Program port for communication. The Configuration DIP switch is located on the rear of the NI-4000/3000/2000 Integrated Controllers.
Connections and Wiring Think of the PRD Mode (On) equating to a PC’s SAFE Mode setting. This mode allows a user to continue powering a unit, update the firmware, and download a new program while circumventing any problems with a currently downloaded program. Power must be cycled to the unit after activating/deactivating this mode on the Program Port DIP switch #1. Working with the Configuration DIP switch 1.
Connections and Wiring Modes and Front Panel LED Blink Patterns The following table lists the modes and blink patterns for the front panel LEDs associated with each mode. These patterns are not evident until after the unit is powered. Modes and LED Blink Patterns LEDs and Blink Patterns STATUS (green) OUTPUT (red) INPUT (yellow) On Mode Description OS Start Starting the operating system (OS). On On Boot On-board Master is booting.
Connections and Wiring AXlink Port and LED All NI-4000/3000/2000 units have an AXlink port and adjacent status LED (FIG. 7). This port allows the NI to support AMX Legacy AXlink devices such as G3 touch panels (ex: CP4/A) and PosiTrack Pilot devices. A green LED shows AXlink data activity. When the AXlink port is operating normally, blink patterns include: Off - No power, or the controller is not functioning properly 1 blink per second - Normal operation. 3 blinks per second - AXlink bus error.
Connections and Wiring Wiring length guidelines The unit should only have one source of incoming power. Refer to the following tables for the wiring length information used with the different types of NetLinx Integrated Controllers: Wiring Guidelines - NI-4000 & NI-3000@ 900 mA Wire size Maximum wiring length 18 AWG 120.41 feet (39.70 meters) 20 AWG 76.45 feet (23.30 meters) 22 AWG 49.36 feet (15.04meters) 24 AWG 30.08 feet (9.
Connections and Wiring Using the 4-pin mini-Phoenix connector for data with external power To use the NetLinx 4-pin 3.5 mm mini-Phoenix (female) captive-wire connector for data communication and power transfer, the incoming PWR and GND cable from the PSN must be connected to the AXlink cable connector going to the Integrated Controller. FIG. 10 shows the wiring diagram. Always use a local power supply to power the Integrated Controller unit.
Connections and Wiring The rear DB9 Device Port connectors support RS-232 communication protocols for PC data transmission. The table below provides information about the connector pins, signal types, and signal functions. This table’s wiring specifications are applicable to the rear RS-232/422/485 Device Port connectors on the: NI-4000/NI-3000 (Ports 1-7) and NI-2000 (Ports 1-3).
Connections and Wiring 1 2 3 4 5 6 7 8 1 2 3 4 5 6 7 8 (female) (male) RJ-45 connector - pin configurations The FIG. 12 illustrates the location of the ICSNet and ICSHub Out connectors on the rear panel. Ports PORT 1 ICSNet ICSNet ICSHub Out FIG. 12 Location of ICSNet and ICSHub Out connectors Unlike the ICSNet ports, the ICSHub connections require a specific polarity.
Connections and Wiring Relay connections Use A for common and B for output (FIG. 13). Each relay is isolated and normally open. A metal connector strip is also provided to common multiple relays. RELAYS (Port 8) 8 7 6 5 B A B A B A B A 4 RELAYS (Port 4) 3 2 1 4 B A B A B A B A 3 2 1 B A B A B A B A NI-4000/NI-3000 relay connector configuration (Port 8) NI-2000 relay connector configuration (Port 4) FIG.
Connections and Wiring I/O Port Wiring Specifications NI-4000 and NI-3000 Pin Signal 1 GND 2 I/O 1 3 4 I/O Port Wiring Specifications NI-2000 Pin Signal Signal GND 1 GND Signal GND Input/Output 2 I/O 1 Input/Output I/O 2 Input/Output 3 I/O 2 Input/Output I/O 3 Input/Output 4 I/O 3 Input/Output 5 I/O 4 Input/Output 5 I/O 4 Input/Output 6 I/O 5 Input/Output 6 12 VDC 7 I/O 6 Input/Output 8 I/O 7 Input/Output 9 I/O 8 10 12 VDC Function Function PWR Input/Outpu
Connections and Wiring The IR/Serial connector wiring specifications are listed in the following table.
Connections and Wiring FIG. 17 RJ-45 wiring diagram Ethernet LEDs L/A - Link/Activity LED lights (green) when the Ethernet cables are connected and terminated correctly. ETHERNET 10/100 SPD - Speed LED lights (yellow) when the connection speed is 100 Mbps and turns Off when speed is 10 Mbps. FIG.
Connections and Wiring Ethernet Ports Used by the NetLinx Integrated Controllers (Cont.) Port type Description ICSP Peer-to-peer protocol used for both Master-to-Master and Master-to-device 1319 (UDP/TCP) communications. Standard Port # For maximum flexibility, the Master can be configured to utilize a different port than 1319, or disable ICSP over Ethernet completely from either Telnet or the Program Port located on the rear of the Master itself.
Connections and Wiring 32 NetLinx Integrated Controllers
Installation and Upgrading Installation and Upgrading Installing NetLinx Control Cards (NI-4000 Only) NetLinx Cards can be installed into the front card slots. The cards mount horizontally through the card slot openings on the front of the enclosure. To install a NetLinx Card: 1. Discharge the static electricity from your body, by touching a grounded object. 2. Remove the three screws by turning them in a counter-clockwise direction and then remove the faceplate (FIG. 19).
Installation and Upgrading If the cards do not appear in the Workspace window for the selected Master System number: give the system time to detect the inserted cards (and refresh the system) and/or cycle power to the NI-4000 unit. Setting the NetLinx Control Card Addresses (NI-4000 Only) The 8-position CardFrame Number DIP switch, located on the rear of the Integrated Controller, sets the starting address (the device number in the D:P:S specification) for the Control Cards installed in the CardFrame.
Installation and Upgrading Here's the syntax: NUMBER:PORT:SYSTEM where: NUMBER: 16-bit integer represents the device number PORT: 16-bit integer represents the port number (in the range 1 through the number of ports on the Controller or device) SYSTEM: 16-bit integer represents the system number (0 = this system) Removing NetLinx Control Cards (NI-4000 Only) To install NetLinx Control Card: 1.
Installation and Upgrading Chassis housing screws (top) - 6 on top - sides vary per model Mounting Brackets Compact Flash Compact Flash insert location Chassis housing screws (side) - 4 on each side of the NI-4000 - 3 on each side of the NI-3000/2000 NXC Card Slot faceplate NXC Card Slots FIG. 21 Location of the Compact Flash within a sample Integrated Controller 3. Carefully pull-up and remove the housing up and away from the Controller to expose the internal circuit board (FIG. 21). 4.
Installation and Upgrading 6. Insert the upgrade card into the connector opening with the arrow facing towards the pins, then push it in firmly until the contact pins are completely inside the flash card and securely attached to the connector (FIG. 22). Under-side groove located below Card Removal Grooves Insert with arrow facing towards the connector pins FIG. 22 Removing the Compact Flash card 7.
Installation and Upgrading Installing the Integrated Controller into an Equipment Rack Use either the rack-mounting brackets (supplied with the NI-4000/3000/2000 controller) for equipment rack installations. Remove the mounting brackets for flat surface installations. Before completing the install process, it is recommended that you complete any firmware upgrade of the NetLinx Control Cards.
