NI-3101-SIG Operation/Reference Guide Operation/Reference Guide NI-3101-SIG Signature Series NetLinx Integrated Controller Central Controllers Last Revised: 9/13/2011
AMX Limited Warranty and Disclaimer This Limited Warranty and Disclaimer extends only to products purchased directly from AMX or an AMX Authorized Partner which include AMX Dealers, Distributors, VIP’s or other AMX authorized entity.
AMX Software License and Warranty Agreement • LICENSE GRANT. AMX grants to Licensee the non-exclusive right to use the AMX Software in the manner described in this License. The AMX Software is licensed, not sold. This license does not grant Licensee the right to create derivative works of the AMX Software. The AMX Software consists of generally available programming and development software, product documentation, sample applications, tools and utilities, and miscellaneous technical information.
Table of Contents Table of Contents Introduction ........................................................................................................1 NI-3101-SIG Specifications........................................................................................ 2 Installation and Upgrading .................................................................................5 Device:Port:System (D:P:S) .......................................................................................
Table of Contents Resetting the Factory Default System and Device Values....................................... 22 Obtaining the Master’s IP Address (using DHCP) ................................................... 23 Assigning a Static IP to the NetLinx Master............................................................ 24 Communicating with the NI Device via an IP .......................................................... 26 Verifying the current version of NetLinx Master Firmware .........................
Table of Contents SSL Server Certificate Creation Procedures............................................................ 64 Server - Display SSL Server Certificate Information ...................................................... 66 Server - Creating a self-generated SSL Certificate ........................................................ 66 Server - Regenerating an SSL Server Certificate Request ............................................. 67 Server - Creating a Request for an SSL Certificate ..........
Table of Contents Initial Setup via a Terminal Connection................................................................... 99 Establishing a Terminal connection via the RS-232/USB Configuration Port ............... 100 Accessing the Security configuration options ....................................................... 100 Option 1 - Set system security options for NetLinx Master (Security Options Menu) . 101 Option 2 - Display system security options for NetLinx Master ..................................
Table of Contents WindowsTM client programs....................................................................................... 131 Linux Telnet client ....................................................................................................... 131 LED Disable/Enable Send_Commands .................................................................. 132 RS232/422/485 Ports Channels ............................................................................ 132 RS-232/422/485 Send_Commands ....
Table of Contents vi NI-3101-SIG Signature Series NetLinx Integrated Controller
Introduction Introduction The NI-3101-SIG Signature Series NetLinx Integrated Controller satisfies the control and automation features common in a larger area or multiple rooms, which may include the integration of a larger number of devices including VCR and DVD players, projectors, lighting, thermostats and other electronic equipment. In technology-driven environments, this solution allows for the future addition of more devices and control capabilities.
Introduction NI-3101-SIG Specifications The NI-3101-SIG (FIG. 1) provides support for 6 configurable RS-232/RS-422/RS-485 Ports, 8 IR/Serial Output ports, 8 Digital Input/Output ports, and 8 Relays. FIG.
Introduction NI-3101-SIG Specifications (Cont.) Input/Output LEDs White Output LED blinks when the Controller transmits data, sets channels On/Off, sends data strings, etc. White Input LED blinks when it receives data from button pushes, strings, commands, channel levels, etc.
Introduction NI-3101-SIG Specifications (Cont.) IR/Serial (Ports 9 - 16) Eight IR/Serial control ports support high-frequency carriers up to 1.142 MHz. • Each output is capable of three electrical formats: IR, Serial, and Data • Eight IR/Serial data signals can be generated simultaneously.
Installation and Upgrading Installation and Upgrading Device:Port:System (D:P:S) A device is any hardware component that can be connected to an AXlink bus. Each device must be assigned a unique number to locate that device on the bus. Only the Device value can be set through the DIP switch settings mentioned above. NetLinx requires a Device:Port:System (D:P:S) specification. This D:P:S triplet can be expressed as a series of constants, variables separated by colons, or a DEV structure.
Installation and Upgrading 3. Thread the cables through the opening in the equipment rack. Allow for enough slack in the cables to accommodate for movement during the installation process. 4. Reconnect all cables to their appropriate source/terminal locations. Refer to theConnections and Wiring section on page 7 for more detailed wiring and connection information. Verify that the terminal end of the power cable is not connected to the a power supply before plugging in the 2-pin power connector.
Connections and Wiring Connections and Wiring Setting the Configuration DIP Switch for the Configuration Port Prior to installing the Controller, use the Configuration DIP switch to set the information used by the Configuration Port for communication. The DIP switchsets the starting address (the device number in the D:P:S specification) for the Control Cards installed in the controller with a range of 1-1536. The four-pin Configuration DIP switch is located on the rear of the device.
Connections and Wiring Modes and Front Panel LED Blink Patterns The following table lists the modes and blink patterns for the front panel LEDs associated with each mode. These patterns are not evident until after the unit is powered. Modes and LED Blink Patterns LEDs and Blink Patterns STATUS (blue) OUTPUT (white) Starting the operating system (OS). On On On On-board Master is booting. On Off On Contacting DHCP server On-board Master is contacting a DHCP server for IP configuration information.
Connections and Wiring The AXlink port can be used to supply power to downstream AXlink-compatible devices, so long as both the power required is LESS THAN 2 Amps total and the external power supply feeding the device has the necessary power capability. Wiring Guidelines The Integrated Controllers use a 12 VDC-compliant power supply to provide power through the rear 2-pin 3.5 mm mini-Phoenix PWR connector, or through the 4-pin 3.
Connections and Wiring PWR + Power Supply GND Integrated Controller FIG. 4 2-pin mini-Phoenix connector wiring diagram (direct power) Using the 4-pin mini-Phoenix connector for data and power Connect the 4-pin 3.5 mm mini-Phoenix (female) captive-wire connector to an external NetLinx device as shown in FIG. 5. To the Integrated Controller’s AXlink/PWR connector To the external AXlink device Top view PWR + GND - AXP/TX AXM/RX AXM/RX PWR + GND - AXP/TX Top view FIG.
Connections and Wiring DB9 Device Port: Connections and Wiring FIG. 7 shows the connector pinouts for the rear RS-232/RS-422/RS-485 (DB9) Device Ports. These ports support most standard RS-232 communication protocols for data transmission. This figure gives a visual representation of the wiring specifications for the RS-232/422/485 Device connectors.
Connections and Wiring RELAYS (Port 8) 8 7 6 5 B A B A B A B A 4 RELAYS (Port 4) 3 2 1 4 3 2 1 NI-3101-SIG relay connector B A B A B A B A configuration (Port 8) B A B A B A B A FIG. 8 RELAY connector (male) NI-3101-SIG Input/Output (I/O) Port: Connections and Wiring The I/O port responds to either switch closures or voltage level (high/low) changes, or it can be used for logiclevel outputs.
