Installation Manual

NetSure™ LMS Data Processing Unit
Installation Instructions, Section 5879 (Issue BA, April 7, 2014)
Spec. No: 58650500, 586505500 Code: Section 5879
Model No: LMS1000 Issue BA, April 7, 2014
[80 of 149]
h. Affected by ACO (Y or N): An Alarm Cut-Off feature
allows temporary disabling of existing alarms. This
feature is for applications where programmable relays
are used as alarm relays. For alarm cut-off to be
functional, the appropriate relay channel has to be
configured for alarm cut-off. The system can be
programmed to automatically release the alarm cut-off
feature at a selected time interval. See the discussion on
"cycle frequency" which follows.
i. Cycle Frequency (0-1440 minutes): When a relay is
energized, the system can be programmed to de-
energize the relay at a selected time interval. This time
interval is determined by the relay’s "cycle frequency".
This feature resets external alarm logic that requires an
open to close transition for alarming. During a relay
alarm condition, the relay remains energized for the time
duration determined by the value of the relay’s cycle
frequency. Once this time period expires, the system
de-energizes the relay for 15 seconds. The system will
then re-energize the relay if the alarm condition still
exists. If the relay channel is set to be affected by ACO,
the cycle frequency is also used to automatically release
the alarm cut-off feature at a time interval determined by
the cycle frequency. The system automatically performs
the equivalent of a CLR ACO command at the end of the
"cycle frequency". To disable these features, set the
"cycle frequency" to zero.
j. Control Type (10 characters maximum): This parameter
applies only to TL1 commands/messages. A description
of the NMA system external control entity that this
channel is controlling. Only alpha characters can be
entered for this parameter. TL1 uses specific values for
this parameter. Refer to Appendix G of TR-NWT-000833,
issue 5.
k. Program Line (79 characters maximum): A control
program that defines the conditions under which the
relay energizes.
User Attributes
A maximum of eight users can be configured with each user having
the attributes described below. The programmable attributes of
each user can be separated into three groups as follows:
Basic User Configuration - This is the minimum information
required to specify a user.
Required Configuration for Reports and Callbacks - This is the
minimum information required to specify a user that is going to
use the callback feature or receive a System Alarm Report.
Optional Configuration for User Reports - This is the minimum
information required to specify a user that is going to receive any
of the User Reports.
Basic User Configuration: Enter the information describe in a)
through e), and v) below.
Required Configuration for Reports and Callbacks: Enter the
information described in f) through m) below.
Optional Configuration for User Reports: Enter the information
described in n) through v) below. Also enter the information
described in "Required Configuration for Reports & Callbacks"
above. User Channels must also be specified.
a. User Active (Y or N): The purpose of this attribute is so
unused (spare) users can be configured as inactive. A "Y"
(Yes) indicates the user is active while a "N" (No) indicates
the user is NOT active. It is recommended that unused
users be made inactive. This eliminates a password from
the list of available valid passwords and reduces the
chance of unauthorized access.
b. Name (30 characters maximum unless used with TL1,
then 10 characters maximum): A description that
identifies the user. This name is used by the system for
the following:
In the greeting header when a user logs on.
In the report header for an alarm report.
Names are shown to a user sending mail so they can
determine which users should receive their mail.
Any user logging on to the system or changing system
configuration has their name stamped into the Event
Log. The Event Log also records other pertinent
information such as the type of activity, and the date and
time of the activity.
c. Password (8 Characters maximum): Each user receives a
unique password that must be entered to gain access to
the system.
Note:
If the user is to access the system through the TL1 port,
the user’s password must contain two non-alpha
characters. One of these must be a symbol. ([%], [#], and
[+] are the only symbols which can be used.)
d. Access Level (1 - 6): The access level determines which
commands are available to the user. The commands are
separated into six different command levels. Level 6
allows the user to have access to all commands.
Commands available in a specific command level also
include the commands of all lower command levels. As
an example, commands in levels 1, 2, and 3 are also