Installation and Upgrading 7. Slide the unit into the rack until the attachment holes, along both sides, align to their corresponding locations on the mounting brackets, as shown in FIG. 23. 8. Secure the Rack Mount to the equipment rack by screwing in the four #10-32 screws (80-0186) and four #10 washers (80-0342) supplied in the Assembly Kit (KA2105-01) (in a clockwise direction). 9.
Installation and Upgrading 40 NetLinx Integrated Controllers
Configuration and Firmware Update Configuration and Firmware Update This section refers to steps necessary to both communicate and upgrade the various NI Controller components. Before commencing, verify you are using the latest firmware KIT file (this file contains both the NI Integrated Controller and on-board Master firmware. The NI-4000/3000/2000 KIT file begins with 2105_X000 whereas the NI-700/900 KIT file begins with 2105_03_NI-X00. Verify you are using the latest version of NetLinx Studio.
Configuration and Firmware Update The default setting for most Masters is 38400 FIG. 24 Assigning Master Communication Serial Settings and Baud Rates 6. Click the Edit Settings button to open the Serial Settings dialog (FIG. 24). No authentication user name or password information is required with a direct connection such as: USB or Serial. 7. Set the COM port parameters for the selected COM port used for communication to the NetLinx Master.
Configuration and Firmware Update System Address (default for initial system is 1) Check-Off to verify change FIG. 25 Device Addressing tab (changing the system value) This tab represents the only way to change the System Number associated to the active on-board NI Master. The Master must have it’s power cycled to incorporate the new System number (often a simple reboot via Studio will not be enough to incorporate this new number). 2.
Configuration and Firmware Update The system value on a Modero touch panel can NOT be changed from the Device Addressing dialog and MUST be altered through the panel Protected Setup page. Using multiple NetLinx Masters When using more than one Master, each unit must be assigned to a separate System value. A Master’s System value can be changed but it’s device Address must always be set to zero (00000). The Device Addressing dialog will not allow you to alter the NetLinx Master address value.
Configuration and Firmware Update 6. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot. The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink. 7. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*. 8. Click the OnLine Tree tab in the Workspace window to view the devices on the System. The default System value is one (1). 9.
Configuration and Firmware Update This dialog represents the another way to change the Device value of the NI Controller. This ID mode section of the Device Addressing dialog can be used only by Masters with an ID button (which apply to all NI-Series Masters). 2. Locate the Device field (A in FIG. 27) and enter the new value for the NI Controller. This value must fall within a range of 0 - 32767. 3. Press the on-screen Start Identify Mode button.
Configuration and Firmware Update 6. Click the OnLine Tree tab in the Workspace window to view the devices on the System. The default System value is one (1). 7. Right-click the associated System number (or anywhere within the tab itself) and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. 8. Use Ctrl+S to save your existing NetLinx Project with the new changes.
Configuration and Firmware Update If the IP Address field is empty, give the Master a few minutes to negotiate a DHCP Address with the DHCP Server, and try again. The DHCP Server can take anywhere from a few seconds to a few minutes to provide the Master with an IP Address. 5. Verify that NetLinx appears in the Host Name field (if not, then enter it in at this time). 6. Click the Use DHCP radio button from the IP Address section (if not greyed-out). 7.
Configuration and Firmware Update 2. Verify that both the System number corresponds to the System value previously assigned within the Device Addressing tab and that zero (0) is entered into the Device field. The system value must correspond to the Device Address previously entered in the Device Addressing tab. Refer to the Setting the System Value section on page 42 for more detailed instructions on setting a system value. 3.
Configuration and Firmware Update FIG. 30 Assigning Master Communication Settings and TCP/IP Settings 5. Click on the NetLinx Master radio button (from the Platform Selection section) to indicate you are working with a NetLinx Master (such as the NXC-ME260/64 or NI-Series of Integrated Controllers). 6. Click on the TCP/IP radio button (from the Transport Connection Option section) to indicate you are connecting to the Master via an IP Address. 7.
Configuration and Firmware Update 17. Click OK to save your newly entered information and return to the previous Communication Settings dialog. 18. Click OK again to begin the communication process to your Master. If you are currently connected to the assigned Master, a popup asks whether you would want to temporarily stop communication to the Master and apply the new settings. 19. Click Yes to interrupt the current communication from the Master and apply the new settings. 20.
Configuration and Firmware Update 3. After the Communication Verification dialog window indicates active communication between the PC and the Master, verify the NetLinx Master (00000 NI Master) appears within the OnLine Tree tab of the Workspace window (FIG. 31). The default NI Master value is zero (00000) and cannot be changed. On-board NI Master Control cards (NI-4000 ONLY) NetLinx Integrated Controller NetLinx Studio app.
Configuration and Firmware Update 2. After Studio has establish a connection to the target Master, click the OnLine Tree tab of the Workspace window to view the devices on the System. The default System value is one (1). 3. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is highlighted in green on the bottom of the NetLinx Studio window. 4.
Configuration and Firmware Update The KIT file for the NI-4000/3000/2000 Series of NI Masters begins with 2105_NI-X000_Master. The KIT file for the NI-700/900 Series of NI Masters begins with 2105-03_NI-X000_Master. DO NOT use the 2105-03_NI_Master KIT file on anything other than an NI-700/900 since each Master KIT file is specifically configured to function on a specific NI unit. 9.
Configuration and Firmware Update 3. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is highlighted in green on the bottom of the NetLinx Studio window. 4.
Configuration and Firmware Update Selected on-board Integrated Controller firmware file Description field for selected KIT file Firmware download status Device and System Number must match the Device and System values listed in the Workspace window FIG.
Configuration and Firmware Update If the connection fails to establish, a Connection Failed dialog appears. Try selecting a different IP Address if communication fails. Press the Retry button to reconnect using the same communication parameters. Press the Change button to alter your communication parameters and repeat steps 2 thru 11.
Configuration and Firmware Update 6. After you’ve accepted the Licensing Agreement, verify you have downloaded the NetLinx NXC card firmware (KIT) file to a known location. 7. Verify you have downloaded the latest NetLinx Control Card firmware (KIT) file to a known location. 8. Select Tools > Firmware Transfers > Send to NetLinx Device from the Main menu to open the Send to NetLinx Device dialog (FIG. 36).
Configuration and Firmware Update This process of cycling power acts to reset the updated NetLinx Control Card and detect its new firmware update. It also serves to allow the Integrated Controller to detect and reflect the new firmware on the card to the NetLinx Studio display on the Workspace window. 18. After Studio has establish a connection to the target Master, click the OnLine Tree tab of the Workspace window to view the devices on the System. The default System value is one (1). 19.
Configuration and Firmware Update 60 NI Connection and Firmware Updating
NetLinx Security within the Web Server NetLinx Security within the Web Server NetLinx Masters (installed with firmware build 300 or higher) incorporate new built-in security for: HTTPS and Terminal sessions (enhanced with SSL and SSH respectively), ICSP data verification/encryption, and Server Port configuration.