Connections and Wiring The IR/Serial connector wiring specifications are listed in the following table: IR/Serial Connector Wiring Specifications (per Port) Number of IR connections NI-3101-SIG Port # 1 9 GND (-) 2 10 GND (-) Function Signal 1 (+) Signal 2 (+) 3 11 GND (-) 4 12 GND (-) Signal 3 (+) Signal 4 (+) 5 13 GND (-) 6 14 GND (-) Signal 5 (+) Signal 6 (+) 7 15 GND (-) 8 16 GND (-) Signal 7 (+) Signal 8 (+) LAN (Ethernet/RJ-45 Port): Connections and Wiring The following ta
Connections and Wiring LAN LEDs L/A - Link/Activity LED lights (green) when the LAN cables are connected and terminated correctly. SPD - Speed LED lights (yellow) when the connection speed is 100 Mbps and turns Off when speed is 10 Mbps. ETHERNET 10/100 FIG. 12 LAN LEDs LAN ports used by the Integrated Controllers LAN Ports Used by the NetLinx Integrated Controllers Port type Description Standard Port # FTP The on-board Master has a built-in FTP server.
Connections and Wiring 3. Remove the rear panel from the device, and then disconnect the NXI control cable and remove the Master card. 4. Locate the battery behind the Configuration Port on the circuit board. 5. Carefully slide the battery out of its socket and insert the new battery. 6. Plug the 2-pin 3.5 mm mini-Phoenix PWR (green) connector to reapply power. Wait approximately 1 minute, then remove the PWR connector again. 7.
Connections and Wiring 16 NI-3101-SIG Signature Series NetLinx Integrated Controller
Configuration and Firmware Update Configuration and Firmware Update Overview This section refers to steps necessary to both communicate with and upgrade the NI-3101-SIG. Before continuing, verify that you are using the latest version of NetLinx Studio and the latest firmware Kit file (this file contains both the NI Integrated Controller and onboard Master firmware). The NI-3101-SIG Kit file begins with 2105_04_X100. Before beginning: 1. Set up and configure the NI-3101-SIG.
Configuration and Firmware Update FIG. 14 Communication Settings dialog box FIG. 15 Serial Settings dialog box No authentication username or password information is required when selecting a direct connection such as USB or Serial. 7. Set the COM port parameters for the selected COM port used for communication to the NetLinx Master.
Configuration and Firmware Update System Address (default for initial system is 1) Check-Off to verify change FIG. 16 Device Addressing tab (changing the system value) This tab represents the only way to change the System Number associated to the active on-board NI Master. The Master must have its power cycled to incorporate the new System number, as often a simple reboot via Studio will not be enough to incorporate this new number). 2.
Configuration and Firmware Update Using Multiple NetLinx Masters When using more than one Master, each unit must be assigned to a separate System value. A Master’s System value can be changed but its device Address must always be set to zero (00000). The Device Addressing dialog will not allow you to alter the NetLinx Master address value. Example: Using NetLinx Studio v 2.x to work with an NXC-ME260/64 and NI-3101-SIG: The NXC-ME260/64 could be assigned to System 1 (with a value of 00000).
Configuration and Firmware Update Recommended NetLinx Device Numbers • 1 - 255 • Axcess Devices use Axcess standards • 301 - 3072 • NetLinx CardFrames start at frame number 25 - (frame# * 12) + Card # • 5001 - 5999 • ICSNet NetLinx devices: NXI, NXM-COM2, NXM-IRS4, etc.
Configuration and Firmware Update Identify Mode is currently active FIG. 19 Device Addressing dialog - Identify Mode active 5. Press the NI Controller’s ID button to assign the new Device / System values entered in step 3 to the Controller. At this point, the "Successful Identification Made " message is displayed (FIG. 20): Device identified ID Mode no longer active FIG.
Configuration and Firmware Update By setting the system to its default value (#1), Modero panels that were set to connect to the Master on another System value will not appear in the OnLine Tree tab of the Workspace window. For example: A Modero touch panel was previously set to System #2. The system is then reset to its default setting of System #1 and then refreshed from within the Workspace window.
Configuration and Firmware Update DO NOT enter ANY IP information at this time; this step only gets the System Master to recognize that it should begin using an obtained DHCP Address. 4. Note the obtained IP Address (greyed-out and read-only). This information is later entered into the Master Communication Settings dialog and used by NetLinx Studio v 2.x to communicate to the Master via an IP. This address is reserved by the DHCP server and then given to the Master.
Configuration and Firmware Update 2. Verify that both the System number corresponds to the System value previously assigned within the Device Addressing tab and that zero (0) is entered into the Device field. The system value must correspond to the Device Address previously entered in the Device Addressing tab. Refer to the Setting the System Value section on page 18 for more detailed instructions on setting a system value. 3.
Configuration and Firmware Update Communicating with the NI Device via an IP Whether the on-board Master’s IP Address was Static Set (Set IP Info) or Dynamically obtained (Get IP Info), use the IP Address information from the Network Addresses dialog to establish communication via the LANconnected Integrated Controller. 1. From your PC, launch NetLinx Studio 2. 2. Obtain the IP Address of the Master from the System Administrator.
Configuration and Firmware Update FIG. 25 TCP/IP Settings dialog 7. Click the New button to open the New TCP/IP Setting dialog box (FIG. 26), where you may enter both a previously obtained DHCP or Static IP Address and an associated description for the connection into their respective fields. FIG. 26 New TCP/IP Setting dialog 8.
Configuration and Firmware Update 13. Click OK to save the newly entered information and return to the previous Communication Settings dialog box. Click OK again to begin the communication process to the Master. If currently connected to the assigned Master, a popup asks about temporarily stopping communication to the Master and applying the new settings. 14. Click Yes to interrupt the current communication from the Master and apply the new settings. 15.
Configuration and Firmware Update On-board NI Master Control cards NetLinx Integrated Controller NetLinx Studio app. version Unbound Dynamic Device FIG. 28 Sample NetLinx Workspace window (showing OnLine Tree tab) Upgrading the On-board Master Firmware via an IP The on-board Master firmware Kit file is not the same as the Integrated Controller Kit file.
Configuration and Firmware Update value listed within the active System folder in the OnLine Tree tab of the Workspace. The Device number is always 0 for the NI Master. Selected on-board Master firmware file Description field for selected Kit file Firmware download status Device and System Number must match the Device and System values listed in the Workspace window FIG. 29 Send to NetLinx Device dialog (showing on-board NI_Master firmware update via IP) 8.
Configuration and Firmware Update The OUTPUT and INPUT LEDs alternately blink to indicate the on-board Master is incorporating the new firmware. Allow the Master 20 - 30 seconds to reboot and fully restart. 17. Right-click the System number and select Refresh System. This establishes a new connection to the System and populates the list with the current devices (and their firmware versions) on your system. Upgrading the NI Controller Firmware via IP 1.
