Delta V System Administration
Delta V System Administration
D800008X092
2005-2006 Fisher-Rosemount Systems, Inc. All rights reserved. Printed in UK DeltaV, the DeltaV design, and PlantWeb are marks of one of the Emerson Process Management group of companies. All other marks are property of their respective owners. The contents of this publication are presented for informational purposes only, and while every effort has been made to ensure their accuracy, they are not to be construed as warrantees or guarantees, expressed or implied, regarding the products or services described herein or their use or applicability. All sales are governed by our terms and conditions, which are available on request. We reserve the right to modify or improve the design or specification of such products at any time without notice.
Contents
Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . iii Developing a Security Scheme . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Workgroups and Domains . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 Creating and Managing Windows Groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 Environmental Security Protection for Operators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 DeltaV User Manager and DeltaV Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 The DeltaV Desktop . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16 Keeping Security Current . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
Workstations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Workstation Software License Suites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 Securing the Workstation in the Workplace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 BIOS Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Windows System Logon and DeltaV System Logon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 System Time . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Workstation Synchronization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29 Configuring the Fault-Tolerant Server to Run the DeltaV System . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 Renaming Workstations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 36 Switching Host Machines . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38
Remote Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
DeltaV Remote Client Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40 Starting and Ending a Remote Client Session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 Using DeltaV Remote Client from a Client Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Administrator Functions: Configuring Remote Client Sessions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 53 Administrator Functions: Adding Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Administrator Functions: Managing Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 61 Remote Workstations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63 Remote Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Remote Workstation Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Remote Access Control Application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Remote System Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Remote System Configuration Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Contents
iii
Hardware Repairs and Additions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170 Overview to Configuring Cisco Switches. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Setting Up the ProfessionalPLUS Workstation for Telnet Switch Management . . . . . . . . . . . . . . . . . . . . . . . . 174 Configuring the Cisco 2950 and 2950C Switches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
iv
Configuring the Cisco 3550FX Switch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the Cisco 3750G-12S Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the Cisco 3750-24FS Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configuring the Cisco 3750-24TS Switch . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Contents
vi
2 3 4 5 6
Recommendations Use the DeltaV screen saver to log off users automatically after a 10-minute timeout period. Do not use the Password protected option with the DeltaV screen saver. Either use the DeltaV screen saver or do not use a screen saver at all. To secure your operating environment, give operators access to the DeltaV desktop only and other users, such as engineers, access to both the DeltaV desktop and the Windows desktop. Keep the default setting to restrict unauthorized users from accessing the Windows desktop.
DeltaV Desktop
Leave Autoswitch Desktop enabled to keep unauthorized users from accessing the Windows desktop. Disable <Ctrl><Alt><Del> to provide a secure operating environment. Do not disable the pop-up menu. Do not disable the menu bar. The administration of DeltaV accounts should be done only on the DeltaV server to avoid conflicting settings and to keep the runtime databases in sync. Directory and file security should be implemented on the server (whether in a domain or workgroup) to protect other resources on the DeltaV server (for example, drives, directories and files). DeltaV requires share access to the following directories: C:\DeltaV\DVData, C:\DeltaV\DVData\Databases and C:\DeltaV\DVData\Databases\DeltaV_System.
Remote Systems
System Security
This book contains information on setting security in DeltaV sofware.
Domain Accounts
In a domain environment, users do not need to have a local user account to log on to a particular workstation if the workstation is a part of a domain and the user has a domain account. Domains allow users to access domain computers and resources with one account rather than having to establish a local account on each workstation. This simplifies user account management. If necessary, a domain user can be prevented from logging on to a specific machine. Refer to the Domain section in your Windows documentation for more information about restricting domain accounts' access to specific workstations. When you access DeltaV User Manager application from a workstation in a domain system, you will see the user accounts list for the domain only. You cannot access the local workstation user accounts from DeltaV User Manager if the workstation is in a domain. To access local workstation user accounts, use the Windows User Manager. Refer to your Windows documentation for more information. Note When you modify user accounts in DeltaV User Manager on a workstation in a domain system, you are modifying the domain accounts and not the local workstation user accounts.
System Security
System Security
Note After installing the DeltaV software, restart the operating system before attempting to use environment protection for the first time.
To secure the DeltaV Operate environment: 1 Click Workspace | User Preferences. The User Preferences dialog box opens. Click the Environment Protection tab.
Environmental Protection Tab for DeltaV Operate The following table describes the behavior of the Environment Protection settings. Setting Disable title bar and menu bar. Description Does not display the title bar or the menu bar. Removes the minimize, maximize, and exit buttons from the title bar. Does not display the menu bar. Applications / Desktops Affected Disabled for DeltaV Operate only on both the Windows and DeltaV desktops. Disabled for the operator's interface only on both the Windows and DeltaV desktops. Disabled for DeltaV Operate only on both the Windows and DeltaV desktops. Disabled on both the Windows and DeltaV desktops as long as DeltaV Operate is running on either desktop.
Disables all entries in the Workspace menu selection in Run mode. <Ctrl><Alt><Del> is ignored.
System Security
Description Alt + Tab is ignored. Removes minimize, maximize, and exit buttons from the title bar.
Applications / Desktops Affected Alt + Tab is disabled on both the Windows and DeltaV desktops as long as DeltaV Operate is running on either desktop. Title bar is only affected on DeltaV Operate.
Disables access to the Visual Basic Editor in Run mode. Disables the menu accelerators that exists for the entries under the File menu. Disable the Ctrl+O accelerator.
Disabled for the DeltaV Operate only on both the Windows and DeltaV desktops. Disabled for DeltaV Operate only on both the Windows and DeltaV desktops. Disabled for DeltaV Operate only on both the Windows and DeltaV desktops. Disabled for DeltaV Operate only on both the Windows and DeltaV desktops.
Establish the settings in the Environment Protection dialog box. You can disable the menu bar and the title bar based on your own preferences. Task switching does not need to be disabled because operators can only switch between DeltaV applications made available from FlexLock, provided that Autoswitch Desktop is enabled. (Refer to the Enabling or Disabling Automatic Switching topic for more information.). However, you might want to disable task switching if you want to display the title bar and menu bar in DeltaV Operate without allowing operators to have access to the minimize, maximize, and exit buttons. The following settings are recommended: Disable <Ctrl><Alt><Del> to provide a secure operating environment. The only resulting loss of functionality from the engineering environment will be the ability to change passwords or lock the workstation while DeltaV Operate is running. If you do not select this setting, an operator can log off, shut down, or lock the workstation from the Windows Security dialog. Invoking the task manager from the Windows Security dialog launches the task manager on the Windows desktop rather than the DeltaV desktop. Therefore, an operator is still unable to switch to or launch another application. Do not enable the menu bar. Emerson Process Management strongly recommends that you not change this setting.
Note While running DeltaV Operate, operators can access other DeltaV system software applications through the buttons in the Toolbar window.
Use the DeltaV User Manager to create and manage DeltaV user accounts without accessing the Windows User Manager application. You can specify whether users will be a Windows users, DeltaV system users, or both. Both DeltaV security and Windows security are based on the concept of user accounts and groups. A user account consists of unique credentials (logon name and password) that allow the user to access resources. A group is an account that contains user accounts, called members. Permissions and access rights are granted to groups and apply to all members of the group. A group is essentially a classification of users, and it offers a convenient way to set access permissions for a collection of users of the same type. A user can be assigned to more than one group.
System Security
Groups
There are two types of groups: Windows Groups control access to functionality at the Windows level. DeltaV Groups control access to DeltaV functionality through the use of Locks and Keys. For more information about DeltaV Locks, refer to the DeltaV Locks topic.
There are built-in (default) groups installed by both Windows and DeltaV.
For domain systems, the following groups are created during DeltaV software installation: Domain DeltaV Group Members of this group have access to DeltaV applications but do not have access to the Windows Desktop. Domain DeltaV Admins Group Members of this group can perform privileged DeltaV operations and have access to the Windows Desktop. They are also members of the Administrators group and, therefore, are allowed access to Windows System utilities. Domain DeltaV Ax S Group Members of this group have access to the Windows Desktop. Domain DVBHisAdmin Group Members of this group have unrestricted access to DeltaV Batch Historian data. Domain DVBHisUser Members of this group have restricted, read-only access to DeltaV Batch Historian data. Domain DeltaV TSUsers Members of this group are allowed to log in remotely.
Note The installation creates other groups to support DeltaV software that can be purchased and installed separately. You do not assign DeltaV users to Windows groups directly. When you create a user in the DeltaV User Manager the selections you make for each user determine the Windows groups the user is assigned to. Refer to Types of User Accounts for more information.
10
Each of these has default users assigned, as well as default keys. From the DeltaV User Manager you can see the default members of each group and the default keys assigned to each group. You can create your own groups, if necessary. For more information on creating and managing DeltaV groups, refer to the following help topic: Managing Groups of Users
Windows Groups Administrators DeltaV DeltaV Admins Administrators DeltaV DeltaV Administrators DeltaV DVBHisAdmin
--Supervise ---
System Security
11
User Name DVBatchAdmin Maintainer Operator SIS_Configure SOFTPHASEUSER (supports Soft Phases) Supervisor
Windows Groups DeltaV DeltaV Admins DeltaV DeltaV DeltaV DeltaV DeltaV
Note that although the Administrator account is not assigned to any DeltaV groups, it is assigned several DeltaV keys. Note There can be additional user accounts and groups on your system that are created by Windows. To learn more about them, refer to your Windows documentation. For information on creating your own user accounts, refer to the following DeltaV User Manager help topic:
12
Operating System (Windows) Account The user is given an account on the workstation or the domain. This allows the user to log on to the workstation or the domain. DeltaV Database Account The user is added to the workgroup or Domain DeltaV Windows group and is given a DeltaV account. This allows the user to log on to the DeltaV system.
There are five sub-types under the Operating System (Windows) Account. Selecting a subtype adds the user to a specific Windows workgroup or domain group as shown in the following table. Selecting this sub-type... Adds user to this group in a workgroup environment DeltaV Admins DVBHisAdmin DeltaV Access Adds user to this group in a Domain environment Domain DeltaV Admins Domain DVBHisAdmin Domain DeltaV Ax S
DeltaV Administrator DeltaV Batch Historian Administrator Windows Desktop Access (Refer to the Enabling or Disabling Automatic Switching topic for more information.) Windows Administrator Allow Terminal Server Logon
Users must be assigned an operating system account in order to be assigned any of these sub-types. Once a user account is created, you can modify the account type in DeltaV User Manager by double-clicking the account name to access the user account properties.
System Security
13
Important Change the DeltaVAdmin password using ServPwd.exe. Change the Administrator password using DeltaV User Manager.
Version Control Check In Message In the example shown above, a new user account (Jane Doe) is added in DeltaV User Manager. As shown in the following image, when a modification is made to an existing account, the messages dialog indicates that the account data is checked out of Version Control and then checked in when the changes are made. Refer to Checking Items in and Out for more information on these Version Control functions.
Version Control Check In Check Out Message Similar Version Control messages are logged for all User Manager actions when Version Control is enabled.
14
System Security
15
Note Keep the default setting to restrict unauthorized users from accessing the Windows desktop. For more information, refer to the DeltaV FlexLock topic.
16
Whenever plant area or user security configuration changes are made, make sure to download workstations with setup data so that they have the most current configuration and security information.
System Security
17
Workstations
This book contains information on using workstations in DeltaV sofware.
ProfessionalPLUS Station
The ProfessionalPLUS Station license suite supports the global database for a DeltaV system. You need one ProfessionalPLUS station per system. A ProfessionalPLUS station has a complete set of operating, diagnostic and engineering tools. PCs defined as ProfessionalPLUS Station nodes during workstation configuration can accept the ProfessionalPLUS license suite.
Professional Station
The Professional Station license suite is an engineering workstation to be used in systems that require more than one engineering seat provided by the ProfessionalPLUS. It has a complete set of operating, diagnostic and engineering tools without the global database. PCs defined as Operator Station nodes during workstation configuration can accept the Professional license suite.
Operator Station
The Operator Station license suite provides the licensing typically required for operators. The suite contains DeltaV Operate support as well as support for viewing continuous history. PCs defined as Operator Station nodes during workstation configuration can accept the Operator license suite.
Base Station
The Base Station license suite provides fundamental software support. The base station is best suited to situations where you want to define the functionality of the station using add-on licenses. PCs defined as Operator Station nodes during workstation configuration can accept the Base license suite.
Application Station
The Application Station license suite provides a foundation for integrating the DeltaV system with other networks and 3rd-party applications. PCs defined as Application Station nodes during workstation configuration can accept the Application license suite.
18
Maintenance Station
The Maintenance Station license suite provides software licenses tailored to maintenance personnel. This includes diagnostics, AMS Device Manager, and DeltaV Inspect. It also includes a maintenance version of Control Studio which enables users to calibrate devices and view their configurations. It does not allow configuration or download. PCs defined as Operator Station nodes during workstation configuration can accept the Maintenance license suite.
Workstations
19
20
BIOS Security
BIOS security is system protection that can prevent authorized users from modifying your CMOS and unauthorized users from accessing your workstations. To help prevent an authorized person from changing a workstation's CMOS settings, use the BIOS to create a supervisor password that limits access to the workstation. To prevent an intruder from accessing your system by using software started from the A:/ drive, use the BIOS to lock the boot sequence so that the workstation starts only from the C:/ drive. Refer to your Dell documentation for details on how to configure the BIOS. Important Although it is not part of DeltaV security, Emerson Process Management recommends that you use BIOS security to avoid unauthorized tampering on your workstations.
Workstations
21
Important When setting up the DeltaV system, make sure that Autoswitch Desktop is enabled. Doing so helps protect against operators and maintenance personnel having unrestricted access to the system if a user with administrator privileges is logged on to the underlying Windows system. Refer to the Enabling or Disabling Automatic Switching topic for more information. Make sure that all users with Windows administrator privileges log off of the Windows system after have finished using a workstation. Do not allow non-administrative users to log on to the DeltaV system on top of an underlying Windows Administrator logon.
22
System Time
Inside this topic Synchronizing Time with an External Network DeltaV Systems use the Network Time Protocol (NTP) to synchronize the time on all Control Network nodes. Any DeltaV workstation may be defined as the master time source using the Physical Network Properties dialog in the DeltaV Explorer. Systems that require more precise time derive master time from a network time server connected to a specific IP address on the DeltaV Control Network. Network time servers are a requirement for systems that include SOE cards (Sequence of Events). The Symmetricom NTS-200 GPS Network Time Server has been tested and approved for use with the DeltaV System. Refer to the documentation for the network time server for installation and configuration information and to the Installing Your DeltaV Digital Automation System manual for specific network settings that are required for configuring a network time server for use with the DeltaV system. If a network time server is not used, a single workstation (called the master time node) keeps time for the entire DeltaV system. The ProfessionalPLUS workstation is the master time node by default. However, you can use the DeltaV Explorer to define another workstation as the master time node. The Set/Synchronize Network Time program (available from the Tools menu in DeltaV Explorer) determines the time and date for the DeltaV System. Setting the time while the legacy historian is running can cause unexpected results. Before setting the time, stop the legacy historian (go to the /PI/adm directory and run pisrvstop.bat). After setting the time, use DeltaV Explorer to download the legacy historian. The TimeInSync diagnostics parameter retains a status of 1 (good) if the time for the node remains within the following specifications from the NTP server time: Systems without a network time server - Workstations: 50ms; Controllers: 50 ms; Remote I/O Nodes:50 ms Systems with a network time server - Workstations 10ms; Controllers: 3 ms; Remote I/O Nodes: 3 ms You can set and synchronize the time from any DeltaV workstation on the Control Network. The network time is derived from the same internal clock used by the Date/Time tool in the Windows Control Panel. Caution Do not change the time using the Windows Date and Time Properties (accessed from the Control Panel or by double-clicking the clock in the Taskbar). Windows Date and Time Properties do not synchronize the time in all the workstations and controllers. Instead, use the Set/Synchronize Network Time tool (accessed from the Tools command in the DeltaV Explorer) to change the system time. This ensures that all workstations and controllers are synchronized. The Set/Synchronize Network Time tool includes the following components: Apply Sends the time and date changes to the master time node, which broadcasts the time to all nodes on the Control Network. Close Closes this dialog without changing the time. New Time and Date Allows you to set the date and time for the system. Select the values that match the current time and date.
Warning Setting and synchronizing the system time affects Event Journals and continuous history.
Workstations
23
24
From DeltaV Explorer, select Remote Network under the ProfessionalPLUS workstation or Application Station, as shown in the following figure.
From the context menu, select Properties. The Remote Network Properties dialog appears.
Select the Enable Remote Network check box. The following figure shows the dialog with the check box selected.
Workstations
25
26
If you use this setup procedure to synchronize a local DeltaV network to a plant-wide master, enter the IP address of the plant-wide master into the Primary Master Time Server fields. If your network has a backup time server, enter its IP address in the Backup Master Time Server fields. Run Workstation Configuration on the Application Station to allow communication on the Remote Network. The Remote Network address of the Application Station (or ProfessionalPLUS workstation) must be supplied by that network administrator. Select the properties dialog for the Physical network and select the DeltaV node configured to communicate with the plant-wide time source as the Master Time Server of the DeltaV network. Select a Backup Time Server, if appropriate.
After this procedure is finished and Workstation Configuration has been run to allow communication with the remote network, the IP address of the plant-wide Time Server on that remote network is added to the NTP.ini file. For example, a plant-wide time source at 192.167.90.91 appears in the NTP.ini file as follows: server 10.4.128.1 preferserver 10.4.128.2 server 192.167.90.91 server 127.127.1.1 driftfile ntp.drift This NTP.ini file is generated for the DeltaV node connected to the remote network and you do not have to create or edit it. The 10.4.128.1 and .2 addresses are set up automatically. The 192.167.90.91 is the address configured for the plantwide Time Master. The 127.127.1.1 address indicates that this DeltaV node is the Time master for the DeltaV Network.
Workstations
27
Do not modify the NTP.ini file. Any changes you make will be overwritten each time that DeltaV node is downloaded. To configure a permanent connection to a plant-wide time server, use the procedure outlined above.
28
Workstation Synchronization
The system setup information stored on the DeltaV workstations must be synchronized across workstations to ensure proper operation of the system. To accomplish this synchronization, one workstation on the DeltaV network (by default, the ProfessionalPLUS station) ensures that this system-wide setup data is distributed automatically to all the workstation nodes whenever this information is updated. This function is called Auto-Update. The benefit of auto-update is that it is not necessary for you to download each workstation individually whenever the system setup data changes. Only workstation-specific setup information requires a workstation download. If the DeltaV Explorer shows a blue triangle download status beside a workstation or workstation subsystem then a specific download needs to be made to that station. If you change system setup data and download any specific workstation, the DeltaV system downloads the changed system tables to the ProfessionalPLUS. If you change something that is workstation-specific and download that workstation node, it will download that workstation with the workstation-specific data. Note For remote workstations the workstation-specific data is actually downloaded to the Professional PLUS and then distributed to the remote workstation via the auto-update mechanism. If you change a node's configuration, download that node. The system determines if the change was global and download the ProfessionalPLUS as needed. The Auto-Update Service Control application enables you to select the file types that are automatically transferred from the ProfessionalPLUS to all other workstations after any node is downloaded. To access Auto-Update Service Control, click Start | DeltaV | Engineering | Auto-Update Service. A download consists of many individual script files, which exist locally on the workstation after a download occurs. The following is a discussion of which parts of a download are managed automatically through workstation synchronization and which require a manual download to the specific node. The following download scripts are workstation-specific. You must download these scripts to each workstation manually using the DeltaV Explorer Download command. These scripts contain information regarding software licenses, continuous history, batch configuration on the ProfessionalPLUS and Application Station and any modules assigned to the ProfessionalPLUS or Application Station. General workstation-specific download scripts, which are always sent to the target node SWLIC.SCR (Software License Assignments) PHIST.SCR (Continuous History Assignments) LOOPDOC.SCR Batch executive files, if enabled (for example, RECIPE.DIR) DVController Specific files, if enabled (for example, modules assigned to the node) Batch executive files, if enabled (for example, RECIPE.DIR) DVController Specific files, if enabled (for example, modules assigned to the node)
The following download scripts are system wide tables or configuration files (system setup information). The system automatically downloads these scripts to the ProfessionalPLUS after you make a change to the configuration database. You do not need to request a download. they are changed and then automatically propagated to other workstation nodes through workstation synchronization.
Workstations
29
Non-node specific download scripts ANT.SCR (Area Name Table) APT.SCR ATTSECT.SCR (Attribute Security Table) BHIST.SCR (Batch History) BSL.SCR DEFASEC.SCR (Default Area Security) DSTT.SCR (DST Table - not replicated to Remote Nodes) DT.SCR (Device Table) ETT.SCR (Event Type Table) EUDT.SCR (Engineering Units Description Table) FLDSECT.SCR (Field Security Table) GAAG.SCR (Global Horn Ack Group Table, not replicated to Remote Nodes) MODT.SCR (Module Table, not replicated to Remote Nodes) NCP.SCR (ACN Network Configuration Parameters, not replicated to Remote Nodes) NCT.SCR (Network Time Publisher, not replicated to remote Nodes) PHSL.SCR (Continuous Historian List) REMNET.SCR (Remote Network Configuration) SJL.SCR (Event Chronicle Configurations) UENUMS.SCR (User Defined ENUMS) USERT.SCR (User Table) WLNAMES.SCR
The Auto-Update Service does not automatically distribute operator pictures and process history view charts. You must download workstations to update their pictures. Refer to Downloading and Uploading Operator Pictures for information on how to distribute pictures and charts to all workstations.
30
Workstations
31
synchronization pause to occur. Setting the CPU unit not to synchronize on boot causes the redundancy status to be degraded and the failure can be investigated. The RAM synchronizes and the pause (described above) occurs during the regular boot process. If the system is configured not to automatically synchronize, a user must initiate the inclusion of the second CPU unit after the system boots. To disable the CPUs from auto synchronizing: 1 2 3 4 5 6 Open the ftServer MMC Console. From the tree-view, expand ftServer Drivers, select Stratus BigBoard Driver, and click the right mouse button. Select Properties from the context menu. Choose the last Properties tab. Change CPUBringUpPolicy to Defer Bringup-Allow Simplex. Click OK.
The ftServer remains simplex when it boots until CPUBringUpPolicy is changed to Enable BringUp. Once this is done, the CPU will begin synchronization. Be sure to reset the value to "Defer-Allow Simplex" after the CPU has synchronized.
32
Note If there are multiple Application Stations with connections to the same Plant LAN as the Stratus ftServer machine, then the Plant LAN NIC in the ftStratus machine should also be teamed. This is due to how DCOM utilizes network pathways to send OPC data. It is possible for the Plant LAN pathway to be used for DeltaV OPC data and therefore it needs to be teamed. In the ftServer 3210 model, you can use the embedded Ethernet ports with a DeltaV system ONLY when you use the "teaming" Intel NIC driver feature. This is the recommended configuration. The 3210's embedded Ethernet ports share the same MAC address and if they are not used as part of a team they cannot be used with the DeltaV system. This is because the DeltaV system requires that all the Ethernet ports have a unique MAC address. This is not an issue with the ftServer 3300 or 4300 Ethernet ports as those ports have unique MAC addresses. In the ftServer 3300 model, you can use dual port Ethernet cards (available from Stratus) provided you are running the Stratus ftServer software v3.x. In the ftServer 4300 model, you can use dual port Ethernet cards (available from Stratus) provided you are running the Stratus ftServer software v4.x. Configuring teaming when using the dual port Ethernet cards follows the same rules as using regular single port Ethernet cards. That is, the team must span the I/O Enclosure, the type of Ethernet fault-tolerant team to select is "Adapter Fault Tolerant" (AFT). For all other settings, refer to the online manual, Stratus ftServer XXXX Series: Configuring Ethernet PCI Adapters (where XXXX is your Stratus ftServer model).
Workstations
33
software's interface) for your DeltaV primary network and one other paired (teamed) NIC for the DeltaV secondary network. The individual NICs are also displayed in DeltaV Workstation Configuration; however, do not select those cards as they do not have the IP addresses bound to them and DeltaV Workstation Configuration will not complete successfully. The recommended minimum video resolution for use with the DeltaV system is 1024x768 at 256 colors. The ftServer has a built in Phone-Home and Dial-In feature. The Phone Home feature allows the user to connect the ftServer to a phone line and if a component fails, the system will automatically call Stratus and order a replacement part. The initial testing of the ftServer was with the Phone Home feature disabled. There is no specific incompatibility with the Phone-Home feature; however, it is recommended that this feature be disabled.
34
Two pieces of data are communicated to the DVFTS_Status DeltaV module via an OPC write. They are the Boolean overall integrity and a number representing the system time. The system time is used as a watchdog timer in the module. If an update has not been received in 200 seconds, then the Change-of-State alarm is tripped. The 'Refresh' button will clear the entire hierarchy and rebuild it. If you are not sure that the hierarchy is reading correctly, it is recommended that the 'Refresh' button be clicked. For additional help, refer to the application's on-line help.
Workstations
35
Renaming Workstations
Important It is vital that you read this entire topic before renaming any workstation.
Note Do not rename ProfessionalPLUS workstations. You can rename all other workstations on your DeltaV network. The process of renaming a workstation involves the entire DeltaV network. For information on replacing a workstation on the DeltaV network, refer to the DeltaV Knowledge Base. Important Do not change workstation names from Windows. Always use DeltaV Workstation Configuration to change workstation names. Renaming a workstation changes the UNC name of that machine. You must make the other nodes aware of the new name in order to communicate with that machine. This is true for all DeltaV workstation types. All of the nodes communicate with all other nodes on the DeltaV network. Renaming a workstation consists of three major steps: Rename the workstation in DeltaV Explorer Reconfigure the renamed workstation with DeltaV Workstation Configuration Download the new data to each node using DeltaV Explorer
You must complete all three of the steps listed above before DeltaV will function properly. Note Each node (workstation or controller) is downloaded with configuration data. This information is stored locally in that node and must be updated when you rename a workstation. To rename workstations: 1 2 3 4 5 6 7 8 9 Log in to Windows on the ProfessionalPLUS Workstation as a user with Administrator privileges. Log in to DeltaV as a user with Administrator privileges. Shut down all physical processes controlled by this DeltaV Network. Stop all DeltaV programs on the ProfessionalPLUS Workstation. Use the Database Administrator Tools to verify that no connections exist (the database cannot be in use by any node while renaming a workstation). From the ProfessionalPLUS workstation open DeltaV Explorer. Select the node being renamed, right click, and then select Rename. Enter the new workstation name. On the popup dialog that appears, click the Yes button to create a configuration diskette.
10 On the workstation you are renaming, log in to Windows as a user with Administrator privileges. 11 Stop all DeltaV programs. 12 Run DeltaV Workstation Configuration. 13 From DeltaV Workstation Configuration, click Next, Next, Browse, and select the correct workstation name from the list on your configuration diskette.
36
14 Restart the computer when prompted by DeltaV Workstation Configuration. After the computer has restarted, log in to Windows as a user with Administrator privileges and let DeltaV Workstation Configuration complete. 15 From the ProfessionalPLUS workstation use DeltaV Explorer to download all the nodes (you can either download them individually or as a group) on your DeltaV network. Refer to the Downloading Data topic for details about partial downloads. If you rename any workstations that are SQL servers (such as the Batch Historian, Version Control, or Device Audit Trail machines), you must shut down and restart the workstation or restart the SQL Server. For more information refer to the SQL Server Books Online topic Renaming a Server.
Workstations
37
To change the host machine, you must take the database off of the current host and then configure and download the new host. You must follow the instructions in the order given below or you might corrupt the data and end up reinstalling the DeltaV software. The database will not function properly if corrupted. Refer to the Database topic for more information on correcting database problems. Important Read both sets of instructions (that is, those under "Current Host" and under "New Host") before beginning the switch.
Current Host
Follow these instructions for the machine that is currently your host machine. The current host machine is a ProfessionalPLUS workstation with Objectivity's Lock Server and the control database installed on it. If you are combining two networks, this is the machine that will no longer be the host. Note The control network must be off line while changing the host machine. No nodes can be accessing the database at this time. 1 Export your database and any graphics specific to this control strategy. You can export to floppy diskette or to a drive shared by both the current host and the new host. If you are keeping the current host machine on the control network (but not as the host), stop all of the DeltaV services. To do this, run Workstation Configuration on the current host and download it as type Other.
