Ni Series: Webconsole & Programming Guide
Ni Series: Webconsole & Programming Guide
NI Series
NetLinx Integrated Controllers
NI-700/900 NI-2000/3000/4000 NI-2100/3100/4100 NI-3101-SIG NXC-ME260/64
All products returned to AMX require a Return Material Authorization (RMA) number. The RMA number is obtained from the AMX RMA Department. The RMA number must be clearly marked on the outside of each box. The RMA is valid for a 30-day period. After the 30-day period the RMA will be cancelled. Any shipments received not consistent with the RMA, or after the RMA is cancelled, will be refused. AMX is not responsible for products returned without a valid RMA number. AMX is not liable for any damages caused by its products or for the failure of its products to perform. This includes any lost profits, lost savings, incidental damages, or consequential damages. AMX is not liable for any claim made by a third party or by an AMX Authorized Partner for a third party. This Limited Warranty does not apply to (a) any AMX product that has been modified, altered or repaired by an unauthorized agent or improperly transported, stored, installed, used, or maintained; (b) damage caused by acts of nature, including flood, erosion, or earthquake; (c) damage caused by a sustained low or high voltage situation or by a low or high voltage disturbance, including brownouts, sags, spikes, or power outages; or (d) damage caused by war, vandalism, theft, depletion, or obsolescence. This limitation of liability applies whether damages are sought, or a claim is made, under this warranty or as a tort claim (including negligence and strict product liability), a contract claim, or any other claim. This limitation of liability cannot be waived or amended by any person. This limitation of liability will be effective even if AMX or an authorized representative of AMX has been advised of the possibility of any such damages. This limitation of liability, however, will not apply to claims for personal injury. Some states do not allow a limitation of how long an implied warranty last. Some states do not allow the limitation or exclusion of incidental or consequential damages for consumer products. In such states, the limitation or exclusion of the Limited Warranty may not apply. This Limited Warranty gives the owner specific legal rights. The owner may also have other rights that vary from state to state. The owner is advised to consult applicable state laws for full determination of rights. EXCEPT AS EXPRESSLY SET FORTH IN THIS WARRANTY, AMX MAKES NO OTHER WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. AMX EXPRESSLY DISCLAIMS ALL WARRANTIES NOT STATED IN THIS LIMITED WARRANTY. ANY IMPLIED WARRANTIES THAT MAY BE IMPOSED BY LAW ARE LIMITED TO THE TERMS OF THIS LIMITED WARRANTY. EXCEPT AS OTHERWISE LIMITED BY APPLICABLE LAW, AMX RESERVES THE RIGHT TO MODIFY OR DISCONTINUE DESIGNS, SPECIFICATIONS, WARRANTIES, PRICES, AND POLICIES WITHOUT NOTICE.
Table of Contents
Table of Contents
Overview ............................................................................................................1
NetLinx Integrated Controllers ................................................................................. 1 About This Document ............................................................................................... 1 Related Documents................................................................................................... 2 Quick Setup and Configuration Overview ................................................................ 2
Installation Procedures.................................................................................................... 2 Configuration and Communication.................................................................................. 2 Update the On-board Master and Controller Firmware .................................................. 3 Configure NetLinx Security on the NI Controller ............................................................ 3
Upgrading NXC Card Firmware Via IP .................................................................... 19 Resetting the Factory Default System and Device Values ...................................... 21
Table of Contents
Security Overview................................................................................................... 29
Default Security Configuration ...................................................................................... 30 Login Rules .................................................................................................................... 30 User Name and Password Rules .................................................................................... 30
ii
Table of Contents
SSL Certificate Options ................................................................................................. 56 Creating an SSL Server Certificate ................................................................................ 56 SSL Certificate Entries................................................................................................... 57 Displaying SSL Server Certificate Information............................................................... 58 Creating a Request for an SSL Certificate ..................................................................... 58 Self-Generating an SSL Certificate ................................................................................ 58 Regenerating an SSL Server Certificate Request........................................................... 58 Exporting an SSL Certificate Request ........................................................................... 59 Importing an SSL Certificate ......................................................................................... 60
System - Manage NetLinx ....................................................................................... 66 System - Manage Devices ....................................................................................... 68 Manage Devices - Device Options .......................................................................... 68
Configuring Device Binding Options............................................................................. 68 Managing Device Modules ............................................................................................ 69
Programming ....................................................................................................81