Configuration and Firmware Update Selected on-board Integrated Controller firmware file Description field for selected Kit file Firmware download status Device and System Number must match the Device and System values listed in the Workspace window FIG. 31 Send to NetLinx Device dialog (showing on-board Integrated Controller firmware update via IP) The Kit file for the Integrated Controller on the NI-2100/3100/3101-SIG/4100 Series begins with 2105_04_NI_X100.
NetLinx Security within the Web Server NetLinx Security within the Web Server NetLinx Masters incorporate built-in security for HTTPS and Terminal sessions (enhanced with SSL and SSH respectively), ICSP data verification/encryption, and Server Port configuration. By using both SSL certificate verification and encryption over a secured HTTP (HTTPS) connection, this version of NetLinx firmware provides users with a more convenient web-based method of securing both the Master and its data communications.
NetLinx Security within the Web Server NetLinx Security Terms The following table lists some commonly used NetLinx Security terms: NetLinx Security Terms User A user is a single potential client of the NetLinx Master. Administrator An administrator has privileges to modify existing NetLinx Master access groups, users, and their rights.
NetLinx Security within the Web Server Browser Application Frames A web page (FIG. 32) can be divided into separate sections or frames, each of which can be independent of one another and display their own information. Located on the left side of the populated Browser window is the Navigation frame which allows a user to navigate throughout the application.
NetLinx Security within the Web Server Username field Password field Log In/Log Out button FIG. 33 Log In/Log Out fields Authentication is based upon matching the user’s data to pre-configured username and password information, and then assigning the rights assigned to that user. The maximum length of a username or password is 20 characters. The minimum length of a username or password is four characters.
NetLinx Security within the Web Server Master Firmware Security Access Parameters Master Security Configuration Terminal (RS232/USB Configuration port) security HTTP (Web Server) Security (allows for access via a secure HTTP connection (if enabled) by requiring a username and password) Telnet Security Configuration (allows the alteration of current communication, system, and security settings by requiring a username and password) ICSP Connectivity (for AMX product communication) Encryption
NetLinx Security within the Web Server Clicking on a G4 WebControl link opens a separate browser window which is configured to display the current information from the panel using the native resolution of the target panel. An example is a CA15 panel link opening a new window using an 800 x 600 resolution.
NetLinx Security within the Web Server The following table lists the NetLinx System Security options that can be granted or denied by an administrator or other authorized user: Security Features Feature Description System Level: Provides an authorized user with the ability to alter the current security options of the system assigned to the target Master.
NetLinx Security within the Web Server Security Level features NetLinx Master security features Require Encryption option (enable/disable) FIG. 36 System Level Security - Enable/Disable System Security page System Level Security Page Feature Description Master Security: This option allows an authorized user to require that a valid username and password be required for access to a feature listed on this page.
NetLinx Security within the Web Server System Level Security Page (Cont.) Feature Description Telnet Access: This selection determines if a username and password is required for Telnet Access (see FIG. 37). • If Telnet access is enabled, a username and password is required before allowing communication over either the Telnet and/or SSH Ports. SSH version 2 is only supported. • This authorized user must have sufficient access rights to login through a Telnet session to the Master.
NetLinx Security within the Web Server Telnet Access option ICSP Connectivity and Encryption option SS SS Telnet Port ICSP Port HTTP Port HTTP Access option SS HTTP/SSL Port SSH Port FTP Access option SS SS Username and Password are required when enabled FTP Port Master FIG.
NetLinx Security within the Web Server Security Level features NetLinx Master security features Require Encryption option (enable/disable) FIG. 38 System Level Security - Enable/Disable System Security page with selections parameters. If the Configuration option is enabled and the user wants to modify the Master’s IP Address; they would either be prompted to log in (via the Login button) or if already logged in, notified whether their rights are sufficient to allow them to change the current parameter.
NetLinx Security within the Web Server Security - Group Level Security page To access this page, click the Group Level link (from within the Security section of the Navigation frame). This page (FIG. 39) allows an authorized user to both select and modify an existing group, delete an existing group, or add a new group. Unless you are logged in with administrator privileges, you will not be allowed to modify the default administrator profile.
NetLinx Security within the Web Server Configure Group Properties Page Feature Description Configure Group Properties: This page allows an authorized user to configure the options for either a pre-existing or new group. Configuration on this page consists of both the options and directories to which the group is granted access. Update • This button submits the modified page (form) information back to the server.
NetLinx Security within the Web Server Adding a new Group 1. Click the Group Level link (from within the Security section of the Navigation frame) to open the Manage Groups page. 2. Click the New button to be transferred to the Configure Group Properties page (FIG. 39). 3. From within the Group Security Details section, enter a unique name for the new group. The name must be a valid character string consisting of 4 - 20 alpha-numeric characters.
NetLinx Security within the Web Server give them a new group or assign them (none) as a group. When returning to delete the desired group, the "Group deleted successfully" notice is displayed. Security - User Level Security page To access the User Level Security page (FIG. 40), click on the User Level link (from within the Security section of the Navigation frame). This page allows an authorized user to add a user account (FIG. 30) and then assign that user’s current access rights.
NetLinx Security within the Web Server Configure User Properties Page Feature Description Configure User Properties: This page allows an authorized user to configure the options for either a pre-existing or new user. Configuration on this page consists of both the options and directories to which the user is granted access. Update • This button submits the modified page (form) information back to the server.
NetLinx Security within the Web Server ICSP Access • This selection grants this user ICSP access. • ICSP communication allows a user to connect to the target NetLinx Master via ICSP connection using any transport method (TCP/IP, UDP/IP, and RS-232/USB). Configure Users Properties Page (Cont.) Feature Description User Security Details (Cont.): Encrypt ICSP Connection • This selection enables encryption of the ICSP communication. • This checkbox is greyed-out until ICSP Access is enabled.
NetLinx Security within the Web Server 8. Click the Update button to save the changes to the target Master. A “User added successfully” notice is displayed at the top of the page if the page parameters have no errors. 9. Click the Back button to return to the Manage User page. Modifying the properties of an existing User 1. Click the User Level link (from within the Security section of the Navigation frame) to open the Manage Users page.
NetLinx Security within the Web Server 3. Click the Delete button to remove the selected user and return to the Manage Users page. The NetLinx account can be deleted from the Manage User page.The administrator account cannot be deleted, nor can it have its directory associations modified. System Settings This section of the Navigation frame (FIG.
NetLinx Security within the Web Server Manage System Page Components Feature Description Online Tree menu: The Online Tree menu contains button options relating to the entries within the Online Tree. • Expand - Expands the selected level to expose any subfolders. • Refresh - Refreshes the contents of the Online Tree frame. • Collapse - Collapses the selected level to hide any subfolders.
NetLinx Security within the Web Server Manage System Page Components (Cont.) Feature Description Management menu options: These management buttons change depending on the source chosen from the Online Tree. • There are three menu groupings available: - System Menu (to configure Master properties). - Device Menu (to configure device specific properties). - Port Menu (to configure specific Port settings). System menu buttons: The selected system number is displayed below these menu buttons.