Refer to the Workstation Configuration instructions for more information on configuring a workstation.
New Host
The DeltaV host machine is always a ProfessionalPLUS machine with Objectivity's Lock Server and the control database installed on it. Follow these instructions after completing the Current Host instructions above. Designate which workstation will be the new host machine. Remember, the control network must be off line. No nodes can be accessing the host machine. Note If the new host is a machine of type Other or Application Station, uninstall and then reinstall the DeltaV software using the type ProfessionalPLUS.
38
1 2 3 4 5 6
Create a new database using the Database Administrator Tools. Name it the same name as your exported database. Run Workstation Configuration on the new host machine. Refer to the Workstation Configuration instructions for more information on configuring a workstation. Set Host Machine using Database Administrator Tools to this new machine (using the machine name you just assigned in Workstation Configuration). Set the new database as the Active Database using the Database Administrator Tools. Run Synchronize Workstations in Database Administrator Tools. The control network is now on line.
Workstations
39
Remote Access
This book contains information on remote access of DeltaV software.
40
sessions that can actually be open at one time. The current tested limit for concurrent sessions is fifteen; this is not a fixed system limit, but a guideline. Only one DeltaV Operate application can be in Configure mode at one time; that is, only one person can be editing graphics at a time on each server. It is highly recommended that for larger numbers of remote users the engineering and operator functions use dedicated servers rather than mixing engineering and operations functions on one server. A Remote Client server can have a maximum of 60 database connections open at one time. After the limit is reached, any attempt to open an application that needs a database connection will result in an error message and the application on the remote client will be closed. Warning Another limitation on remote sessions is that there is a maximum of 7200 graphic data links on all displays open through a Remote Client server. Beyond that number, graphic updates slow considerably and therefore the data on those graphics may not be updated as frequently as required. No explicit warning messages are given about the reduced performance. It is important to limit the number of users so that more than 7200 data links cannot be open at one time. For example, if displays are configured with 600 data links, then no more than 12 total sessions of any kind should be configured on the server.
Terminology
Following is a list of terms and their definitions. DeltaV Remote Client - the DeltaV application that allows access to a DeltaV server through a Microsoft Remote Desktop connection Remote Client server - the DeltaV ProfessionalPLUS or Operator Station that is set up to function as a host machine (server) for clients accessing a DeltaV system through the DeltaV Remote Client application Remote Client node- a computer, such as a desktop PC, laptop computer, or any DeltaV workstation that can be used to access a DeltaV system through the DeltaV Remote Client application Remote Client session - an object configured in the DeltaV Explorer that represents the availability of a remote session. It contains an assigned license, assigned areas (from the DeltaV application's control strategy), and optional reserved lists of users/nodes. Remote Session - an actual session in which a Remote Client server is accessed by a Remote Client node Terminal Server - a Microsoft application that includes the basic functions necessary for administrators to set up server and client nodes, manage connections, send messages, view sessions, and so forth. Remote Desktop Connection - a Microsoft communications tool that allows a remote PC to connect to a host computer's desktop and run applications as if the user were sitting at the host machine. It is available through the Start Menu under All Programs | Accessories | Communications.
Remote Access
41
During installation of the DeltaV software, the correct workstation type must be selected to designate the workstation as a Remote Client server. To Install Windows Server 2003 (Standard Edition) on the server machine 1 2 3 4 Insert the Windows Server 2003 CD. Click Install Windows Server 2003. Use Per Server licensing. Click Finish and Reboot.
To add the Microsoft Terminal Server component 1 2 3 4 Insert the Windows Server 2003 CD. Click Install optional Windows components. Check Terminal Server and click Next (select Full Security). Finish and Reboot.
When installing the DeltaV software, use one of three choices as the workstation type for the server: ProfessionalPLUS as a Remote Client Server Operator Station as a Remote Client Server Simulate for standalone laptop or workstation
After installing the DeltaV software, you must configure the Windows Server 2003 operating system properties to enable remote access. 1 2 3 4 5 From the Administrative Tools, select Services. Select the Routing and Remote Access service. Right click and select Properties. Set the service to enable automatically. Click OK on the dialogs to close them.
42
6 7
Open the Systems Properties dialog by clicking Start | Control Panel | System. Select the Remote tab.
8 9
Select Allow Users to connect remotely to this computer. Follow the instructions for configuring the users in the Administrator Functions: Adding Users topic. Click OK.
On the remote node (the machine that connects remotely to the DeltaV system) you must install the appropriate Microsoft licenses. DeltaV licenses for remote use are assigned in DeltaV Explorer and are based on the existing license structure for DeltaV workstations.
Remote Access
43
You can save one or more preconfigured connection files to store your remote connection settings. Thus, you can have customized settings for a 28.8 Kbps modem connection, a direct LAN connection, and any other kind of connection you might use. If you routinely connect to more than one server, you may want to customize your settings for each server. To further speed up the remote connection process, you can save these files as shortcuts on your Windows desktop. Warning Although it is possible to save your Windows password in the connection file, it is strongly advised that you do not do so. Although it could speed up your connection time, it also provides a direct path for unauthorized access to both the server and your local computer. In general, it is never a good idea to save your password.
44
To start a remote session from a client node 1 2 3 4 5 6 From the Windows taskbar, select Start | All Programs | Accessories | Communications | Remote Desktop Connection. (It is preferable that a Remote Desktop shortcut be provided for all users.) In the Remote Desktop Connection dialog box, either browse for the name of the Remote Client server to which you want to connect or type its name in the Computer field. Click the Options button to expand the Connection dialog box. On the General tab, type your user name and password. Make other connection choices for sound, color, connection speed, etc., on the other tabs. If you wish to save the settings in a file, click the Save As button on the General tab to save the settings in a file.
Note Even if you do not save the settings in a file, the settings are automatically saved and will be used the next time your user name connects. You need to save the file only if you wish to create a shortcut for your desktop or if you wish to have multiple preconfigured connection files for different servers, connection speeds, etc. 7 8 Click Connect. It will take a few seconds for DeltaV software to initialize. On the DeltaV logon dialog box, the server computer name and your user name appear in the Computer and User name fields, respectively. Enter your password and select a session. Only those sessions that are available for your use (as defined by the reserved lists and not in use by another Remote Client node) appear in the list of sessions from which to choose. After selecting a session, click OK.
Depending on your user privileges and the license assigned to your terminal session, you will then have access through the FlexLock system to one or more of the following: the Windows Desktop, the DeltaV desktop, or the DeltaV Operate application.
Remote Access
45
FlexLock
The FlexLock application provides the same secure operating environment through the remote connection as it does on a normal DeltaV workstation. Users with remote Windows desktop access and the necessary DeltaV privileges can launch most DeltaV applications through the Windows Start menu, if they are connected to a remote session with an appropriate license. (Note, however, that any user who logs on to a terminal session that is licensed only for operator control will be restricted to operator functions, regardless of their own user privileges.) Typically, operators are restricted to the DeltaV Operate system, and the other buttons will be inactive on the FlexLock dialog. Note It is possible that a Remote Client session running FlexLock does not appear on the Processses tab of the Windows Task Manager. If it is necessary to close FlexLock (for instance, to uninstall the DeltaV system), select the checkbox "Show processes from all users" on the Task Manager Processes tab. Then select and end the process DeskTop.exe, which is the FlexLock name in the process list.
46
If, for some reason, the operator needs to close the DeltaV Operate application and disconnect from the remote session, he should do so by selecting the Logoff Windows option from the FlexLock dropdown menu, as shown in the figure below.
Important It is very important that remote users do not use the Shut Down option from the Windows Start menu when they are connected to a DeltaV Remote Client server because this will shut down the server machine. It is recommended that the Shut Down option be disabled by the Windows Administrator. If you are on the windows Desktop, do not use the X on the Windows title bar to close your session. This will disconnect your Windows session, but your programs will continue to run while you are disconnected. Note The system administrator should configure automatic ending of disconnected or idle sessions after a specified amount of time. When a session is ended this way, all Windows and DeltaV applications are closed and the session is deleted from the server.
Unintentional Disconnects
If you lose your remote connection without closing your DeltaV or Windows applications, you are not automatically logged off unless the system administrator has set a time limit for disconnected sessions. If you are able to reconnect before the time expires, you will be reconnected to your existing session.
Forced Disconnects
There is also the possibility that your session will be terminated by an administrator. In such circumstances the Administrator will likely send a message through either the DeltaV Diagnostics system or the Windows Terminal
Remote Access
47
Services application to ask you to exit the programs you are working on and logoff. However, if you are temporarily away from the remote terminal or otherwise unaware of the request, the administrator can log you off the DeltaV system and force a disconnect without your consent through the Administrator functions. A message will be displayed notifying you that the session was disconnected.
48
In general, the number of datalinks on a picture is not as great a factor in its startup time as the complexity of the bitmap (in terms of shape and color changes within the picture). A simple graphic with 200 datalinks will come up on a "slow" remote connection almost as quickly as on a direct LAN-connected machine; a picture with 700 datalinks will take longer to start up, but should operate normally. Alarm Summaries, which are not graphics-intensive, should open in almost the same amount of time as a direct connection. For slow connection speeds, it is suggested that you do not open complex, color-intensive graphics. Such graphics may take several minutes to open. If network or protocol errors occur, DeltaV Operate may hang or appear to be hung. The connected client will not be able to exit DeltaV Operate or log off. The user will be able to disconnect using the X on the remote session title bar. The session will then have to be logged off by someone with administrator privileges (using Task Manager or DeltaV Diagnostics) or it may be automatically logged off through use of the "timeout" option. This option can be set by the administrator to automatically log off disconnected sessions after a set period of time.
Remote Access
49
10 Restart DeltaV Operate. 11 Type the new file name, DeltaV.original, and click OK. Click OK to the warning and/or confirmation messages. 12 Select DeltaV.BLANK, right-click, and select Rename. 13 Type the new name, DeltaV.grf, and click OK. Click OK to the warning and/or confirmation messages.
50
14 Repeat the process for Startup.grf (rename to Startup.original) and Startup.BLANK (rename to Startup.grf) under Pic/Standard. 15 Restart DeltaV Operate. Select the DeltaV.grf file, right-click, and select Rename. Type the new file name, DeltaV.original, and click OK. Click OK to the warning and/or confirmation messages. Select DeltaV.BLANK, right-click, and select Rename. Type the new name, DeltaV.grf, and click OK. Click OK to the warning and/or confirmation messages. Repeat the process for Startup.grf (rename to Startup.original) and Startup.BLANK (rename to Startup.grf) under Pic/Standard. Restart DeltaV Operate. Type the new file name, DeltaV.original, and click OK. Click OK to the warning and/or confirmation messages. Select DeltaV.BLANK, right-click, and select Rename. Type the new name, DeltaV.grf, and click OK. Click OK to the warning and/or confirmation messages. Repeat the process for Startup.grf (rename to Startup.original) and Startup.BLANK (rename to Startup.grf) under Pic/Standard. Restart DeltaV Operate.
Remote Access
51
users on the server will see the results the next time that picture is called up. (A download is not required for the changes to be available to all sessions on the server.) The first user to enter DeltaV Operate configure mode has access to the picture configuration tools, such as the toolbars, and will be able to create, edit, and save pictures. If an additional user attempts to load toolbars in configuration mode, an error message is displayed warning of a sharing violation, and the toolbars will not be available. The user will enter the configuration mode, but will have limited configuration ability with the toolbars unavailable. To free up the DeltaV Operate configuration resources so that another user can use configure mode, the first user must exit DeltaV Operate completely. It is not sufficient to simply close the picture or exit configure mode. The Remote Client session does not need to be disconnected as long as DeltaV Operate is closed. It is suggested that graphics configuration only be done on sessions that provide the ability to shut down and restart the DeltaV Operate Workspace application. Full-time operator interface sessions should not be used for graphics configuration. To avoid the share conflicts, users should consider designating a specific engineering session to be used for graphics configuration.
Screen Resolution
Set the screen resolution of the remote client to match the resolution on the server. If the resolutions are different, it is possible that not all the server's screen elements will be accessible from the client.
52
Setting up Licensing
License requirements exist for both Microsoft Remote Terminal Server and DeltaV Remote Client. It is the administrator's responsibility to determine the Microsoft licensing requirements. DeltaV licenses for remote use are based on the existing license structure for DeltaV workstations. This section includes some considerations for setting up licenses for use by Remote Client nodes. Licenses are assigned to Remote Client sessions, which are treated like Operator Stations with respect to DeltaV licensing: You can assign licenses to Remote Client sessions using the drag-and-drop method in DeltaV Explorer. (Licenses can also be assigned by right-clicking the Remote Client session and selecting Licensing | Assign License and then selecting from the list of available licenses.) You can review the licensing for a Remote Client session using the Properties dialog for the session. (In DeltaV Explorer, right-click the session and choose Properties; then click the Licensing tab of the Properties dialog.) Remote Client sessions appear in the system-wide Licensing report.
Users may wish to license each Remote Client session at a different level, particularly if some sessions will be used exclusively for specific tasks such as viewing or maintenance. For example, sessions may be licensed as a run-time viewing session (Only a Base Station License is needed.) a full operator interface session (An Operator Station license is needed with an appropriate DST size; a Diagnostics license may also be added.) a maintenance session (Only a Maintenance Station license is needed.) a full professional session (a ProfessionalPLUS Station license with up to 30,000 DSTs; perhaps a DeltaV Tune and Batch Operator Interface license)
Each Remote Client session must have an assigned plant area or a set of plant areas. This is done by assigning the plant areas to the Alarms and Events object under a Remote Client session in the DeltaV Explorer. (The assignment can be done using the drag-and-drop method or by right-clicking the Alarms and Events object and selecting Assign Area.) Any Remote Client session using OPC licenses on an Operator Station (such as when running the DeltaV Excel AddIn) requires that the OPC license be assigned to the host machine (the DeltaV machine acting as the Remote Terminal Server). This allows the license to be shared by the remote sessions.
Remote Access
53
54
1 2 3 4 5
In DeltaV Explorer, select the workstation name for which you want to create a Remote Client session. Click the + sign next to the workstation name, if necessary, to expand its contents. Select Remote Client, click the right mouse button, and select New Remote Client Session. In the Remote Client Session Properties dialog box, give the session a meaningful name that will help users identify it, especially if it is to be restricted to certain users. Include a description to further identify any restrictions on the session's use (such as the plant areas or licenses that are assigned to it ).
The Participate in Global Horn Acknowledge Group field is selected by default. It is recommended that this field remain selected. This allows the remote session user to acknowledge alarms that sound for the areas to which they have access.
Remote Access
55
To assign a DeltaV license to a Remote Client session 1 2 3 Right-click the Remote Client session name in the DeltaV Explorer. Select Licensing | Assign License. A dialog box opens that displays valid licenses that can be assigned to this session. Browse and select the license.
To view the assigned license features, open the Properties dialog box for the Remote Client session and click the Licensing tab. To see more information on any of the license features, select the feature and then click the License Details button.
56
Even though a user is able to begin the process of connecting to a Remote Client server from a node on the reserved node list, the user must still log in under a valid DeltaV user ID and password for the connection to be completed. Usage privileges are still as defined in the DeltaV User Manager. To add names to the Reserved for User (or Node) List 1 2 3 4 5 6 Open DeltaV Explorer. Navigate to the Remote Client server workstation. Select the Remote Client session for which you want to define a reserved user list, click the right mouse button, and select Properties from the context menu. Select the Reserved for User List tab on the Properties dialog box. Click Add to open a dialog box where you can enter the user name or select the name from a pull-down list of available user names. You can also use this dialog box to delete user names from the reserved list. Similarly, if you wish to reserve the remote session for specific nodes, click the tab Reserved for Node List. Then click Add to open a dialog box where you can enter the node name or select the name from a pull-down list of all the node names in the local network.
Remote Access
57
As an administrator with the proper access privileges, you can select a remote session, click the right mouse button, and choose from the following options: Send message Disconnect Log Off
The fields in the Remote Clients box are as follows: ID - A numerical identifier. An ID with a very high number, such as 65536 in the above example, is used for Windows server listener sessions that wait for requests for new client connections. No user is logged on to a listener session. DeltaV Session - The session name, as identified in the DeltaV Explorer hierarchy. DeltaV User Name - The name of the DeltaV User logged on to the session. XP User Name - The Windows user name of the user logged on to the session. Client Name - The name of the remote node logged on to the session.
58
Connection state - One of 10 possible states: Active - A user is logged on to the server Connected - The server is connected to the client. Connecting - The server is in the process of connecting to the client. Shadow Connection - The server is shadowing another Disconnected - The sever is active but the client is disconnected. Idle - The server is waiting for a client to connect. Listening - The server is listening for a connection. Resetting WinStation - The server is being reset. WinStation Error - The server is down due to an error. Initializing - The server is initializing. Client IP Address - The IP address of the client node
Disconnecting Users
Typically, the Administrator will send a request (via an online message) to the current session user to log off and disconnect before initiating a forced disconnect. Circumstances when an Administrator may need to disconnect remote session users include the following: Another user with a more pressing need requires access and there are no terminal sessions available A major system maintenance task is to be performed
Administrators have 3 options for logging off or disconnecting users: Remote Client Diagnostics Windows Task Manager Terminal Services Manager
For more information on logging off and disconnecting, refer to Starting and Ending a Remote Client Session.
Remote Access
59
You can also override individual user settings for these options using Terminal Services Configuration. To access the RDP-Tcp Properties dialog, click Start | Administrative Tools | Terminal Services Configuration and double-click the RDP-Tcp connection. On the RDP-Tcp Properties dialog, select the Sessions tab, click Override User settings, and use the dropdown boxes to select the preferred time options for the following: End a disconnected session Active session limit Idle session limit
Disconnecting a Session vs. Ending a Session You can decide whether the session should be disconnected or ended when the session limit is reached or the connection is broken. When you specify that a client session is to be disconnected, the client can reconnect if needed (and if reconnection is allowed). When you specify that a client session is to be ended, the session is reset and cannot be reconnected. The remote user would need to open a new client session if one is available. It is not recommended that you set these limits unless you have more remote users than remote sessions available. How DeltaV Ends Disconnected and Idle Sessions DeltaV handles ending a disconnected session slightly differently than ending an idle session, as described below. In both cases the the time limit to end the disconnected or idle session is 30 minutes: Disconnected session - Approximately 2 minutes before the 30-minute time limit is reached, DeltaV applications running in the session exit. The session ends in 30 minutes. Idle session - At the 30-minute time limit, DeltaV applications running in the session exit. The session ends 2 minutes after the time limit.
The example below shows how these options might be configured. Note that the option to Allow reconnection defaults to "From any client" and the option to override user settings is grayed out (not available). (The other option,
60
to allow reconnection "From previous client" is supported by Windows Terminal Services only for Citrix ICA-based clients that provide a serial number when connecting.)
As an Administrator, you may want to set up guidelines for ending disconnected sessions and to inform remote users of these time limits. For instance, you might want to allow Engineering sessions to be reconnected within 30 minutes after a session connection is broken so that work in progress is not lost. Since Operator sessions do not usually require saving work in progress, you may choose to end disconnected Operator sessions after only 5 minutes.
Security Considerations
The DeltaV Remote Client application uses the standard Microsoft security along with normal DeltaV security. Securing the Remote Client server from unauthorized access is primarily the responsibility of the administrator. When working at a remote site, it is important that the individual user employ additional security measures as necessary to prevent unauthorized access. When remote clients are PCs on the plant LAN, it is recommended that a router be installed between the DeltaV system and the plant LAN to prevent unnecessary plant LAN traffic from getting to the server. For more information on DeltaV security-related topics, refer to the following: DeltaV FlexLock DeltaV User Manager and DeltaV Security
Remote Access
61
62
Remote Workstations
Inside this topic Remote Workstation Types Remote Applications Support Licensing The DeltaV system supports connections to remote networks that are not part of the standard DeltaV control network. The workstations on a remote network provide most of the functions of a workstation on the control network. DeltaV ProfessionalPLUS and Application Workstations can be Remote Access Services (RAS) servers for remote networks. Each of these workstation types have a Remote Network subsystem. You enable the Remote Network subsystem and add remote workstations to the subsystem using the DeltaV Explorer. Refer to Explore help for more information.
Remote Access
63
The following Engineering Tools applications are supported on remote workstations: DeltaV Explorer, including Foundation Fieldbus support. Control Studio Recipe Studio Advanced Control Applications DeltaV Tune, DeltaV Inspect, DeltaV Predict Database Administrator User Manager
Remote Operator Stations have the following three subsystems: 1 Operator - This subsystem provides the means to configure the operations scope (for Operation license enforcement) for the Remote Operation Station. Remote Operator Stations will accept standard workstation licenses. Continuous Historian This subsystem provides the means to configure historical values collected on the remote workstation. Alarms and Events This subsystem provides a means to configure which Areas the workstation should participate in. However, a Remote Operator System cannot collect alarm and event history on remote Operator nodes.
2 3
64
Remote Application Stations have the following three subsystems: 1 2 Continuous Historian This subsystem provides the means to configure historical values collected on the remote workstation. Alarms and Events This subsystem provides a means to configure which Areas the workstation should participate in and, optionally, can collect alarm and event information. If the Enable option is checked, the Remote Application Station stores alarms and events into a local database. Remote Network This is a nested remote network. Nodes assigned to this network route their real-time communications through this application station.
A remote network on a remote server is used when using satellites. This reduces the amount of slow message traffic sent to the control system.
Licensing
Remote Application Stations and Remote Operator Stations accept the same licenses and upgrades as local stations. Enforcement rules are the same for both local and remote nodes.
Remote Access
65
Remote Installation
Installing DeltaV software on a remote workstation is basically the same as installing DeltaV software on a local workstation. For example, if your ProfessionalPLUS will act as a server for remote workstations: 1 2 3 4 5 6 7 Execute the normal DeltaV Setup program on the ProfessionalPLUS and the Remote Workstation. Execute DeltaV Workstation Configuration on the ProfessionalPLUS. Check the Workstation will be a Remote Access Server box indicating that this machine will be a remote server. Using DeltaV Explorer, enable the remote network subsystem on the ProfessionalPLUS. Add the remote workstations to the remote network. Export the Workstation Configuration data onto a floppy disk. Execute the DeltaV Workstation Configuration program on the remote workstations to complete the installation and configuration process. When the DeltaV Workstation Configuration program asks for it, supply the Workstation Configuration data on the floppy disk to set up the remote workstation for remote access to the DeltaV System.
Note If you have already installed the DeltaV software without designating a remote server, you do not need to reinstall the software. You can designate a workstation as a remote server by running DeltaV Workstation Configuration and checking the Workstation will be a Remote Access Server box.
Note You must have the same DeltaVAdmin password on the remote workstations and on the machines in the DeltaV System. Use ServPwd.exe to change this password. For more detailed information about these steps, see DeltaV Workstation Configuration and DeltaV Explorer Help.
IP Addresses
DeltaV software assigns IP addresses to all the workstations in the control network. Remote workstations typically will already have an IP address to enable them to connect to a plant or office LAN. When you install DeltaV software on a remote workstation, the software finds the available IP addresses and network adapters for that machine. You must select from this list of available choices as the DeltaV software does not assign new addresses to remote workstations. DeltaV software requires that a permanent IP address be assigned to the machine, DHCP is not supported.
66
SwRev (Software Revision) - Software revision of the selected component. Conn_Integ (Connection Integrity) - Indicates if the DeltaV Remote Access Server can successfully communicate with the remote workstations that have been configured on the remote network. This value is Good if the Remote Access Server can communicate with all the remote workstations and Bad if the Remote Access Server cannot communicate with at least one workstation.
Note A configuration option for remote workstations is Monitor Integrity. When this option is selected, Diagnostics reports an integrity error for both the Remote Network subsystem and the remote workstation if the remote workstation is not connected and not communicating with the Remote Access Server. If this option is not selected, Diagnostics will not report an integrity error. Pri_CInteg (Primary Communications Integrity) - The overall integrity of communication on the remote network's primary communication link. Bad if any remote connection has a bad primary communications link. Good if all remote connections have good primary communications. Pri_ConGood (Primary Connections Good) - The number of good remote communication connections on the primary remote network. Pri_ConBad (Primary Connections Bad) - The number of bad remote communication connections on the primary remote network. Sec_CInteg (Secondary Communications Integrity) - The overall integrity of communication on the remote network's secondary communication link. Bad if any remote connection has a bad secondary communications link. Good if all remote connections have good secondary communications.
Remote Access
67
Sec_ConGood (Secondary Connections Good) - The number of good remote communication connections on the secondary remote network. Sec_ConBad (Secondary Connections Bad) - The number of bad remote communication connections on the secondary remote network. AvailCon (Available Connections) - The number of remote connections that are still available to other remote workstations that are not configured to be connected through this Remote Access Server. Enabled - Indicates if the remote network is enabled or not enabled. The remote network must be enabled to allow remote workstations to connect to the Remote Access Server and access runtime data. Yes means the remote network is enabled; No means the remote network is not enabled. NetType (Network Type) - The type of remote network configured. The only value currently supported for network type is "Remote Network." Licensed - Indicates of this workstation has a remote network license. Yes indicates a license and No indicates no license. The remote network must be licensed before any remote connections are allowed. Pri_MCastCount (Primary Multicast Received Counter) - The number of multicast messages received on the primary remote network. Sec_MCastCount (Secondary Multicast Received Counter) - The number of multicast messages received on the secondary remote network.
You must use the full path to a parameter on the remote operator station to access the value of that parameter. Path is specified as: Local Server Name/Remnet/Remote Station Name/parameter (where Remnet is the required subsystem name)
68
For example, to access the value of OINTEG on a remote operator station called Cosmos that uses the local server Galileo, the path is: Galileo/Remnet/Cosmos/OINTEG Tip The easiest way to find a parameter path is to right-click the parameter in the Contents pane in DeltaV Diagnostics and select Properties. An exception is the channel value, which cannot be accessed directly from Operator Graphics. You must assign the channel value to a module parameter in order to use it on graphics.
Remote Access
69
If you want backup servers for your remote workstations, make sure that you install one or more of your workstations as remote servers and enable the remote networks on these machines. Note If you have already installed the DeltaV software without designating a remote server, you do not need to reinstall the software. You can designate a workstation as a remote server by running DeltaV Workstation Configuration and checking the Workstation will be a Remote Access Server box.
70
Remote Access
71
72
Setting up a Workgroup to Workgroup Configuration 1 Create the Windows user account on the remote workstation using Windows User Manager: 2 Create the Windows user account on the remote workstation. Refer to your Windows documentation for more details. Add the user to the appropriate DeltaV Group (DeltaV, DeltaV Access, DeltaV Admin). Refer to the Types of User Accounts topic for more information on DeltaV groups. Create the Windows and DeltaV user accounts. Refer to the Adding a New User topic for more information. Use the same username and password from the remote account for the DeltaV and Windows server accounts.
Create the user accounts on DeltaV server using DeltaV User Manager:
Remote Access
73
Setting up a Remote System in a Workgroup to Domain Configuration 1 Create the Windows user account on the remote workstation using Windows User Manager: 2 Create the Windows user account on the remote workstation. Refer to your Windows documentation for details. Add the user to the appropriate DeltaV Group (DeltaV, DeltaV Access, DeltaV Admin). Refer to the DeltaV User Accounts and Groups topic for more information on DeltaV groups. Create the Windows and DeltaV user accounts. Refer to the Adding a New User topic for more information. Use the same username and password for the DeltaV server and Windows server accounts as on the remote account.
Create the user accounts on the DeltaV server using DeltaV User Manager:
Setting Up A Remote System in a Domain to Workgroup Configuration Since the remote workstation is on a domain, users can include local users and domain users. An individual can have both a local account and a domain account on the workstation. (Having both accounts is typical for an engineer who uses the workstation as a personal PC.) Most users should only have a domain account. This simplifies the administration of user accounts.
74
Create the Windows user account on the remote workstation using Windows User Manager: Domain users are not added directly as new users. They are given access to the machine and resources by being added to a local group on the workstation. Refer to the Domain section of your Windows documentation for information regarding how to add domain members to workstation groups. Add the domain user to the appropriate DeltaV group (DeltaV, DeltaV Access, DeltaVAdmin). Refer to the DeltaV User Accounts and Groups topic for more information on DeltaV groups. Create the Windows and DeltaV user accounts on the server. Refer to the Adding a New User topic for more information. Use the same username and password for these accounts as on the remote account.