Overview ................................................................................................................ 81 Port Assignments By NI Model .............................................................................. 81 Master Send_Commands ........................................................................................ 81 Master IP Local Port Send_Commands ................................................................... 83
iii
Table of Contents
LED Disable/Enable Send_Commands .................................................................... 84 RS232/422/485 Ports Channels .............................................................................. 84 RS-232/422/485 Send_Commands ......................................................................... 84 RS-232/422/485 Send_String Escape Sequences.................................................... 88 IR / Serial Ports Channels ....................................................................................... 89 IR RX Port Channels ................................................................................................ 89 IR/Serial Send_Commands ...................................................................................... 89 Input/Output Send_Commands .............................................................................. 95
Accessing the Security Configuration Options...................................................... 113 Setup Security Menu............................................................................................. 115
Security Options Menu................................................................................................ 116 Edit User Menu............................................................................................................ 117 Edit Group Menu......................................................................................................... 117 Access Rights Menu..................................................................................................... 118 Adding a Group........................................................................................................... 118 Edit Group Menu: Add Directory Association ............................................................. 119 Default Security Configuration .................................................................................... 120
Telnet Diagnostics Commands.............................................................................. 121 Logging Out of a Terminal Session ....................................................................... 121 Notes on Specific Telnet/Terminal Clients ............................................................ 122
WindowsTM Client Programs ...................................................................................... 122 Linux Telnet Client....................................................................................................... 122
iv
Table of Contents
SpdAddBypass ........................................................................................................... 130 SpdAddDiscard .......................................................................................................... 131 SpdSetProp ................................................................................................................ 132 SpdSetPropAttrib ....................................................................................................... 136 spdSetSA .................................................................................................................... 137
Sample IPSec Configuration File ........................................................................... 146 IPSec Web Configuration Interface ....................................................................... 147
Table of Contents
vi
Overview
Overview
NetLinx Integrated Controllers
NetLinx Integrated Controllers (Masters) can be programmed to control RS-232/422/485, Relay, IR/ Serial, and Input/Output devices using the NetLinx Studio application (version 2.4 or higher).
NetLinx Integrated Controllers
NI-700 (FG2105-03) NI-900 (FG2105-09) NI-3101-SIG (FG2105-08) NI-2000 (FG2105-01) NI-3000 (FG2105-02) NI-4000 (FG2105) NXC-ME260/64 (FG2010-64) NI-2100 (FG2105-04) NI-3100 (FG2105-05) NI-4100 (FG2105-06)
These NI Controllers feature an on-board Web Console which allows you to connect to the NI Controller via a web browser and make various configuration and security settings. The Web Console is described in this document (starting with the Onboard WebConsole User Interface section on page 23). These NI Controllers are Duet-compatible and can be upgraded via firmware. Duet is a dual-interpreter firmware platform from AMX which combines the proven reliability and power of NetLinx with the extensive capabilities of the Java MicroEdition (JavaME) platform. Duet simplifies the programming of a system that includes the NI-900 and other third party devices by standardizing device and function definitions, defaulting touch panel button assignments, and controlling feedback methods. Dynamic Device Discovery makes integration even easier by automatically identifying and communicating with devices which support this beaconing technology. Refer to the Manage Devices - Device Options section on page 68 for more detailed information on the use of Dynamic Device Discovery (DDD).
Overview
Related Documents
For detailed descriptions of NI Controller hardware, including specifications, port assignments, installation procedures, connection and wiring information, refer to the Hardware Reference Guide for your Master:
Related Documents
Title NXI-700/900 NetLinx Integrated Controllers - Hardware Reference Guide NXI-x000 NetLinx Integrated Controllers - Hardware Reference Guide (NI-2000, NI-3000, NI-4000) NXI-x100 NetLinx Integrated Controllers - Hardware Reference Guide (NI-2100, NI-3100, NI-4100) NI-3101-SIG Signature Series NetLinx Integrated Controller - Operation/Reference Guide NXC-ME260/64 NetLinx Master-Ethernet Card/Module - Hardware Reference Guide NetLinx CardFrame, Control Cards, and NetModules Instruction Manual NetLinx Studio v2.4 or higher Instruction Manual NetLinx Programming Language Reference Guide
Overview
1. Launch Internet Explorer with the Bonjour plug-in. 2. Once power is applied to the device, the Bonjour plugin displays the device in the list of devices as shown in FIG. 1: 3. Double-click on the desired NetLinx Controller to access the Web Console of the selected device.