NetLinx Security within the Web Server Manage System - System Menu Buttons These buttons appear (on the right) when a user clicks on the purple System icon from within the Online Tree. The selected system number is displayed below these System menu buttons. System Menu - Modifying the Date/Time 1. Click the Manage System link (from within the System Settings section of the Navigation frame). 2.
NetLinx Security within the Web Server Current System Number FIG. 46 Change System Number dialog 4. Enter a new numeric value into the New System Number field. 5. Click the Update button to save this new value to the system on the target Master. The following message, "System number changed to X. Master must be rebooted for the change to take effect", reminds the user the Master must first be rebooted before the new settings take effect.
NetLinx Security within the Web Server 5. Select either the Control or Emulate option. FIG. 47 Control/Emulate dialog To Control a device means that the program generates messages which appear to a specified device to have come from the Master. The options in this frame specify the combination for the device to be controlled. To Emulate a device means that the program generates messages which appear to the Master to have come from a specified combination (real or fictitious).
NetLinx Security within the Web Server Valid Level Data Types and Ranges Minimum Value Maximum Value 0 255 INTEGER 0 65535 SINTEGER -32768 32767 CHAR LONG 0 429497295 SLONG -2147483648 2147483647 FLOAT -3.402823466e+38 3.402823466e+38 11. Within the Command and String fields, you can enter any number of messages that can be sent as either a String or Command. 12.
NetLinx Security within the Web Server Selected device NetLinx Notification types Device Configuration dialog FIG. 48 Diagnostics dialog (showing modify popup) Setting up and removing a Diagnostic Filter 1. Setup a diagnostic filter by scrolling down the page and clicking the Modify button below the first empty column. This action opens the Device Configuration dialog as a secondary popup window.
NetLinx Security within the Web Server Press the down arrow (adjacent to the Preset drop-down list) to display a listing of all currently available Presets. Select a previously configured Preset and press the Recall button to populate all available fields and radio buttons with the selections associated with this chosen Preset. This preset mechanism is done via cookies so it does not persist across multiple browsers/ computers. 4.
NetLinx Security within the Web Server Diagnostic Configuration Dialog (Cont.) Feature Description NetLinx Notification Types: All Notifications: Enables (selects) every notification field. • Online/Offline Messages: Generates a message with a change in the target device’s online/offline status. • Configuration Messages: Generates a message with a change in the target device’s configuration. • Input Channel Changes: Generates a message with an input channel change (i.e.
NetLinx Security within the Web Server Setting the Master’s Port Configurations Manage System - Server This page allows a user to both change the port numbers (used for various Web services) and configure the SSL settings used on the Master by bringing up a submenu of options such as: Server Submenu Options Feature Description Port Settings: Allows a user to modify the server settings; specifically those port assignments associated with individual services.
NetLinx Security within the Web Server Telnet Access option SS Telnet SSH Client Web Browser SS 22 SSH Port 80 HTTP Port 443 HTTP/SSL Port 1319 ICSP Port 21 FTP Port Secure Secure ICSP Connectivity and Encryption option FTP SS Telnet Port HTTP Access option Browser or SSL AMX Software & Hardware 23 SS SS Username and Password are required when enabled Secure Secure NetLinx Master FIG. 50 Port Communication Settings Modifying the Server Port Settings 1.
NetLinx Security within the Web Server Server Port Settings (Cont.) Feature Description HTTP Port: The port value used for unsecure HTTP Internet communication between the web browser’s UI and the target Master. • The default port value is 80. • By default, the Master does not have security enabled and must use http:// in the Address field for communication. • One method of adding security to HTTP communication would be to change the port value.
NetLinx Security within the Web Server Online Tree refreshes with the current system information and showing the newly updated system number. If the Online Tree contents do not refresh within a few minutes, press the browser’s Refresh button and reconnect to the Master. SSL Server Certificate Creation Procedures Initially, a NetLinx Master is not equipped with any installed certificates.
NetLinx Security within the Web Server Server Certificate Entries Feature Description Server Certificate Field Information: Update Updates the target Master with the information entered on this page. • This process can take a few minutes. Bit Length Provides a drop-down selection with three available public key lengths: 512, 1024, and 2048. • Longer key lengths result in increased certificate processing times. • A longer key length results in more secure certificates.
NetLinx Security within the Web Server Server - Display SSL Server Certificate Information 1. Navigate to the Server Certificate page by clicking System Settings > Manage System > Server > Create SSL Certificate to open the Server Certificate page. By default, the Display Certificate Action is selected and these fields are populated with information from an installed certificate. If the Master does not have a previously installed certificate, these fields are blank. 2.
NetLinx Security within the Web Server Server - Regenerating an SSL Server Certificate Request 1. Navigate to the Server Certificate page by clicking System Settings > Manage System > Server > Create SSL Certificate to open the Server Certificate page. This method of certificate generation is used to modify or recreate a previously existing certificate already on the Master.
NetLinx Security within the Web Server 10. Choose Create Request from the drop-down list. 11. Click the Update button to accept the information entered into the above fields and generate a certificate file. Refer to theServer - Exporting an SSL Certificate Request section on page 68. This refreshed the Server Certificate page and if the certificate request was successful, displays a "Certified request generated" message. 12.
NetLinx Security within the Web Server Certificate text field FIG. 52 Export SSL Certificate dialog 3. Place your cursor within the certificate text field. 4. Press the Ctrl + A keys simultaneously on your keyboard (this selects all the text within the field). YOU MUST COPY ALL OF THE TEXT within this field, including the -----BEGIN CERTIFICATE REQUEST----- and the -----END CERTIFICATE REQUEST-----. This text in the CA submission must be included to receive a CA-approved certificate. 5.
NetLinx Security within the Web Server 2. Navigate to the Server Certificate page by clicking System Settings > Manage System > Server > Import SSL Certificate to open the Import Certificate page (FIG. 53). Certificate text field FIG. 53 Import SSL Certificate dialog 3. Place the cursor within the empty window and paste the raw text data (in its entirety) into the field. 4. Click the Update button to enter the new encrypted certificate information and save it to the Master.
NetLinx Security within the Web Server Manage System - Device Menu Buttons The Device Menu buttons appear when a user clicks on any violet Device icon from within the Online Tree. The selected system number: device number are displayed below these menu buttons. Device Menu - Configuring the LAN Settings 1. Click the System Settings > Manage System link from within the System Settings section of the Navigation frame. 2.
NetLinx Security within the Web Server 8. Return to the System menu by clicking on the purple System icon from within the Online Tree, click the Reboot button, and then allow the Master a short time to reboot itself. 9. Click on the Refresh macro from the browser’s menu bar. If no security is currently enabled on the target Master, the browser is directed back to the Manage WebControl Connections page.
NetLinx Security within the Web Server 10. Confirm that the newly added URLs appear within the URL List dialog (FIG. 56). Successful connection established Connection could not be made Attempting to connect FIG. 56 URL List dialog (with entries) If the newly added URL doesn’t appear on this page, click the Refresh button. 11.