Create the user accounts on the DeltaV server using DeltaV User Manager:
Setting up a Remote System in a Two Domain, No-Trust Configuration Since the remote workstation is on a domain, users can include local users and domain users. An individual can have both a local account and a domain account on the workstation. (Having both accounts is typical for an engineer who uses the workstation as a personal PC.) Most users should only have a domain account. This simplifies the administration of user accounts.
Remote Access
75
Create the Windows user account on the remote workstation using Windows User Manager: Domain users are not added directly as new users. They are given access to the machine and resources by being added to a local group on the workstation. Refer to the Domain section in your Windows documentation for information regarding how to add domain members to workstation groups. Add the domain user to the appropriate DeltaV group (DeltaV, DeltaV Access, DeltaVAdmin). Refer to the DeltaV User Accounts and Groups topic for more information on DeltaV groups. Create the Windows server and DeltaV user accounts. Refer to the Adding a New User topic for more information. Use the same username and password for these accounts as on the remote account.
Create the user accounts on the DeltaV server using DeltaV User Manager:
Scenario 5: Two Domains, One-Way Trust Configuration (DV Server Is Trusting Domain)
Logging on to the DeltaV System In order for a domain user to connect to the DeltaV database server from the remote workstation in a oneway trust domain environment, the following must apply: The Windows user on the remote workstation must have a DeltaV account on the remote system. The Windows user on the remote workstation must have a DeltaV account on the server. The DeltaV user on the remote workstation must have a DeltaV account on the server.
For domain logons, the user does not need to have a Windows account on the remote workstation. In order for a non-domain user to connect to the DeltaV database server from the remote workstation in a one-way trust domain environment, the followint must apply: The Windows user on the remote workstation must have a Windows account on both the remote workstation and the DeltaV server with the same username and password. The Windows user on the remote workstation must have a DeltaV account on both the remote workstation and the DeltaV server. The DeltaV user on the remote workstation must have a DeltaV account and a Windows account on the server with the same username and password as on the remote system. The DeltaV user on the remote workstation must have a Windows account on the remote system.
Setting up a Remote System in a Two Domain, One-Way Trust Configuration (DV Server is Trusting Domain) Since the remote workstation is on a domain, users can include local users and domain users. An individual can have both a local account and a domain account on the workstation. (Having both accounts is typical for an engineer who uses the workstation as a personal PC.) Most users should only have a domain account. This simplifies the administration of user accounts
76
Create the domain Windows user account on the remote workstation using Windows User Manager: Domain users are not added directly as new users. They are given access to the machine and resources by being added to a local group on the workstation. Refer to the Domain section in your Windows documentation for details on adding domain members to a workstation group. Add the domain user to the appropriate DeltaV group (DeltaV, DeltaV Access, DeltaVAdmin). Refer to the DeltaV User Accounts and Groups topic for more information on DeltaV groups. Create a DeltaV account for the domain user. Do not enter a password for the DeltaV account. (This assumes that the user already has a domain account. If you still need to create the domain user account, refer to the Domain section of your Windows documentation for more information.)
Create the user accounts on the DeltaV server using DeltaV User Manager:
Scenario 6: Two Domains, One-way Trust Configuration (DeltaV Server Is Trusted Domain)
In a trust relationship where the DeltaV server is the trusted domain, users on the DeltaV domain can be allowed to access resources on the plant domain. However, this is not relevant for this particular scenario. Having the plant domain trust the DeltaV domain does not affect the users accessing DeltaV remotely and yields the same behavior as Scenario 4.
Remote Access
77
DeltaV Databases
DeltaV configuration data is stored in a database in one of the workstations in the system. This database is referred to as the persistent database. A system can have several databases, but only one database can be active within the system at a time. A database includes everything you can see from the DeltaV Explorer. This includes: The library of control modules and function blocks included with the system The modules you create The workstations and controllers in the system (although they can all be viewed in Explorer, they might not all be physically connected to the network) System-wide data, such as named sets, alarm preferences, and event chronicle definition
Displays are not stored in the database; however, the modules in the database reference the displays. Events are not part of the database. For information on managing the DeltaV database, refer to the Database Administrator Tools topic. Each event chronicle view is a separate database of events.
Database Access
Many DeltaV applications access the active database to some degree. When you add a new module through Control Studio, for example, the module is added to the active database. The DeltaV Explorer provides the widest and most detailed view of a database. It also provides the fastest means to populate your database.
Purpose/Function
The DeltaV database contains all the information about your control strategies and your control network (nodes, workstations, I/O channels, and so on). The DeltaV system downloads with a template database for you. This makes getting the DeltaV system up and running easy.
78
Control Studio, DeltaV Explorer and Configuration Assistant modify the database as you create or modify your control strategy. All changes to the database are made through the DeltaV interface: the DeltaV Explorer, Control Studio, Database Administrator, or Configuration Assistant. Database Administrator takes the basic database management tasks and makes them easier to do. With Database Administrator, you can perform the following tasks: Create a new, empty database. Copy an existing database. Delete a database. Move a database to a new machine. Back up an existing database. Restore a database from a backup.
There are additional database management tasks that are important for keeping the DeltaV system running smoothly and efficiently. The Database Administrator gives you the tools to perform these tasks. Monitor transaction locks on a database. Monitor application locks on the DeltaV applications. Set the active database for that workstation. Set the database host for all workstations to access. Register/deregister the database. Synchronize all the workstations for the same active database.
The Database Administrator Tools is not intended for making any changes to your control strategy, except in the creation or deletion of a database. The Database Administrator Tools are for managing the DeltaV database that makes up your control strategy.
79
To see the size of the individual databases you have created, start Windows Explorer: 1 2 3 4 5 Expand the \\DeltaV\DVData\Databases folder. Highlight the folder with the name of the database you are checking. Click the right mouse button. Click Properties from the menu. On the General Tab you see the size of that individual database.
These are just examples of when you can use the Database Administrator tools. Each tool is described in its own section to better help you determine when to use the tools.
80
Refer to What can I Back Up to Tape? and What can I Back Up to Floppy? for more information. Processes for restoring data are also essential to your data protection plan. Restore processes must be matched to the backup data available and be followed in a certain order to minimize data loss and down time. Finally, it makes sense to take precautions that will prevent data loss in the first place. Your representative or sales office can discuss strategies like disk mirroring and RAID 5 disk striping to prevent the loss of your plant's data.
81
..\Bulkedit
Directory containing the template, sample format specification files, and sample .txt files for bulk edit. Directory containing saved Process History View charts Directory containing predefined E+Chart files for module and faceplate parameters. For example, AI_fp.phve contains a chart of the PV parameter of the Analog Input function block and an event log for the module. Process History View opens these files when an operator presses the E+Chart button on the module or function block's faceplate. Directory containing the active configuration database and any backup databases Directory containing the download scripts for the last downloaded configuration Directory containing expressions created in Control Studio Directory containing operator displays and historical data files Directory containing pre-existing graphics as well as user-created pictures that are used in operator displays Directory containing files that have data exported from the configuration database Directory containing download files. Directory containing *.wav files for audible alarms
..\Charts ..\Charts\Lib
..\Databases
82
if you get tape errors during a backup procedure if a tape's quality and reliability become questionable
All standard DeltaV Operator tools can remain active during the backup procedure, but it is recommended that you close the DeltaV Engineering tools. Note If the default location for any of these files has been changed, select the appropriate directories and files when running the Windows Backup Utility.
Caution Do not make any configuration changes while performing a backup procedure.
Use the Windows Backup Utility to back up all DeltaV displays and the control configuration files (which are stored by default in the \DeltaV\DVData directory) to a tape device. If you are using a ProfessionalPLUS workstation, the utility also backs up the database to tape. Perform the backup for every workstation that you want to back up. The control and display configuration backup procedure is discussed in more detail below. Using the Windows Backup Utility 1 2 Insert a tape into the tape drive. Use the Windows Backup Utility to back up to the tape. This utility can be found under Programs | Accessories | System Tools | Backup. The configuration files are in the DeltaV\DVData directory. If you created a backup in a directory that is not under DeltaV\DVData, navigate to the backup directory and click the box next to the backup directory.
83
Use the Windows Backup Utility to back up the entire disk with registry to a tape device. These steps are discussed in more detail below. Using the Windows Backup Utility The following steps are for the wizard. An advanced mode is available that enables you to set various options that are not available in the wizard. Follow the Windows Backup help for more information. 1 2 Insert a tape into the tape drive. Use the Windows Backup Utility to back up to the tape. This utility can be found under Programs | Accessories | System Tools | Backup. Select the All information on this computer for a full system backup.
If you make a copy of the Event Chronicle file prior to performing a control and display configuration backup procedure, you can restore the Event Chronicle as needed. To schedule a maintenance cycle to run immediately prior to performing a backup, use the Alarms and Events Properties Sheet of DeltaV Explorer. You can schedule Event Chronicle to store removed records in a text file at a specified time. The stored records retain the date-time stamp (in GMT) of the event. You must perform a download to the workstation before any changes made to the Alarms and Events Properties Sheet take effect. To copy EJournal.mdb, perform the following steps: 1 Highlight EJournal.mdb in the Windows Explorer, click Edit | Copy, and then click Edit | Paste. A copy of EJournal.mdb is displayed below the original EJournal.mdb file. 2 Highlight the Copy of EJournal.mdb, click Edit | Cut, and then paste this file (Edit | Paste) to your floppy disk or tape (depending on whether you are going to back up to disk or tape).
Note To view file extensions in the Windows Explorer application, click View | Options. Then, disable the Hide file extensions for known file types check box.
84
Caution Do not make any configuration changes while performing a backup procedure. If you back up the DeltaV workstation's configuration data to floppy disk, you can restore that data from floppy disk as needed. The Objectivity Database contains the control configuration data that define the workstations, the controllers, and the modules that run in the controllers. The display data are the operator displays.
Note The backup program formats the floppy disk. Exporting the Database 1 2 3 4 Run DeltaV Explorer. Click the top object in the left pane, which is the name of the database. (Usually, it is named DeltaV_System.) Click File | Export Selected Object. Accept the default name and location for the file. (The file is usually located in \DELTAV\DVDATA\ImportExport. The filename is the name of the database.) After making your selections, click OK.
Backing up the Exported Database 1 2 Insert a blank floppy disk into the floppy drive. Copy the necessary fhx files or the entire directory from \DeltaV\DvData\Import-Export to the floppy.
Backing up the Historical Configuration Note Performing this procedure backs up the configuration of the historical trends, not the historical data collected from the trends. Refer to Backing Up the Legacy Historian Archives and Database Files for more information on backing up historical data from the Legacy Historian. Refer to Continuous Historian Administration for information on backing up historical data from the Continuous Historian. 1 2 Insert a blank floppy disk into the floppy drive. Use the Windows Backup Utility to back up to a floppy. This utility can be found under Programs | Accessories | System Tools | Backup. The Charts configuration can be found under \DeltaV\ DvData\ Charts folder.
85
Backing up the Operator Displays 1 2 Insert a blank floppy disk into the floppy drive. Copy the required files or the entire directory from \DeltaV\ DvData\ Pic folder to the floppy.
Note For a partial restore of specific data, select the files you want to restore when running the Windows Backup Utility. Refer to the Windows documentation for more information on running the Windows Backup Utility.
Note The following procedure assumes that all configuration, display, and runtime data files are in the default directory \DeltaV\DVData.
86
Note Windows includes an option called System Restore on the System Properties dialog. This feature is not related to the procedure documented here. Emerson Process Management recommends turning off the Windows System Restore feature. The restore operation consists of four main steps: 1 2 3 4 Installing the operating system Configuring the tape device Restoring the full backup from tape using the Windows Backup Utility Restoring the Objectivity Database using the Database Administrator program
Installing Windows Install Windows according to the instructions provided in XPHelp.chm, which is located in the \_Support directory on DeltaV CD-ROM #4. Note Do not install the network at this time. Restoring the Full Backup Using the Windows Backup Utility 1 2 3 4 Click Start | Programs | Accessories | System Tools | Backup. Click Restore files and settings. Follow the instructions in the wizard. For details on using the utility, refer to the Windows Backup Utility help sections on restoring data. After the restore from tape is complete, restart your workstation.
87
88
times of the archives. Note that the bs qualifier also updates the backup date/time of each archive as listed in the archive list. The backup date/time of full archives should be later than the End times of the archives. Note Depending on your installation options, you can perform the following procedure on either the C: drive or the D: drive. (The C: drive is used in the examples in this procedure.) 1 Click Start | Programs | Command Prompt to open an MS-DOS window and go to C:\PI\ADM. C:\> cd \PI\ADM 2 Type piartool -al to list archives. C:\PI\ADM> piartool -al Note Identify the name of each archive file associated with the index locations. The primary archive is index 0 and is first in the list. 3 Type piartool -bs 0 to flush the cache and take the primary (index=0) archive file offline. C:\PI\ADM> piartool -bs 0 While the primary archive file is offline, all archive data that is currently being collected is sent to C:\PI\DAT\PIEVENTQ.DAT if needed. Note The archive index 0, 1, and 2 does not necessarily correlate to the PIARCH file extension of .001, .002, and .003. To identify the indexes of the archive files, go to C:\PI\ADM and type piartool -al. This command lists the registered PIARCH files with all their specific details in order of increasing index number. Archive 0 is the primary archive where current data is being stored. 4 5 Back up the specified archive file (C:\PI\DAT\PIARCH.001, PIARCH.002, or PIARCH.003) as an ordinary file to your backup location, such as a tape backup or remote hard drive directory. Type piartool -be to put the archive file back online. C:\PI\ADM> piartool -be 6 Repeat steps 3-4, for each archive file that contains data that has changed since the last backup. Typically, this is only required following an archive shift as the additional archives do not receive new data when they are no longer the primary archive. Type piartool -bs 1 (instead of piartool -bs 0 ) in step 2, to start the backup of the specified archive.
89
While the historian processes are running, copy the following files to the backup directory: C:\PI\LOG\*.dat C:\PI\DAT\shutdown.dat C:\PI\DAT\pisql.ini C:\PI\DAT\pifirewall.tbl C:\PI\DAT\pitimeout.tbl C:\PI\DAT\pisubsys.cfg C:\PI\DAT\Piproxy.dat (if it exists)
To copy the next group of files, you must first stop the pibasess process which owns the files. Type net stop pibasess to stop the pibasess process. C:\ net stop pibasess The system returns the following messages: The PI Base Subsystem service is stopping The PI Base Subsystem service was stopped successfully Copy the following files to the backup directory: C:\PI\DAT\pipoints.dat C:\PI\DAT\piptattr.dat C:\PI\DAT\piptclss.dat C:\PI\DAT\pidigst.dat C:\PI\DAT\pidignam.dat C:\PI\DAT\piusr.dat C:\PI\DAT\piusrgrp.dat C:\PI\DAT\piusrctx.dat C:\PI\DAT\piptunit.dat C:\PI\DAT\piptalia.dat C:\PI\DAT\PIModuleDb.dat C:\PI\DAT\pitrstrl.dat C:\ net start pibasess The system returns the following message: The PI Base Subsystem was started successfully
The PI Batch subsystem is not used in DeltaV software and should not be running. If it is running, shut it down: Type net stop pibatch to stop pibatch:
90
C:\ net stop pibatch The system returns the following messages: The PI Batch Subsystem service is stopping The PI Batch Subsystem service was stopped successfully Copy the following files to the backup directory: C:\PI\DAT\ pibaunit1.nt C:\PI\DAT\ pibaalias.nt
Contact your local Service Representative to develop detailed and automated backup procedures that should also include appropriate recovery procedures.
91
Sizing Calculations
The Legacy Historian system stores data into archive files. You can have multiple archive files of various sizes. For example, you can have three 100-Megabyte files or five 250-Megabyte files. The maximum archive file size is 1 Gigabyte. The default installation provides for 3 archive files. It is recommended that you create no fewer than 3 archive files. The maximum number of archives is limited by the operating system and the maximum file handles available, as well as by the available memory in the computer. The theoretical limit is 1022 archive files, although the actual number is typically between 30 to 100 archive files on medium to large systems. Consult with your local representative or Emerson Process Management service provider before expanding your archive count beyond 100. Consider the following when determining archive file size and count: The total archive volume (size of a single archive file times the number of archive files) affects the length of time that files store data before being overwritten. The individual archive volume (size of a single archive file) affects how often an archive shift occurs. The Legacy Historian performs an archive shift to switch archiving from the active file to the file that contains the oldest data. The individual archive volume also affects how much available data is discarded when an archive shift occurs. For example, if each archive stored approximately one month of data and there were three archives, there would be a maximum of three months data online just prior to the shift and a maximum of two months data online after the archive shift.
Here are a few things to consider before setting the archive files: Consider future expansion. Estimate the point count for the next year or two and size archive files accordingly. Data storage rate increases with an increase in scan rate and decreases with an increase in compression deviation. The default compression values are Compression=ON with a Compression Deviation of 0. If this
92
is left unchanged, every change in data values will be stored to disk, possibly consuming the archives much faster than expected. Each point stored requires a minimum of 4 Kilobytes of storage for the archive system to work correctly. However, archive storage is more efficient if 5 Kilobytes per point are used. Make sure that the archive is of a size that will fit on the media used for long-term backup and will back up in a reasonable amount of time. (For example, use 600-Mbyte archives if a writable CD drive is used to store archive files.) An archive file can be any size, but it is recommended that all archives be the same size to facilitate system administration. Once created, a fixed archive's size cannot be changed. It must be deleted and then recreated at the larger size. Therefore, it is much easier to add archives than to change archive sizes. Be generous in archive file sizing to meet the point count estimates and use the archive count to adjust for total archive duration. Nominally, the archive should shift every 14 to 60 days. Keep in mind that a point will consume 1.5 Kilobytes per day.
Using the above criteria, a system with a projected size of 1000 points and a storage time of 30 days before an archive shift occurs would require a 44-Mbyte archive file, as shown in the following calculation: Minimum Size Requirement: Estimate for 30 days storage: 1000 *4.0Kbytes = 4 Mbytes 1000 * 1.5Kbytes * 30 = 44 Mbytes
Given these calculations, the following table provides a quick reference (values are in Mbytes, which are rounded where appropriate): Point Count 250 Minimum Size 2 Mbytes (minimum archive size, regardless of point count) 5 20 40 80 30 Days 11 60 Day 22
Analyzing Results
Once the archive files are online, you can test the accuracy of the calculations by comparing the actual data storage rate to the estimated rate. If the rate is too high, either adjust the compression deviation on values that do not require minute changes to be stored or increase the total archive volume. Increase the archive file size to reduce the frequency of archive shifts, but do so only after careful evaluation of data compression and scan rate configuration. Increase the number of archives so that it extends the total archive volume size to satisfy the required online availability of data. The Legacy Historian system is installed with the DeltaV system, and a default archive file size is selected. If the system was already collecting data, the following procedure will give a good estimate of the rate at which the archive files are being consumed.
93
Log on to the PC running the Legacy Historian system that you want to analyze and then open a Command Prompt window. For Windows NT, select Start | Programs | Command Prompt. For Windows XP, select Start | All Programs | Accessories | Command Prompt.
In the Command Prompt window, set the adm subdirectory under the PI installation directory to be the default directory. For example, if the Legacy Historian was installed on the D: drive in the PI directory, you would enter the following commands: C:\D: D:\cd \PI\adm
94
Run the program piartool and supply the argument AL: D:\PI\adm>piartool -AL
View the output. It should appear similar to the following: Archive shift prediction: Shift Time: 5-Mar-03 13:11:05 Target Archive: d:\PI\dat\piarch.002 Archive[0]: d:\PI\dat\piarch.003 PIarcfilehead[$Workfile: piarfile.cxx $ $Revision: 56 $]:: Version: 5 Path: d:\PI\dat\piarch.003 State: 4 Type: 0 Write Flag: 1 Shift Flag: 1 Record Size: 1024 Count: 87040 Offsets: Primary: 24/21760 Overflow: 71431/87040 Start Time: 27-Aug-02 10:18:59 End Time: Current Time Backup Time: 24-Sep-02 11:40:05 Archive[1]: d:\PI\dat\piarch.001 PIarcfilehead[$Workfile: piarfile.cxx $ $Revision: 56 $]:: Version: 5 Path: d:\PI\dat\piarch.001 State: 4 Type: 0 Write Flag: 1 Shift Flag: 1 Record Size: 1024 Count: 87040 Offsets: Primary: 14/21760 Overflow: 65370/87040 Start Time: 24-Jun-02 15:30:54 End Time: 27-Aug-02 10:18:59 Backup Time: 24-Sep-02 11:40:25 Archive[2]: d:\PI\dat\piarch.002 PIarcfilehead[$Workfile: piarfile.cxx $ $Revision: 56 $]:: Version: 5 Path: d:\PI\dat\piarch.002 State: 4 Type: 0 Write Flag: 1 Shift Flag: 1 Record Size: 1024 Count: 87040 Offsets: Primary: 1/21760 Overflow: 87039/87040 Start Time: Current Time End Time: Current Time Backup Time: Never
Understanding the Output The archive files are listed according to their archive numbers. The archive number (0, 1, 2, and so on) should not be confused with the file extension on the piarch files (001, 002, 003). The archive numbers are always defined as: Archive 0 the active archive Archive 1 the most recently active archive Archive 2 the remaining archives (The more recently written archives have the smaller number.)
95
Therefore, Archive[0] is active and will have a defined Start Time showing when this archive became the active archive, and End Time of Current Time. In the preceding output, the Start Time is 27-Aug-02 10:18:59. Any file that has not been written to will have a Start Time and an End Time of Current Time. When the Legacy Historian system initially starts, archives 1 and 2 will be in this state. As each archive is used, its Start Time will be defined. Once all archives have been used, each will have a defined Start Time, and all except the active archive will have a defined End Time. The active archive always has an End Time of Current Time. Determining Archive Consumption Rates To determine the archive consumption rates, subtract the Start Time from the End Time of any archive that has been filled. In the preceding example output, only Archive[1] meets these criteria with a Start Time of 24-Jun-02 15:30:54 and an End Time of 27-Aug-02 10:18:59. This archive, sized at 87,040 KB (85 MB), was filled in 64 days. Since we have 3 archives, the system can store up to approximately 192 days of data when the 3 archives are filled, dropping to 128 days when an archive shift empties the oldest archive file and begins storing new data into it. If this is acceptable, no change is necessary. If the 64 day-archive size is acceptable but you want a minimum of one year's data online, increase the number of archive files to (365 / 64 + 1) = 7 archives. If you want an archive to hold 90 days of data, increase it to (85 MB * 90 / 64) = 120 MB. At 90 days per archive, only 5 archives would be required for one year of online data. Note You cannot change the size of a fixed archive. Create new archives at the size that you want and retire the existing archives once you no longer need them.
96
Important Near the top of the list output, there is an estimated shift time. Do not attempt the following resizing procedure if the estimated shift time is in the near future. Allow at least 20 minutes for this procedure. Follow these steps to resize the two other files (piarch.001 and piarch.002): 1 2 3 4 Take the .002 archive offline: D:\PI\adm>piartool au D:\PI\dat\piarch.002 Continue to run the list command until the file is no longer listed: D:\PI\adm>piartool -al Delete the .002 archive: D:\PI\adm>del d:\PI\dat\piarch.002 Create a new .002 archive with the piarcreate command. The following example creates a new 150 Mbyte archive file size: D:\PI\adm>piarcreate d:\PI\dat\piarch.002 150 5 6 Register the archive so that it is an active archive: D:\PI\adm>piartoolar D:\PI\dat\piarch.002 Run the list command again to ensure that the new .002 file is back online with the new size (the Count value should be the number of Kbytes of the new file). Use Windows Explorer to ensure that it is the correct size. The list command is required to determine if the file is back online. Repeat the above steps for the other file that is not online. In this example, that is the .001 file. The two non-current files have been replaced. The active file cannot be deleted while it is active; so, you must force a shift to the next archive. The command is: D:\PI\adm>piartool-fs A message about the time it takes to complete the force shift request appears. A sample of this message follows. The actual file names and number of records will differ according to your system.
7 8
97
Attempting to force an archive shift... An archive shift has been initiated on the server. Completion time will vary from a few minutes to hours, depending on the machine and archive size. During this time the archive subsystem will be unavailable and the PI System should not be stopped until the shift is complete. The status of the shift can be found in the message log using pigetmsg. The current primary archive is d:\PI\dat\piarch.003 and the target archive for shift is d:\PI\dat\piarch.002 The current primary archive has 87040 records and the target archive for shift has 51200 records. The system generates a message to the messaging system. You can review the contents of this message and confirm the completion of the shift. From the adm directory, enter the command pigetmsg and enter a T to view the tail end of the message. Look for a message similar to the following: >> Archive d:\PI\dat\piarch.003 shifted successfully. New Primary Archive is d:\PI\dat\piarch.002 9 Now, you can repeat the above replacement steps for the archive that was originally active (In this example, archive 003).
10 Finally, make sure that all files appear as expected when you run the piartool al command. All archives should be online, in the correct directory, and of the same size. You can add the newer, larger archives using different file names and keep the older archives online until they are no longer needed. When they are no longer needed, you can take them offline and delete them.
98
Use the piartool utility with the ac (archive create) argument to add an archive. This call creates an archive that is the same size as the currently active archive and automatically registers it, making it easier to use than the piarcreate command. Archives can be added while the Legacy Historian system is running; so, there is no need to disable the Legacy Historian or stop its services. Repeat the following procedure as many times as necessary, changing only the file extension, until sufficient storage is created: 1 Log on to the PC running the Legacy Historian system and open a Command Prompt window: For Windows NT, click Start | Programs | Command Prompt. For Windows XP, click Start | All Programs | Accessories | Command Prompt. 2 Set the adm subdirectory under the PI installation directory to be the default directory. For example, if the Legacy Historian was installed on the D: drive in the PI directory, you would enter the following commands: C:\>D: D:\PI\adm>cd \PI\adm 3 Run the piartool program and supply the list argument al (AL): D:\PI\adm>piartool al Important Make sure that the predicted Shift Time, displayed near the top of the output, will not occur in the next few minutes. 4 For this example, it is assumed that the output of the piartool al command is identical to the output displayed earlier in this document. Therefore, the next archive to create will have a .004 extension: D:\PI\adm>piartool ac 5 6 7 8 As part of this function, you are prompted for the complete path to the new archive (for example, d:\pi\dat\piarch.004). Confirm this question by entering y. When asked if you want to initialize the start and end times, decline this question by entering n. When the archive name, Start Time, and End Time of "not specified" are presented for confirmation, confirm by entering y. The function completes with a message indicating that the archive will remain offline until the creation process is complete and that the Legacy Historian should not be stopped until the process is complete (It should complete in a few seconds). Use the pigetmsg utility to ensure that the archive is online: D:\PI\adm> pigetmsg 10 Enter a T to view the tail end of the message and look for the following string: >> Archive file d:\pi\dat\piarch.004 loaded. This indicates thatthe archive is active in the PI system. 11 Use piartool al to list the archives and show the new archive. 12 Repeat the above steps for all required archives.
99
Preliminary Steps
Before you can change the file permissions, you must disable the Legacy Historian and shut down the Legacy Historian system. 1 2 3 4 5 6 Open a Command Prompt window (select Start | Programs | Accessories | Command Prompt or select Start | Run and enter CMD). Set the drive and directory to the Legacy Historian administration directory (\PI\adm by default). Run pisrvstop.bat and wait until it completes. Follow the instructions in the following topic, which is entitled "Changing Data File Permissions." When the file permissions are changed, enable the Legacy Historian in DeltaV Explorer again. (If you are running DeltaV software version 7.2 or above, you can start the Legacy Historian by running pisrvstart.bat.) Download the Continuous Historian subsystem in DeltaV Explorer.
100
Since the Legacy Historian services are run as user SYSTEM, the goal is to create file permissions that allow SYSTEM full access and then limit other users as required. This procedure enables the following privileges and disables inheriting parent privileges: Full Access DeltaV Admins Read, Write, Special (This is the group for DeltaV Administrators.) DeltaV Read (This is the group for DeltaV Users.)