This requires valid login information - the browser will prompt you for User ID and Password before displaying the configuration pages for the selected device. Notice that the serial number is appended to the name of the device. At this point, the device can be configured (changing IP settings, NetLinx settings, User settings, etc) via the pages in the Web Console (see the Onboard WebConsole User Interface section on page 23).
Overview
Overview
Overview
1. Launch NetLinx Studio 2.x (default location is Start > Programs > AMX Control Disc > NetLinx Studio 2 > NetLinx Studio 2). 2. Select Settings > Master Communication Settings, from the menu bar, to open the Master Communication Settings dialog box. 3. Click the Communications Settings button to open the Communications Settings dialog. 4. Click the NetLinx Master radio button (from the Platform Selection section) to indicate you are working with a NetLinx Master. 5. Click the Serial radio button (from the Transport Connection Option section) to indicate you are connecting to the Master via a COM port. 6. Click the Edit Settings button (on the Communications Settings dialog) to open the Serial Settings dialog and set the COM port parameters (used to communicate to the NetLinx Master). 7. Click OK to close all dialogs and return to the main application. 8. Right-click the Online Tree tab entry and select Refresh System: the Controller should appear in the Device Tree. If not, verify that the Serial cable is connected properly, and that the Baud Rate settings on the Controller (set via the Program Port DIP Switch) match the settings in NetLinx Studio.
Once Serial communication has been established, use NetLinx Studio to configure the Controller for Ethernet Communication, as described below.
1. Use an Ethernet cable to connect the Controller to the LAN to which the PC running NetLinx Studio is connected.
The NI-x100 Controllers feature an Auto MDI/MDI-X Ethernet port. This provides the option of using either a standard (straight through), or a crossover Ethernet cable to communicate with a PC - both cable types will work.
2. Select Diagnostics > Network Address from the menu bar and enter the System, Device (0 for a Master), and Host Name information. 3. To configure the Address:
Use a DHCP Address by selecting the Use DHCP radio button, then click the GET IP button (to obtain a DHCP Address from the DHCP Server), click the SET IP Information button (to retain the new address), and then finish the process by clicking the Reboot Master > OK buttons. Use a Static IP Address by selecting the Specify IP Address radio button, enter the IP parameters into the available fields, then click the SET IP Information button (to retain the pre-reserved IP Address to the Master), and then click the Reboot Master > OK buttons to finish the process.
4. Repeat steps 1 - 5 from the previous section, but rather than selecting the Serial option, choose TCP/IP and edit the settings to match the IP Address you are using (Static or IP). 5. Click on the Authentication Required radio box (if the Master is secured) and press the User Name and Password button to enter a valid username and password being used by the secured Master. 6. Click the OK to close all dialogs and return to the main application.
1. Access the Device Addressing dialog (FIG. 2) by selecting Diagnostics > Device Addressing.
Enter the Masters new Device value Assign the new value to the Master
A FIG. 2 NetLinx Studio: Device Addressing dialog (using the ID mode to set the NI Controllers device value)
2. In the Device field (A in FIG. 2), enter the new value for the NI Controller (range = 0 - 32767). 3. Press the Start Identify Mode button (B in FIG. 2).
This action causes the *Not Active* message (in red) to display a Waiting...Press Cancel to Quit message (in green). This message indicates that Studio is waiting to detect the device value of the NI Controller associated with the ID button.
4. Press the NI Controllers ID button to read the device value of the NI Controller, and assign it to the new value entered in step 2.
Once the swap has been successfully made, a red Successful Identification Made field appears. The previous Device and System numbers of the NI Controller are displayed below the red field.
Example: Previous D:S=32002:1, where 32002 represents the previous device value of the NI Controller (D) and 1 represents the NI Controllers System value (S).
1. In NetLinx Studio, select Diagnostics > Network Addresses from the Main menu to access the Network Addresses dialog (FIG. 3).
System Address reflects the value set in the Device Addressing tab
Used to obtain a Dynamic (DHCP) IP Address FIG. 3 NetLinx Studio: Network Addresses dialog (for a DHCP IP Address)
2. Verify that both the System number corresponds to the System value previously assigned within the Device Addressing tab and that zero (0) is entered into the Device field.