NetLinx Security within the Web Server Device Menu - Controlling or Emulating a device Refer to the procedures outlined within theSystem Menu - Controlling/Emulating Devices on the Master section on page 55 for more information. Device Menu - Viewing the Log 1. Click on the System Settings > Manage System link from within the System Settings section of the Navigation frame. 2. Click on a violet Device icon from within the Online Tree to open the Device menu buttons within the right frame. 3.
NetLinx Security within the Web Server New button allows for the addition of new license keys Shows exiting license keys FIG. 59 System Settings - Manage License page Adding a new license 1. Click on the System Settings > Manage License link from within the System Settings section of the Navigation frame. 2. Click the New button to be transferred to the Add new License Key page (FIG. 60). FIG. 60 System Settings - Add New License Key page 3.
NetLinx Security within the Web Server Removing a license 1. Click on the System Settings > Manage License link from within the System Settings section of the Navigation frame. 2. Click the Remove button. 3. Click OK from the "Are you sure you want to remove this?" popup. System Settings - Manage NetLinx Devices To access this page, click on the Manage NetLinx Devices link (from within the System Settings section of the Navigation frame). These pages (FIG.
NetLinx Security within the Web Server A large number of NDP-capable devices on the LAN can result in a large amount of LAN traffic occurring at the same time. Manage NetLinx Devices Page (Cont.) Feature Description Device Listings: • This page (in addition to the target Master which is typically the first entry) lists those NetLinx Masters which have sent out NetLinx Discovery Master Announce packets (NDPs). • Each entry contains the data necessary to describe the devices detected by the system.
NetLinx Security within the Web Server Manage NetLinx Devices - Displaying NDP-capable devices Note that in the previous example (FIG. 61), the first NetLinx Master has a "+" icon next to it, which shows that this Master is indicating the presence of NDP-capable devices currently connected to it. 1. Click the "+" icon to expand the particular Master’s listing and reveal those NDP-capable devices connected to it, as shown below in FIG. 62.
NetLinx Security within the Web Server Manage NetLinx Devices - Obtaining NetLinx Device information To obtain more description than is provided by the listing: 1. Hover the cursor over a particular device within the listing to display a mouse-over popup dialog (FIG. 63). This field illustrates the MAC Address of the Master. NetLinx Master’s associated property information (displayed via a mouse-over popup dialog) FIG.
NetLinx Security within the Web Server System Settings - Manage Other Devices - Dynamic Device Discovery Pages Before beginning to manage any other devices, the target Master must be loaded with the program which defines the new devices and modules. In addition to this code, all IP/Serial devices must be pre-configured and connected to the system. To access this page, click on the Manage Other Devices link (from within the System Settings section of the Navigation frame). This page (FIG.
NetLinx Security within the Web Server Manage Other Devices Page (Cont.) Feature Description Dynamic Device Discovery links (Cont.): • View Discovered Devices page displays a listing of all the dynamic devices that have been discovered within the system.
NetLinx Security within the Web Server Manage Other Devices Page (Cont.) Feature Enable/Disable Module Search via Internet Description • Clicking this button toggles the capability of searching the Internet (either AMX's site or a device specified site) for a device’s compatible Duet modules. This capability is automatically disabled if the Master does not have Internet connectivity. • Upon enabling Internet connectivity, the AMX License Agreement is displayed for acceptance (FIG. 66).
NetLinx Security within the Web Server Accept button FIG. 66 System Settings - AMX License Agreement page What is Dynamic Device Discovery? The Dynamic Device Detector (DDD) monitors the system for newly connected devices. New devices can be detected via either an external discovery protocol manager (built into firmware build 320 or higher), Multicast reception of a Dynamic Device Beacon, or via the receipt of a beacon response on an application specified list of serial devices.
NetLinx Security within the Web Server Polling: • Dynamic physical devices can be detected by DDDP through both Serial and IP interfaces. • While IP connections are then able to utilize the LAN’s higher layers of multicast to broadcast their existence, Serial devices speak a fixed protocol that is incompatible with DDDP. • Serial devices are passive and will only broadcast their existence if polled to do so. The program developer must specify which NetLinx interfaces/ports (i.e.
NetLinx Security within the Web Server Manage Other Devices - Manage Device Bindings To access this page, click on the Manage Device Bindings button (from within the Manage Other Device page). This page is used to configure application-defined Duet virtual devices with discovered physical devices. The on-screen table (FIG.
NetLinx Security within the Web Server FIG. 67 Manage Device Bindings page - showing the NetLinx code relation This code would have given the Master a previous “heads-up” notification to look for those devices meeting the criteria outlined within the code. Dynamic application devices (Bind/Unbind) Static bound application devices (blank/Release) Device’s associated property information (displayed via a mouse-over popup dialog) FIG.
NetLinx Security within the Web Server What are Application Devices and their association status? There are two types of application devices: Static Bound application devices and Dynamic application devices. Static Bound application devices specify both a Duet virtual device and its associated Device SDK class type, as well as a NetLinx physical device port to which the application device is ALWAYS associated (i.e. statically bound).
NetLinx Security within the Web Server virtual device). If the Cancel button is selected, the binding activity is then aborted. - A mouse-over popup dialog is provided to display the properties associated with each discovered physical device that is listed (FIG. 69). If the manufacturer device does not support Dynamic Device Discovery (DDD) beaconing, you must use the Add New Device page to both create and manage those values necessary to add a dynamic physical device.
NetLinx Security within the Web Server Module Properties (displayed via a mouse-over popup dialog) FIG. 71 Select Device Module page Mousing-over a listed module entry presents a popup which displays the properties associated with the selected module. By selecting the module and clicking the Save button, the administrator can assign a Duet module to be associated with the physical device. This action will NOT affect any currently running Duet module associated with the physical device.
NetLinx Security within the Web Server 1. Click on the Create User Defined Device button (from within the Manage Other Device page). 2. Begin by entering the address of the physical device within the Address field. This information can be either the NetLinx Master port value (D:P:S) or an IP Address (#.#.#.#). 3. From within the Device Category field, use the drop-down list to select the control method associated with the physical target device (IR, IP, Serial, Relay, Other). 4.
NetLinx Security within the Web Server 1. Decide whether the application interface is to be Dynamic or Static bound and how the device will be connected to the system (Serial, IP, IR, etc). Refer to page 87 for a definition of Static and Dynamic Application devices. IP devices cannot be statically bound because they do not have an associated NetLinx D:P:S port value to associate with the application device. 2.
NetLinx Security within the Web Server If the Master is connected to the Internet, the Module Search via Internet button (FIG. 65 on page 80) can be enabled (via toggling). From within the View Discovered Devices UI page, click the Search button adjacent to the appropriate device to begin the search of an appropriate module. Any available modules on either the amx.