The executables that will be modified are piartool.exe, which is used to perform backup procedures, and piconfig.exe, which is used to configure the Legacy Historian system. This procedure turns off access to any user who is not an administrator. Attempting to run the program without privileges results in an Access Denied message. The following procedure applies to default installations where the 3 default archives are in the PI\DAT directory. If yours is not a default installation, run PIARTOOL -AL to identify the location of the registered archives and then modify them. 1 2 3 4 5 Start Windows Explorer. Navigate to the data directory (\PI\dat by default) on the disk drive on which the Legacy Historian was installed. Select all of the archive files (piarch.00x). By default, there are 3 piarch files, although an implementation may have been modified to include additional archives. Right-click one of the selected files and select Properties. In the Properties dialog, select the Security tab and refer to the following specific instructions for either Windows XP or Windows NT.
2 3 4 5 6 7 8 9
10 Click the Find Now button and select DeltaV as the group for DeltaV users. 11 Click OK and select the Read check boxes to give read privileges to DeltaV users. 12 Repeat step 10 and add DeltaV Admins as the group for DeltaV Administrators.
101
13 Click OK and select the Read and Write check boxes. Then, click the Advanced button and click the Edit button for the Administrator users. In each case, select both the Change Permissions and Take Ownership check boxes to give any DeltaV Administrator sufficient privileges to read, write, and modify files. 14 Continue to click OK in all of the dialogs until the Windows Explorer application is active.
10 Click OK to return to the File Permissions dialog. 11 From the File Permissions dialog, double-click DeltaV Admins. A new dialog is displayed with each selectable privilege. Select the bottom two check boxes, Change Permissions and Take Ownership. 12 Continue to click OK until the Windows Explorer is active. 13 Repeat these steps to provide the DeltaV Admins group full privileges to the piartool.exe and piconfig.exe files in \PI\adm and remove all other privileges from those files.
102
Version Control
This book contains information on using version control in DeltaV software.
Version Control
Inside this topic Setting up and Disabling Version Control Setting Version Control Preferences Version Control Functions and Locks DeltaV Version Control (VCAT) helps you manage configuration and user security changes by retaining previous versions of the configuration and security items. Version Control enables you to see who made changes and the reason given for any changes made. It allows you to restore previous versions of items or entire databases, to archive Version Control databases, restore archives, and clean up the database after restoring items. When enabled, Version Control affects all of the configuration items that you add, edit, or delete using DeltaV Explorer, Control Studio, Recipe Studio, I/O Configuration, and System Alarm Management (SAM), and all of the security items that you add, edit, or delete using DeltaV User Manager. In addition, you can enable Version Control for DeltaV Displays. Version Control for DeltaV Displays requires DeltaV Version Control be enabled. That is, Version Control for DeltaV Displays cannot be enabled alone. Setting up, enabling and disabling, preferences, and the functions and locks options that are set for DeltaV Version Control apply to Version Control for DeltaV Displays. No additional configuration is required. However, there are some behavioral differences between Version Control's management of configuration items and its management of graphic and schedule files. Refer to Version Control for DeltaV Displays for more information. When you enable Version Control, the DeltaV system creates a Version Control database and populates it with the items in your current configuration database. Once you have established the Version Control database and Version Control is enabled, you can see configuration changes by comparing versions of items in the Version Control database with the items in the configuration database. The version control database name is based on the configuration database name. After enabling Version Control, you can set your Version Control preferences using DeltaV Explorer.
Version Control
103
The following items are not tracked in the Version Control database. Changes to transducer and resource blocks in commissioned fieldbus devices. These changes are tracked through Device Audit Trail Changes to decommissioned fieldbus devices, including their resource and transducer blocks. These changes are tracked through Device Audit Trail Imported items from third-party sources (for example, fieldbus revisions in the library) Licenses
104
to create an audit trail for security items. Refer to the Checking Items In and Out topic for more information on check in and check out: Manual or Prompt user for Checkout - Prompts users to check out affected items before changes can be saved and prevents user edits of an item in Control Studio or Recipe Studio unless the user clicks a Check Out command to check out the item. This is the default preference. Auto Check Out - Automatically checks out any item that you edit or open. After saving an item, you must also check in the item for the change to be added to the Version Control database. Auto Check Out and In - Automatically checks out any item that you edit or open. Automatically checks in items when you close them if they were automatically checked out. The system also automatically checks in displays that were checked out manually.
Note When Auto Check Out or Auto Check Out and In are enabled, opening and saving configuration items typically takes longer than it would without one of these preferences selected.
Refer to the DeltaV Locks topic for information on the relationship between these functions and DeltaV locks.
Version Control
105
A red check indicates that the item is checked out by the current user. A blue check indicates that the item is checked out by another user. Only one person at a time can have an item checked out. After you have finished editing an item, you can save the item as you normally would. Saving the item changes the item in the configuration database. To update the item in the Version Control database, you must check it in. Check in retrieves a copy of the item from the configuration database and places it in the Version Control database as a new version. Additionally, the configuration item then becomes read-only again (the item can always be viewed by any user, and its data can be accessed whether it is checked out or not). The Version Control database stores all the changes that have been made to the item. The most recent copy is always available from Version Control. You can also restore or roll back to previous versions of the item. If you have not made any changes to the file or you do not want your changes checked in, you can select Undo Checkout. Undoing the checkout of an item restores it to the way it was before you checked it out. If there are no changes made to a checked out item, the Check in command does the equivalent of the Undo Checkout command. You can also check out recursively. This means that you can select an item in DeltaV Explorer and specify that you want to check it out along with all of its subordinate items in the hierarchy. You can also check in recursively. Note Recursive checkins and checkouts can take considerably longer than checkins or checkouts of single items because the system is performing the checkin or checkout operation on multiple items. You can cancel recursive operations. Refer to the Version Control Messages topic for more information about canceling operations. Recursive operations do not affect assignments. For example, if you check out a controller with assigned modules, the modules are not affected because they are simply referenced to the controller.
106
Whenever you check in an item, you have an opportunity to add a comment related to the item. Users can go back to the history for this item and see your description of the changes. Use comments that will help you and other users understand the nature and reasons for changes. When you add a configuration item, Version Control adds the item to the database and checks it out. You must eventually check in the item. Finally, if you want to update an item periodically but you want to keep the item checked out, use the Keep checked out command.
You can use the Cancel button to stop long operations such as recursive check ins. Canceling an operation interrupts it at the point at which you click the button. Any portion of the operation that has already occurred is not undone by clicking the Cancel button. Click the minimize (-) button to hide the message dialog. When you perform an action that affects the Version Control database, the message window pops up automatically. Right-click the Control menu (the application icon in the upper-left corner) to define other behaviors of the box: Always on Top - places the message dialog on top of all other windows so that it is always visible Keep Minimized - keeps the message dialog minimized even during Version Control operations Auto Minimize - minimizes the message dialog when you select another window
Version Control
107
Item History
The software allows you to select an item and see a history of all versions of the item. The following figure is an example of a configuration item's history.
This dialog enables you to select an item and then select one of the following operations: Rollback - Replaces the current version of the item in the configuration database with the selected version. Note that Rollback does not affect downloaded modules or physical devices in the field. Rollback only modifies the configuration database. For example, when you roll back to an earlier version of a module, the module does not change the module in its assigned controller. You must download the controller in order for the changes to take effect in the controller. Another example is a situation you have commissioned fieldbus device and you roll back to a previous, decommissioned version of the device. The device is not decommissioned by the rollback. Differences - When you select two items in the list, this button shows the differences textually or graphically between the two selected versions in the Version Control database. When you select a single item, this button shows the differences between the version of the item you select from the list and the item in the configuration database. Details - Displays comments associated with an event, along with more detailed event information, such as label information, version information, check-out comments, and so on View - Displays the item graphically or textually as appropriate Print - Prints the selection
Item Differences
DeltaV software enables you to view differences between two versions of an item. There are several ways to display differences. For example, you can use the Differences menu, which is accessible from the Version Control menu or you can use the History dialog. The system displays the differences as either text or graphics, depending on the item. For example, to see the differences between an item open in Control Studio and a different version in the Version Control database, click Tools | Version Control | Show Differences. For graphics, the system displays a diagram view containing a combination of all the elements in the two configuration items. The most current version appears on top by default. The view shows the unchanged items in gray, added items in green, changed items in red, and deleted items in blue.
108
The difference display enables you to Transpose the display. This places the older version on top. Note that Added elements such as function blocks (those that appeared in green when the newer version of the item was on top), will be highlighted in blue when the older item is on top. Strictly speaking, these items have not been deleted. However when the system compares the two versions, it recognizes that this item is absent from the older version and highlights the item in blue.
Version Control
109
this change to the history because the value is no longer derived from the class. The differences viewed from history would look similar to the following:
110
L_TYPE now has an override value because it is not derived from the class. A subsequent change to the override value of L_TYPE would look similar to the following:
Version Control
111
If the value of L_TYPE is reset using the Use default value from library object, the history for L_TYPE is deleted for the instance. The L_TYPE parameter itself has not been deleted from the instance, but the value is now derived from the library default rather than from an override in the instance.
When a parameter is actually deleted from a class or composite block, VCAT history indicates this in the same way. To determine if the deleted information is the result of reverting to a library value or a deletion of a parameter in the class or linked composite, you must look at the history for the class or linked composite rather than the instance.
112
has been added to the module. This is because the history is documenting the override of a value in the library definition for the PID block. The following graphic shows how the change is displayed.
Version Control
113
When you make additional changes to GAIN, these values appear as side-by-side changes since the parameter already exists in the previous checked in version.
114
When a parameter value is reset to its default value the parameter appears to have been deleted from the module since the parameter once again obtains its value from the library definition. This occurs when you import the module or perform a Version Control rollback or recovery and the value matches the value in the library.
Recover/Purge
When you delete an item from the configuration database, the item is no longer visible in through the Version Control history. However, deleting an item does not remove it from the Version Control database. You can restore deleted items using the Recover Purge command. To recover an item, select its container item (the item one level higher than the item you want to recover) and click Tools | Version Control | Recover/Purge. From the Recover - Purge dialog, select the item you want to restore and then click Recover. To remove an item from the Version Control database permanently, select the item and then click Purge.
Version Control
115
In addition to these two types of labels, DeltaV software automatically labels all of the initial configuration items in the configuration database when you enable Version Control.
User-Created Labels
The Version Control database enables you to mark either an entire configuration or a specific configuration for later reference or use. This mark is called a label. For example, you might want to label a configuration prior to a significant change or a shutdown. The label can be attached to all the configuration items, which makes it easy to restore that configuration at a later date using DeltaV Explorer. Refer to the DeltaV Explorer help for more information.
Download Labels
The system labels downloaded configuration items. For example, when a module is downloaded to the controller, a download label is added to the module. This allows you to track which configuration version is currently in the controller as well as which configuration version was in the controller on a given date.
History Report
The History Report command allows you to query the configuration database. The query lets you specify the time frame of the changes during which the changes were made as well as the user who made the changes. You can also specify a recursive query. A recursive query searches the selected item as well as its subordinate items.
116
Synchronize Databases
The Synchronize Database tool in the Database Administrator application ensures that the latest configuration items in the Version Control database are identical to those in the configuration database. More specifically, the Synchronize Databases tool does the following: deletes items from the Version Control database that have never existed in the configuration database creates items not found in the Version Control database that exist in the configuration database synchronizes the checked out state of the items, if necessary compares items' data. If items are different, the Synchronize tool creates a new version from the configuration database. labels the synchronized version of the configuration in Version Control database
Version Control
117
DeltaV Database Administrator application to ensure that the latest configuration items in the Version Control database are identical to those in the configuration database. Follow these instructions to back up the Version Control database with the SQL Server Enterprise Manager: 1 2 3 4 Log in to the ProfessionalPLUS workstation as a DeltaV Administrator and as the Windows administrator. Close all the DeltaV applications. Use the SQL Server Enterprise Manager database backup utility. Documentation for this utility is available in the SQL Server Books On Line. The Version Control database is named VCAT_databasename. Restore database using the SQL Server Enterprise Manager.
Note Backing up the Version Control (VCAT) database to a destination drive that is not the SQL database's drive requires the MSSQLServer and SQLAgent services to have access to the destination machine to perform the backup. In this case, the service accounts must be modified with the Service Control Manager. The accounts must be changed from the default of SYSTEM to a Windows account that has access to (permissions on) the destination machine (which must have a share) and is in the Administrators group on the DeltaV machine. An example of such an account would be the DeltaVAdmin account if the destination machine is running DeltaV software or if the destination machine has granted DeltaVAdmin access to the resource. Refer to Modify SQL Services Logon for more information.
118
DeltaV Database Administrator and double-click the Version Control Archive Database icon to open the Version Control Archive Database dialog.
Version Control Archive Database Icon You have the options of archiving an entire Version Control database or only the display items such as graphics in a Version Control database and you can archive by date or by version. You can type in or browse to a valid location on the network to store the archive file. If you are typing in a path to a remote location, be sure to use the UNC path (\\Servername\Sharename\Directory\Filename).
Version Control
119
Tips: Be sure to keep track of the archive filename and location. You will need to provide this information later if you decide to restore the archive. Also, it is recommended that you backup the Version Control database prior to archiving it. Depending upon the size of your Version Control database, it could take several hours to create the archive.
120
Control database. When a single item is selected for restore, all versions of the item in the archive are restored. The Version Control Restore Database application is accessed from the DeltaV Database Administrator application.
Version Control Restore Database Icon in Database Administrator Double-click the Version Control Restore Database icon to open the Select Archive to Restore to Version Control Database dialog and type in or browse to the archive file to be restored. If you are typing in a path to a remote location, be sure to use the UNC path (\\Servername\Sharename\Directory\Filename). Archive files have a .ZIP extension.
After entering the archive file name, click OK to open the Restore Archived Items to Version Control Database.
Version Control
121
Restore Archived Items to Version Control Database Select the item(s) to be restored from the Available items list. To select an item, place the cursor in the grey box to the left of the item name and click the left mouse button. Use the Add, Remove, Add All, and Remove All buttons to move the items between the Available items and Selected items lists. When you have selected all the items that you want to restore, click the Restore button. The items in the Selected items list are restored to the current Version Control database. Restoring an archived item restores the data of all versions of that item. Restored items can be cleaned from the Version Control database.
122
Double-click the Version Control CleanUp Database icon to open the CleanUp Version Control Database dialog.
CleanUp Version Control Database Dialog Select the item(s) to be removed from the Items that have been restored list. To select an item, place the cursor in the grey box to the left of the item name and click the left mouse button. Use the Add, Remove, Add All, and Remove All buttons to move the items between the lists. Click the Cleanup button to remove all the items in the Selected items to clean up list from the current Version Control database. It is possible to clean a single restored item, multiple restored items, or all restored items.
Version Control
123
Version Control Error Conditions Error Error validating Version Control database schema. The Version Control database schema .9 does not match the code set schema 1.0. [Microsoft][ODBC SQL Server Driver][Named Pipes] Specified SQL server not found. Cause Either the Version Control database is from a different DeltaV software version or the DeltaV software did not create the Version Control database correctly. Either the MS SQL server is not running on the ProfessionalPLUS machine or it is not correctly installed on the ProfessionalPLUS machine. Corrective Actions Contact Customer Support.
If the MS SQL Server is not running, perform the following steps: 1. Using the SQL Server Service Manager, start the server on the ProfessionalPLUS machine. 2. If the server fails to start, take corrective action based on the error returned. If MS SQL Server 2000 is not installed, reinstall SQL Server on the ProfessionalPLUS station by running the Workstation Configuration application and installing the VCAT option.
124
Error [Microsoft][ODBC SQL Server Driver][SQL Server] Device activation error. The physical file name [File Name] may be incorrect.
Cause Either the Version Control database is on an unavailable disk (that is, one that is not mounted), the files have been deleted, or the files have been moved to another location.
Corrective Actions If the disk is unavailable, perform the following steps: 1. Take corrective action to make the disk available. 2. Stop and restart the MS SQL Manager using the MS SQL Server Service Manager. 3. Use the SQL Enterprise manager to verify that the database in question is no longer marked as suspect (gray icon). If the files have been deleted or moved to another location, perform the following steps: 1. Restore the Version Control database from backup or move back using Windows Explorer. 2. Stop and restart the MS SQL Manager using the MS SQL Server Service Manager. 3. Use SQL Enterprise manager to verify that the database in question is no longer marked as suspect (gray icon). If the database is marked as suspect and exists from a previous installation of DeltaV software that has been removed from the system, use SQL Enterprise Manager to delete the database.
Version Control
125
Error [Microsoft][ODBC SQL Server Driver][SQL Server] Cannot open database requested in login VCAT_fdb. Login fails.
Cause The Version Control database has been removed from the SQL Server.
Corrective Actions Perform one of the following: - Use the DbAdmin Backup/Restore tool to restore the configuration and Version Control database. or - Open the SQL Enterprise Manager, select Databases, and right-click Restore Database. or - Disable and then enable Version Control using Database Administrator. Note that all previous Version Control history will be lost.
The SQL data files may have limited free space and failed to automatically grow before the timeout period. The SQL Server is not in a paused state on the ProfessionalPLUS machine.
Refer to Increasing the Space Allocated for Version Control Data Files for information on checking free space and resizing the data files. Start the MS SQL Manager using the MS SQL Server Service Manager.
[Microsoft][ODBC SQL Server Driver][SQL Server] SQL Server has been paused. No new connections will be allowed. Failed to back-up Version Control's SQL database Note The configuration database will have been backed up, but the VCAT database will have failed to be backed up.
To read the specific error and determine the cause of the restriction, locate the file: SQL_Results.txt in the DeltaV\DVData\VCAT_Databas es folder. Also review the SQL error log for clarification of the error, if needed. The file is located on the same machine as the ProfessionalPLUS in the MSSQL2K\MSSQL\LOG folder and is named ERRORLOG. You can also access this through SQL Enterprise Manager.
If the cause in the ERRORLOG is access denied, then MSSQL Server's access to the destination machine (where the backup is being written) is restricted. Refer to the Modify SQL Services Logon and Backup/Restore topics for more information.
126
Version Control
127
Operate in all the workstations to update the system tree. It is the initialization process that populates the DeltaV Operate system tree. You must use DeltaV Explorer to check the files in to VCAT unless Auto CheckIn/Out is enabled. When using Version Control for DeltaV Operate, do not enable Remote Desktop. DeltaV Operate will warn you that it is enabled and only open in run mode, where you cannot edit or create any graphics. Refer to the DeltaV Remote Client topic for more information on enabling/disabling Terminal Services. When disabling VCAT for DeltaV Operate Displays, you must download the ProfessionalPLUS and all workstations. This sends the new setting (of disabled) to all the workstations. When VCAT for DeltaV Operate Displays is enabled, a copy of all the graphics files (.GRF, .PDS and .EVS) are stored in the DeltaV configuration database. If VCAT for DeltaV Operate Displays is subsequently disabled, the graphic files remain in the database as a copy that cannot be accessed. However, those files will make the database (and any export of the full database) substantially larger than without the files. When importing an FHX file that contains displays, you will see the displays listed in the import log even if VCAT for displays is not enabled on the current database.
128
When viewing these files in DeltaV Operate, the system tree shows the following organization of files.
When viewing these files in DeltaV Explorer, the system tree shows the following organization of files. All Schedules are in the PDB folder. The Dynamo sets (.fds) are found at the root of the PIC folder in DeltaV Explorer. All other
Version Control
129
files are in the same structure as found in DeltaV Operate, that is, under the PIC folder (which is named Pictures in DeltaV Operate).
Important Do not move, copy, create or in any way manage these files using any Windows application, such as Windows Explorer. DeltaV Operate and VCAT will not respond correctly to such changes.
130
Version Control
131
being checked out. The logged in user must have the VC_DOWNLOAD_CHECKEDOUT key to select this option. Refer to Version Control Functions and Locks topic for more information. Important: You must download the ProfessionalPLUS and all workstations after enabling or disabling Version Control.
132
Version Control
133
134
Version Control
135
3 4 5
With the database name selected, right-click and select View. Select the Taskpad view if it is not already selected. Review the space allocated to vcat_data, vcat_data2 and vcat_data3. If any of these data files have less than 10% free space, click the data file name.
Enter a file size twice the original size shown in the Space allocated column.
7 8
136
Auto-Logon/Logoff
Note Most screen savers are not compatible with the DeltaV system. For this reason, Emerson Process Management recommends that you either use only the DeltaV screen saver or do not use a screen saver at all. The DeltaV screen saver can be used to log the current user off of the DeltaV system automatically when an idle timeout occurs. It can also be used to log a user on automatically. Each workstation must be configured separately for the DeltaV screen saver. Instructions for setting up the DeltaV screen saver for auto-logoff and/or auto-logon are detailed in the two subsequent topics. Auto-Logon You can log on a different user automatically after an idle timeout logs off the current DeltaV user. The account being logged on automatically should be set up so that the user that is automatically logged on can see the alarms for areas assigned to the workstation but cannot change anything in the system. This involves creating and configuring a user account, granting a key to the user, and setting the DeltaV screen saver for Auto-Logon.
137
To use the DeltaV screen saver for Auto-Logon: 1 2 3 4 5 6 7 8 Create a new user in DeltaV User Manager. Assign only one of the keys that has no function security associated with it (function security is assigned in DeltaV Explorer -- by default, none of the User Locks have associated function security). Close DeltaV User Manager and download the workstations' setup data. Select Start | Settings | Control Panel. Double-click the Display icon. Click the Screen Saver tab. From the Screen Saver drop-down list, select DeltaV Screen Saver. Make sure that the Password Protection box is not checked.
Note Do not use the password protected option. If you need a Windows account password to protect access, do not use the DeltaV Screen Saver for idle timeout. 9 Click Settings.
10 Make sure the Log Off User check box is unchecked. 11 If desired, enter the local machine name in the Computer textbox. 12 Enter the newly created DeltaV user and password in the User and Password textboxes. Select OK in the current dialog and again in the next one. 13 Close Control Panel. Auto-Logoff If you want the current user to be logged off the DeltaV system automatically when an idle timeout occurs, you must configure each workstation to use the DeltaV screen saver. This will not affect the Windows Login. 1 2 3 4 5 Select Start | Settings | Control Panel. Double-click the Display icon. Click the Screen Saver tab. From the Screen Saver drop-down list, select DeltaV Screen Saver. Make sure that the Password Protected box is not checked.
Note Do not use the Password protected option. If you need a Windows account password to protect access, do not use the DeltaV screen saver for idle timeout. 6 7 8 9 Click Settings. Select the Log Off User check box. Select OK in the current dialog and again in the next one. Close Control Panel.
138
workstation drops below 400 Mbytes and Warning when it drops below 200 Mbytes. The alarm priority can be increased depending upon your needs. In the DeltaV Diagnostics application, the FreeDisk parameter on the ProfessionalPLUS workstation shows the amount of free space (in megabytes) on the disk.
Disk Check
Perform a disk check whenever Windows shuts down abruptly (without using the normal shutdown procedures). Use the following steps: 1 2 Start the Windows Explorer by selecting Start | Programs | Accessories | Windows Explorer. Select the disk (s) where the DeltaV software and database reside. (If the software and database reside on two disks, perform these steps separately for each disk.) Click the right mouse button and then click Properties. The Local Disk Properties dialog appears.
139
Click the Tools tab. Then, click Check Now in the Error-checking pane.
6 7
A system message appears stating that you cannot get exclusive access to the disk and asking if you want to perform error-checking restart. Click Yes. Restart the computer. This runs the disk check.
140
Running Chkdsk
To aid in Windows, file system, or hard drive failure prevention or early warning, it is recommended that you run Chkdsk periodically and reinstall the supported service pack each time a software change is made to the system. Chkdsk is Windows' built-in file system error detection and repair utility. Running it scans the physical drive surface, checks each file, and looks for problems on the hard drive. Run Chkdsk periodically to safeguard against data loss. Running Chkdsk includes restarting a Windows workstation. Before performing this procedure, make sure of the following: All DeltaV applications on the workstation are closed. Your process is either properly shut down or being controlled by another node. You have adequate time to complete the procedure. If you are performing this procedure on a ProfessionalPLUS workstation, close all of the DeltaV Engineering Tools on all workstations on your DeltaV network.
If you are unsure about any of the above requirements, call Technical Support. To run Chkdsk, perform the following procedure: 1 2 Click Start | Programs | Command Prompt. From the command prompt, enter the following: CHKDSK c: /f /rA message appears stating that Chkdsk will run the next time that the system is restarted. 3 4 5 6 7 8 9 Restart the workstation. Upon restart, during the blue screen portion of the process, Chkdsk will run. Chkdsk can take five minutes or longer if problems are found on the drive. Once you are finished, log on to Windows. Click Start | Programs | Administrative Tools | Event Viewer. If the top line of the Event Viewer windows does not read, "Event Viewer - Application Log on \\computer name", click Log | Application. An entry labeled Autochk appears in the log that correlates to the last boot process. Double-click the entry to view the results of the Chkdsk. If no errors are reported in the log, you are finished. If errors are reported in the log, perform this process again. 10 If an error occurs the second time you run Chkdsk, you might have a hard drive media problem. Call Technical Support immediately. If no errors occur the second time you run Chkdsk, Chkdsk has successfully corrected any problems it found.
141
To install a service pack, browse to the Service Pack directory on DeltaV disk 1. There are service packs for dotNET servers and for workstations. Install the appropriate service pack.
Note The Emergency Repair Disk does not create a system backup or a DeltaV backup. Do not use the Repair Disk utility in place of a backup tool. Online Windows documentation steps you through the creation of an ERD. To view these instructions, click Start | Help and enter ERD under the Find or Index tab.
142
historical data archives. Refer to the System Configuration manual for more information. batch historian data. Refer to the Backing Up the Batch Historian Data topic for more information.
Perform a backup for any data that you change. Back up daily until you are no longer changing the data. Store several of the most recent backups in a safe location free from environmental hazards (such as extreme heat, extreme cold, dust, or magnetic devices, including speaker phones). Refer to the DeltaV Administrator Tools Backup and Restore function for more information on backing up and restoring your DeltaV System. Caution If you do not back up the control configuration, operator displays, and historical configuration on a regular basis, you do not have the resources to restore the DeltaV system to its previous state.
If time stamps are not correct after completing these steps it may be necessary to restart the workstation.
143
Software
This book contains information on managing DeltaV Software.
Installation Checklist
Verify the following: Objectivity services and DeltaV programs are not running. Disk size requirements: Based on the requirements listed in the Release Notes for the version of software being installed. Temp storage in your temp directory: 18 MB for redundant configuration or for simplex configuration RAM based on the requirements listed in the Release Notes. Default paging file size based on the requirements listed in the Release Notes. Memory:
Network cards:
Operating System: Windows XP. Required service packs (if any) are documented in the release news. Authority: You must be logged on under the name Administrator on the target machine.
Note It is recommended that you use the Typical2 installation, which places DVData on the D drive.
Installation
Insert the DeltaV CD and follow the Install wizard. This uninstalls the current version and reinstalls the DeltaV software.
Software Updates
DeltaV software updates are automatically distributed on CD-ROM media to Foundation Support and Guardian Support Plan subscribers. Updates are also available for purchase by customers who decline these plans.
144
To purchase a license for added product functionality, contact your local Emerson Process Management service office or representative.
Software
145
Refer to the DeltaV Controller and I/O Upgrade Utility's online help for more information on upgrading H1 fieldbus devices.
Software Additions
Contact your local Emerson Process Management service office or representative to order software additions to the system. The system identification number is required to place an order. Software additions are automatically added to the existing Foundation Support and Guardian Support plans and taken into account when determining the Foundation Support and Guardian Support plan renewal fees.
Excel loads the add-in, and a floating toolbar appears in the upper left corner of the worksheet. You can move this floating toolbar (for example, to the Excel toolbar). Note If the DeltaV add-in is loaded when Excel is shut down, it is still loaded when Excel is started again.
146
DeltaV Diagnostics
Use DeltaV Diagnostics as a starting point to diagnose nodes (controllers and workstations) and subsystems in your DeltaV System. You can view diagnostic information any time after configuring nodes and placing devices on the control network and downloading the workstation. You can access DeltaV Diagnostics locally from your workstation or remotely using a dial-in modem and standard, off-the-shelf, remote access software. Click Start | DeltaV | Operator | Diagnostics to launch the Diagnostics program.