The system value must correspond to the Device Address entered in the Device Addressing dialog. Refer to the Manage System - System Number section on page 44 for more detailed instructions on setting a system value.
3. Click the Get IP Information button to configure the on-board Master for DHCP usage and then read the IP Address obtained from the DHCP Server.
DO NOT enter ANY IP information at this time; this step only gets the System Master to recognize that it should begin using an obtained DHCP Address.
4. Note the obtained IP Address (read-only). This information is later entered into the Master Communication Settings dialog and used by NetLinx Studio v 2.x to communicate to the NI Controller via an IP. This address is reserved by the DHCP server and then given to the Master.
If the IP Address field is empty, give the Master a few minutes to negotiate a DHCP Address with the DHCP Server, and try again. The DHCP Server can take anywhere from a few seconds to a few minutes to provide the Master with an IP Address.
5. Verify that NetLinx appears in the Host Name field (if not, then enter it in at this time). 6. Click the Use DHCP radio button from the IP Address section. 7. Click the Set IP Information button to retain the IP Address from the DHCP server and assign it to the on-board Master. A popup window then appears to notify you that Setting the IP information was successful and it is recommended that the Master be rebooted. 8. Click OK to accept the change to the new IP/DNS information. 9. Click the Reboot Master button and select Yes to close the Network Addresses dialog. 10. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot and retain the newly obtained DHCP Address.
10
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
11. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*.
Verify that these IP values are also entered into the related fields within either the IP Settings section of the System Connection page (on the touch panel) or within the Address field on the web browser.
12. Complete the communication process by continuing on to the Communicating Via an IP section on page 12.
1. In NetLinx Studio, select Diagnostics > Network Addresses from the Main menu to access the Network Addresses dialog (FIG. 4).
System Address reflects the value set in the Device Addressing tab
2. Verify that both the System number corresponds to the System value previously assigned within the Device Addressing tab and that zero (0) is entered into the Device field.
The system value must correspond to the Device Address previously entered in the Device Addressing tab. Refer to the Manage System - System Number section on page 44 for more detailed instructions on setting a system value.
3. Click the Get IP Information button to temporarily configure the on-board Master for DHCP usage and then read the IP Address obtained from the DHCP Server. 4. Click the Specify IP Address radio button from the IP Address section. With this action, all IP fields become editable. 5. Verify that NetLinx appears in the Host Name field (if not, then enter it in at this time). 6. Enter the IP Address, Subnet Mask, and Gateway information into their respective fields. 7. Click the Set IP Information button to cause the on-board Master to retain this new IP Address (pre-obtained from the System Administrator).
11
8. Click OK to accept the change to the new IP/DNS information. 9. Click the Reboot Master button and select Yes to close the Network Addresses dialog. 10. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot and retain the newly obtained DHCP Address.
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
11. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*.
Verify that these IP values are also entered into the related fields within either the IP Settings section of the System Connection page (on the touch panel) or within the Address field on the web browser.
12. Complete the communication process by continuing on to the Communicating Via an IP section on page 12.
Communicating Via an IP
Whether the on-board Masters IP Address was Static Set (via the Set IP Info command) or Dynamically obtained (via the Get IP Info command), use the IP Address information from the Network Addresses dialog to establish communication via the Ethernet-connected Master.
1. Use NetLinx Studio to obtain the IP Address of the NI Controller from your System Administrator.
If you do not have an IP Address: Follow the steps outlined in either the Obtaining the NI Controllers IP Address (using DHCP) section on page 9, or the Assigning a Static IP to the NI Controller section on page 11.
2. Select Settings > Master Communication Settings from the Main menu to open the Master Communication Settings dialog (FIG. 5).