NetLinx Security within the Web Server To ensure this higher degree of security on the Master, an administrator can disable the HTTP Port access, enable HTTPS Port access (both from within the same Manage System > Server page), and then alter the level of encryption on the current SSL Certificate to meet their security needs. SSL (Secure Sockets Layer) is a protocol that works by encrypting data being transferred over an HTTPS connection.
NetLinx Security within the Web Server The maximum length of a user name or password is 20 characters. The minimum length of a user name or password is four characters. Characters such as # (pound) & (ampersand) and ’ " (single and double quotes) are invalid and should not be used in user names, group names, or passwords.
NetLinx Security within the Web Server Navigation frame Active frame FIG. 37 Browser Application frames The first Active frame displayed within the Browser is the Manage WebControl Connections page. Default Security Configuration Security for web pages is separated into two access groups: HTTP and Configuration: HTTP Access allows an authorized user to view these web pages by first requiring the entry of a user name and password at the beginning of every connection session with the target Master.
NetLinx Security within the Web Server User name field Password field Log In/Log Out button FIG. 38 Log In/Log Out fields Authentication is based upon matching the user’s data to pre-configured user name and password information, and then assigning the rights assigned to that user. The maximum length of a user name or password is 20 characters. The minimum length of a user name or password is four characters.
NetLinx Security within the Web Server The NetLinx user account was created to be compatible with previous NetLinx Master firmware versions. This account is initially created by default and can later be deleted or modified. The administrator group account cannot be deleted or modified.
NetLinx Security within the Web Server Compatible devices field (showing G4 WebControl links) G4 panels Compression Options FIG. 39 Manage WebControl Connections page (populated with compatible panels) Clicking on a G4 WebControl link opens a separate browser window which is configured to display the current information from the panel using the native resolution of the target panel. An example is a CA15 panel link opening a new window using an 800 x 600 resolution.
NetLinx Security within the Web Server Security Features This section of the Navigation frame (FIG. 40) contains the NetLinx system security parameter links which allow an authorized user to define access rights at the system level and those for the various groups or users. Security features FIG.
NetLinx Security within the Web Server Security - System Level Security page To access this page, click the Security Level link from within the Security section of the Navigation frame. This page is strictly used to require a valid user name and password be entered prior to gaining access to the listed features and options. If the Master Security option is not selected, the Master is completely open and can be modified by anyone accessing the target Master via the web server’s UI.
NetLinx Security within the Web Server System Level Security Page (Cont.) Feature Description Terminal (RS232) Access: This selection determines if a user name and password is required for Terminal communication (through the RS232 Program port). • If Terminal Security is enabled, a user must have sufficient access rights to login to a Terminal session and communicate with the Master.
NetLinx Security within the Web Server System Level Security Page (Cont.) Feature Description ICSP Connectivity: This selection determines if a user name and password is required prior to communication with a target NetLinx Master via an ICSP connection using any transport method (TCP/IP, UDP/IP, and RS-232) (see FIG. 42). • If this access is enabled and the user is not logged-in, when the user attempts to connect, the authentication fails and displays an “Access not allowed” message.
NetLinx Security within the Web Server Setting the system security options for a NetLinx Master This page simply toggles the requirement of a user to enter a valid user name and password before gaining access to a particular feature. For every action, the Master validates whether a user name and password are required and whether the user has sufficient rights. Refer to the Security - Group Level Security page section on page 74 for more information on the assignment of the Group/User rights.
NetLinx Security within the Web Server Enabling the Terminal, HTTP, and Telnet Access options require that a valid user name and password be entered prior to gaining access to the desired action. If the HTTP Access option is enabled, upon the initial connection to the Master (via the web browser) the Login page appears and requires a valid user name and password be entered before allowing access to the web server pages.
NetLinx Security within the Web Server Security - Group Level Security page To access this page, click the Group Level link (from within the Security section of the Navigation frame). This page (FIG. 44) allows an authorized user to both select and modify an existing group, delete an existing group, or add a new group. Unless you are logged in with administrator privileges, you will not be allowed to modify the default administrator profile.
NetLinx Security within the Web Server Configure Group Properties Page Feature Description Configure Group Properties: This page allows an authorized user to configure the options for either a pre-existing or new group. Configuration on this page consists of both the options and directories the group is granted access to. Update • This button submits the modified page (form) information back to the server.
NetLinx Security within the Web Server Adding a new Group 1. Click the Group Level link (from within the Security section of the Navigation frame) to open the Manage Groups page. 2. Click the New button to be transferred to the Configure Group Properties page (FIG. 44). 3. From within the Group Security Details section, enter a unique name for the new group. The name must be a valid character string consisting of 4 - 20 alpha-numeric characters.
NetLinx Security within the Web Server Deleting an existing Group 1. Click the Group Level link (from within the Security section of the Navigation frame) to open the Manage Groups page. 2. Press the Select button (next to the selected Group name) to open the Configure Group Properties page (FIG. 44) for the particular group. 3. Click the Delete button to remove the selected group and return to the Manage Groups page.
NetLinx Security within the Web Server Manage Users Page Feature Description Manage Users page: This page allows a user to either modify the rights for an existing user (available from the displayed list) or use the New button to access a secondary window where they can create a new user. New • Clicking this button allows an authorized user to add a new user and configure their settings through the Configure User Properties page.
NetLinx Security within the Web Server Configure Users Properties Page (Cont.) Feature Description User Security Details (Cont.): Admin Change Password Access • This selection enables or disables the user’s right to change the administrator’s user passwords. Note: Once the Administrator’s password has been changed, the default password can no longer be used to gain access. FTP Access • This selection enables or disables FTP Access for the target user.
NetLinx Security within the Web Server Any properties possessed by groups (ex: access rights, update rights, directory associations, etc.) are inherited by users assigned to that particular group. Unchecking a security option (which is available within the associated group) does not remove that right from the user. The only way to remove a group’s available security right from a target user is to either NOT associate a group to a user or to alter the security rights of the group being associated. 5.
NetLinx Security within the Web Server 3. From within the User Security Details section, modify any previously configured access rights by either placing or removing a checkmark from within any of the available checkboxes (FIG. 46). Group Rights are read-only and display the previously configured rights assigned to the associated group FIG. 46 User Level Security - Modifying a User’s Security rights 4.
NetLinx Security within the Web Server The NetLinx account can be deleted from Manage User page.The administrator account can not be deleted nor can it have it’s directory associations modified. System Settings This section of the Navigation frame (FIG. 47) provides the ability to both manage existing and pending license keys, manage the active NetLinx system communication parameters, and configure/modify the SSL certificates on the target Master. System and Licensing management features FIG.
NetLinx Security within the Web Server Manage System Page Components Feature Description Online Tree menu: The Online Tree menu contains button options relating to the entries within the Online Tree. • Expand - Expands the selected level to expose any subfolders. • Refresh - Refreshes the contents of the Online Tree frame. • Collapse - Collapses the selected level to hide any subfolders.
NetLinx Security within the Web Server Manage System Page Components (Cont.) Feature Description Management menu options: These management buttons change depending on the source chosen from the Online Tree. • There are three menu groupings available: - System Menu (to configure Master properties). - Device Menu (to configure device specific properties). - Port Menu (to configure specific Port settings). System menu buttons: The selected system number is displayed below these menu buttons.