With DeltaV Diagnostics, you can perform the following tasks: Display overall status and detailed integrity information for any node and subsystem in the DeltaV control network View diagnostic parameters for nodes and subsystems Display communication information for controllers and workstations and detailed statistics on I/O cards and devices Launch the Process History View program in context with a selected item to display process events for that item Diagnose most problems on a remote network from a workstation on the control network and diagnose all problems on a remote workstation from the remote workstation
DeltaV Diagnostics has the same look and feel as the DeltaV Explorer. The left pane shows the hierarchy of nodes and subsystems in the control network. Typically, workstations have communications, assigned modules, alarms and
147
events, continuous historian, OPC, and remote network subsystems and controllers have communications, I/O, and assigned modules subsystems. Devices are below the I/O subsystem.
To explore the contents of a node or subsystem, click the plus sign next to it to expand the contents. To see diagnostic information for a node or subsystem, select the node or subsystem, and view the diagnostic information for the selection in the right pane. To change how the diagnostic information is presented, experiment with the different views: List, Details, Comparison, and Verbose. In this figure, diagnostic information for the Primary communications subsystem of the workstation node USAUST-DOVETAIL is displayed.
148
Four indicators are used to show the status of nodes and subsystems. These indicators appear at the top level in the hierarchy as well as at the specific node or subsystem:
Indicates the node is not communicating. Typically this indicator occurs when there is a bad connection or if the node is not powered up or is decommissioned. Indicates that Diagnostics does not have all the information on the node. For example if an unconfigured I/O card is pulled, this indicator appears. Indicates the node is communicating but has an integrity problem. Integrity problems can occur for a variety of conditions including hardware or connection problems, a mismatch between the I/O configuration and the installed I/O, or if the node is configured for redundancy but does not have the necessary connections to support redundancy. Indicates the node has lost its configuration or the configuration is not downloaded. A node can lose its configuration if it loses power or is reset. Refer to the online help for complete information on using DeltaV Diagnostics.
149
Database Administrator Control Panel Window The Database Administrator contains tools for managing your DeltaV databases. These tools include: Create Database - Creates a persistent database that is used primarily to store configuration information Delete Database - Deletes a database Copy Database - Copies an existing database Rename Database - Renames a database Synchronize Workstations - Specifies the active database in the registries of other workstations in the system Backup and Restore - Backs up a database and restores a backup version of a database (into the current active database) Set Server Host - Specifies the workstation on which the DeltaV Database Server resides. This setting is used by the database administrator tools in those dialogs that provide a list of registered databases on a workstation (such as delete, copy, move, monitor, backup, and set active database) Set Active Database - Specifies the database to be used as the active database Register Database from Files - Registers (and deregisters) the database on the database host Clean Database - Rolls back transactions that have terminated abnormally Extended Clean - Consolidates and defragments the selected database in addition to rolling back transactions that have terminated abnormally Database Connections - Displays the active database connections Daily Export Enable or Disable - Provides the configuration and enabling (or disabling) of a daily export of the DeltaV database Migrate Database - Migrates an older version of the DeltaV database to the current version. Used specifically after upgrading DeltaV software.
150
Each of these functions is described individually in its own section. These functions are the most basic database functions but are not necessarily the most frequently accessed functions. Caution Never use Windows Explorer to copy, move, create or delete a database. Always use the Database Administrator Tools. Access to the correct database could be compromised if you use Windows Explorer.
Create
You would create multiple databases for a number of reasons. Here are a few examples: to modify the default control strategy to be your control strategy on the initial configuration of the DeltaV system to have one database as a production database and one as the simulation database to create a database for the addition of a new area of the plant that is identical to a current configuration and on the same DeltaV system (for example, a new node on your current control network) to create a new database for a second DeltaV system that is separate from your current system, but has the same control strategy (for example, a second control network)
Creating a new database does not create any new configuration, control, or device details. The DeltaV system takes the original (reference) database and makes a copy of it to create the new database. It does not change the original (reference) database. Note You can populate the new database with your current physical network configuration by selecting the option, Preserve the Network Definition when creating a new database. When you choose this option you then can choose whether to use the current active database or an existing export file. Depending on your configuration this option may cause some non-network database objects to be preserved. You can also use Create to restore a backed up database as a new database. Restoring a database does not overwrite an existing database. Instead, you have a new database (restored from the backup) with all the configuration and control data of the backed up (original) database.
151
The process of creating a new database automatically registers the database name in that computer's registry. Windows uses the convention called a registry to track all programs and hardware on or attached to the computer and their respective settings. The DeltaV system also uses the convention of the registry to track settings for the DeltaV databases, hardware and applications. In order to use a newly created database as your control strategy on your DeltaV network, perform the following steps: 1 2 3 Define all of the existing nodes on your DeltaV control network in the newly created database. Set the new database as Active from your master node using the Set Active Database tool. Make sure that all of the nodes are powered on.
If you are having problems with the database not showing up as a choice in your DeltaV Explorer or in Set Active Database, you must manually register the database with the Register Database from Files tool from the master node.
Delete
There are times when you might need to delete a database. Here are some examples of times when deleting a database is recommended: The database was a simulation database that you no longer want to have on the system. The control strategy that the database defines is no longer being utilized due to plant reorganization or other reasons. The database is no longer usable due to internal problems and cannot be repaired and you have already restored a good backup. You have a backup of an old (that is, no longer used) database on the system.
Deleting a database removes the data files (including all configuration information) from the computer's hard drive. The files are deleted from the \\DeltaV\DVData\Databases\DatabaseName folder (where DatabaseName is the folder name of the database you are deleting). Once the database is deleted, the DeltaV nodes (workstations and controllers) that are defined in that database are no longer recognized. Note You must be logged on as the Windows user Administrator to delete a database. The delete action automatically deregisters the database from the DeltaV system. The other workstations are no longer able to access that database. If, after deleting a database, you continue to see the database name as a choice in your DeltaV Explorer (or in the Set Active Database tool), then you need to deregister the database manually. You manually deregister a database with the Register Database tool.
Rename
When you rename a database, you are changing the physical location of where that database resides. The files that are moved are found in \\DeltaV\DVData\Databases\DatabaseName (where DatabaseName is the folder name of the database you are renaming). Note You can only rename a database if you are logged on to the computer as the Windows user Administrator. Renaming a database makes the old name invalid, so you must select the active database with its new name. Use the Set Active Database tool to set the new database name as the active database.
152
There are a number of reasons when it is necessary to rename a database (for example, to change the name of a database to better describe the functions or plant area that is controlled with the database).
Copy
To copy a database means to make a duplicate of an existing database. In order to copy the database, you must choose a different name for the copy. When you copy a database, you are copying the files found in \\DeltaV\DVData\Database\DatabaseName (where DatabaseName is the folder name of the database you are copying). Here are some rules for making copies of a database: You cannot make a copy of a database with the same name as the original. Copy does not overwrite existing databases.
Here are some reasons why you might make a copy of a database: Use a copied database to put a new area online that is an identical process and will be controlled through the same DeltaV controllers Use a copied database to set up a simulated change. This allows you to test the new machines and controllers in a simulated environment without affecting the real-time data and plant controls.
The Copy tool automatically registers the database in the DeltaV system. If you are having problems with accessing the database: it is not showing up as a choice in your DeltaV Explorer or in Set Active Database, then you need to manually register it. Use the Register Database tool to manually register the new copy. You might need to set the new copy as active if you plan on using the copy as the primary database.
Utility Functions
The Database Administrator tools fall under 3 groups: Basic, Utility, and Configuration. This section describes the Utility tools. The Utility tools include: Clean Database Database Connections Backup and Restore Synchronize Nodes Daily Export Migrate Database
The Utility tools are used only as needed to correct problems with the database. You might use some of the Utility tools more frequently than others.
153
Note If your workstation does get powered off without exiting all applications and Windows first, use the Database Administrator tools to correct any problems with the DeltaV databases.
Lock Server
Note The Lock Server is not a Database Administrator tool. It is an Objectivity program that is used by the DeltaV system. The Lock Server is an Objectivity control for assigning locks on transactions and applications. This function is designed to track which workstation or node is currently in control of the data. Locking out other workstations and nodes keeps multiple workstations from making changes to the same data at the same time. This ensures data integrity in your database. Transaction locks are applied when a node accesses the database and effects a change on that database. Application locks is applied when a node has the application in use. At startup, the Database Server reads what the Lock Server is doing to determine if any locks are currently applied to a transaction or application. These locks are different than the DeltaV security locks. The Lock Server locks are specific to database functions and are not related to user access and security. The Database Server attempts to clear any locks it detects at startup. The DeltaV Monitor tools require that the Objectivity Lock Server be properly configured and running. You can verify the correct version and setup of the Lock Server in Control Panel | Objectivity | Lock Server. Note The Lock Server should reside on the host machine along with the Federated database (configdb.hdb.FDB), the Boot file related to the Federated database (configdb.hdb) and the data files that make up the DeltaV control database. This is the default download. A transaction lock occurs when a node accesses the database and effects a change on that database. A change on the database can be any update, node removals, device configuration changes, addition of a control loop, or other configuration changes. While that change is occurring the Objectivity Lock Server applies a lock on the data until that transaction is complete. No other node can change the data at this time. Other nodes can utilize (read) the data, but not change (write) it. This is called MROW - Multiple Reads One Write. If the system is interrupted (for example, powered off) before the transaction is complete, then the transaction lock remains but is not attached to a specific node. This results in an invalid (unfinished) transaction lock. An application lock is applied when a node has the application in use. This prevents other nodes from accessing that application and making simultaneous changes through the application. Locking an application ensures configuration
154
integrity. When that node (workstation or device) is finished with the application, the lock is released and other nodes can now use the application. An application lock is invalid when any part of the system (node or host computer) is interrupted before the lock is cleared. The lock remains even though the node is no longer using the application. This prevents other nodes from accessing the same application.
Clean Database
The Database Administrator tools have a Clean and Extended Clean utility. Use the Clean utility to rollback transactions that have terminated abnormally. Use the Extended Clean command to consolidate and defragment a DeltaV database in addition to rolling back transactions that have terminated abnormally. These utilities recover disk space that is no longer needed in the database files.
Database Connections
The Database Administrators tools have a Database Connections utility. Use this utility to display the active database connections. This utility also allows you to disconnect any active connection. Select the connection and click the Disconnect button.
Backup/Restore
The Database Administrator tools have a Backup and Restore utility. Use these utilities to make a backup of your DeltaV databases. This utility is only backing up or restoring the DeltaV database files, as found in \\DeltaV\DVData\Databases\DatabaseName (where DatabaseName is the folder name of the database you are backing up or restoring). The Backup and Restore tool does not back up historical (PI) data, event data, or process graphics. A backup can only be restored into the same version of the DeltaV software. Only upgrade utility produces a file intended for import into a different version of DeltaV software. All DeltaV applications must be closed and all locks cleared before backing up. If you back up a database with locks, those locks are also backed up. If you restore a database that was backed up with locks, the locks are also restored. Backup It is important that you back up your entire DeltaV system often. To do that, follow the instructions in the Full System Backup topic. There might be times when you only want to back up your DeltaV databases (controller configuration, I/O setup, the control strategy, and so on), as found in \\DeltaV\DVData\Databases\DatabaseName (where DatabaseName is the folder name of the database you are backing up). This situation applies before making any changes, adding new nodes, or when creating simulation configurations. When you only want to back up your DeltaV databases, use the Database Administrator tool Backup and Restore. With the Backup and Restore tool, you can only back up the database for the workstation configuration. You cannot back up the entire system. The database is stored in UNC name: \\Machine Name\Databases. This is the same as the DeltaV\DVData\Databases folder if viewed from Windows Explorer. To back up the entire system, follow the instructions in the Full System Backup topic.
155
Important When VCAT (Version Control) is enabled on the database, the Backup utility will back up the DeltaV database as well as the VCAT database. The VCAT database is a SQL database. In order to back up the VCAT database to a destination drive that is not on the SQL database machine, the MSSQLServer and SQLServerAgent services must be given access to (permissions on) the destination machine (which must have a share where the backup will be written). Therefore, the service accounts must be modified with the Service Control Manager. The accounts must be changed from the default of SYSTEM to a Windows account that has access to the destination machine (with permissions to the share and the destination folder) and is in the Administrators group on the DeltaV ProfessionalPLUS machine. An example of such an account would be the DeltaVAdmin account if the destination machine were running the DeltaV software or the destination machine had granted DeltaVAdmin access to the resource. Refer to Modify SQL Services Logon for more information. Restore Restoring the DeltaV database is done when there is a problem with the database that the other Database Administrator tools (for example, Set Active Database and Register Database) cannot solve. Note With the Backup and Restore tool, you can only restore the DeltaV database (controllers, I/O configuration, and control strategy). You are not restoring the entire DeltaV system. The database is normally stored in UNC name: \\Machine Name\Databases. This is the same as the DeltaV\DVData\Databases folder if viewed from Windows Explorer. To restore the entire system, follow the instructions in the Full System Restore topic. If you restore the database to a different machine or under a new name, you need to set the server host machine, set the active database, and synchronize the workstations. Backing up the Objectivity Database The Objectivity Database contains the control configuration data that defines the workstations, controllers, and modules that run in the controllers. The display data consists of the operator displays. 1 2 Run the DeltaV Database Administrator tool by clicking Start | DeltaV | Engineering | Database Administrator. Use the DeltaV Database Administrator tool to back up the configuration database. For instructions on how to back up this database, refer to the online help for the DeltaV Database Administrator tool. The backup procedure takes several minutes. If the previous backup is no longer needed, delete it using Windows Explorer.
Note It is required that you exit all DeltaV Engineering Tools before running a backup of the active configuration database. These tools access the configuration database, and the integrity of a database backup is not guaranteed while any of these tools are open. An error dialog appears during the backup if there are open programs. To determine which programs are open, double-click Database Connections in Database Administrator. Restoring the Objectivity Database Note Exit the DeltaV Engineering tools before restoring the database. Use Database Connections if necessary. 1 Use the DeltaV Database Administrator tool to restore the configuration database. For instructions on how to restore this database, refer to the online help for the DeltaV Database Administrator tool. Also, make certain that
156
you are restoring the appropriate backup. The restore procedure takes several minutes. 2 3 Click OK in the message box that states that the data has been restored. Close the window and exit the application.
2 3 4 5 6 7 8
Use the following table to determine the type of account to use and what the password must be. If you are backing up to: MSSQLServer and SQLServerAgent Services Account log in as: a domain account The destination machine: Security access on the destination machine: The DeltaV domain account must have write access to the backup destination. The DeltaV domain account must have write access to the backup destination.
a domain account
uses DeltaV domain account Note Grant access to remote network and directory to the DeltaV domain account.
157
MSSQLServer and SQLServerAgent Services Account log in as: a local or domain account
Security access on the destination machine: The local account must have write access to the backup destination. The local account must have a backup destination.
a computer on a different domain without a domain trust relationship a computer in the same or another workgroup
must have a local account with same name and password must have a local account with same name and password
a local account
The destination (where the backup will be written) must be a shared device and the MSSQL services logon account must have Change permission to the destination folder. To configure the share, perform the following steps: 1 2 3 4 5 6 7 8 9 Go to the destination machine. Select the drive or folder where the backup will be written and right click. Select Sharing... Select Shared As and provide a share name. Set the User Limit. Click Permissions. Click Add and select the MS SQL services user account (the one that MSSQLServer and SQLServerAgent are using for logon on the source machine). Select Type of Access as Change. Click OK until all dialogs are closed.
For more information on configuring sharing, refer to the Windows help system. To set the permissions on the backup folder, perform the following steps: 1 2 3 4 5 Select the folder where the backup will be written. This can be a subfolder of the share. Right-click and then select Properties. Select the Security tab. Click the Permissions button. Set the MS SQL services user account (the one that MSSQLServer and SQLServerAgent are using for logon on the source machine) to be listed with Change access. The account needs the ability to read from that folder, write to that folder, and create new files and folders in that folder. Click OK until all dialogs are closed.
For more information on permissions, security, and access type, refer to the Windows help system.
158
Synchronize Nodes
The Synchronize Nodes tool is used to get multiple workstations on the same DeltaV control network using the same server host machine and the same active database. Synchronize Nodes actually synchronizes the registry on multiple workstations.
Synchronize Nodes Dialog Window Synchronize Nodes forces the refresh so that multiple workstations are looking at the same machine's (that is, the host's) registry. This ensures that all workstations are running from the same database and, therefore, the same control strategy. Note You can have multiple DeltaV systems running as separate control strategies as long as they are separate systems. However, every workstation on a single DeltaV system must run from the same database. Use Synchronize Nodes when you bring a new workstation on line or change the host machine to another ProfessionalPLUS machine.
Repair
Note The Repair feature is not a tool accessed from the Database Administrator window. However, it is a function usually performed by the database administrator, which is why it is covered in this section. Most of the problems you encounter with a database are related to setting the active database, setting the server host, or other problems that are solved by the Database Administrator tools. However, there are times where the database becomes damaged. This is referred to as a corrupted database. This does not happen often but it is a remote possibility. The database administrator must know how to recognize and fix this problem A truly corrupted database is one where data are incorrect or the database in unable to be accessed (opened and written to). In a corrupted database, the data integrity (accuracy of your control strategy) is at risk.
159
You can be sure that you have a corrupted database when the problem persists even after running the other Database Administrator tools. At that point, stop and restart the database server. If the problem still persists, the only other option you should have left is to restore a backup and that might be the preferred choice, if you have a current backup. Remember, when you restore a database, you need to first delete or rename the existing, corrupted database and then restore the backup. You also need to set the new database as active.
Daily Export
The Daily Export tool allows you to configure and enable (or disable) a daily export of the DeltaV configuration database. This includes Version Control information in the configuration database but does not include the Version Control database. Refer to Backing Up the Version Control Database for further information. The Daily Export tool sets the exporting at the same time (using 24 hour format) each day and to the same network directory. This tool takes the active DeltaV configuration database and exports it to the network location you specify.
Migrate Database
The Migrate Database tool migrates a previous version of the DeltaV configuration database to the current database structure. This tool is used to migrate a database after upgrading the DeltaV system.
Configuring Functions
The Database Administrator tools fall under three groups: Basic, Utility, and Configuration. This section describes the Configuration tools. The Configuration tools include: Register Database from Files Set Server Host Set Active Database
160
Register the Database from Files Dialog Window You use the Register Database from Files tool when any workstation on the same system is having trouble recognizing the existence of the database. You can test this by looking in the Set Active Database tool. If the database is not showing up in the list of databases, you need to register the database and set it as active. There might be times when you need to deregister a database using the Register Database from files tool. This removes the database name from the list of possible databases to use. Deregister a database with the Register Database from Files tool if you see a decommissioned (deleted) database in the Set Active Database list. Normally the Register and Deregister functions occur automatically when using the Database Administrator tools to create, move, copy, rename, or delete the DeltaV databases.
Set a Server Host Dialog Window There is always only one host machine and only one active database per DeltaV system. The host is the machine that controls all of the other workstations through the Database Server application. It is also referred to as the
161
ProfessionalPLUS machine. The active database and the Lock Server reside on the host machine. The host machine controls all access to the DeltaV database. All other workstations (also referred to as Visual machines) must point to the appropriate machine as the host machine and therefore recognize the one active database residing on the host. The Visual workstations have access to the database and DeltaV applications based on the Database Server, which resides on the host machine. The Set Server Host tool is used to designate which machine is acting as the primary machine. In order for all of the workstations in the DeltaV system to reference the active host, the Set Server Host tool calls the Synchronize Workstations tool. Note The host machine must have the Federated database (configdb.hdb.FDB), the Boot file related to the Federated database (configdb.hdb), the data files that make up the DeltaV control database, and the Objectivity Lock Server residing on it.
Set Active Database Dialog Window Once you set the active database on a workstation, the engineering tools on that workstation reference that database.
162
Exporting Objects
The DeltaV Explorer enables you to select objects at several levels in the Explorer hierarchy for exporting. You can export nodes, a module, the entire control network, or the entire configuration system. The Export command converts the database data for the object you select into an ASCII file with an .fhx extension. This file includes the data for the selected object and everything beneath it. To back up an entire database, use the Backup Database administrator tool. Note Do not edit the ASCII text export files. Editing these files can cause later problems in your database.
Importing Objects
You can incorporate database objects from an .fhx file into your database. An .fhx file is created using the Export command in the Explorer. A single .fhx file can include one or many database objects. Note Do not edit the import (.fhx) files. Editing these files can cause problems in your database.
163
Keys can be held directly by the user or indirectly through association with a group that owns the key. Keys provide permission to access locked parameters or parameter fields. (The granting of keys is done with the DeltaV User Manager.) A user's association with a group or ownership of a key can be global or limited to the scope of a plant area or set of plant areas. Areas - DeltaV system users can be granted different sets of keys in each area. This feature can be used to grant parameter write access to operators for control modules within the operators' responsibility, yet withhold access to other similar modules outside their responsibility.
Many of the changes you make in the DeltaV User Manager require that you perform a workstation download in the DeltaV Explorer. Before you close the DeltaV User Manager, a message appears reminding you to download the workstation to ensure that all security changes take effect.
164
Start User Manager from the task bar by clicking Start | DeltaV | Engineering | User Manager.
Start Menu for DeltaV User Manager The User Manager window gives you three views; Users, Locks, and Groups. You can open, close, and resize each pane. These views are available under the View menu.
165
User Accounts
The first user who logs in to the system starts off with a default user name of Administrator. This person has administration privileges associated with the computer work group as well as full access to all DeltaV functions, such as configuring hardware, configuring the process system, downloading the configurations, and so on. Note You cannot change the Administrator's privileges unless you have created another user with equal privileges. The first user must configure the ProfessionalPLUS workstation. Before any other users log in to the system, some thought should be given to the overall user access scheme. If more than just one or two users will be accessing the system, you might want to limit their ability to change the process configuration or perform downloads. To do this, you need to set up user names and access privileges in the User Manager. If you are the first user after the workstation has been configured, log in as Administrator. Click Start | DeltaV | Engineering | User Manager. The default user accounts, displayed in the User Manager program screen, are Administrator, DeltaVAdmin, DVBatchAdmin, SoftPhaseUser, DVPEHAdministrator, and Guest. Note Do not change the password for DeltaVAdmin, DVBatchAdmin, or SoftPhaseUser from the DeltaV User Manager application. Always use the ServPwd.exe utility (found in the DeltaV\Bin folder) to change the passwords on these accounts. The following accounts are created as operating system and DeltaV database accounts as part of the DeltaV installation process. User Account Configure Operator Supervisor Maintainer Default Password DeltaVC1 DeltaVO1 DeltaVS1 DeltaVM1
Note If you press Enter or click OK before you have made all selections for this user account, the new user account is created with all the default settings of Windows and DeltaV Account types but no Can Download or Can Configure
166
privileges. To add these privileges, you must edit the user account properties by selecting the user's name and then clicking the Keys tab.
Note Many of the changes you make in the DeltaV User Manager require that you perform a workstation download in the DeltaV Explorer. Before you close the DeltaV User Manager, a message appears reminding you to download the workstation to ensure that all security changes take effect. To assign the user to a user group that has predefined access limits, click the Groups tab. To restrict or grant access to particular logical plant areas, click the Keys tab.
DeltaV FlexLock
Inside this topic Accessing the DeltaV Desktop Accessing the DeltaV Logon Accessing DeltaV Operate Enabling or Disabling Automatic Switching Enabling or Disabling Autorun DeltaV Operate The DeltaV FlexLock application creates dual desktops on a single workstation to provide both a secure operating environment and a wide open engineering environment. Access to a desktop is determined by the current user's privileges. (FlexLock appears as DeskTop.exe in the Windows Task Manager Process list.) The available desktops are the Windows desktop and the DeltaV desktop. A user with Windows administrative, DeltaV administrative, or DeltaV access privileges has access to both the DeltaV desktop and the Windows desktop. The Windows desktop includes all of the DeltaV programs as well as all programs available in Windows. A user who does not have Windows administrative, DeltaV administrative, or DeltaV access privileges only has access to the DeltaV desktop. The DeltaV desktop limits the user to the DeltaV Operate program and to those programs available to the user through DeltaV Operate.
FlexLock Application on the DeltaV Desktop To secure your operating environment, consider giving operators access to the DeltaV desktop and other users, such as engineers, access to both the DeltaV desktop and the Windows desktop. Note You must also consider access to the underlying Windows account, especially when logged on with Windows Administrator Account privileges. When you log off of the DeltaV software, be sure to log off of Windows also, especially if you are logged on with Windows Administrator privileges. If you do not log off of Windows, the next user to log on to the DeltaV system will operate under the Windows Administrator account. The Windows Administrator account grants the user the right to perform actions that could interfere with the operation of the DeltaV system. In the Windows User Manager, consider creating an administrator group for users with unrestricted rights and an operator group for users with restricted rights.
167
When the current user logs off, the next user to log on sees the FlexLock application with the DeltaV Desktop button pressed. This indicates that FlexLock switched the user to the DeltaV desktop. If the current user has Windows administrative or DeltaV configuration privileges, the user can select the Windows Desktop button from FlexLock and switch to the Windows desktop. If the current user does not have Windows administrative or DeltaV configuration privileges, they can only access DeltaV Operate. Users without Windows administrative or DeltaV configuration privileges who attempt to switch to the Windows Desktop will receive a message indicating that they lack the proper privileges and be prompted to enter an administrator name and password. If the user enters the proper administrator name and password, FlexLock switches to the Windows desktop. Users with DeltaV configuration privileges can prevent FlexLock from automatically switching to the DeltaV desktop on subsequent logins by selecting the Disable Auto Switching button. If you exit the FlexLock application from the Windows desktop, click Start | DeltaV | Engineering | FlexLock to open the FlexLock application. You cannot exit the FlexLock application from the DeltaV desktop. Note It is possible that a Remote Client session running FlexLock does not appear on the Processses tab of the Windows Task Manager. If it is necessary to close FlexLock (for instance, to uninstall the DeltaV system), select the checkbox "Show processes from all users" on the Task Manager Processes tab. Then select and end the process DeskTop.exe, which is the FlexLock name in the process list.
168
169
Equipment Repair
The DeltaV control system equipment is, with few exceptions, not reparable. Customer replacement orders are given a priority over standard material orders and are typically shipped within 24 hours. To enter a replacement order, contact your local Emerson Process Management service center or representative. To qualify an order as a replacement order, you must provide the serial number of the failed assembly. If the replacement order is for an assembly covered by warranty, either standard or extended, you will receive a Return Authorization number and instructions for returning the item.
Equipment Warranty
The standard warranty period for the DeltaV Fisher-Rosemount Systems, Inc. manufactured equipment is 12 months from initial installation, but no more than 18 months from shipment. Initial installation is defined as the day the software identifiers are first loaded by the end-user, as reported on the registration form. You can purchase an extended warranty service to cover Fisher-Rosemount Systems, Inc. manufactured equipment at either the time of purchase or the time of registration. The extended warranty period is 36 months from the initial installation, but no more than 42 months after shipment. (This does not include the personal computer.) Equipment not manufactured by Fisher-Rosemount Systems, Inc. (for example, workstation, power supply, and control network hub) is warranted by the manufacturers according to their warranty terms and period of coverage. Fisher-Rosemount Systems, Inc. will arrange the warranty services for this equipment with the manufacturers. To receive assistance, contact your local Emerson Process Management service center or the representative in your World Area.
Equipment Additions
Contact your local Emerson Process Management service center or representative to place an order for equipment additions to the system. The system identification number is required to place an order. When adding equipment to a system enrolled in the extended warranty plan, the DeltaV Response Center automatically enrolls the new equipment in the existing extended warranty plan. The added hardware is taken into account when determining the fee for extensions to the Extended Warranty Plan.
170
Check the firmware revision level of the new/replacement item using the Controller Upgrade Utility. Click DeltaV | Installation | Controller Upgrade Utility and then click the Show Revision Info button. If the revision level of the new/replacement item matches your system revision level, you do not need to do anything further. If the revision level of the new/replacement item does not match your system revision level, upgrade the controller or I/O card by following the steps listed in the Software Updates topic.