12
3. Click the Communications Settings button to open the Communications Settings dialog. 4. Click on the NetLinx Master radio button (from the Platform Selection section) to indicate you are working with a NetLinx Master (such as the NXC-ME260/64 or NI-Series of Integrated Controllers). 5. Click on the TCP/IP radio button (from the Transport Connection Option section) to indicate you are connecting to the Master via an IP Address. 6. Click the Edit Settings button (on the Communications Settings dialog) to open the TCP/IP Settings dialog (FIG. 5). This dialog contains a series of previously entered IP Address/URLs and their associated names, all of which are stored within Studio and are user-editable. 7. Click the New button to open the New TCP/IP Settings dialog where you can enter both a previously obtained DHCP or Static IP Address and an associated description for the connection into their respective fields. 8. Place a checkmark within the Automatically Ping the Master Controller to ensure availability radio box to make sure the Master is initially responding online before establishing full communication. 9. Click OK to close the current New TCP/IP Settings dialog and return to the previous TCP/IP Settings dialog where you must locate your new entry within the List of Addresses section. 10. Click the Select button to make that the currently used IP Address communication parameter. 11. Click OK to return to the Communications Settings dialog and place a checkmark within the Authentication Required radio box if your Master has been previously secured with a username/ password. 12. Click on the Authentication Required radio box (if the Master is secured) and then press the User Name and Password button to open the Master Controller User Name and Password dialog. 13. Within this dialog, you must enter a previously configured username and password (with sufficient rights) before being able to successfully connect to the Master. 14. Click OK to save your newly entered information and return to the previous Communication Settings dialog where you must click OK again to begin the communication process to your Master.
If you are currently connected to the assigned Master, a popup asks whether you would want to temporarily stop communication to the Master and apply the new settings.
15. Click Yes to interrupt the current communication from the Master and apply the new settings. 16. Once the particular System Master is configured for communication via an IP Address, remove the DB9 connector from the Program port on the NI on-board Master. 17. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the Master to reboot.
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
18. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*. 19. Click the OnLine Tree tab in the Workspace window to view the devices on the System. The default System value is one (1). 20. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is then highlighted in green on the bottom of the NetLinx Studio window.
13
If the connection fails to establish, a Connection Failed dialog appears. Try selecting a different IP Address if communication fails. Press the Retry button to reconnect using the same communication parameters. Press the Change button to alter your communication parameters and repeat steps 4 thru 18.
1. After Studio has established a connection with the target Master, click on the OnLine Tree tab in the Workspace window to view the devices on the System. The default System value is one (1). 2. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is highlighted in green on the bottom of the NetLinx Studio window.
The current installed firmware version of the on-board NI Master is displayed to the right of the device within the Online Tree tab as 00000 NI Master.
3. After the Communication Verification dialog indicates active communication between the PC and the Master, verify the NetLinx Master (00000 NI Master) appears within the OnLine Tree tab of the Workspace window (FIG. 6).
The default NI Master value is zero (00000) and cannot be changed.
On-board NI Master Control cards (NI-4x00 ONLY) NetLinx Integrated Controller NetLinx Studio version Unbound Dynamic Device
14
4. If either the on-board NI Master or Integrated Controller is not the latest firmware version, follow the procedures outlined in the following sections to obtain these Kit files from www.amx.com and then transfer the new firmware Kit files to the device.
Only Master firmware Kit files use the word _Master in the Kit file name.
1. Follow the procedures outlined within the Communicating Via an IP section on page 12 to connect to the target NI device via the web. 2. After NetLinx Studio has established a connection to the target Master, click the OnLine Tree tab of the Workspace window to view the devices on the System. The default System value is one (1). 3. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is highlighted in green on the bottom of the NetLinx Studio window.
15
4. After the Communication Verification dialog window verifies active communication between the PC and the Master, verify the NetLinx Master (00000 NI Master) appears in the OnLine Tree tab of the Workspace window. The default NI Master value is zero (00000).
First upgrade of the on-board Master using the Masters Kit file. The Integrated Controller can later be upgraded using the Controllers Kit file. BOTH Kits should be used when upgrading any firmware associated with the Integrated Controllers.
5. If the on-board Master firmware being used is not current, download the latest Kit file by first logging in to www.amx.com and then navigating to Tech Center > Firmware Files, where you can locate the desired file from within the NetLinx section of the web page. 6. Click on the desired Kit file link and after youve accepted the Licensing Agreement, verify you have downloaded the correct NI Master firmware (Kit) file to a known location. 7. In NetLinx Studio, select Tools > Firmware Transfers > Send to NetLinx Device to open the Send to NetLinx Device dialog (FIG. 7). Verify the targets System number matches the value listed within the active System folder in the OnLine Tree tab of the Workspace.
The Device number is always 0 for the NI Master.