NetLinx Security within the Web Server FIG. 73 Security Alert and Certificate popups The above alert only appears if an SSL Server Certificate has been installed on the target Master, the SSL Enable options has been enabled, from within the Enable Security window of the Security tab, and there is a problem with the site’s certificate. Problems with the certificate can result from: The default AMX certificate, self generated, or self-signed certificate has not been approved by a CA.
NetLinx Security within the Web Server FIG. 74 Certificate Import Wizard 8. Click Next to proceed with the certificate importation process. FIG. 75 Certificate Import Wizard- storing the certificate 9. Click Next to automatically use the default certificate store settings and locations (FIG. 75). 10. Click Finish button to finalize the certificate installation process. 11. Click Yes, from the next popup window to "...ADD the following certificate to the Root Store?". 12.
NetLinx Security within the Web Server Using your NetLinx Master to control the G4 panel Refer to the specific panel instruction manual for detailed information on configuring and enabling WebControl. This firmware build enables SSL certificate identification and encryption, HTTPS communication, ICSP data encryption, and disables the ability to alter the Master security properties via a TELNET session. Once the Master’s IP Address has been set through NetLinx Studio version 2.4 or higher: 1.
NetLinx Security within the Web Server FIG. 77 WebControl VNC installation and Password entry screens 9. Click Yes from the Security Alert popup window to agree to the installation of the G4 WebControl application on your computer. This application contains the necessary Active X and VNC client applications necessary to properly view and control the panel pages from your computer. The G4 WebControl application is sent by the panel to the computer that is used for communication.
NetLinx Security within the Web Server What to do when a Certificate Expires Self-generated certificates have a duration period of approximately 30 years. Most externally requested CA certificates are generally valid for a period of approximately 1 - 5 years. The only way to avoid a CA certificate becoming invalid due to a time expiration is to request a new certificate from your current CA.
NetLinx Security within the Web Server 98 NI-3101-SIG Signature Series NetLinx Integrated Controller
NetLinx Security with a Terminal Connection NetLinx Security with a Terminal Connection Overview NetLinx Masters currently have built-in security capabilities. They require a user entering a valid username and password to access the NetLinx System’s Telnet, HTTP, ICSP, and FTP services. The security capabilities are configured and applied via a Telnet connection or the NetLinx Master’s RS-232/ USB terminal interface (the RS232/USB Configuration Port).
NetLinx Security with a Terminal Connection Although these procedures are written for a Terminal connection, a user can also connect to a Master via a Telnet connection. Do this by going to Start > Run, enter cmd within the Run dialog’s Open field and click OK. Then from within the CMD command prompt use the IP Address info to type >telnet XXX.XXX.XXX.XXX . Establishing a Terminal connection via the RS-232/USB Configuration Port 1.
NetLinx Security with a Terminal Connection 12) Display Telnet Timeout in seconds 13) Make changes permanent by saving to flash Or to return to previous menu Security Setup -> 3. The Main Security Menu shows a list of choices and a prompt. To select one of the listed choices, simply enter the number of the choice (1 - 13) at the prompt and press Enter. Options 14 and 15 are only visible to the System Administrator. Refer to theTable , “Main Security Menu (Cont.),” on page 110. 4.
NetLinx Security with a Terminal Connection 5) ICSP Security.............................. Enabled 6) ICSP Encryption Required................... Enabled Or to return to previous menu Security Options -> Each selection simply toggles the security setting selected. Press to exit the menu and return to the Main Security Menu.
NetLinx Security with a Terminal Connection Option 3 - Add user 1. Type 3 and at the Security Setup prompt (at the bottom of the Main Security Menu) to create a new user account. A sample session response is: The following users are currently enrolled: administrator Fred techpubs Enter username -> 2. At the Enter username prompt, enter a new username (for example "techpubs"). A username is a valid character string (4 - 20 alpha-numeric characters) defining the user. This string is case sensitive.
NetLinx Security with a Terminal Connection Edit User Menu (Cont.) Command Description 2) Change Inherits From Group This selection will display the current group the user is assigned to (if any). It will then display a list of current groups and prompts you to select the new group. 3) Add Directory Association This selection will display any current Directory Associations assigned to the user, and then will prompt you for a path for the new Directory Association.
NetLinx Security with a Terminal Connection Access Rights Menu (Cont.) Command Description 6) Configuration Access (Enable/Disable) This selection enables/disables Configuration Access rights for the target Master. The account has sufficient access rights to access the Main Security Menu if this option is enabled. 5) ICSP Security (Enabled/Disabled) This selection enables/disables ICSP communication access. The account has sufficient access rights to initiate ICSP data communication.
NetLinx Security with a Terminal Connection Or to return to previous menu Edit Group -> Edit Group Menu: Add directory association 1. At the Edit Group prompt, type 1 to add a new directory association. A sample session response is: There are currently no directories associated with this account New directory: A Directory Association is a path that defines the directories and/or files that a particular user or group can access via the HTTP (Web) Server on the NetLinx Master.
NetLinx Security with a Terminal Connection Edit Group menu: List directory associations 1. At the Edit Group prompt, type 3 to list all existing directory associations. A sample session response is: The following directory associations are enrolled: /directory1/* /directory2/* Press key to continue 2. Press to return to the Edit Group menu. Edit Group menu: Change Access Rights 1. At the Edit Group prompt, type 4 to change the current access rights for the selected group account.
NetLinx Security with a Terminal Connection 1) 2) 3) 4) 5) Add Directory Association Delete Directory Association List Directory Associations Change Access Rights Display Access Rights Or to return to previous menu Edit group -> This menu is described on the previous pages (see Edit Group Menu section on page 105). Option 9 - Delete Group 1. Type 9 and at the Security Setup prompt (at the bottom of the Main Security Menu) to delete an existing group account.
NetLinx Security with a Terminal Connection Changes made to the target Master from within the Terminal window are not reflected within the web browser, until the Master is rebooted and the web browser connection is refreshed. Any changes made to the Master, from within the web browser are instantly reflected within the Terminal session without the need to reboot.
NetLinx Security with a Terminal Connection Main Security Menu (Cont.) Command Description 13) Make changes permanent by saving to flash When changes are made to the security settings of the Master, they are initially only changed in RAM and are not automatically saved permanently into flash. This selection saved the current security settings into flash.
NetLinx Security with a Terminal Connection Help menu Type help at the prompt in the Telnet session to display the following help topics: Help Menu Options Command ----- Help ----- Description (Extended diag messages are OFF) : Device:Port:System. If omitted, assumes Master. ? or Help Displays this list. DATE Displays the current date. DEVICE HOLDOFF ON|OFF Sets the Master to holdoff devices (i.e.
NetLinx Security with a Terminal Connection Help Menu Options (Cont.) Command Description SET DNS Sets up the DNS configuration of a device. SET DUET MEMORY Set the amount of memory allocated for Duet Java pool. This is the current Java memory heap size as measured in Megabytes. This feature is used so that if a NetLinx program requires a certain size of memory be allotted for its currently used Duet Modules, it can be reserved on the target Master.