171
172
fiber optic ports on the Cisco 3550-FX fiber optic switch and the 24 MTRJ fiber optic ports on the Cisco 3750FS switch are configured by Emerson Process Management to function at 100Mbit full duplex because they are initially configured to 100Mbit half duplex which is not optimal for switch-to-switch backbone communications. This Emerson configuration allows all DeltaV-supported Cisco switches with fiber optic MTRJ ports to be interconnected with fiber optic cable without further adjustments. If other manufacturers' equipment will be connected to Cisco equipment, fiber optic port speed and duplex must be configured to match the Cisco ports and the Cisco ports must be configured to match the other equipment's ports or there will be serious communications problems. Be cautious when attaching other DeltaV approved 3rd party media converters or hubs or switches to the Cisco equipment always be sure to make configuration adjustments before attaching the cables to the Cisco switches. Twisted Pair Port Speed and Duplex - Twisted pair ports on the Cisco switches are configured to operate in auto-negotiate and auto-sense mode. The ports automatically detect the speed and duplex of the attached device and adjust the port accordingly. There is no need to hard-configure the twisted pair ports to any speed or duplex.
173
174
to up 13 Press Return at the prompt. The system displays: Switch(config-if)# Caution The following steps allow unrestricted, full Read/Write Telnet access to the switch through the use of passwords for the Telnet sessions. Consult the Cisco documentation for information on configuring more restrictive access to the switch. 14 Type line vty 0 4 at the prompt and press Return. The system displays: Switch(config-line)# 15 Type password <password> at the prompt and press Return. The system displays: Switch(config-line)# 16 Type line vty 5 15 at the prompt and press Return. The system displays: Switch(config-line)# 17 Type password <password> at the prompt and press Return. The system displays: Switch(config-line)# 18 Type line con 0 at the prompt and press Return. The system displays: Switch(config-line)# 19 Type password <password> at the prompt and press Return. The system displays: Switch(config-line)# 20 Type end at the prompt. The system displays: Switch# XXXXX: %SYS-5-CONFIG_I: Configured from the console by console 21 Press Return at the prompt. The system displays: Switch# 22 To permanently save the IP address, subnet mask, password, and shutdown configuration information, type write mem at the prompt. The system displays: Building configuration. . . [OK] Switch# 23 To view the new information, type sho config, and press Return at the prompt. Verify that the new IP address and subnet mask are entered correctly toward the end of the configuration file and that the parameter shutdown is not present near the end of the file. 24 When all IP address information is verified, use the ProfessionalPLUS workstation to enter the switch's IP address to manage the switch from a Telnet session. 25 Repeat this procedure for every switch that will be managed through Telnet. Be sure to use a unique IP address for each switch.
175
Verifying Emerson Factory Defaults on the Cisco 2950 and 2950C Switches
To verify that you have the correct factory defaults configured on the switch, follow these instructions: 1 2 3 4 5 6 Connect the switch management stations Comm Port to the switchs Console serial port on the rear of the switch with the serial cable that is included with the Cisco switch. Start a terminal session such as a HyperTerminal session on the switch management station and set the properties to 9600 baud, 8 data bits, No parity, 1 stop bit, no flow control, and save. Connect power to the Cisco switch - the switch boot up process is displayed on the terminal. The first line that is displayed begins with: C2950 Boot Loader . . . After about 1-1.5 minutes, the following line is displayed: Press RETURN to get started! Do not press return. Wait a few more seconds until this final line is displayed: xx:xx:xx %LINEPROTO-5-UPDOWN:Line protocol on Interface Vlan1; changed state to down 7 8 9 Press Return. The default switch> prompt is displayed: Switch> Type enable at the initial command prompt and press Return. The privileged EXEC mode prompt is displayed: Switch# Type show config at the prompt and press Return. The first few lines of the switch configuration file are displayed. Then press Return repeatedly until the entire file is displayed as follows:
Note There are some differences between the 2950 and 2950C configuration files. The configuration file for the 2950 reports information for its 24 ports in the sections beginning with Interface FastEthernet01 and ending with Interface FastEthernet24. The 2950C reports additional configuration information for its two, MTRJ fiber optic ports in sections Interface FastEthernet25 through Interface FastEthernet26. Finally, the line no ip address is valid only for the 2950C ports.
176
Using xxxx out of 32768 bytes ! version 12.1 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Switch ! ! ip subnet-zero no ip igmp snooping ! ! spanning-tree mode pvst no spanning-tree optimize bpdu transmission spanning-tree extend system-id no spanning-tree vlan 1 ! ! interface FastEthernet0/1 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/2 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/3 switchport mode access switchport nonegotiate no ip address no cdp enable
177
! interface FastEthernet0/4 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/5 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/6 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/7 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/8 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/9 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/10 switchport mode access
178
switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/11 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/12 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/13 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/14 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/15 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/16 switchport mode access switchport nonegotiate no ip address no cdp enable
179
! interface FastEthernet0/17 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/18 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/19 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/20 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/21 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/22 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/23 switchport mode access
180
switchport nonegotiate no ip address no cdp enable ! interface FastEthernet0/24 switchport mode access switchport nonegotiate no ip address no cdp enable ! ! interface Vlan1 no ip address no ip route-cache shutdown ! ip http server ! no cdp run ! line con 0 line vty 5 15 ! end Switch# 10 Verify that your switch configuration matches the preceding configuration. Note that as additional configuration occurs, some information changes. The information above is for a new switch from the Emerson factory. 11 Type show flash at the prompt and press Return. The following lines display: Directory of flash:/ Mar 01 1993 00:12:10 Mar 01 1993 00:02:14 Mar 01 1993 18:30:55 Mar 01 1993 18:30:55 Mar 05 1993 03:08:22 html config.text info info.ver env_vars
181
private-config.text c2950-i6q4l2-mz.121-13.EA1c.bin
xxxxxxx bytes total (xxxxxxx bytes free) Switch# 12 Verify that the filenames displayed match the above filenames. Note that as additional configuration occurs, file size changes. The information above is for a new switch from the Emerson factory. If the file names do not match, refer to Configuring the 2950 and 2950C Switches to Emerson Defaults to configure the switch to the minimum defaults for use with the DeltaV system.
182
xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 10 Press Return. The system displays: Switch# 11 Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 12 Verify that the configuration for the Cisco switches matches the Emerson factory defaults (except for IP address and shutdown information you may have entered) by typing show config at the prompt and pressing Return repeatedly to step through the file. Note There is a slight difference between the 2950 and 2950C switches in item 3 in the following configuration information. The configuration information for the 2950C reads: 3) interface fastethernet0/1 (and all other ports through 0/26). In addition, the line no ip address is valid for the 2950C ports only. Verify that the following items are in the configuration file: 1) no ip igmp snooping (near the beginning of the file) 2) no spanning-tree vlan 1 (near the beginning of the file) 3) interface fastethernet0/1 (and all other ports through 0/24) switchport mode access switchport nonegotiate no ip address no cdp enable shutdown (near the end of the file unless removed for telnet/web management) no cdp run (near the end of the file unless Cisco Cluster Management is being used) 13 After verifying the above information, press Return until the Switch# prompt appears. This is the end of the Emerson Factory Default configuration process.
183
press Return repeatedly. The system displays these lines: (Information varies depending on switch address, port connections, and network load.) FastEthernet0/1 is down, line protocol is down (notconnect) Hardware is Fast Ethernet, address is 0007.eca9.8941 (bia 0007.eca9.8941) MTU 1500 bytes, BW 10000 Kbit, DLY 1000 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Auto-duplex, Auto-speed input flow-control is off, output flow-control is off ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output 00:51:16, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute ouxtput rate 0 bits/sec, 0 packets/sec 1 packets input, 64 bytes, 0 no buffer Received 0 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 0 input packets with dribble condition detected 1 packets output, 64 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets <>0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out Switch# 2 To view network statistics for all ports on the switch, type show interface at the prompt and press Return repeatedly to display all ports. The information varies depending on switch address, port connections, and network load. To clear or zero the fast ethernet port counters to get fresh data, type clear counters at the prompt and press Return. The system displays: Clear show interface counters on all interfaces [confirm]. Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
184
4 5 6
Press Return. The system displays: Switch# Switch# This serial console port can also be used to view Ethernet controller statistics. To view statistics for Ethernet Port 1 for example, type the following at the prompt: show controller ethernet-controller fastethernet 0/1 and press Return repeatedly. The system displays the following lines: (Information varies depending on port connections, and network load.) Receive 64 Bytes 1 Frames 0 FCS errors 0 Multicast frames 0 Broadcast frames 0 Control frames 0 Pause frames 0 Unknown opcode frames 0 Alignment errors 0 Length out of range 0 Symbol error frames 0 False carrier errors 0 Valid frames, too small 0 Valid frames, too large 0 Invalid frames, too small 0 Invalid frames, too large 0 Discarded frames %CLEAR-5-COUNTERS: Clear counter on all interfaces by console Press Return. The system displays:
Transmit 64 Bytes 1 Frames 0 Multicast frames 0 Broadcast frame 0 Pause frames 0 Single defer frames 0 Multiple defer frames 0 1 collision frames 0 2-15 collisions 0 Late collisions 0 Excessive collisions 0 Total collisions 0 Control frames 0 VLAN discard frames 0 Too old frames 0 Tagged frames 0 Aborted Tx frames Transmit and Receive 2 Minimum size frames 0 65 to 127 byte frames 0 128 to 255 byte frames 0 256 to 511 byte frames 0 512 to 1023 byte frames 0 1024 to 1518 byte frames 0 1519 to 1522 byte frames
185
Switch# 7 To view controller statistics for all ports on the switch, type show controller ethernet-controller at the prompt and press Return repeatedly. All ports are displayed. (Information varies depending on switch address, port connections, and network load.) To clear or zero the ethernet controller counters to get fresh data, type clear controller ethernet-controller at the prompt and press Return. The system displays: Switch# Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
Enabling the Cisco 2950 and 2950C Switches for Telnet and Web Management
1 An IP address and subnet mask must be entered to manage the switch using telnet or a web browser. To begin the process of entering IP management information, type config t at the Switch# prompt and press Return. The system displays: Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# 2 3 Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Enter an approved IP address followed by the subnet mask by typing ip address 10.4.128.18 255.254.0.0 and press Return at the prompt. The system displays: Switch(config-if)# 4 Type no shutdown at the prompt and press Return. The system displays: Switch(config-if)# 1d06h: %LINK-3-UPDOWN: Interface Vlan1, changed state to up 1d06h: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up 5 6 Press Return at the prompt. The system displays: Switch(config-if)# Type end at the prompt. The system displays: Switch# 1d06h: %SYS-5-CONFIG_I: Configured from the console by console 7 8 Press Return at the prompt. The system displays: Switch# To permanently save the IP address, subnet mask, and shutdown configuration information, type write mem at the prompt. The system displays: Building configuration. . . [OK] Switch# 9 To view the new IP address information, type sho config, and press Return at the prompt. Verify that the new IP address and subnet mask are entered correctly toward the end of the configuration file and that the parameter
186
shutdown is no longer present as it was when viewing Emerson factory defaults in Verifying Emerson Factory Defaults on the Cisco 2950 and 2950C Switches. 10 When all IP address information is verified, use the management PC stations web browser to enter the switchs IP address for managing the switch. See the Cisco documentation for use of the Cisco web management interface.
Using the Web Console to Set Up a Telnet Password to Manage the Cisco 2950 and 2950C Switches
Telnet switch management can be used from within the web browser by selecting telnet from the Cisco switch display in the web browser. Before telnet can be used however, complete all of the steps in Enabling the Cisco2950 and 2950C Switches for Telnet and Web Management. When those steps are complete, attach a shielded twisted pair cable to one of the switchs Ethernet ports, then enter the IP address of the new switch in the Internet Explorer address box of the switch management station and the Cisco switch display will appear. Use the Administration/Users and Passwords/Terminal Lines dialog, found in the switch display, and the Cisco documentation to determine the different levels of password protection options that can be used for telnet access. For example, enter a unique password and select level 15 for full read/write access to the switch. Different levels of access for different management functions are possible. Consult the Cisco documentation for these options. Be sure to OK and save the password and access level information to permanent memory. Save this information by using the Administration Save Configuration dialog box and selecting the appropriate check-boxes to select Source/Running Configuration and Destination/Startup Configuration. Alternately, if the serial connection is still attached to the switch once the passwords are entered from the web browser, enter the write mem command from the config t switch prompt and the new password information will be saved in permanent memory. You can view the new passwords and access levels by entering the show config command at the switch prompt either from the serial console port or from telnet.
Enabling Cisco Discovery Protocol for Cisco Cluster Management on the Cisco 2950 and 2950C Switches
Cisco Cluster Management is sometimes used for managing a large number of switches. Cluster Management requires only one IP address for managing up to 16 switches anywhere on the network. If there are more then 16 switches, additional clusters can be used. An IP address can be assigned to every switch if desired, but it is not necessary if Cluster Management is used. Refer to Reserved IP address for the approved list of IP addresses that can be used for Ethernet switches. Assigning a name to each switch is helpful for keeping track of a switch's location, especially if Cluster Management is used and IP addresses are not assigned to every switch. In a network where there is a mixture of different Cisco switch types, Cisco Systems recommends that the highest performance switch should be used as the Cluster Command Switch. DeltaV software makes use of Cisco 2950-series and 3550-FX switches. If these are mixed on the network, use the 3550-FX switch as the cluster command switch. This way, one 3550-FX switch could have an IP address assigned to it and be designated the cluster command switch for up to 15 of the 2950-series switches, or a mixture of 15 of the 3550-FX and 2950-series switches. In order for cluster management to automatically discover up to 16 switches on the network, Cisco Discovery Protocol (CDP) must be running on all switches but enabled only on ports that connect switches and not enabled on ports that are connected to DeltaV workstations or controllers. For example, if a fiber optic port on a 3550-FX switch is connected to a fiber optic port on a 2950C switch, both switches must have CDP enabled (running), and only the two fiber optic ports must have no cdp enable removed from their port configuration. The same is true for any other port on a switch that is connected to another switch. Similarly, it is true for a twisted pair port on one switch that is connected to a twisted pair port on a another switch. If cluster management is used, enable "cdp run" for the switch and remove no cdp enable for each connected switch-to-switch port. The following procedure shows how to
187
configure a switch for the (CDP) using the serial console port or telnet interface. This allows the cluster command switch to find the other switches on the network automatically and draw a network map: 1 At the Switch> prompt at either a telnet session or serial port session, type ena and press Return. The system displays: Switch# 2 3 4 5 Type config t at the prompt and press Return. The system displays: Switch(config)# Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Type cdp run at the prompt and press Return. The system displays: Switch(config)# If port 24 is used as a connection to another switch, type interface fastethernet 0/24 at the prompt and press Return. The system displays: Switch(config-if)# 6 7 8 9 Type cdp enable at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# Switch# Type write mem at the prompt and press Return. The system displays: Building configuration... [OK] Switch# 10 Type show config at the prompt and press Return repeatedly and verify that "no cdp enable" has been removed from the port 24 configuration (compare port 24 to other ports to see that "no cdp enable" is removed from this port). Press Return repeatedly to verify that near the end of the file, "no cdp run" has been removed. Refer to Verifying Emerson Factory Defaults on the Cisco 2950 and 2950C Switches to compare to the Emerson factory default configuration. 11 Cisco Discover Protocol (CDP) has now been successfully configured and saved to permanent memory. Repeat this process for all other switches in this network and for each port that has a switch-to-switch port connection. When configuration is complete, use the Cisco Cluster Management Suite in the web browser to start the automatic discovery of all switches on the network and then assign them to a cluster for management. Consult Cisco documentation for this information. xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console Press return. The system displays:
188
This topic explains how to verify that the correct Emerson defaults have been configured on the Cisco 3550FX switch and explains how to configure the defaults if necessary. It also provides additional configuration information.
189
state to down 7 8 9 Press Return. The system displays: Switch> Type enable at the prompt and press Return. The system displays: Switch# Type show config at the prompt and press Return. The first few lines of the switch configuration file are displayed. Press Return repeatedly until the entire file is displayed as follows: Using 3579 out of 393216 bytes ! version 12.1 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Switch ! ! ip subnet-zero no ip igmp snooping ! ! ! spanning-tree mode pvst spanning-tree extend system-id no spanning-tree vlan 1 ! ! interface FastEthernet0/1 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/2 switchport mode access switchport nonegotiate no ip address duplex full
190
no cdp enable ! interface FastEthernet0/3 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/4 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/5 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/6 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/7 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/8 switchport mode access
191
switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/9 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/10 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/11 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/12 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/13 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable
192
! interface FastEthernet0/14 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/15 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/16 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/17 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/18 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/19 switchport mode access switchport nonegotiate
193
no ip address duplex full no cdp enable ! interface FastEthernet0/20 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/21 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/22 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/23 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable ! interface FastEthernet0/24 switchport mode access switchport nonegotiate no ip address duplex full no cdp enable !
194
interface GigabitEthernet0/1 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface GigabitEthernet0/2 switchport mode access switchport nonegotiate no ip address no cdp enable ! interface Vlan1 no ip address shutdown ! ip classless ip http server ! ! no cdp run ! line con 0 line vty 0 4 privilege level 15 password deltav login line vty 5 15 privilege level 15 password deltav login ! end Switch# 10 Verify that your switch configuration displayed matches the preceding configuration. Note that as additional configuration occurs, some information changes. The information above is for a new switch from the Emerson factory. 11 Type show flash at the prompt and press Return. The system displays: Directory of flash:/ Mar 01 1993 00:01:31 config.text Mar 01 1993 00:05:38 c3550-i9q3l2-mz.121-13.EA1c Mar 01 1993 00:05:48 env_vars
195
Mar 01 1993 00:05:48 system_env_vars Mar 01 1993 00:01:31 private-config.text 15998976 bytes total (10737664 bytes free) Switch# 12 Verify that the filenames displayed match the above filenames. Note that as additional configuration occurs, some filenames change. The information above is for a new switch from the Emerson factory. If the filenames do not match, refer to Configuring the Cisco 3550FX Switch to Emerson Defaults to configure the switch to the minimum defaults for use with the DeltaV system.
196
12 Type switchport nonegotiate at the prompt and press Return. The system displays: Switch(config-if-range)# 13 Type no cdp enable at the prompt and press Return. The system displays: Switch(config-if-range)# 14 Type end at the prompt and press Return. The system displays: Switch# xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 15 Press Return. The system displays: Switch# 16 Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 17 Type show config at the prompt to verify the configuration matches the Emerson factory defaults for a Cisco 3550FX Switch. Press Return repeatedly to step through the file. Verify these items are present in the configuration file: (IP address and shutdown information you may have entered will differ.) 1) no ip igmp snooping (near the begining of the file) 2) no spanning-tree vlan 1 (near the beginning of the file) 3) interface fastethernet0/1 (and all other ports through 0/24) switchport mode access switchport nonegotiate no ip address duplex full no cdp enable 4) interface GigabitEthernet0/1 and GigabitEthernet0/2 switchport mode access switchport nonegotiate no ip address no cdp enable 5) shutdown (near the end of the file unless removed for telnet/web management) 6) no cdp run (near the end of the file - unless Cisco Cluster Management is being used) 18 After verifying the configuration, press Return until the Switch# prompt appears. This is the end of the Emerson factory default configuration process.
197
To configure the duplex setting of a fiber optic switch port to half-duplex: 1 Type config t at the Switch# prompt and press Return. The system displays: Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# Note If the Switch> prompt is displayed instead of the Switch# prompt, type ena at the Switch> prompt. 2 3 4 5 6 Type interface fastethernet0/24 (or any fast ethernet port on the switch) and press Return. The system displays: Switch(config-if)# Type duplex half and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console Press Return. The system displays: Switch# Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 7 Type show config at the prompt to verify that the duplex setting is changed to half-duplex for this port. Press Return repeatedly to step through the file until the port entered in step 2 is reached. Verify that "duplex full" has been removed from the port configuration
198
fastethernet 0/1, Press Return repeatedly, these lines will be displayed: (information will vary depending on switch address, port connections, and network load) FastEthernet0/1 is up, line protocol is up (connected) Hardware is Fast Ethernet, address is 000b.5fbf.3481 (bia 000b.5fbf.3481) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Full-duplex, 100Mb/s input flow-control is off, output flow-control is off ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output 00:00:02, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue :0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute ouxtput rate 0 bits/sec, 0 packets/sec 5328 packets input, 419937 bytes, 0 no buffer Received 5327 broadcasts, 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 386 multicast, 0 pause input 0 input packets with dribble condition detected 218 packets output, 13952 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out Switch# 2 3 To view network statistics for all ports on the switch, type show interface at the prompt and press Return repeatedly. (Information varies depending upon switch address, port connections, and network load.) To clear or "zero" the fast ethernet port counters to get fresh data, type clear counters and the prompt and press Return. The system displays: Clear "show interface" counters on all interfaces [confirm] Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
199
Press Return. The system displays: Switch# 1d05h: %CLEAR-5-COUNTERS: Clear counter on all interfaces by console
5 6
Press Return. The system displays: Switch# This serial console port can also be used to view Ethernet controller statistics. To view statistics for Ethernet Port 1 for example, type show controller ethernet-controller fastethernet 0/1 at the prompt and press Return
200
repeatedly. The system displays the following lines: (information varies depending upon port connections, and network load) Transmit FastEthernet0/1 Receive 14592 Bytes 442347 Bytes 227 Unicast frames 0 Unicast frames 1 Multicast frames 0 Multicast frames 0 Broadcast frames 5196 Broadcast frames 0 Discarded frames 1 No dest, unicast 0 Too old frames 404 No dest, multicast 0 Deferred frames 0 No dest, broadcast 0 1 collision frames 0 2 collision frames 0 FCS errors 0 3 collision frames 0 Oversize frames 0 4 collision frames 0 Undersize frames 0 5 collision frames 0 Collision fragments 0 6 collision frames 0 7 collision frames 11 Minimum size frames 0 8 collision frames 5148 65 to 127 byte frames 0 9 collision frames 419 128 to 255 byte frames 0 10 collision frames 24 256 to 511 byte frames 0 11 collision frames 0 512 to 1023 byte frames 0 12 collision frames 0 1024 to 1518 byte frames 0 13 collision frames 0 14 collision frames 0 Flooded frames 0 15 collision frames 0 Overrun frames 0 Excessive collisions 0 Good (1 coll) frames 0 Good(>1 coll) frames 0 Pause frames 0 VLAN filtered frames 0 Valid oversize frames 0 Pause frames 0 Symbol error frames 0 Late collisions 0 Source routed frames
0 VLAN discard frames 0 Invalid frames, too large 0 Excess defer frames 0 Valid frames, too large 0 Too large frames 0 Invalid frames, too small 228 64 byte frames 0 Valid frames, too small 0 127 byte frames 0 255 byte frames 0 511 byte frames 0 1023 byte frames 0 1518 byte frames Switch# 7 To view controller statistics for all ports of the switch, type show controller ethernet-controller at the prompt
201
and press Return repeatedly. The system displays all ports. (Information varies depending on switch address, port connections, and network load.) 8 To clear or "zero" the ethernet controller counters to get fresh data, type clear controller ethernet-controller at the prompt and press Return. The system displays: Switch# Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
Using the Web Console to Set Up a Telnet Password for a Cisco 3550FX Switch
Telnet switch management can be used from within the web browser by selecting telnet from the Cisco switch display in the web browser. Before telnet can be used however, complete all of the steps described in Enabling the Cisco 2950 and 2950C Switches for Telnet and Web Management . (The procedure is the same for the 2950, 2950C and 3550FX switches. When telnet and web management are enabled, attach a fiber optic cable between the switch's fiber optic Ethernet ports and the network. Refer to Extending the Control Network with Media Converters for information on making this connection. When the connection is complete, enter the IP address of the new switch in the Management Station's Internet Explorer address box and the Cisco switch display will appear. Use the Administration dialog box found in the switch display and the Cisco documentation to determine the different levels of password protection options that can be used for telnet access. For example, enter a unique password and select level 15 for full read/write access to the switch. Different levels of access for different management functions are possible. Be sure to save the password and access level information to permanent memory. (Use the Administration dialog box and select the appropriate check-boxes to "Save Running Configuration to Startup Configuration".) Alternately, if the serial connection is still attached to the switch once the passwords are entered from the web browser, enter the write mem command from the config t switch prompt to save the new password information to permanent memory. Now that the telnet configuration is complete, type show config at the switch prompt either from the serial console port or from telnet to view the new passwords and access levels.
Enabling Cisco Discovery Protocol for Cisco Cluster Management on the Cisco 3550FX Switch
The procedure for enabling Cisco Discovery Protocol (CDP) is the same for the 2950, 2950C, and 3550FX switches. Refer to Enabling the Cisco 2950 and 2950C Switches for Cisco Discovery Protocol for Cisco Cluster Management.
202
Restoring the Cisco 2950C and 3550FX Switches to Cisco Factory Defaults
1 2 Enter ena at the Switch> prompt and press Return. Enter write erase at the Switch# prompt and press Return. The system displays Erasing the nvram filesystem will remove all configuration files! Continue? [confirm] 3 Press Return. The system displays: [OK] Erase of nvram: complete Switch# Xx:xx:xx %SYS-7-NV_BLOCK_INIT: Initialized the geometry of nvram 4 5 6 7 Press Return. Enter reload at the Switch# prompt. The system displays: Proceed with reload ? [confirm] Press Return. The system displays the first line: Xx:xx:xx: %SYS-5-RELOAD: Reload requested (starts to reboot) After about 1-1.5 minutes the system displays: -------System Configuration Dialog-------Would you like to enter the initial configuration dialog? {yes/no]: 8 Wait a few seconds and the system automatically displays more information on the terminal. The last line is: xx:xx:xx %LINEPROTO-5-UPDOWN: Line protocol on Interface . . .changed state to up 9 Press Return. The system displays: Would you like to enter the initial configuration dialog? {yes/no]: 10 Type n, and press Return. The system displays: Press Return to get started! xx:xx:xx: %LINK-5-CHANGED: . . . xx:xx:xx: %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to down 11 Press Return. The system displays: Switch> 12 Enter ena at the Switch> prompt. 13 Enter Sho config at the Switch# prompt. The system displays: startup-config is not present 14 Enter Sho flash at the Switch# prompt (shows files without config.text or private config.text)
203
204
Type show config at the prompt and press Return. The first few lines of the switch configuration file are displayed. Press Return repeatedly until the entire file is displayed as follows: ! version 12.2 no service pad service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Switch ! ! no aaa new-model no boot auto-copy-sw switch 1 provision ws-c3750g-12s ip subnet-zero ! no ip igmp snooping ! ! ! no file verify auto ! spanning-tree mode rapid-pvst spanning-tree extend system-id no spanning-tree vlan 1 ! vlan internal allocation policy ascending ! interface GigabitEthernet1/0/1 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/2 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/3
205
switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/4 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/5 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/6 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/7 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/8 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/9 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/10 switchport mode access switchport nonegotiate no cdp enable !
206
interface GigabitEthernet1/0/11 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/12 switchport mode access switchport nonegotiate no cdp enable ! interface Vlan1 no ip address no ip route-cache shutdown ! ip classless no ip http server ! no cdp run ! control-plane ! ! line con 0 line vty 0 4 no login line vty 5 15 no login ! ! end Switch# 10 Verify that your switch configuration matches the preceding configuration. Note that as additional configuration occurs, some information changes. The information above is for a new switch from the Emerson factory.
207
11 Type show flash at the prompt and press Return. The following lines display: Directory of flash:/ xxxxx config.text xxxxx c3750-ipbase-mz.122-25.SEB2 xxxxxxx bytes total (xxxxxxx bytes free) Switch# Verify that the filenames displayed match the above filenames. Note that as additional configuration occurs, file size changes. The information above is for a new switch from the Emerson factory. If the file names do not match, refer to Configuring the 3750G-12S Switch to Emerson Defaults to configure the switch to the minimum defaults for use with the DeltaV system.