NetLinx Security within the Web Server Manage System - System Menu Buttons These buttons appear (on the right) when a user clicks on the purple System icon from within the Online Tree. The selected system number is displayed below these System menu buttons. System Menu - Modifying the Date/Time 1. Click the Manage System link (from within the System Settings section of the Navigation frame). 2.
NetLinx Security within the Web Server Current System Number FIG. 51 Change System Number dialog The current system number is also shown just below the System menu buttons. 4. Enter a new numeric value into the New System Number field. 5. Click the Update button to save this new value to the system on the target Master. The following message; "System number changed to X. Master must be rebooted for the change to take effect.
NetLinx Security within the Web Server 2. Clicking on any of the Online Tree items opens menu items with the Control/Emulate button option available. 3. Click the Control/Emulate button to open the Control/Emulate dialog (FIG. 52). 4. Click the Update Status button to query the Master for the status of the currently entered level and channel. The System Number, Device Number, and Port Number value fields are read-only (disabled) if you are brought to this window from a selection of an Online Tree item.
NetLinx Security within the Web Server 6. Enter a System Number, Device Number, and Port Number into the appropriate fields. These values correspond to the device you wish to control (real or fictitious). The Device, Port, and System value ranges are 1 - 65535. 7. Within the Channel Code section, enter a valid Channel number to emulate Channel messages (i.e., Push/Release, CHON, and CHOFF) for the specified . The Channel number range is 1 - 65535. 8.
NetLinx Security within the Web Server Manage System - Diagnostics This page allows an authorized user to setup and monitor diagnostic messages coming from and going to devices available on the Online Tree. This dialog also allows the user to watch the ICSP commands being sent to/from a device. There are several different types of asynchronous notifications that can be selected for a device:port:system (D:P:S) combination. Each notification type is represented by a column in the table.
NetLinx Security within the Web Server Setting up and removing a Diagnostic Filter 1. Setup a diagnostic filter by scrolling down the page and clicking the Modify button below the first empty column. This action opens the Device Configuration dialog as a secondary popup window. Up to 8 concurrent diagnostic filter slots can be simultaneously active using any eight of the 10 available user-configurable Presets available through the Device Configuration dialog. 2.
NetLinx Security within the Web Server Diagnostic Configuration Dialog (Cont.) Feature Description Presets: This list of up to 10 presets comes defaulted with Preset 0: All Devices, All Notifications • Store: Save the current notification selections to a Preset profile. Pressing this button opens a popup field labeled Explorer User Prompt - Preset Name? where you enter the name associated with this new Preset.
NetLinx Security within the Web Server 5. Remove a diagnostic filter by clicking the Modify button below it (from the Diagnostics dialog), then pressing the Remove button to delete this filter from the Diagnostics dialog. Once a Preset is assigned to a specific Diagnostic filter "slot" (up to 8), its System:Device:Port fields are greyed-out, and can’t be modified unless the Preset in that slot is removed and replicated with new information within these fields.
NetLinx Security within the Web Server 1. Click on the Manage System link (from within the System Settings section of the Navigation frame). 2. Click on the purple System icon from within the Online Tree to open the System menu buttons within the right frame. 3. Click the Server button to open the Server dialog and its associated submenu options (FIG. 54). Disabling the HTTP Port requires that an authorized user access the Master ONLY via a secure HTTPS connection. SSH version 2 is only supported. FIG.
NetLinx Security within the Web Server Modifying the Server Port Settings 1. From within the Server submenu, press the Port Settings button to open the Server Port Settings dialog seen above in FIG. 54. 2. Uncheck any services (and corresponding ports) to disable their functionality. 3. Modify any preset service port value by first enabling that service with a checkmark within the Enabled checkbox and then entering a value within the Port Number field.
NetLinx Security within the Web Server Server Port Settings (Cont.) Feature Description HTTPS/SSL Port: The port value used by web browser to securely communicate between the web server UI and the target Master. This port is also used to simultaneously encrypt this data using the SSL certificate information on the Master as a key. • The default port value is 443.
NetLinx Security within the Web Server SSL Server Certificate Creation Procedures Initially, a NetLinx Master is not equipped with any installed certificates. In order to prepare a Master for later use with CA (officially issued) server certificates, it is necessary to: First create a self-generated certificate which is automatically installed onto the Master. Secondly, enable the SSL feature from the Enable Security page.
NetLinx Security within the Web Server This page allows an authorized user to display an installed certificate, create a certificate request, self-generate, and regenerate SSL Server Certificates. Server Certificate Entries Feature Description Server Certificate Field Information: Update Updates the target Master with the information entered on this page. • This process can take a few minutes. Bit Length Provides a drop-down selection with three available public key lengths: 512, 1024, and 2048.
NetLinx Security within the Web Server Server - Display SSL Server Certificate Information 1. Navigate to the Server Certificate page by clicking System Settings > Manage System > Server > Create SSL Certificate to open the Server Certificate page. By default, the Display Certificate Action is selected and these fields are populated with information from an installed certificate. If the Master does not have a previously installed certificate, these fields are blank. 2.
NetLinx Security within the Web Server 10. Choose Self Generate Certificate from the drop-down list. When this request is submitted, the certificate is generated and installed into the Master in one step. 11. Click Update to save the new encrypted certificate information to the Master. ONLY use the Regenerate certificate option when you have Self Generated your own certificate. DO NOT regenerate an external CA-generated certificate. Server - Regenerating an SSL Server Certificate Request 1.
NetLinx Security within the Web Server 3. Enter the used Domain Name into the Common Name field. Example: If the address being used is www.amxuser.com, that must be the Common name and format used in the Common Name field. This string provides a unique name for the desired user. This domain name must be associated to a resolvable URL Address when creating a request for a purchased certificate. The address does not need to be resolvable when obtaining a free certificate. 4.
NetLinx Security within the Web Server 1. Navigate to the Web Server Certificate HTML page on your CA’s web site. A Web Server certificate allows you to authenticate through a Web browser via SSL. In order to successfully verify other certificates it is also necessary to import the CA key into the Web Server. Refer to the Server - Creating a Request for an SSL Certificate section on page 99. This is done as part of the process of receiving your Web Server certificate.
NetLinx Security within the Web Server Certificate text field FIG. 57 Export SSL Certificate dialog YOU MUST COPY ALL OF THE TEXT within this field, including the -----BEGIN CERTIFICATE REQUEST----- and the -----END CERTIFICATE REQUEST-----. Without this text included in the CA submission, you will not receive a CA-approved certificate. 5. Press the Ctrl + C keys simultaneously on your keyboard (this takes the blue selected text within the field and copies it to your temporary memory/clipboard). 6.
NetLinx Security within the Web Server Server - Importing a CA created SSL Certificate Before importing a CA server certificate, you must: First, have a self-generated certificate installed onto your target Master. Secondly, enable the SSL security feature from the Enable Security page, to establish a secure connection to the Master prior to importing the encrypted CA certificate. Refer to the Security - System Level Security page section on page 69 for more information about enabling SSL security. 1.
NetLinx Security within the Web Server A certificate consists of two different Keys: Master Key is generated by the Master and is incorporated into the text string sent to the CA during a certificate request. It is specific to a particular request made on a specific Master. Public Key is part of the text string that is returned from the CA as part of an approved SSL Server Certificate. This public key is based off the submitted Master key from the original request.