NetLinx Security with a Terminal Connection Logging Into a Session Until Telnet security is enabled, a session will begin with a welcome banner. Welcome to NetLinx v3.01.320 Copyright AMX Corp. 1999-2005 > The welcome banner is not displayed for Terminal sessions. It is very important for a user properly execute the 'logout' command prior to disconnecting from a Master.
NetLinx Security with a Terminal Connection Setup Security The security command displays a series of menus that allow the security administrator to create and edit users, create and edit groups, and setup directory associations for the Web Server. A user must be given rights to access this command.
Programming Programming This section describes the Send_Commands, Send_Strings, and Channel commands you can use to program the Integrated Controller. The examples in this section require a declaration in the DEFINE_DEVICE section of your program to work correctly. Refer to the NetLinx Programming Language instruction manual for specifics about declarations and DEFINE_DEVICE information.
Programming Master Send_Commands (Cont.) Command Description G4WC The internal G4WC Send command (to Master 0:1:0) has been revised to add G4 WebControl devices to Web control list displayed in the browser. Add G4 Web Control devices to Web control list displayed by the Web server in a browser.
Programming Master IP Local Port Send_Commands These commands are specific to the Master and not the Controller. These commands are sent to the DPS 0:1:0 (the Master). A device must first be defined in the NetLinx programming language with values for the Device: Port: System. In these programming examples, = Device. The term = Device:Port:System. Master IP Local Port Send_Commands Command Description This is only available for Type 2 and Type 3 Local Ports.
Programming Device:Port:System (D:P:S) A device is any hardware component that can be connected to an AXlink or ICSNet bus. Each device must be assigned a unique number to locate that device on the bus. The NetLinx programming language allows numbers in the range 1-32,767 for ICSNet (255 for AXlink). NetLinx requires a Device:Port:System (D:P:S) specification. This D:P:S triplet can be expressed as a series of constants, variables separated by colons, or a DEV structure.
Programming Configuration Port Commands (Cont.) Command DEVICE HOLDOFF ON|OFF Description Sets the Master to holdoff devices and not allow them to report online until the NetLinx program has completed executing the DEFINE_START section. Example: >Device Holdoff ON Device Holdoff Set. This command sets the state of the device holdoff. The GET DEVICE HOLDOFF command reveals whether the state is On or Off. DEVICE STATUS Displays a list of all active (on) channels for the specified D:P:S.
Programming Configuration Port Commands (Cont.) Command GET ETHERNET MODE Description Displays the current LAN configuration setting. Settings are either "auto" in which the LAN driver will discover it's settings based on the LAN it is connected to OR and where speed is either 10 or 100 and duplex is either full or half. Example: get ethernet mode Ethernet mode is auto. Note: See SET ETHERNET MODE.
Programming Configuration Port Commands (Cont.) Command ON Description Turns on a channel on a device. The device can be on any system the Master you are connected to can reach. You can specify the device number, port, and system; or the name of the device that is defined in the DEFINE_DEVICE section of the program. Syntax: ON[name,channel] or ON[D:P:S,channel] Example: >ON[5001:7:4] Sending On[5001:7:4] PASS Sets up a pass through mode to a device.
Programming Configuration Port Commands (Cont.) Command REBOOT Description Reboots the Master or specified device. Example: >REBOOT [0:1:0] Rebooting... RELEASE DHCP Releases the DHCP setting for the Master. Example: >RELEASE DHCP The Master must be rebooted to acquire a new DHCP lease. ROUTE MODE DIRECT|NORMAL Sets the Master-to-Master route mode: • Normal mode - allows a Master to communicate with any Master accessible via the routing tables (shown with the SHOW ROUTE command).
Programming Configuration Port Commands (Cont.) Command SET DNS Description Prompts you to enter a Domain Name, DNS IP #1, DNS IP #2, and DNS IP #3. Then, enter Y (yes) to approve/store the information in the Master. Entering N (no) cancels the operation. Example: >SET DNS [0:1:0] -- Enter New Values or just hit Enter to keep current settings -Enter Domain Suffix: amx.com Enter DNS Entry 1 : 192.168.20.5 Enter DNS Entry 2 : 12.18.110.8 Enter DNS Entry 3 : 12.18.110.
Programming Configuration Port Commands (Cont.) Command SET HTTPS PORT Description Sets the IP port listened to for HTTPS connections. Example: >SET HTTPS PORT Current HTTPS port number = 443 Enter new HTTPS port number (Usually 443) (0=disable HTTPS) : Once you enter a value and press the ENTER key, you get the following message: Setting HTTPS port number to New HTTPS port number set, reboot the master for the change to take affect. SET ICSP PORT Sets the IP port listened to for ICSP connections.
Programming Configuration Port Commands (Cont.) Command SET LOG COUNT Description Sets the number of entries allowed in the message log. Example: >SET LOG COUNT Current log count = 1000 Enter new log count (between 50-10000) : Once you enter a value and press the ENTER key, you get the following message: Setting log count to New log count set, reboot the Master for the change to take affect. SET QUEUE SIZE Provides the capability to modify maximum message queue sizes for various threads.
Programming Configuration Port Commands (Cont.) Command SET THRESHOLD Description Sets the Master's internal message thresholds. Example: >SET THRESHOLD -- This will set the thresholds of when particular tasks are pended. The threshold is the number of messages queued before a task is pended.---Use extreme caution when adjusting these values.
Programming Configuration Port Commands (Cont.) Command SHOW BUFFERS Description Displays a list of various message queues and the number of buffers in each queue Example: show buffers Thread TX RX Queued ----------- ---- ---- ---Axlink 0 UDP 0 0-Sent=NO Waiting=NO IPCon Mgr 0 Con Manager 0 Interpreter 0 Device Mgr 0 Diag Mgr 0 Msg Dispatch 0 Cfg Mgr 0 Route Mgr 0 Notify Mgr 0 ---- ---- ---Total 0 0 0 GrandTotal 0 Note: See SHOW MAX BUFFERS. SHOW COMBINE Displays a list of any combined devices.
Programming Configuration Port Commands (Cont.) Command SHOW LOG Description Displays the log of messages stored in the Master's memory. The Master logs all internal messages and keeps the most recent messages. The log contains:· • Entries starting with first specified or most recent • Date, Day, and Time message was logged • Which object originated the message • The text of the message SHOW LOG [start] [end] SHOW LOG ALL If start is not entered, the most recent message will be first.
Programming Configuration Port Commands (Cont.) Command SHOW MAX BUFFERS Description Displays a list of various message queues and the maximum number of message buffers that were ever present on the queue. Example: show max buffers Thread TX RX ----------- ---- ---Axlink 1 UDP 1 IPCon Mgr 0 (Total for TCP Connections TX=0) Con Manager 8 Interpreter 17 Device Mgr 8 Diag Mgr 1 Msg Dispatch 0 Cfg Mgr 0 Route Mgr 0 Notify Mgr 0 ---- ---- ---Total 2 34 GrandTotal 36 See SHOW BUFFERS.