208
2 3 4 5 6 7 8 9
Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if) Type no ip igmp snooping at the prompt and press Return. The system displays: Switch(config)# Type no spanning-tree vlan 1 at the prompt and press Return. The system displays: Switch(config)# Type no aaa new-model at the prompt and press Return. The system displays: Switch(config)# Type no boot auto-copy-sw at the prompt and press Return. The system displays: Switch(config)# Type no file verify auto at the prompt and press Return. The system displays: Switch(config)# Type no shutdown at the prompt and press Return. The system displays: Switch(config)# Type no cdp run at the prompt and press Return. The system displays: Switch(config)#
10 Type no ip http server at the prompt and press Return. The system displays: Switch(config)# 11 Type interface range gigabitethernet1/0/1 - 12 at the prompt and press Return. The system displays: Switch(config-if-range)# 12 Type switchport mode access at the prompt and press Return. The system displays: Switch(config-if-range)# 13 Type switchport nonegotiate at the prompt and press Return. The system displays: Switch(config-if-range)# 14 Type no cdp enable at the prompt and press Return. The system displays: Switch(config-if-range)# 15 Type end at the prompt and press Return. The system displays: Switch#xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 16 Press Return. The system displays: Switch# 17 Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 18 Verify that the configuration for the Cisco switches matches the Emerson factory defaults (except for IP address and any shutdown information you may have entered) by typing show config at the prompt and pressing Return repeatedly to step through the file.Verify that the following items are in the configuration file: 1) no aaa new-model (near the beginning of the file) 2) no boot auto-copy-sw (near the beginning of the file) 3) no ip igmp snooping (near the beginning of the file)
209
4) no file verify auto (near the beginning of the file) 5) no spanning-tree vlan 1 (near the beginning of the file) 6) interface gigabitethernet1/0/1 through 1/0/12 switchport nonegotiate no cdp enable 7)shutdown (near the end of the file) 8)no ip http server (near the end of the file) 9)no cdp run (near the end of the file) 19 After verifying the above information, press Return until the Switch# prompt appears. This is the end of the Emerson Factory Default configuration process. switchport mode access
210
Switch# 1 To view network statistics for all ports on the switch, type show interface at the prompt and press Return repeatedly to display all ports. The information varies depending on switch address, port connections, and network load. To clear or zero the fast ethernet port counters to get fresh data, type clear counters at the prompt and press Return. The system displays: Clear show interface counters on all interfaces [confirm] Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics. 3 Press Return. The system displays: Switch# %CLEAR-5-COUNTERS: Clear counter on all interfaces by console 4 5 Press Return. The system displays: Switch# The serial console port can also be used to view Ethernet controller statistics. To view statistics for Ethernet Port 1 for example, type the following at the prompt: show controller ethernet-controller gigabitethernet1/ 0/1 and press Return repeatedly. The system displays the following lines: (Information varies depending on port connections, and network load.) Receive 0 Bytes 0 Unicast frames 0 Multicast frames 0 Broadcast frames 0 Unicast bytes 0 Multicast bytes 0 Broadcast bytes 0 Alignment errors 0 FCS errors 0 Oversize frames 0 Undersize frames 0 Collision fragments
Transmit GigabitEthernet1/0/1 0 Bytes 0 Unicast frames 0 Multicast frames 0 Broadcast frames 0 Too old frames 0 Deferred frames 0 MTU exceeded frames 0 1 collision frames 0 2 collision frames 0 3 collision frames 0 4 collision frames 0 5 collision frames 0 6 collision frames 0 7 collision frames 0 8 collision frames 0 9 collision frames 0 10 collision frames 0 11 collision frames
0 Minimum size frames 0 65 to 127 byte frames 0 128 to 255 byte frames 0 256 to 511 byte frames 0 512 to 1023 byte frames
211
0 12 collision frames 0 13 collision frames 0 14 collision frames 0 15 collision frames 0 Excessive collisions 0 Late collisions 0 VLAN discard frames 0 Excess defer frames 0 64 byte frames 0 127 byte frames 0 255 byte frames 0 511 byte frames 0 1023 byte frames 0 1518 byte frames 0 Too large frames 0 Good (1 coll) frames 0 Good (>1 coll) frames Switch# 6
0 Symbol error frames 0 Invalid frames, too large 0 Valid frames, too large 0 Invalid frames, too small 0 Valid frames, too small
0 Too old frames 0 Valid oversize frames 0 System FCS error frames 0 RxPortFifoFull drop frame
To view controller statistics for all ports on the switch, type show controller ethernet- controller at the prompt and press Return repeatedly. All ports are displayed. (Information varies depending on switch address, port connections, and network load.) To clear or zero the ethernet controller counters to get fresh data, type clear controller ethernet-controller at the prompt and press Return. The system displays: Switch#
Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
Enabling the Cisco 3750G-12S Switch for Telnet and Web Management
1 An IP address and subnet mask must be entered to manage the switch using telnet or a web browser. To begin the process of entering IP management information, type config t at the Switch# prompt and press Return. The system displays: Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#
212
2 3
Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Enter an approved IP address followed by the subnet mask by typing ip address 10.4.128.18 255.254.0.0 and press Return at the prompt. The system displays: Switch(config-if)# Type no shutdown at the prompt and press Return. The system displays: Switch(config-if)# xxxxx %LINK-3-UPDOWN: Interface Vlan1, changed state to up xxxxx %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up
5 6 7
Press Return at the prompt. The system displays: Switch(config-if)# Type ip http server at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# xxxxx %SYS-5-CONFIG_I: Configured from the console by console
8 9
Press Return at the prompt. The system displays: Switch# To permanently save the IP address, subnet mask, and shutdown configuration information, type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch#
10 To view the new IP address information, type sho config, and press Return at the prompt. Verify that the new IP address and subnet mask are entered correctly toward the end of the configuration file and that the parameter shutdown is no longer present as it was when viewing Emerson factory defaults in Verifying Emerson Factory Defaults on the Cisco 3750G-12 Switch. When all IP address information is verified, use the management PC stations web browser to enter the switchs IP address for managing the switch. See the Cisco documentation for use of the Cisco web management interface.
Using the Web Console to Set Up a Telnet Password to Manage the Cisco 3750G-12S Switch
Telnet switch management can be used from within the web browser by selecting telnet from the Cisco switch display in the web browser. Before telnet can be used however, complete all of the steps in Enabling the Cisco 3750G-12S Switch for Telnet and Web Management. When those steps are complete, attach a fiber optic cable between one of the switchs gigabit interface ports with the appropriate twisted pair gigabit transceiver to connect to the twisted pair port of the management PC. Then enter the IP address of the new switch in the Internet Explorer address box of the switch management station and the Cisco switch display will appear. This display is the embedded Cisco switch management software called Device Manager. Complete these steps to enable Telnet access to the switch:
213
1 2 3 4
From the Device Manager display, in the Contents section, select Tools | Telnet, then select the Express Setup link. In the Network Settings section, enter a switch password and then confirm the switch password. In the Optional Settings section, enter a Telnet password and then confirm the telnet password. Select the Enable button. At the bottom of the switch page, select Submit to save the configuration.
Alternately, if the serial connection is still attached to the switch once the passwords are entered from the web browser, enter the write mem command from the config t switch prompt and the new password information will be saved in permanent memory. You can view the new passwords and access levels by entering the show config command at the switch prompt either from the serial console port or from telnet.
214
At the Switch> prompt at either a telnet session or serial port session, type ena and press Return. The system displays: Switch# Type config t at the prompt and press Return. The system displays: Switch(config)# Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Type cdp run at the prompt and press Return. The system displays: Switch(config)# If port 12 is used as a connection to another switch, type interface gigabitethernet 1/0/12 at the prompt and press Return. The system displays: Switch(config-if)# Type cdp enable at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch#xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console Press return. The system displays: Switch# Type write mem at the prompt and press Return. The system displays: Building configuration... [OK] Switch#
2 3 4 5
6 7 8 9
10 Type show config at the prompt and press Return repeatedly and verify that "no cdp enable" has been removed from the port 12 configuration (compare port 12 to other ports to ensure that "no cdp enable" is removed from this port). Press Return repeatedly to verify that near the end of the file, "no cdp run" has been removed. Refer to Verifying Emerson Factory Defaults on the 3750G-12S Switch to compare to the Emerson factory default configuration. 11 Cisco Discover Protocol (CDP) has now been successfully configured and saved to permanent memory. Repeat this process for all other switches in this network and for each port that has a switch-to-switch port connection. When configuration is complete, use the web browser on the network management station to start the Cisco Network Assistant application (available as a download from the Cisco website). This will start the automatic discovery of all switches on the network; then they can be assigned to a cluster number and name for management. Consult the Cisco documentation and information from the Cisco Network Assistant application for additional information. If you do not have access to the Cisco Network Assistant application software, you can assign individual IP addresses (from the approved IP address list) and manage the switches individually using the switchs built-in Device Manager software.
215
after the switch has stopped booting and wait until the Switch> prompt displays. The switch is now ready for normal operation.
216
217
service timestamps log uptime no service password-encryption ! hostname Switch ! ! no aaa new-model no boot auto-copy-sw switch 1 provision ws-c3750-24fs ip subnet-zero ! no ip igmp snooping ! ! ! no file verify auto ! spanning-tree mode rapid-pvst spanning-tree extend system-id no spanning-tree vlan 1 ! vlan internal allocation policy ascending ! interface FastEthernet1/0/1 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/2 switchport mode access switchport nonegotiate duplex full no cdp enable
218
! interface FastEthernet1/0/3 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/4 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/5 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/6 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/7 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/8 switchport mode access switchport nonegotiate
219
duplex full no cdp enable ! interface FastEthernet1/0/9 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/10 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/11 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/12 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/13 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/14
220
switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/15 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/16 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/17 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/18 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/19 switchport mode access switchport nonegotiate duplex full no cdp enable
221
! interface FastEthernet1/0/20 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/21 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/22 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/23 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface FastEthernet1/0/24 switchport mode access switchport nonegotiate duplex full no cdp enable ! interface GigabitEthernet1/0/1 switchport mode access switchport nonegotiate
222
no cdp enable ! interface GigabitEthernet1/0/2 switchport mode access switchport nonegotiate no cdp enable ! interface Vlan1 no ip address no ip route-cache shutdown ! ip classless no ip http server ! no cdp run ! control-plane ! ! line con 0 line vty 0 4 no login line vty 5 15 no login ! ! end Switch# 9 Verify that your switch configuration matches the preceding configuration. Note that as additional configuration occurs, some information changes. The information above is for a new switch from the Emerson factory. Directory of flash:/ xxxxx config.text xxxxx c3750-ipbase-mz.12225.SEB2 xxxxxxx bytes total (xxxxxxx bytes free) Switch# 11 Verify that the filenames displayed match the above filenames. Note that as additional configuration occurs, file size changes. The information above is for a new switch from the Emerson factory. If the file names do not
10 Type show flash at the prompt and press Return. The following lines display:
223
match, refer to Configuring the 3750-24FS Switch to Emerson Defaults to configure the switch to the minimum defaults for use with the DeltaV system.
224
16 Type switchport mode access at the prompt and press Return. The system displays: Switch(config-if-range)# 17 Type switchport nonegotiate at the prompt and press Return. The system displays: Switch(config-if-range)# 18 Type no cdp enable at the prompt and press Return. The system displays: Switch(config-if-range)# 19 Type end at the prompt and press Return. The system displays: Switch#xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 20 Press Return. The system displays: Switch# 21 Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 22 Verify that the configuration for the Cisco switches matches the Emerson factory defaults (except for IP address and shutdown information you may have entered) by typing show config at the prompt and pressing Return repeatedly to step through the file. Verify that the following items are in the configuration file: 1) no aaa new-model (near the beginning of the file) 2) no boot auto-copy-sw (near the beginning of the file) 3) no ip igmp snooping (near the beginning of the file) 4) no file verify auto (near the beginning of the file) 5) no spanning-tree vlan 1 (near the beginning of the file) 6) interface fastethernet1/0/1 through 1/0/24 and gigabit ethernet1/0/1 through 1/0/2 switchport mode access switchport nonegotiate no cdp enable 7) interface fastethernet1/0/1 through 1/0/24 duplex full 8) shutdown (near the end of the file) 9) no ip http server (near the end of the file) 10) no cdp run (near the end of the file) 23 After verifying the above information, press Return until the Switch# prompt appears. This is the end of the Emerson Factory Default configuration process.
225
FastEthernet1/0/1 is down, line protocol is down (notconnect) Hardware is Fast Ethernet, address is 0014.69a7.2403 (bia 0014.69a7.2403) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Auto-duplex, Auto-speed, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts (0 multicast) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns
0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out Switch#
226
To view network statistics for all ports on the switch, type show interface at the prompt and press Return repeatedly to display all ports. The information varies depending on switch address, port connections, and network load. To clear or zero the fast ethernet port counters to get fresh data, type clear counters at the prompt and press Return. The system displays: Clear show interface counters on all interfaces [confirm]
Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics. 3 Press Return. The system displays: Switch# %CLEAR-5-COUNTERS: Clear counter on all interfaces by console 4 5 Press Return. The system displays: Switch# The serial console port can also be used to view Ethernet controller statistics. To view statistics for Ethernet Port 1 for example, type the following at the prompt: show controller ethernet-controller fastethernet1/ 0/1 and
227
press Return repeatedly. The system displays the following lines: (Information varies depending on port connections, and network load.) Transmit FastEthernet1/0/1 0 Bytes 0 Unicast frames 0 Multicast frames 0 Broadcast frames 0 Too old frames 0 Deferred frames 0 MTU exceeded frames 0 1 collision frames 0 2 collision frames 0 3 collision frames 0 4 collision frames 0 5 collision frames 0 6 collision frames 0 7 collision frames 0 8 collision frames 0 9 collision frames 0 10 collision frames 0 11 collision frames 0 12 collision frames 0 13 collision frames 0 14 collision frames 0 15 collision frames 0 Excessive collisions 0 Late collisions 0 VLAN discard frames 0 Excess defer frames 0 64 byte frames 0 127 byte frames 0 255 byte frames 0 511 byte frames 0 1023 byte frames 0 1518 byte frames 0 Too large frames 0 Good (1 coll) frames 0 Good (>1 coll) frames Switch# 0 Too old frames 0 Valid oversize frames 0 System FCS error frames 0 RxPortFifoFull drop frame 0 Symbol error frames 0 Invalid frames, too large 0 Valid frames, too large 0 Invalid frames, too small 0 Valid frames, too small 0 Minimum size frames 0 65 to 127 byte frames 0 128 to 255 byte frames 0 256 to 511 byte frames 0 512 to 1023 byte frames 0 1024 to 1518 byte frames 0 Overrun frames 0 Pause frames Receive 0 Bytes 0 Unicast frames 0 Multicast frames 0 Broadcast frames 0 Unicast bytes 0 Multicast bytes 0 Broadcast bytes 0 Alignment errors 0 FCS errors 0 Oversize frames 0 Undersize frames 0 Collision fragments
228
To view controller statistics for all ports on the switch, type show controller ethernet-controller at the prompt and press Return repeatedly. All ports are displayed. (Information varies depending on switch address, port connections, and network load.) To clear or zero the ethernet controller counters to get fresh data, type clear controller ethernet-controller at the prompt and press Return. The system displays: Switch#
Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
Enabling the Cisco 3750-24FS Switch for Telnet and Web Management
1 An IP address and subnet mask must be entered to manage the switch using telnet or a web browser. To begin the process of entering IP management information, type config t at the Switch# prompt and press Return. The system displays: Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# 2 3 Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Enter an approved IP address followed by the subnet mask by typing ip address 10.4.128.18 255.254.0.0 and press Return at the prompt. The system displays: Switch(config-if)# 4 Type no shutdown at the prompt and press Return. The system displays: Switch(config-if)# xxxxx %LINK-3-UPDOWN: Interface Vlan1, changed state to up xxxxx %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up 5 6 7 Press Return at the prompt. The system displays: Switch(config-if)# Type ip http server at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# xxxxx %SYS-5-CONFIG_I: Configured from the console by console 8 9 Press Return at the prompt. The system displays: Switch# To permanently save the IP address, subnet mask, and shutdown configuration information, type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch#
229
10 To view the new IP address information, type sho config, and press Return at the prompt. Verify that the new IP address and subnet mask are entered correctly toward the end of the configuration file and that the parameter shutdown is no longer present as it was when viewing Emerson factory defaults in Verifying Emerson Factory Defaults on the Cisco 3750-24FS Switch. When all IP address information is verified, use the management stations web browser to enter the switchs IP address for managing the switch. See the Cisco documentation for information on using the Cisco web management interface.
Using the Web Console to Set Up a Telnet Password to Manage the Cisco 3750-24FS Switch
Telnet switch management can be used from within the web browser by selecting telnet from the Cisco switch display in the web browser. However, before telnet can be used, complete all of the steps in Enabling the Cisco 3750-24FS-S Switch for Telnet and Web Management. When these steps are complete, attach a fiber optic cable between one of the switchs MTRJ fiber optic Ethernet ports and a media converter to connect to the twisted pair port of the management PC, or use the switch's gigabit interface port with the appropriate twisted pair gigabit transceiver to connect to the twisted pair port of the management PC. Then enter the IP address of the new switch in the Internet Explorer address box of the switch management station; the Cisco switch display will appear. This display is Cisco's embedded switch management software called Device Manager. Complete these steps to enable Telnet access to the switch: 1 2 3 4 From the Contents section of the Device Manager display, select Tools | Telnet, then select the Express Setup link. In the Network Settings section, enter a switch password and then confirm the switch password. In the Optional Settings section, enter a telnet password and then confirm the telnet password. Select the Enable button. At the bottom of the switch page, select Submit to save the configuration.
Alternately, if the serial connection is still attached to the switch once the passwords are entered from the web browser, enter the write mem command from the config t switch prompt and the new password information will be saved in permanent memory. You can view the new passwords and access levels by entering the show config command at the switch prompt either from the serial console port or from telnet.
230
enabled (running), and only the two fiber optic ports must have no cdp enable removed from their port configuration. The same is true for any other port on a switch that is connected to another switch. Similarly, it is true for a twisted pair port on one switch that is connected to a twisted pair port on another switch. If cluster management is used, enable "cdp run" for the overall switch and remove no cdp enable for each connected switch-to-switch port. The following procedure shows how to configure a switch for the (CDP) using the serial console port or telnet interface. This allows the cluster command switch to find the other switches on the network automatically and draw a network map. Note If you do not have access to download Ciscos Network Assistant software from the Cisco web site or have no plans to use cluster management, there is no need to configure CDP on the switches. If this is the case but you still want to use web management for the switches, you will only need to assign IP addresses from the approved IP address list to each switch individually and then use the switchs built-in Device Manager software and web browser on the management station PC to manage the switches. To configure CDP on the switches for use with the Cisco Network Assistant software (must be downloaded from the Cisco website), perform the following steps: 1 At the Switch> prompt at either a telnet session or serial port session, type ena and press Return. The system displays: Switch# 2 3 4 5 Type config t at the prompt and press Return. The system displays: Switch(config)# Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Type cdp run at the prompt and press Return. The system displays: Switch(config)# If port 24 is used as a connection to another switch, type interface fastethernet 1/0/24 at the prompt and press Return. The system displays: Switch(config-if)# 6 7 Type cdp enable at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 8 9 Press return. The system displays: Switch# Type write mem at the prompt and press Return. The system displays: Building configuration... [OK] Switch# 10 Type show config at the prompt and press Return repeatedly. Verify that "no cdp enable" has been removed from the port 24 configuration (compare port 24 to other ports to see that "no cdp enable" is removed from this port).
231
Press Return repeatedly to verify that near the end of the file, "no cdp run" has been removed. Refer to Verifying Emerson Factory Defaults on the 3750-24FS Switch to compare to the Emerson factory default configuration. 11 Cisco Discover Protocol (CDP) has now been successfully configured and saved to permanent memory. Repeat this process for all other switches in this network and for each port that has a switch-to-switch port connection. When configuration is complete, use the web browser on the network management station to start the Cisco Network Assistant application (available as a download from the Cisco website). This will start the automatic discovery of all switches on the network. Then they can be assigned to a cluster number and name for management. Consult Cisco documentation and information within the Cisco Network Assistant application for additional information. If you do not have access to the Cisco Network Assistant application software, you can assign individual IP addresses (from the approved IP address list) and manage the switches individually using the switchs built-in Device Manager software.
232
state to up 8 9 Press Return, the system displays: Would you like to terminate autoinstall? [yes]: Type y and press Return. The system displays: Would you like to enter the initial configuration dialog? [yes/no]: 10 Type n and press Return. The systems displays: Switch> 11 Type ena at the Switch> prompt and press Return. The system displays: Switch# 12 Type sho config at the Switch# prompt and press Return. The system displays: startup-config is not present 13 Type sho flash at the Switch# prompt and press Return. The system displays: c3750-ipbase-mz.122-25.SEB2 without config.text or private config.text files present 14 Return to the Configuring the 3750-24FS Switch to Emerson Defaults section for correct switch configuration.
233
This topic explains how to verify that the correct Emerson defaults have been configured on the Cisco 3750-24TS switch and explains how to configure the defaults if necessary. It also provides additional configuration information.
234
no service password-encryption ! hostname Switch ! ! no aaa new-model no boot auto-copy-sw switch 1 provision ws-c3750-24ts ip subnet-zero ! no ip igmp snooping ! ! ! no file verify auto ! spanning-tree mode rapid-pvst spanning-tree extend system-id no spanning-tree vlan 1 ! vlan internal allocation policy ascending ! interface FastEthernet1/0/1 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/2 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/3 switchport mode access
235
switchport nonegotiate no cdp enable ! interface FastEthernet1/0/4 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/5 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/6 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/7 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/8 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/9 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/10
236
switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/11 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/12 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/13 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/14 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/15 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/16 switchport mode access switchport nonegotiate no cdp enable !
237
interface FastEthernet1/0/17 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/18 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/19 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/20 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/21 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/22 switchport mode access switchport nonegotiate no cdp enable ! interface FastEthernet1/0/23 switchport mode access switchport nonegotiate no cdp enable
238
! interface FastEthernet1/0/24 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/1 switchport mode access switchport nonegotiate no cdp enable ! interface GigabitEthernet1/0/2 switchport mode access switchport nonegotiate no cdp enable ! interface Vlan1 no ip address no ip route-cache shutdown ! ip classless no ip http server ! no cdp run ! control-plane ! ! line con 0 line vty 0 4 no login line vty 5 15 no login
239
! ! end Switch# 10 Verify that your switch configuration matches the preceding configuration. Note that as additional configuration occurs, some information changes. The information above is for a new switch from the Emerson factory. 11 Type show flash at the prompt and press Return. The following lines display: Directory of flash:/ xxxxx config.text xxxxx c3750-ipbase-mz.122-25.SEB2 xxxxxxx bytes total (xxxxxxx bytes free) Switch# 12 Verify that the filenames displayed match the above filenames. Note that as additional configuration occurs, file size changes. The information above is for a new switch from the Emerson factory. If the file names do not match, refer to Configuring the 3750-24TS Switch to Emerson Defaults to configure the switch to the minimum defaults for use with the DeltaV system.
240
2 3 4 5 6 7 8 9
Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if) Type no ip igmp snooping at the prompt and press Return. The system displays: Switch(config)# Type no spanning-tree vlan 1 at the prompt and press Return. The system displays: Switch(config)# Type no aaa new-model at the prompt and press Return. The system displays: Switch(config)# Type no boot auto-copy-sw at the prompt and press Return. The system displays: Switch(config)# Type no file verify auto at the prompt and press Return. The system displays: Switch(config)# Type no ip http server at the prompt and press Return. The system displays: Switch(config)# Type shutdown at the prompt and press Return. The system displays: Switch(config)#
10 Type no cdp run at the prompt and press Return. The system displays: Switch(config)# 11 Type interface range fastethernet1/0/1 - 24 at the prompt and press Return. The system displays: Switch(config-if-range)# 12 Type switchport mode access at the prompt and press Return. The system displays: Switch(config-if-range)# 13 Type switchport nonegotiate at the prompt and press Return. The system displays: Switch(config-if-range)# 14 Type no cdp enable at the prompt and press Return. The system displays: Switch(config-if-range)# 15 Type interface range gigabitethernet1/0/1 2 at the prompt and press Return. The system displays: Switch(config-if-range)# 16 Type switchport mode access at the prompt and press Return. The system displays: Switch(config-if-range)# 17 Type switchport nonegotiate at the prompt and press Return. The system displays: Switch(config-if-range)# 18 Type no cdp enable at the prompt and press Return. The system displays: Switch(config-if-range)# 19 Type end at the prompt and press Return. The system displays: Switch# xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console 20 Press Return. The system displays: Switch#
241
21 Type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 22 Verify that the configuration for the Cisco switches matches the Emerson factory defaults (except for IP address and shutdown information you may have entered) by typing show config at the prompt and pressing Return repeatedly to step through the file. 23 Verify that the following items are in the configuration file: 1) no aaa new-model (near the beginning of the file) 2) no boot auto-copy-sw (near the beginning of the file) 3) no ip igmp snooping (near the beginning of the file) 4) no file verify auto (near the beginning of the file) 5) no spanning-tree vlan 1 (near the beginning of the file) 6) interface fastethernet1/0/1 through 1/0/24 and gigabitethernet1/0/1 through 1/0/2 switchport mode access switchport nonegotiate no cdp enable 7) shutdown (near the end of the file) 8) no ip http server (near the end of the file) 9) no cdp run (near the end of the file) 24 After verifying the above information, press Return until the Switch# prompt appears. This is the end of the Emerson Factory Default configuration process.
242
FastEthernet1/0/1 is down, line protocol is down (notconnect) Hardware is Fast Ethernet, address is 0014.69a7.2403 (bia 0014.69a7.2403) MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec, reliability 255/255, txload 1/255, rxload 1/255 Encapsulation ARPA, loopback not set Keepalive set (10 sec) Auto-duplex, Auto-speed, media type is 10/100BaseTX input flow-control is off, output flow-control is unsupported ARP type: ARPA, ARP Timeout 04:00:00 Last input never, output never, output hang never Last clearing of "show interface" counters never Input queue: 0/75/0/0 (size/max/drops/flushes); Total output drops: 0 Queueing strategy: fifo Output queue: 0/40 (size/max) 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 0 packets input, 0 bytes, 0 no buffer Received 0 broadcasts (0 multicast) 0 runts, 0 giants, 0 throttles 0 input errors, 0 CRC, 0 frame, 0 overrun, 0 ignored 0 watchdog, 0 multicast, 0 pause input 0 input packets with dribble condition detected 0 packets output, 0 bytes, 0 underruns 0 output errors, 0 collisions, 1 interface resets 0 babbles, 0 late collision, 0 deferred 0 lost carrier, 0 no carrier, 0 PAUSE output 0 output buffer failures, 0 output buffers swapped out Switch# To view network statistics for all ports on the switch, type show interface at the prompt and press Return repeatedly to display all ports. The information varies depending on switch address, port connections, and network load. 1 To clear or zero the fast ethernet port counters to get fresh data, type clear counters at the prompt and press Return. The system displays: Clear show interface counters on all interfaces [confirm] Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
243
Press Return. The system displays: Switch#%CLEAR-5-COUNTERS: Clear counter on all interfaces by console
The serial console port can also be used to view Ethernet controller statistics. To view statistics for Ethernet Port 1 for example, type the following at the prompt: show controller ethernet-controller fastethernet1/ 0/1 and press Return repeatedly. The system displays the following lines: (Information varies depending on port connections, and network load.)
244
Transmit FastEthernet1/0/1 Receive 0 Bytes 0 Bytes 0 Unicast frames 0 Unicast frames 0 Multicast frames 0 Multicast frames 0 Broadcast frames 0 Broadcast frames 0 Too old frames 0 Unicast bytes 0 Deferred frames 0 Multicast bytes 0 MTU exceeded frames 0 Broadcast bytes 0 1 collision frames 0 Alignment errors 0 2 collision frames 0 FCS errors 0 3 collision frames 0 Oversize frames 0 4 collision frames 0 Undersize frames 0 5 collision frames 0 Collision fragments 0 6 collision frames 0 7 collision frames 0 Minimum size frames 0 8 collision frames 0 65 to 127 byte frames 0 9 collision frames 0 128 to 255 byte frames 0 10 collision frames 0 256 to 511 byte frames 0 11 collision frames 0 512 to 1023 byte frames 0 12 collision frames 0 1024 to 1518 byte frames 0 13 collision frames 0 Overrun frames 0 14 collision frames 0 Pause frames 0 15 collision frames 0 Excessive collisions 0 Symbol error frames 0 Late collisions 0 Invalid frames, too large 0 VLAN discard frames 0 Valid frames, too large 0 Excess defer frames 0 Invalid frames, too small 0 64 byte frames 0 Valid frames, too small 0 127 byte frames 0 255 byte frames 0 Too old frames 0 511 byte frames 0 Valid oversize frames 0 1023 byte frames 0 System FCS error frames 0 1518 byte frames 0 RxPortFifoFull drop frame 0 Too large frames 0 Good (1 coll) frames 0 Good (>1 coll) frames Switch# 4 To view controller statistics for all ports on the switch, type show controller ethernet-controller at the prompt and press Return repeatedly. All ports are displayed. (Information varies depending on switch address, port connections, and network load.)