NetLinx Security within the Web Server Network Settings Dialog Feature Description IP Address: Host Name Use this field to view/edit the target Master's current Host Name. DHCP/Specify IP Address Use these radio buttons to specify an address for the target Master: • DHCP - obtained from a DHCP Server. • Specify an IP Address - typically obtained from a System Administrator. IP Address Use this field to view/edit the target Master's current IP Address.
NetLinx Security within the Web Server URL List dialog Add New URL dialog FIG. 60 URL List dialog 7. If a User name and/or Password is required for successful communication with the target URL, place a checkmark in the Secure Connection checkbox and enter the necessary information within the User name, Password, and Confirm (password) fields. If this box is unchecked, the fields are greyed-out and the user is prevented from entering any text into any of the remaining fields.
NetLinx Security within the Web Server 11. URL entries can be removed either individually or as a whole: Remove an individual URL entry by pressing the Remove button on that URLs row listing within the URL List dialog (FIG. 61). Remove all previously entered URLs by pressing the Remove All button. To confirm the removal of all items, press the Refresh button. Device Menu - Changing the Device Number 1.
NetLinx Security within the Web Server 3. Click the Log button (FIG. 63). This dialog allows the user to view the log for the selected device (currently only the Master supports this feature). FIG. 63 Log dialog 4. Click the Refresh button to update the information on-screen. Device Menu - Running a Diagnostic Filter Refer to the procedures outlined within the Manage System - Diagnostics section on page 89 for more information. System Settings - Manage License This page (FIG.
NetLinx Security within the Web Server An example of this type of product is i!-Voting. The Master confirms this registration information before running the module. Adding a new license 1. Click on the System Settings > Manage License link from within the System Settings section of the Navigation frame. 2. Click the New button to be transferred to the Add new License Key page (FIG. 65). FIG. 65 System Settings - Add New License Key page 3.
NetLinx Security within the Web Server System Settings - Manage NetLinx Devices To access this page, click on the Manage NetLinx Devices link (from within the System Settings section of the Navigation frame). These pages (FIG. 66) have some additions that have been incorporated as part of build 323 (or higher). These features include the display the device status as well as some background color changes which indicate system groupings.
NetLinx Security within the Web Server Manage NetLinx Devices Page (Cont.) Feature Description Device Listings: • This page (in addition to the target Master which is typically the first entry) lists those NetLinx Masters which have sent out NetLinx Discovery Master Announce packets (NDPs). • Each entry contains the data necessary to describe the devices detected by the system.
NetLinx Security within the Web Server Manage NetLinx Devices - Displaying NDP-capable devices You’ll note in the previous example (FIG. 66), that the first NetLinx Master has a "+" icon next to it, which shows that this Master is indicating the presence of NDP-capable devices currently connected to it. 1. Click the "+" icon to expand the particular Master’s listing and reveal those NDP-capable devices connected to it, as shown below in FIG. 67.
NetLinx Security within the Web Server The previous popup dialog shows the Master’s device's IP settings including the IP Address, ICSP Port, and a MAC Address. If the device is one that is bound to a Master, the popup also displays an additional Master MAC Address field, which should match the MAC Address information for the bound target Master (FIG. 69). Notice that the Master MAC Address in FIG. 69 should match the MAC Address of the Master in FIG. 68.
NetLinx Security within the Web Server System Settings - Manage Other Devices - Dynamic Device Discovery Pages Before you begin to manage any other devices, the target Master must be loaded with the program which defines the new devices and modules. In addition to this code, all IP/Serial devices must be pre-configured and connected to the system. To access this page, click on the Manage Other Devices link (from within the System Settings section of the Navigation frame). This page (FIG.
NetLinx Security within the Web Server Manage Other Devices Page Feature Description Dynamic Device Discovery links: These links direct the user to additional Dynamic Device Discovery (DDD) configuration pages which include: • Manage Device Bindings page is used for configuring application-defined Duet virtual devices by using discovered physical devices.
NetLinx Security within the Web Server Manage Other Devices Page (Cont.) Feature Description Configure Binding Options (Cont.): Enable Subnet Match This selection allows an end-user to toggle whether or not IP devices should only be detected/discovered if they are on the same IP Subnet as the Master. Purge Bound Modules on Reset • This selection indicates that all modules should be deleted from the /bound directory upon the next reboot.
NetLinx Security within the Web Server Manage Other Devices Page (Cont.) Feature Description Manage Device Modules: This section displays a list of all currently loaded Duet Modules/ .JAR files on the Master (resident within the /unbound directory); as well as providing those interfaces necessary to delete, add, and retrieve these modules. Select FIle to Delete field • This field provides the listing of loaded Modules/.JAR files. • These entries can be selected for deletion or archiving.
NetLinx Security within the Web Server Dynamic Device Discovery was created to take advantage of Java's Dynamic Class Loading and the Duet Standard NetLinx API (SNAPI). Java loads classes as they are needed. Therefore it is feasible to load a Duet control/protocol module on the fly as each new device is discovered. SNAPI provides a fixed interface for communicating with a certain type of device. The "glue code" refers to the developer defined NetLinx program that runs on a Master and controls a system.
NetLinx Security within the Web Server With program defined/static binding, the developer specifies a permanent binding between an application device and a physical port, such as a particular serial or IR port. At run-time, any device detected on that port is automatically associated with the designated application device. This binding type would be used when the developer wants to hard code what port is used for a device, but does not know what manufacturer's device will actually be connected.
NetLinx Security within the Web Server DEFINE_START STATIC_PORT_BINDING(dvDiscDevice, COM1, DUET_DEV_TYPE_DISC_DEVICE, 'My DVD', DUET_DEV_POLLED) DYNAMIC_POLLED_PORT(COM2) DYNAMIC_APPLICATION_DEVICE(dvRECEIVER1, DUET_DEV_TYPE_RECEIVER, 'My Receiver') (***********************************************************) (* THE EVENTS GO BELOW *) (***********************************************************) DEFINE_EVENT DATA_EVENT [dvRECEIVER1] { // Duet Virtual device data events go here } FIG.
NetLinx Security within the Web Server This code would have given the Master a previous “heads-up” notification to look for those devices meeting the criteria outlined within the code. Dynamic application devices (Bind/Unbind) Static bound application devices (blank/Release) Device’s associated property information (displayed via a mouse-over popup dialog) FIG. 73 Manage Device Bindings page There are two types of application devices: Static Bound application devices and Dynamic application devices.
NetLinx Security within the Web Server - Dynamic application devices that have not been bound to a physical device display a Bind button. When this button is selected, a secondary display appears with a listing of all available unbound physical devices that match the application device's Device SDK class type (FIG. 74). - If a currently bound device needs to be replaced or a Duet Module needs to be swapped out, the device should be unbound and the new module/driver should then be bound.
NetLinx Security within the Web Server Listing of the discovered Dynamic Devices Properties of the discovered physical device (displayed via a mouse-over popup dialog) FIG. 75 View Discovered Devices page Mousing-over a listed entry presents a popup which displays all of the properties associated with the physical device. If the physical device is bound to an application device, the associated application device's “friendly name” will be displayed in the Binding column.
NetLinx Security within the Web Server Module Properties (displayed via a mouse-over popup dialog) FIG. 76 Select Device Module page Mousing-over a listed module entry presents a popup which displays the properties associated with the selected module. By selecting the module and clicking the Save button, the administrator can assign a Duet module to be associated with the physical device.