Programming Configuration Port Commands (Cont.) Command SHOW SYSTEM Description Provides a list of all devices in all systems currently on-line. The systems lists are either directly connected to this Master (i.e. 1 hop away), or are referenced in the DEFINE_DEVICE section of the NetLinx program. Optionally, you may provide the desired system number as a parameter to display only that system's information (e.g. SHOW SYSTEM 2001). The systems listed are in numerical order.
Programming ESC Pass Codes There are 'escape' codes in the pass mode. These codes can switch the display mode or exit pass mode. The following 'escape' codes are defined. Escape Pass Codes Command + + ESC ESC Description Exit Pass Mode: Typing a plus (shift =) followed by another plus followed by an ESC (the escape key) followed by another escape exits the pass mode. The Telnet session returns to "normal".
Programming LED Disable/Enable Send_Commands The following commands enable or disable the LEDs on the Integrated Controller. In these examples: = Port 1 of the device. Sending to port 1 of the NI-Controller (affects all ports). LED Send_Commands Command Description LED-DIS Regardless of whether or not the port is active, the LED will not be lit. Issue this command to port 1 to disable all the LEDs on the Controller. When activity occurs on a port(s) or Controller, the LEDs will not illuminate.
Programming RS-232/422/485 Send_Commands (Cont.) Command Description CHARD Syntax: Set the delay time between all transmitted characters to the value specified (in 100 Microsecond increments). SEND_COMMAND ,"'CHARD-
Programming RS-232/422/485 Send_Commands (Cont.) Command Description RXOFF Syntax: Disable the transmission of incoming received characters to the Master (default). RXON Start transmitting received characters to the Master (default). SEND_COMMAND ,"'RXOFF'" Example: SEND_COMMAND RS232_1,"'RXOFF'" Stops the RS232_1 device from transmitting received characters to the Master. Enables sending incoming received characters to the Master.
Programming RS-232/422/485 Send_Commands (Cont.) Command Description XOFF Syntax: Disable software handshaking (default). Example: SEND_COMMAND ,"'XOFF'" SEND_COMMAND RS232_1,"'XOFF'" Disables software handshaking on the RS232_1 device. XON Syntax: Enable software handshaking. Example: SEND_COMMAND ,"'XON'" SEND_COMMAND RS232_1,"'XON'" Enables software handshaking on the RS232_1 device.
Programming RS-232/422/485 Send_String Escape Sequences (Cont.) Command Description 27,20,1 Syntax: Set the RTS hardware handshake's output to low/inactive (< 3V). Example: SEND_STRING ,"27,20,1" SEND_STRING RS232_1,"27,20,1" Sets the RTS hardware handshake's output to low on the RS232_1 device. IR / Serial Ports Channels IR / Serial Ports Channels 00001 - 00229 IR commands. 00229 - 00253 May be used for system call feedback. 00254 Power Fail. (Used w/ 'PON' and 'POF' commands).
Programming IR/Serial Send_Commands (Cont.) Command Description CH All channels below 100 are transmitted as two digits. If the IR code for ENTER (function #21) is loaded, an Enter will follow the number. If the channel is greater than or equal to (>=) 100, then IR function 127 or 20 (whichever exists) is generated for the one hundred digit. Uses 'CTON' and 'CTOF' times for pulse times. Send IR pulses for the selected channel.
Programming IR/Serial Send_Commands (Cont.) Command Description GET BAUD The port sends the parameters to the device that requested the information. Only valid if the port is in Data Mode (see SET MODE command). Get the IR port’s current DATA mode communication parameters.
Programming IR/Serial Send_Commands (Cont.) Command Description PON If at any time the IR sensor input reads that the device is OFF (such as if one turned it off manually at the front panel), IR function 27 (if available) or IR function 9 is automatically generated in an attempt to turn the device back ON. If three attempts fail, the IR port will continue executing commands in the buffer and trying to turn the device On.
Programming IR/Serial Send_Commands (Cont.) Command Description SET IO LINK The I/O status is automatically reported on channel 255 on the IR port. The I/O channel is used for power sensing (via a PCS or VSS). A channel of zero disables the I/O link. Link an IR or Serial port to a selected I/O channel for use with the 'DE', 'POD', 'PON', and 'POF' commands. Syntax: SEND_COMMAND ,"'SET IO LINK '" Variable: I/O number = 1 - 8. Setting the I/O channel to 0 disables the I/O link.
Programming IR/Serial Send_Commands (Cont.) Command Description XCHM Syntax: Changes the IR output pattern for the 'XCH' send command. Variable: SEND_COMMAND ,"'XCHM '" extended channel mode = 0 - 4. Example: SEND_COMMAND IR_1,"'XCHM 3'" Sets the IR_1 device's extended channel command to mode 3. Mode 0 Example (default): [x][x] SEND_COMMAND IR_1,"'XCH 3'" Transmits the IR code as 3-enter. SEND_COMMAND IR_1,"'XCH 34'" Transmits the IR code as 3-4-enter.
Programming IR/Serial Send_Commands (Cont.) Command Description XCHM (Cont.) Mode 6 Example: SEND_COMMAND IR_1,"'XCH 3'" Transmits the IR code as 0-0-0-3. SEND_COMMAND IR_1,"'XCH 34'" Transmits the IR code as 0-0-3-4. SEND_COMMAND IR_1,"'XCH 343'" Transmits the IR code as 0-3-4-3. SEND_COMMAND IR_1,"'XCH 1343'" Transmits the IR code as 1-3-4-3. Input/Output Send_Commands The following Send_Commands program the I/O ports on the Integrated Controller. In these examples: = device.
Troubleshooting Troubleshooting This section describes the solutions to possible hardware/firmware issues that could arise during the common operation of a NetLinx device. Troubleshooting Information Symptom Solution My NI Controller can’t obtain a DHCP In requesting a DHCP Address, the DHCP Server can take up to a few Address. minutes to provide the address to the on-board Master.
Troubleshooting Troubleshooting Information (Cont.) Symptom Solution I can’t connect to my NI Controller via A USB cable is used for Serial communication between the PC and the Master. the rear Configuration Port using a USB cable. • Verify the USB connectors are securely inserted into their respective ports on both the rear Configuration Port (on the NI) and on the PC. • The NI-3101-SIG is configured to a fixed Baud Rate of 115200.
Troubleshooting NI-3101-SIG Signature Series NetLinx Integrated Controller 145
9/11 ©2011 AMX. All rights reserved. AMX and the AMX logo are registered trademarks of AMX. AMX reserves the right to alter specifications without notice at any time. It’s Your World - Take Control™ 3000 RESEARCH DRIVE, RICHARDSON, TX 75082 USA • 800.222.0193 • 469.624.8000 • 469-624-7153 fax • 800.932.6993 technical support • www.amx.