245
To clear or zero the ethernet controller counters to get fresh data, type clear controller ethernet-controller at the prompt and press Return. The system displays: Switch#
Note Clear the counters after all cables have been attached so that temporary cable installation errors are not counted as part of the run time statistics.
Enabling the Cisco 3750-24TS Switch for Telnet and Web Management
1 An IP address and subnet mask must be entered to manage the switch using telnet or a web browser. To begin the process of entering IP management information, type config t at the Switch# prompt and press Return. The system displays: Enter configuration commands, one per line. End with CNTL/Z. Switch(config)# 2 3 Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Enter an approved IP address followed by the subnet mask by typing: ip address 10.4.128.18 255.254.0.0 and press Return at the prompt. The system displays: Switch(config-if)# 4 Type no shutdown at the prompt and press Return. The system displays: Switch(config-if)# xxxxx %LINK-3-UPDOWN: Interface Vlan1, changed state to up xxxxx %LINEPROTO-5-UPDOWN: Line protocol on Interface Vlan1, changed state to up 5 6 7 Press Return at the prompt. The system displays: Switch(config-if)# Type ip http server at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch# xxxxx %SYS-5-CONFIG_I: Configured from the console by console 8 9 Press Return at the prompt. The system displays: Switch# To permanently save the IP address, subnet mask, and shutdown configuration information, type write mem at the prompt and press Return. The system displays: Building configuration. . . [OK] Switch# 10 To view the new IP address information, type sho config, and press Return at the prompt. Verify that the new IP address and subnet mask are entered correctly toward the end of the configuration file and that the parameter
246
shutdown is no longer present as it was when viewing Emerson factory defaults in Verifying Emerson Factory Defaults on the Cisco 3750-24TS Switch. When all IP address information is verified, use the management PC stations web browser to enter the switchs IP address for managing the switch. Refer to the Cisco documentation for information on using the Cisco web management interface.
Using the Web Console to Set Up a Telnet Password to Manage the Cisco 3750-24TS Switch
Telnet switch management can be used from within the web browser by selecting telnet from the Cisco switch display in the web browser. Before telnet can be used however, complete all of the steps in Enabling the Cisco 3750-24TS Switch for Telnet and Web Management. When those steps are complete, attach a shielded, twisted pair cable to one of the switchs Ethernet ports. Then enter the IP address of the new switch in the Internet Explorer address box of the switch management station. The Cisco switch display will appear. This display is the embedded Cisco switch management software called Device Manager. Complete these steps to enable Telnet access to the switch: 1 2 3 4 From the Device Manager display, in the Contents section, select Tools | Telnet, and select the Express Setup link. In the Network Settings section, enter a switch password and confirm the switch password. In the Optional Settings section, enter a Telnet password and confirm the telnet password. Select the Enable button. At the bottom of the switch page, select Submit to save the configuration.
Alternately, if the serial connection is still attached to the switch once the passwords are entered from the web browser, enter the write mem command from the config t switch prompt and the new password information will be saved in permanent memory. You can view the new passwords and access levels by entering the show config command at the switch prompt either from the serial console port or from telnet.
247
interface. This allows the cluster command switch to find the other switches on the network automatically and draw a network map. Note If you do not have access to download Ciscos Network Assistant software from the Cisco website or have no plans to use cluster management, there is no need to configure CDP on the switches. If this is the case but you still want to use web management for the switches, you will only need to assign individual IP addresses from the approved IP address list to each switch individually and then use the switchs built in Device Manager software and web browser on the management station PC to manage the switches. To configure CDP on the switches for use with the Cisco Network Assistant software that has to be downloaded from the Cisco web, do the following steps: 1 At the Switch> prompt at either a telnet session or serial port session, type ena and press Return. The system displays: Switch# 2 3 4 5 Type config t at the prompt and press Return. The system displays: Switch(config)# Type interface vlan1 at the prompt and press Return. The system displays: Switch(config-if)# Type cdp run at the prompt and press Return. The system displays: Switch(config)# If port 24 is used as a connection to another switch, type interface fastethernet 0/24 at the prompt and press Return. The system displays: Switch(config-if)# 6 7 8 9 Type cdp enable at the prompt and press Return. The system displays: Switch(config-if)# Type end at the prompt and press Return. The system displays: Switch#xx:xx:xx: %SYS-5-CONFIG_I: Configured from console by console Press return. The system displays: Switch# Type write mem at the prompt and press Return. The system displays: Building configuration... [OK] Switch# 10 Type show config at the prompt and press Return repeatedly and verify that "no cdp enable" has been removed from the port 24 configuration (compare port 24 to other ports to see that "no cdp enable" is removed from this port). Press Return repeatedly to verify that near the end of the file, "no cdp run" has been removed. Refer to Verifying Emerson Factory Defaults on the 3750-24TS Switch to compare to the Emerson factory default configuration. Cisco Discover Protocol (CDP) has now been successfully configured and saved to permanent memory. Repeat this process for all other switches in this network and for each port that has a switch-to-switch port connection. When configuration is complete, use the web browser on the network management station to start the Cisco Network Assistant application (available as a download from the Cisco web). This will start the automatic discovery of all switches on the network and then they can be assigned to a cluster number and name for management. Consult Cisco documentation and information within the Cisco Network Assistant application for additional information. If you do not have access to the Cisco Network Assistant application software, you
248
can assign individual IP addresses (from the approved IP address list) and manage the switches individually using the switchs built-in Device Manager software.
249
11 Type ena at the Switch> prompt and press Return. The system displays: Switch# 12 Type sho config at the Switch# prompt and press Return. The system displays: startup-config is not present 13 Type sho flash at the Switch# prompt and press Return. The system displays: c3750-ipbase-mz.122-25.SEB2 without config.text or private config.text files present 14 Return to the Configuring the 3750-24TS Switch to Emerson Defaults section for correct switch configuration.
250
Problem Solving
These sections provide information to assist you in troubleshooting various issues that you may encounter with a DeltaV system. They include topics pertaining to controller and I/O, the DeltaV database, network performance, and so on.
Communication
If you have communication problems, run the DeltaV Diagnosticsprogram. Select the ACN and check the communication status. Then, check each device on the network to see if it is communicating properly. When communication problems exist, clicking Control Network on the tree view in the Diagnostics program provides a quick overview to help determine the source of the problem. A communication integrity problem is indicated on a node when it is unable to communicate on the affected link. As shown in the example diagram below, workstation WRKS1 is running the Diagnostics program and gathering information on nodes CTRL1, CTRL2, and WRKS2 (in addition to itself WRKS1). A communication problem exists on the secondary connection between nodes WRKS1 and CTRL1, as indicated by the overlay on the Secondary communications level of the hierarchy tree. Communications on the secondary are OK to node CTRL2, and node WRKS2 has no secondary connection. The Contents View shows all 4 nodes and their current communication status. PRI and SEC indicate primary and secondary links. In this case, both WRKS1 and CTRL1 show BAD SEC-OCInteg. OCInteg is the Overall Connection Integrity, which is BAD when ANY connection to this node is BAD. To determine which of these nodes is causing the BAD integrity, look at the SEC-OLInteg parameter. OLInteg is the Overall Link Integrity, which is BAD when ALL connections to this node are BAD (same information as shown by the overlay on the hierarchy tree). In this case, WRKS1 shows GOOD SEC-OLInteg (able to communicate with at least one other nodeCTRL2 in this case), and CTRL1 shows BAD SEC-OLInteg (unable to communicate with any other node). From this you can see that the source of the problem is the secondary connection on node CTRL1.
Problem Solving
251
In summary, the OLInteg Overall Link Integrity parameter being BAD typically indicates the source of the problem. Note If a node is communicating with only one other node, both OLInteg and OCInteg are bad regardless of whether or not the node is the source of the problem. For additional details (typically not required), select the Communications (or Primary or Secondary) level on one of the affected nodes. Then, click the right mouse button and click Display Comm Connection List. This list shows the current status of communications between this node and all the nodes with which it is communicating.
In this case, the SecStatus shows BAD on node CTRL1. Selecting the node of interest (controller CTRL1 in the example above) from the list under Connection To and then clicking the Node Details button displays specific packet and error counters for the connection between WRKS1 (the node originally selected) and node CTRL1.
The secondary normally has no traffic, so the communications scheme relies on background traffic (Heartbeats) to determine whether the integrity/connection is good. Heartbeats are sent/received every 15 seconds between nodes expecting to communicate. Integrity is not marked bad until 3 Heartbeats are missed, so it takes 4560 seconds maximum for a disconnected cable to show bad.
252
The above statistics show that the secondary on node WRKS1 sent 6 Heartbeats Out to node CTRL1 and received 0 Heartbeats In from it. Similar statistics are displayed if you select the node CTRL1 and then select detailed statistics between CTRL1 and node WRKS1. In this case, you would not know which of the 2 nodes was at fault, only that they could not communicate with each other. You can reset these Communication Details counters by selecting the Reset Details button. You can also confirm proper connection by selecting the Controller secondary on diagnostics, clicking the right mouse button, and then clicking TCP/IP Ping. Note If multiple workstations trying to communicate to the same controller are reporting communication problems and the controller itself is not reporting a communication problem, the problem might be communication message timeouts due to very heavy controller loading. To troubleshoot this situation, select the Communications subsystem under one of the workstations, click the right mouse button, and click Display Comm Connection List. In the Display Communications Connections List dialog box, select the controller, click Node Details, and check the communication details between the workstation and the controller. If the AckTmOut value between the two nodes is non-zero, click Reset Details and check again in 15 minutes. If timeouts occur more than once every 15 minutes, decrease the controller loading.
Problem Solving
253
Fieldbus Device Alarms (FDA) icon does not show up in DeltaV Explorer
254
If Individual fieldbus Device Alarms (Failed, Maintenance, Advisory, Abnormal, or No Comm) from a particular device do not show up in the right pane of DeltaV Explorer Unable to download fieldbus device (conditions related to Device Alarms may cause this)
Check these Items Enable Device Alarms on the device's properties page, alarms and displays tab.
Use DeltaV Diagnostics to verify connections with the device. Verify that you have the correct controller and I/O. Device Alarms are only supported with Series 2 H1 cards.
Problem Solving
255
256
How Can You Detect a Problem with the Backup Link Active Scheduler (LAS)?
View the integrity of the device in DeltaV Diagnostics.
Problem Solving
257
Either the DeltaV Explorer is not connected to the active database or the DeltaV Database server is not running. *For more information about cable connections, refer to Installing Your DeltaV Digital Automation System.
258
Possible Cause Primary and secondary control network connections are crossed.
Corrective action 1. Use the Identify Controller function in the DeltaV Explorer Node Properties menu to flash the controller LEDs. 2. Verify that the primary control network cables are connected to the correct primary ports on the controller, workstation, and hub.3. Verify that the secondary control network cables are connected to the correct secondary ports on the controller, workstation, and hub. Check the IP addresses for the primary and secondary control networks (using Workstation Configuration). If switched, the DeltaV system does not communicate with the controller, but the controller appears to be commissioned (lights indicate this). The only evidence is that the controller is listed with the X indicator in DeltaV Explorer.
*For more information about cable connections, refer to Installing Your DeltaV Automation System.
Problem Solving
259
When the FRETIM parameter value is 0, one of two conditions exist: All modules are running at their configured execution rate. There is no module slippage. In this case, it is likely that adding control modules to the configuration will introduce slippage. Control module execution attempted to exceed the 65 percent allocation and has been clamped. Not all modules are executing on time, and module slippage is occurring. The degree of slippage is indicated by the diagnostics parameters LPctOnTime, MPctOnTime, and HPctOnTime.
Either of these two cases is undesirable. Either the maximum configuration is reached or slippage is occurring. For this reason, it is recommended that the modules configured in the controller (when downloaded) allow for a FRETIM value no less than 5-10. You can improve a FRETIM by slowing down the execution rate of one or more modules. As previously mentioned, a FRETIM value of 0 allows 35 percent of the CPU for other processing, such as communications. If the control modules are at 65 percent and the number of data links requested from outside the DeltaV system exceeds 35 percent of the CPU resources, the controller CPU is overloaded. In an overload condition, controller operation degrades. In this case, communication requests cannot all be serviced in a timely fashion, resulting in stale data at the PC or timeout indications and downloads or diagnostic requests. The FREMEM parameter is an indication of the amount of free memory (in bytes) available for user configuration. Control modules, function blocks diagrams, and sequential function charts all consume configuration memory. It is inadvisable to construct configurations that drive the FREMEM value to 0. A minimum of 400K is recommended for controller FREMEM. Note that loaded phases dynamically consume memory. Consider the impact of loaded phases when calculating FREMEM.
260
Database
Inside this topic Are You Unable To Find the Database? Are You Unable To Open the Database? Is the Database Locked? Are You Unable To Perform Database Operations? Is the Workstation Using the Wrong Database? This section discusses problems you might encounter with the database.
Problem Solving
261
Click Start | Settings | Control Panel | Administrative Tools and then double-click the Services icon or click the right mouse button on the task bar and then click Task Manager to verify that this service is running. If this service is not running, start it. (Click Start | Settings | Control Panel | Administrative Tools. Then, double-click the Services icon.)
262
DeltaV Programs
Inside this topic Do DeltaV Services Fail To Start Automatically? Does the System Not Function as Expected? Is the System Time Inconsistent? Does Process History View Display an Error Message? Does Process History View Fail To Open Files? Is Channel CV Misleading in Excel or DeltaV Operate? The DeltaV software consists of many executable files, and some are dependent on other executable files. This section some issues that you might encounter with DeltaV Programs. You might also want to run the Diagnostics program to obtain more detailed information about what is happening in your DeltaV system.
To verify that the DeltaV program was started, click Start | Settings | Control Panel | Administrative Tools and then double-click the Services icon.
Problem Solving
263
Several programs depend on these accounts to operate properly and this utility handles changing the password where needed for you. Do not assign the node name of DeltaV to your machine. Make sure that the DeltaVAdmin account is a member of the DeltaV group. Grant Log on as service and Change system time privileges to the DeltaVAdmin account. Grant Read Execute access to the bin and library directories to the DeltaV group. Grant Write access to the data directory and its subdirectories to the DeltaV group.
264
If the Sharing tab is not visible, try using Services in Control Panel (click Start | Settings | Control Panel | Administrative Tools and then double-click the Services icon) to start your Server service. Comments help users locate shared information. To read comments, click Details on the Network Neighborhood View menu and look under Comment.
Problem Solving
265
266
Log On
Users might be unable to log on to the DeltaV system for several reasons: The user might not have an account on the workstation. The user might not have an Operating System (Windows) account and/or a DeltaV Database Account. The user might not have a password or might have forgotten the password.
Perform the following actions. 1 Use the DeltaV User Manager to verify that the user has an account on the workstation. Click Start | DeltaV | Engineering | User Manager. The DeltaV User Manager program opens.
If the user's name does not appear in the list of users, create an account for the user. If the user has an account, verify that the user has an Operating System (Windows) account and/or a DeltaV Database Account. 2 Create a new user account by clicking File | New | User.
Problem Solving
267
3 4 5 6 7 8 9
Enter the user's username in the Name field. The username is the name that identifies this user to the DeltaV system. For example, Jsmith. Enter the user's full name in the Full Name field. The full name identifies the user to the system administrator rather than to the DeltaV system (for example, John Smith). Enter a password for this user in the password field. (Make a note of the password because you will give this password to the user.) Retype the password in the Confirm Password field to confirm that this is the correct password. Click DeltaV Database Account to allow this user to log on to the DeltaV system. Select the Operating System (Windows) account to allow this user to log on to the DeltaV system from this machine. Write a short description of the account in the Operating System (Windows) Description field. Click OK.
10 Download the runtime database with the new information. Refer to the Download the Runtime Database topic for more information. A user might have an account but might lack the required account type. There are two account types: DeltaV database account Operating System (Windows) Account
The DeltaV database account defines the set of DeltaV privileges that a particular user has. Users cannot log on to the DeltaV system without a DeltaV database account. An operating system account allows DeltaV users access to the DeltaV system on a specific machine. DeltaV users can log on to a specific machine only if they have an operating system account on that machine. To verify user accounts, perform the following tasks:
268
Click Start | DeltaV | Engineering | User Manager. The DeltaV User Manager program opens.
The Properties for User dialog box opens. 3 Verify that both account types (Operating System (Windows) Account and DeltaV Database Account) are checked and then click OK. However, if one of the account types is not checked, click the check box for that account type and then click OK. Download the workstation.
Problem Solving
269
Users might be unable to log on because they forgot the password or because their accounts were created without a password. To create a new password: 1 2 3 4 Open the DeltaV User Manager. In the list of names, double-click the user's name to open the Properties for User dialog box. Enter a password for this user in the password field. (Make a note of the password because you will give this password to the user.) Retype the password in the Confirm Password field to confirm that this is the correct password.
270
Modules
Inside this topic Debugging Modules Restoring One Module This section contains some options for troubleshooting your modules.
Debugging Modules
There are two views in Control Studio that enable you to debug a module's algorithm. They are On-line view and Debug view. The On-line view allows you to perform testing of SFCs, function blocks, and modules. The Debug view is used to solve problems, identify areas to increase performance, or gain an understanding of a module. Each view lets you look at the block's input and output value and lets you step through the algorithm one block at a time. In Debug view, you can set breakpoints to stop execution at a particular block. Note You can only debug downloaded modules, and you can affect your process if you change values or stop execution. If you receive the message Failure to establish session, verify that the module you are debugging or viewing online is downloaded in the controller. This message also appears if the controller is reset while an online (or debug) session is in progress. For more information on debugging, refer to the Online and Debug Viewing of Function Blocks topic.
Problem Solving
271
Network Performance
Network performance problems might be caused by address conflicts. If you configure a new database, you must use the DBAdmin tools to create a database and set the database to Active. Then, to create the master node in the database, you must run DeltaV Workstation Configuration (PCInstall) under the DeltaV | Installation menu. If you do not run PCInstall to create the master node, the IP address in the database might not be the IP address at which the workstation network cards are configured. As a result, when you create a new controller in the DeltaV Explorer using drag-and-drop, a decommissioned controller address can conflict with the IP address of the workstation. The DeltaV ProfessionalPLUS or Application Station connects your DeltaV system to your Plant LAN. Make sure that this connection only transfers the information that you intend it to transfer. Transferring unnecessary information can cause your network to slow down. Therefore, it is important that you understand routing characteristics and take the necessary actions to make sure that your system is properly configured. Refer to your router documentation for more information.
272
Parameters/Fields
If you are unable to write to a parameter or field, make sure that you have the keys to unlock this parameter or field. You must have the Can Configure key to look at locks. Contact your system administrator to find out whether or not you have the Can Configure key. To verify the current user, follow these steps: 1 2 3 4 Determine the lock on the parameter or field. Use the DeltaV Explorer to determine which lock protects this parameter or field. Verify the area that has been assigned to the workstation. Click Help | About DeltaV Explorer. Look at the Current User panel.
If your name appears in this panel, you are the current user. If you are not the current user, click Tools | DeltaV Logon and log on. Contact your system administrator if you do not know your user name or password or if you get an error when logging on. Once you have verified the current user, perform the following steps: 1 2 Click Start | DeltaV | Engineering | DeltaV Explorer. In the DeltaV Explorer, expand System Configuration as well as Setup. Then, click Security. In the Contents of Security area of the window, click Parameter Security to look at locks on parameters or Field Security to look at locks on fields. The Parameter Security Properties or Field Security Properties dialog box opens. 3 4 Scroll through the list in the Parameter Security or Field Security dialog box, find the parameter or field you want to write to, and make a note of the lock that protects the parameter or field. Close the dialog box.
If you do not have a key to the lock, ask the system administrator to grant you that key for the area assigned to the workstation. The system administrator uses the following procedure to grant a key to the lock that protects the field or parameter: 1 Click Start | DeltaV | Engineering | User Manager. The DeltaV User Manager program opens. 2 3 4 5 Double-click the user name to open the Properties For User dialog box and click the Keys tab. Select the lock in the All Locks list, click the Grant Key button to grant that key to the user, and then select the Plant Area for which the user needs the key. That is, the same area as assigned to the workstation. Click OK. Return to the DeltaV Explorer to download the runtime database.
You must have the Can Download key to download the runtime database. Contact your system administrator to find out whether or not you have this privilege. To download the runtime database using the DeltaV Explorer: 1 2 3 Select the workstation that you want to download, click the right mouse button, and then click Download. Click the first option on the slide-off menu (for example, ProfessionalPlus Station). Follow the prompts to download the workstation.
Problem Solving
273
Restarting
When recovering from a system crash, perform the following steps: 1 Restart the computer (that is, click Start | Shut Down, click Restart the computer, and then click Yes).
Caution When restarting, do not cycle power. This can affect the entire system and potentially cause more extensive damage.
2 3
Restart the DeltaV software. Wait until all services have started (the disk stops) before you log on.
274
Workstation
Inside this topic Does the Workstation Have an X Indicator? Is the Workstation Using the Wrong Database? Are You Unable To Download or Configure the Workstation? Log On to the DeltaV System Check the System Identification Key Check Execution Keys Download the Runtime Database This section discusses workstation problems that you might encounter.
Node is not connected to the hub. Control network cable is not working correctly. Workstation address is set to a default value or an incorrect address.
Problem Solving
275
276
2 3
If your name appears after Current user:, you are already logged on to the DeltaV system. Go to the Check Execution Keys topic. If <none> or another user name appears after Current user:, find your name in the User Name drop-down list, enter your user password, and click OK. Contact your system administrator if you do not know your user name or password or if your user name is not listed in the User Name drop-down list. If another user name appears after Current user:, find your name in the User Name drop-down list, enter your password, and click OK. Contact your system administrator if you do not know your user name or password or if your user name is not listed in the User Name drop-down list.
Note You can also use the Windows Run command to log on and off of the DeltaV system.
Problem Solving
277
To log on and off (respectively) of the DeltaV system using the Windows Run command, perform the following steps: 1 Click Start | Run and type the following:
hlo.exe -user UserName -password UserPassWord -computer ComputerName (where UserName is the user's name, UserPassword is the user's password, and ComputerName is the workstation name.) hlo.exe -logoff 2 Click OK. If you are still unable to download, refer to the following topics: Check the System Identification Key Check Execution Keys Download the Runtime Database
If the System Identification Key is plugged in securely and you are still unable to download the workstation, contact DeltaV Technical Support.
278
To determine if execution keys are assigned: 1 Click Start | DeltaV | Engineering | User Manager.
Problem Solving
279
Double-click the user name to open the Properties For User dialog box and click the Keys tab.
Note You must have the Can Download key to download the workstation and the Can Configure key to modify the configuration database. 3 4 Look at the Has Key For area. If Can Download and Can Configure are not in the list, add them and then click OK. Go to the Download the Runtime Database topic.
280
To download the runtime database: 1 Click Start | DeltaV | Engineering | DeltaV Explorer. The DeltaV Explorer program opens.
Select the workstation that you want to download and click the right mouse button. Then, click Download and click the first item from the slide-off menu (for example, ProfessionalPLUS Station).
If you are still unable to download the workstation, verify that the System Identification Key is securely plugged into the workstation.
Problem Solving
281
Technical Support
Refer to the DeltaV Service Guide that was packed with your license for information about available services.
Have you previously been able to successfully run DeltaV software? Determine which DeltaV services are running by clicking the right mouse button in the task bar and clicking Task Manager. Click the Processes tab to see a list of tasks that are currently running. Is the DeltaV software the only program that does not work? What is the succession of events that occurred just before this problem appeared?
If you are calling, be at your computer if possible. This enables the Technical Support Representative to step you through the proper problem solving procedures.
282
Index
A
access 167 40, 44, 49, 53, 57, 58, 61 167 access license access,DeltaV accounts 3, 9 3 9 3
boot sequence
21 21
C
CAL cards 40, 49 144 144 40, 49
cards,upgrading
accounts,domain accounts,managing
accounts,non-domain accounts,types 9
AS-Interface devices,diagnosing audit trail for user manager auto run 167 167 9
Connections, Database 167 control module slippage controller LEDs controllers 167 256
B
backup 81, 117, 137 282 81 backup and restore
crash
274
D
Data historian 92 92 Data historian,sizing guidlines Database 282 79, 282 282 282
BIOS security
database 21
database export
database migration
Index
283
database search
107 107
diagnosing, use the DeltaV Diagnostics program diagnosing,AS-Interface devices diagnosing,controllers 117 diagnosing,devices 147 147
147
147 147
database tools,backup
diagnosing,Profibus devices 282 282 diagnosing,workstations diagnostics 67, 147, 251 147
147
database tools,configuration functions database tools,synchronize workstations database tools,utilities database upgrade 282 282 282
diagnostics,remote operation network diagnostics,remote operator station diagnostics,remote workstation disabling 103 103 67 67
67
282
79
download,timeouts on
256 116
6 6 49
E
emergency repair disk 137 6 environmental security protection for operators equipment 170 170
DeltaV Operate, replacing opening pictures DeltaV Operate, sharing violation DeltaV Remote 49
equipment,additions equipment,repair
170 170
123
F
Fault-tolerant server 147 fault-tolerant server fieldbus devices 31 31
284
fieldbus devices,diagnosing
147 254
installing
66 66
108
K
keys 164
L
103 LEDs 256 256 92 88 88 LEDs, controller
functions,version control
G
groups 9, 164 9 groups,DeltaV
Legacy Historian
H
H1 card 256 256 H1 card,recommendations for failure situations H1 fieldbus devices 144 144
92
licensing,remote application stations licensing,remote operator stations lock server locks 282 63
63
history report,version control host 40, 44, 49, 53, 57, 58, 61 38 38
22 22
host machine
I
I/O cards 147 147 I/O cards,diagnosing indicator installation
M
Maintenance Station 18 9 40 managing user accounts
Microsoft Remote Desktop Connection Microsoft Terminal Server Microsoft Windows Server migrate database 282 40 40
installation checklist
Index
285
modify
282 282
Q
question mark 147, 251
R N
Network Time Protocol network time server NIC binding order 23 137 3 23 recommended practices 137 137 recommended practices,alarm on low disk space recommended practices,periodic disk checks recover 115 115 137
O
Operator Station operators 6 6 18
Remote Access Control Application remote applications support Remote Client remote client 40 53 53 63
P
parameters 273 273 parameters,writing to passwords 9 9
58
53
49
Professional Station
Remote Client,setting time limits Remote Client,starting a session Remote Client,terminology 147 Remote Client,using 49 40
58 44
49
purge,version control
286
remote desktop
SOE card
23 23
SOE card, using with a network time server software 144, 146 146 144
70 70 67
remote network connections,switching remote operation network diagnostics remote operator station diagnostics remote service control installation remote systems 72 67 67 70
63 70 70
81
T
technical support 120 Terminal Server terminal server 282 40 40, 44, 49, 53, 57, 58, 61 40, 44, 49, 53, 57, 58, 61 23
S
securing the DeltaV Operate environment securing workstation security 20 6
135
troubleshooting 251, 256, 261, 263, 265, 266, 267, 271, 272, 273, 274 troubleshooting, fieldbus devices troubleshooting,crash 274 274 254
SIS components
144 144
265
snapshot,version control
troubleshooting,network performance
Index
287
troubleshooting,software
256 251
116 108
troubleshooting,software,communication troubleshooting,software,Explorer troubleshooting,software,modules troubleshooting,software,program TS CAL TSCAL 40, 49 40, 49 9 256 271 263
version control,item differences version control,item history version control,labels version control,locks 116 103 107 108
U
upgrade database upgrades 144 9 282
version control,restoring an archive version control,setting preferences version control,setup 103 117
version control,snapshot 9 9 9
117
user accounts,DeltaV
W
Windows groups 5 5 5 Windows groups,creating Windows groups,managing Windows system logon workgroups workstation 3 20 18 29 22
user accounts,managing user accounts,types User Manager user manager users 58, 164 164 61 9
V
VCAT see version control version control 103 135 117 123 118 103
workstation software
Version Control data file Size version control database backup version control error conditions
X
X 147, 256, 275
version control, user manager version control,check in version control,check out 106 106
Y
yellow pages 107 29 29 yellow pages, see auto-update
version control,database search version control,disabling version control,download version control,functions 103 116 103
103
288