NetLinx Security within the Web Server List of discovered physical devices (manually entered info) FIG.
NetLinx Security within the Web Server 9. Once you are done creating the profile for the new device, click the New button to assign additional Name and Value property information for association with the new User Defined Device. When the Add button is selected, the user-defined device is then inserted into the list of discovered physical devices which appears within the lower section of the display (FIG. 77).
NetLinx Security within the Web Server The above alert only appears if an SSL Server Certificate has been installed on the target Master, the SSL Enable options has been enabled, from within the Enable Security window of the Security tab, and there is a problem with the site’s certificate. Problems with the certificate can result from: The default AMX certificate, self generated, or self-signed certificate hasn’t been approved by a CA.
NetLinx Security within the Web Server FIG. 80 Certificate Import Wizard- storing the certificate 13. To close the still open Certificate popup window click OK. 14. To close the still open Security Alert popup window, click Yes. 15. From the Network Password window, click the down arrow from the username field to select a user name. 16. Enter a valid password into the password field. 17.
NetLinx Security within the Web Server G4 panels Compatible devices field (showing G4 WebControl links) Compression Options FIG. 81 Manage WebControl Connections page (populated with compatible panels) 7. Click on the G4 panel name link associated with the target panel. A secondary web browser window appears on the screen (FIG. 82). FIG. 82 WebControl VNC installation and Password entry screens 8.
NetLinx Security within the Web Server 9. In some cases, you might get a Connection Details dialog (FIG. 83) requesting a VNC Server IP Address. This is the IP Address not the IP of the Master but of the target touch panel. Depending on which method of communication you are using, it can be found in either the: Wired Ethernet - System Connection > IP Settings section within the IP Address field. Wireless - Secondary Connection > IP Settings section within the IP Address field.
NetLinx Security with a Terminal Connection NetLinx Security with a Terminal Connection NetLinx Masters currently have built-in security capabilities. They require a user enter a valid user name and password to access the NetLinx System’s Telnet, HTTP, ICSP, and FTP services. The security capabilities are configured and applied via a Telnet connection or the NetLinx Master’s RS-232 terminal interface (the RS232 Program port).
NetLinx Security with a Terminal Connection Initial Setup via a Terminal Connection Security administration and configuration is done via a Terminal communication through the RS232 Program port on the NetLinx Master. Although these procedures are written for a Terminal connection, a user can also connect to a Master via a Telent connection. Do this by going to Start > Run, enter cmd within the Run dialog’s Open field and click OK.
NetLinx Security with a Terminal Connection 9) Delete group 10) Show list of authorized groups 11) Set Telnet Timeout in seconds 12) Display Telnet Timeout in seconds 13) Make changes permanent by saving to flash Or to return to previous menu Security Setup -> 3. The Main Security Menu shows a list of choices and a prompt. To select one of the listed choices, simply enter the number of the choice (1-15) at the prompt and press . 4.
NetLinx Security with a Terminal Connection The selection listed will display what the current settings. To change an option, select the number listed next to the option. For example, if selection 2) is selected (from the Select to change current security option listing), the security options for the Master are listed and HTTP Security becomes enabled. The listing is then displayed as follows: Select to change current security option 1) Terminal (RS232) Security.................. Enabled 2) HTTP Security..
NetLinx Security with a Terminal Connection Option 2 - Display system security options for NetLinx Master Type 2 and at the Security Setup prompt (at the bottom of the Main Security Menu) to display the current security options, and their current state (Enabled/Disabled). For example: Master Security.....................Disabled Terminal............................Disabled HTTP................................Disabled Telnet..............................Disabled Configuration.......................
NetLinx Security with a Terminal Connection Edit User Menu The Edit User Menu is accessed whenever you enter the Add user, or Edit user selections from the Main Security Menu.
NetLinx Security with a Terminal Connection Access Rights Menu The Access Rights Menu is accessed whenever you select Change Access Rights (option 6) from the Edit User Menu, or Change Access Rights from the Edit Group Menu. The Access Rights Menu is displayed as follows: Select to change current access right 1) Terminal (RS232) Access................. Disabled 2) Admin Change Password Access............ Disabled 3) FTP Access.............................. Disabled 4) HTTP Access...........................
NetLinx Security with a Terminal Connection Option 5 - Delete user 1. Type 5 and at the Security Setup prompt (at the bottom of the Main Security Menu) to delete an existing user account. A sample session response is: Select from the following list of enrolled users: 1) administrator 2) NetLinx 3) techpubs 4) Pat Select User -> 2. Enter the value associated to the user you want to delete and press . This action deletes the user account and returns you to the Security Setup menu.
NetLinx Security with a Terminal Connection Edit Group Menu: Add directory association 1. At the Edit Group prompt, type 1 to add a new directory association. A sample session response is: There are currently no directories associated with this account New directory: A Directory Association is a path that defines the directories and/or files that a particular user or group can access via the HTTP (Web) Server on the NetLinx Master. This character string can range from 1 to 128 alpha-numeric characters.
NetLinx Security with a Terminal Connection Edit Group menu: List directory associations 1. At the Edit Group prompt, type 3 to list all existing directory associations. A sample session response is: The following directory associations are enrolled: /directory1/* /directory2/* Press key to continue 2. Press to return to the Edit Group menu. Edit Group menu: Change Access Rights 1. At the Edit Group prompt, type 4 to change the current access rights for the selected group account.
NetLinx Security with a Terminal Connection Option 8 - Edit Group 1. Type 8 and at the Security Setup prompt (at the bottom of the Main Security Menu) to edit an existing group account. A sample session response is: Select from the following list: 1) administrator 2) Group 1 3) Group 2 Select group -> 2. Select a group from the list of currently enrolled groups and press to open the Edit Group Menu.
NetLinx Security with a Terminal Connection Option 11 - Set Telnet Timeout in seconds This feature is disabled after the installation of firmware build 130 or higher onto your target Master. 1. Type 11 and at the Security Setup prompt (at the bottom of the Main Security Menu) to set the Telnet Timeout value, in seconds. A sample session response is: Specify Telnet Timeout in seconds: 2.
NetLinx Security with a Terminal Connection Main Security Menu The Main Security menu is described below: Main Security Menu Command 1) Set system security options for NetLinx Master Description This selection will bring up the Security Options Menu that allows you to change the security options for the NetLinx Master (refer to the Security Options Menu section on page 134 for details). These are "global" options that enable rights given to users and groups.
NetLinx Security with a Terminal Connection Main Security Menu (Cont.) Command Description 13) Make changes permanent by saving to When changes are made to the security settings of the flash master, they are initially only changed in RAM and are not automatically saved permanently into flash. This selection saved the current security settings into flash.
NetLinx Security with a Terminal Connection The FTP Security and Admin Change Password Security are always enabled and cannot be disabled. Help menu Type help at the prompt in the Telnet session to display the following help topics: Help Menu Options Command ----- Help ----- Description (Extended diag messages are OFF) : Device:Port:System. If omitted, assumes Master. ? or Help Displays this list. DATE Displays the current date.
NetLinx Security with a Terminal Connection Help Menu Options (Cont.) Command SEND_COMMAND D:P:S or NAME,COMMAND Description Sends the specified command to the device. The Command uses NetLinx string syntax. • Ex: send_command 1:1:1,"'This is a test',13,10" • Ex: send_command RS232_1,"'This is a test',13,10" 146 SEND_STRING D:P:S or NAME,STRING Sends the specified string to the device. SET DATE Sets the current date. SET DNS Sets up the DNS configuration of a device.
NetLinx Security with a Terminal Connection Logging Into a Session Until Telnet security is enabled, a session will begin with a welcome banner. Welcome to NetLinx v3.01.320 Copyright AMX Corp. 1999-2005 > The welcome banner is not displayed for Terminal sessions. When Terminal security is enabled, the user should type in the word login to then be prompted for a user name and password before they will be allowed to access any commands available from Telnet.
NetLinx Security with a Terminal Connection Logout The logout command will log the user out of the current secure telnet session. For a Terminal session, the user will be logged out and to access Terminal commands again the user will first have to login. Help Security The help security command will display the security menu as shown previously.
Programming Programming This section describes the Send_Commands, Send_Strings, and Channel commands you can use to program the Integrated Controller. The examples in this section require a declaration in the DEFINE_DEVICE section of your program to work correctly. Refer to the NetLinx Programming Language instruction manual for specifics about declarations and DEFINE_DEVICE information.
Programming Master Send_Commands (Cont.) Command Description G4WC The internal G4WC Send command (to Master 0:1:0) has been revised to add G4 WebControl devices to Web control list displayed in the browser. Add G4 Web Control devices to Web control list displayed by the Web server in a browser Syntax: SEND_COMMAND ,"'G4WC "Name/Description",IP Address/URL,IP Port,Enabled'" Variables: Name/Description = A string, enclosed in double quotes, that is the description of the G4 Web Control instance.
Programming Master IP Local Port Send_Commands These commands are specific to the Master and not the Controller. These commands are sent to the DPS 0:1:0 (the Master). A device must first be defined in the NetLinx programming language with values for the Device: Port: System. In these programming examples, = Device. The term = Device:Port:System. Master IP Local Port Send_Commands Command Description This is only available for Type 2 and Type 3 Local Ports.
Programming Only the Device number can be changed on the Controllers using the ID button. Port and System can not be defined. Device:Port:System (D:P:S) A device is any hardware component that can be connected to an AXlink or ICSNet bus. Each device must be assigned a unique number to locate that device on the bus. The NetLinx programming language allows numbers in the range 1-32,767 for ICSNet (255 for AXlink). NetLinx requires a Device:Port:System (D:P:S) specification.
Programming Each of the NetLinx Integrated Controllers has specific port assignments: Port Assignments (NI-4000 & NI-3000) Serial Ports 1 - 7 Relays Port 8 IR Ports 9 -16 I/Os Port 17 Count 8 relays and 8 I/O's Port Assignments (NI-2000) Serial Ports 1 - 3 Relays Port 4 IR Ports 5 -8 I/Os Port 9 Count 4 relays and 4 I/O's In your terminal program, type "Help" or a question mark ("?") and to display the Program port commands listed in the following table.
Programming Program Port Commands (Cont.) Command DISK FREE Description Displays the total bytes of free space available on the Master. Example: >DISK FREE The disk has 2441216 bytes of free space. DNS LIST Displays: • Domain suffix· • Configured DNS IP Information Example: >DNS LIST [0:1:0] Domain suffix:amx.com The following DNS IPs are configured Entry 1-192.168.20.5 Entry 2-12.18.110.8 Entry 3-12.18.110.7 ECHO OFF Disables terminal character's echo (display) function.
Programming Program Port Commands (Cont.) Command OFF Description Turns off a channel on a device. The device can be on any system the Master you are connected to can reach. You can specify the device number, port, and system, or the name of the device that is defined in the DEFINE_DEVICE section of the program. Syntax: OFF[name,channel] -orOFF[D:P:S,channel] Example: >OFF[5001:7:4] Sending Off[5001:7:4] ON Turns on a channel on a device.
Programming Program Port Commands (Cont.) Command PULSE Description Pulses a channel on a device on and off. The device can be on any system the Master you are connected to can reach. You can specify the device number, port, and system; or the name of the device that is defined in the DEFINE_DEVICE section of the program. Example: >PULSE[50001:8:50,1] Sending Pulse[50001:8:50,1] REBOOT Reboots the Master or specified device. Example: >REBOOT [0:1:0] Rebooting...
Programming Program Port Commands (Cont.) Command SET DNS Description Prompts you to enter a Domain Name, DNS IP #1, DNS IP #2, and DNS IP #3. Then, enter Y (yes) to approve/store the information in the Master. Entering N (no) cancels the operation. Example: >SET DNS [0:1:0] -- Enter New Values or just hit Enter to keep current settings -Enter Enter Enter Enter Domain Suffix: DNS Entry 1 : DNS Entry 2 : DNS Entry 3 : amx.com 192.168.20.5 12.18.110.8 12.18.110.
Programming Program Port Commands (Cont.) Command SET ICSP TCP TIMEOUT Description Sets the timeout period for ICSP and i!-WebControl TCP connections. Example: >SET ICSP TCP TIMEOUT This will set the timeout for TCP connections for both ICSP and i!-WebControl.When no communication has been detected for the specified number of seconds, the socket connection is closed.ICSP and i!-WebControl have built-in timeouts and reducing the TCP timeout below these will cause undesirable results.
Programming Program Port Commands (Cont.) Command SET TELNET PORT Description Sets the IP port listened to for Telnet connections. Example: >SET TELNET PORT Current telnet port number = 23 Enter new telnet port number (Usually 23) (0=disable Telnet) : Once you enter a value and press the ENTER key, you get the following message: Setting telnet port number to 23 New telnet port number set, reboot the Master for the change to take affect. SET THRESHOLD Sets the Master's internal message thresholds.
Programming Program Port Commands (Cont.) Command SET URL Description Prompts you to enter the URL address and port number of another Master or device (that will be added to the URL list). Then, enter Y (yes) to approve/store the new addresses in the Master. Entering N (no) cancels the operation. Example: >SET URL [0:1:0] No URLs in the URL connection list Type A and Enter to Add a URL or Enter to exit. -> a Enter URL -> 192.168.21.
Programming Program Port Commands (Cont.) Command SHOW LOG Description Displays the log of messages stored in the Master's memory. The Master logs all internal messages and keeps the most recent messages. The log contains:· • Entries starting with first specified or most recent • Date, Day, and Time message was logged • Which object originated the message • The text of the message SHOW LOG [start] [end] SHOW LOG ALL If start is not entered, the most recent message will be first.
Programming Program Port Commands (Cont.) Command SHOW REMOTE Description Displays a list of the devices this system requires input from and the types of information needed. If when a NetLinx Master connects to another NetLinx Master, the newly connecting system has a device that the local system desires input from; the new system is told what information is desired from what device. Note the local system number is 1062.
Programming Program Port Commands (Cont.) Command TCP LIST Description Lists all active TCP/IP connections. Example: >TCP LIST The following TCP connections exist(ed): 1: IP=192.168.21.56:1042 Socket=0 (Dead) 2: IP=192.168.21.56:1420 Socket=0 (Dead) TIME Displays the current time on the Master. Example: >TIME 13:42:04 URL LIST Displays the list of URL addresses programmed in the Master (or another system). Example: >URL LIST The following URLs exist in the URL connection list ->Entry 0-192.
Programming Notes on Specific Telnet/Terminal Clients Telnet and terminal clients will have different behaviors in some situations. This section states some of the known anomalies. WindowsTM client programs Anomalies occur when using a Windows client if you are not typing standard ASCII characters (i.e. using the keypad and the ALT key to enter decimal codes). Most programs will allow you to enter specific decimal codes by holding ALT and using keypad numbers.
Programming LED Send_Commands (Cont.) Command Description LED-EN When the port is active, the LED is lit. When the port is not active, the LED is not lit. Issue the command to port 1 to enable the LEDs on the Controller (default setting). When activity occurs on a port(s) or Controller, the LEDs illuminate. Enable the LED (on 32 LED hardware) for a port (by default). Syntax: SEND_COMMAND ,'LED-EN' Example: SEND_COMMAND System_1,'LED-EN' Enables the System_1 Controller's LEDs.
Programming RS-232/422/485 Send_Commands (Cont.) Command Description CHARDM Syntax: Set the delay time between SEND_COMMAND ,"'CHARDM-
Programming RS-232/422/485 Send_Commands (Cont.) Command Description RXOFF Syntax: Disable the transmission of incoming received characters to the Master (default). SEND_COMMAND ,"'RXOFF'" Example: SEND_COMMAND RS232_1,"'RXOFF'" Stops the RS232_1 device from transmitting received characters to the Master card. RXON Start transmitting received characters to the Master (default). Enables sending incoming received characters to the Master.
Programming RS-232/422/485 Send_Commands (Cont.) Command Description TSET BAUD TSET BAUD works the same as SET BAUD, except that the changes are not permanent, and the previous values will be restored if the power is cycled on the device. Temporarily set the RS-232/ 422/485 port's communication parameters for a device.
Programming RS-232/422/485 Send_String Escape Sequences This device also has some special SEND_STRING escape sequences: If any of the 3 character combinations below are found anywhere within a SEND_STRING program instruction, they will be treated as a command and not the literal characters. In these examples: = device. RS-232/422/485 Send_String Escape Sequences Command Description 27,17,
Programming IR / Serial Ports Channels IR / Serial Ports Channels 00001 - 00229 IR commands. 00229 - 00253 May be used for system call feedback. 00254 Power Fail. (Used w/ 'PON' and 'POF' commands). 00255 Power status. (Shadows I/O Link channel status). IR ports - Ports 9 - 16 (NI-3000/4000) and Ports 5 - 8 (NI-2000). IR/Serial Send_Commands The following IR and IR/Serial Send_Commands generate control signals for external equipment. In these examples: = device.
Programming IR/Serial Send_Commands (Cont.) Command Description CH All channels below 100 are transmitted as two digits. If the IR code for ENTER (function #21) is loaded, an Enter will follow the number. If the channel is greater than or equal to (>=) 100, then IR function 127 or 20 (whichever exists) is generated for the one hundred digit. Uses 'CTON' and 'CTOF' times for pulse times. Send IR pulses for the selected a channel.
Programming IR/Serial Send_Commands (Cont.) Command Description GET MODE The port responds with: ,,. Syntax: Poll the IR/Serial port's configuration parameters and SEND_COMMAND ,"'GET MODE'" report the active mode Example: settings to the device requesting the information.
Programming IR/Serial Send_Commands (Cont.) Command Description PON If at any time the IR sensor input reads that the device is OFF (such as if one turned it off manually at the front panel), IR function 27 (if available) or IR function 9 is automatically generated in an attempt to turn the device back ON. If three attempts fail, the IR port will continue executing commands in the buffer and trying to turn the device On.
Programming IR/Serial Send_Commands (Cont.) Command Description SET MODE Sets an IR port to either IR or Serial mode Set the IR/Serial ports for IR Syntax: or Serial-controlled devices SEND_COMMAND , 'SET MODE '" connected to a CardFrame or Variable: NetModule. mode = IR or SERIAL. Example: SEND_COMMAND IR_1,"'SET MODE IR'" Sets the IR_1 port to IR mode for IR control. SP Generate a single IR pulse. You can use the 'CTON' to set pulse lengths and the 'CTOF' for time off between pulses.
Programming IR/Serial Send_Commands (Cont.) Command Description XCHM Syntax: Changes the IR output pattern for the 'XCH' send command. SEND_COMMAND ,"'XCHM '" Variable: extended channel mode = 0 - 4. Example: SEND_COMMAND IR_1,"'XCHM 3'" Sets the IR_1 device's extended channel command to mode 3. Mode 0 Example (default): [x][x] SEND_COMMAND IR_1,"'XCH 3'" Transmits the IR code as 3-enter. SEND_COMMAND IR_1,"'XCH 34'" Transmits the IR code as 3-4-enter.
Programming Input/Output Send_Commands The following Send_Commands program the I/O ports on the Integrated Controller. In these examples: = device. I/O ports: Port 17 (NI-3000/4000) and Port 9 (NI-2000). Channels: 1 - 8 I/O channels. I/O SEND_COMMANDS GET INPUT Get the active state for the selected channels. An active state can be high (logic high) or low (logic low or contact closure). Channel changes, Pushes, and Releases generate reports based on their active state.
Troubleshooting Troubleshooting This section describes the solutions to possible hardware/firmware issues that could arise during the common operation of a Modero touch panel. Troubleshooting Information Symptom Solution My NI Controller can’t obtain a DHCP Address. In requesting a DHCP Address, the DHCP Server can take up to a few minutes to provide the address to the on-board Master.
Troubleshooting Troubleshooting Information (Cont.) Symptom Solution I can’t connect to my NI Controller via the rear Program Port using a DB9 cable. A DB9 cable is used for Serial communication between the PC and the Master. • Verify the DB9 connectors are securely inserted into their respective ports on both the rear Program Port (on the NI) and the COM Port (on the PC). • The NI-series of Integrated Controllers comes factory defaulted to a communication Baud Rate of 38400.
Troubleshooting Troubleshooting Information (Cont.) Symptom Solution During the firmware upgrade process, NetLinx Studio failed to install the last component. This occurs when initially upgrading the on-board Master from a previous firmware (build 117 or lower), to the new Web Security firmware (build 300 or higher). • Only upon the initial installation of the new build there will be a failure of the last component to successfully download.
ARGENTINA • AUSTRALIA • BELGIUM • BRAZIL • CANADA • CHINA • ENGLAND • FRANCE • GERMANY • GREECE • HONG KONG • INDIA • INDONESIA • ITALY • JAPAN LEBANON • MALAYSIA • MEXICO • NETHERLANDS • NEW ZEALAND • PHILIPPINES • PORTUGAL • RUSSIA • SINGAPORE • SPAIN • SWITZERLAND • THAILAND • TURKEY • USA ATLANTA • BOSTON • CHICAGO • CLEVELAND • DALLAS • DENVER • INDIANAPOLIS • LOS ANGELES • MINNEAPOLIS • PHILADELPHIA • PHOENIX • PORTLAND • SPOKANE • TAMPA 3000 RESEARCH DRIVE, RICHARDSON, TX 75082 USA • 800.222.