Selected Master firmware file
Device and System Number must match the Device and System values listed in the Workspace window FIG. 7 Send to NetLinx Device dialog (showing on-board NI_Master firmware update via IP)
8. Select the NI Masters Kit file from the Files section (FIG. 7).
The Kit file for the NI-2000/3000/4000 Masters begins with 2105_NI-X000_Master. The Kit file for the NI-2100/3100/4100 Masters begins with 2105_04_NI-X100_Master. The Kit file for the NI-700/900 Masters begins with 2105-03_NI-X000_Master.
16
Do not use the 2105-03_NI_Master Kit file on anything other than an NI-700/900, since each Master Kit file is specifically configured to function on a specific NI unit.
9. Enter the System number associated with the target Master (listed in the OnLine Tree tab of the Workspace window) and verify the Device number value. The Port field is disabled. 10. Click the Reboot Device checkbox to reboot the NI unit after the firmware update process is complete. 11. Click Send to begin the transfer. The file transfer progress is indicated on the bottom-right of the dialog (FIG. 7).
Only upon the initial installation of a new Kit file to an on-board Master will there be a error message displayed indicating a failure of the last component to successfully download. This is part of the NI Master update procedure and requires that the firmware be reloaded after a reboot of the unit. This consecutive process installs the final component of the new Kit file.
12. After the last components fails to install, click Done. 13. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot.
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
14. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*. 15. Repeat steps 5 - 9 again (the last component will now successfully be installed). 16. Click Close once the download process is complete.
The OUTPUT and INPUT LEDs alternately blink to indicate the on-board Master is incorporating the new firmware. Allow the Master 20 - 30 seconds to reboot and fully restart.
17. Right-click the System number and select Refresh System. This establishes a new connection to the System and populates the list with the current devices (and their firmware versions) on your system.
17
On-board NI Master (NI-X000_Master) - Device 0 On-board Integrated Controller (NI-X000) NetLinx Studio version Unbound Dynamic Device
FIG. 8 Sample NetLinx Workspace window (showing separate NI-Master and Controller)
6. Click on the desired Kit file link and after youve accepted the Licensing Agreement, verify you have downloaded the Integrated Controller firmware (Kit) file to a known location. 7. From within Studio, select Tools > Firmware Transfers > Send to NetLinx Device from the Main menu to open the Send to NetLinx Device dialog (FIG. 9). Verify the targets System number matches the value listed within the active System folder in the OnLine Tree tab of the Workspace.
The Device must match the entry for the on-board Integrated Controller (ex: NI-4000 or NI-700) device.
Selected on-board Integrated Controller firmware file
Device and System Number must match the Device and System values listed in the Workspace window FIG. 9 Send to NetLinx Device dialog (showing on-board Integrated Controller firmware update via IP)
18
The Kit file for the Integrated Controller on the NI-2000/3000/4000 begins with 2105_NI_X000. The Kit file for the Integrated Controller on the NI-2100/3100/4100 begins with 2105_04_NI_X100. The Kit file for the NI-700/900 Series begins with 2105-03_NI_X000
Do not use the 2105-03_NI_X00 Kit file on anything other than an NI-700/900 since each Kit file is specifically configured to function on a specific NI unit.
8. Select the Integrated Controllers (_X00) from the Files section (FIG. 9). 9. Enter the System and Device numbers associated with the target Master (listed in the Workspace window). The Port field is greyed-out. 10. Click the Reboot Device checkbox to reboot the NI unit after the firmware update process is complete. 11. Click Send to begin the transfer. The file transfer progress is indicated on the bottom-right of the dialog (FIG. 9). 12. Click Close once the download process is complete.
The OUTPUT and INPUT LEDs alternately blink to indicate the unit is incorporating the new firmware. Allow the unit 20 - 30 seconds to reboot and fully restart.
13. Right-click the System number and select Refresh System. This establishes a new connection to the System and populates the list with the current devices (and their firmware versions) on your system. If The Connection Fails
If the connection fails to establish, a Connection Failed dialog appears. Try selecting a different IP Address if communication fails. Press the Retry button to reconnect using the same communication parameters. Press the Change button to alter your communication parameters and repeat steps 2 thru 11.
Before beginning with this section, verify that both the on-board Master and on-board Integrated Controller have been updated with the latest firmware and that the NetLinx cards are securely inserted into the NI-4000 or NI-4100.
1. Follow the procedures outlined within the Communicating Via an IP section on page 12 to connect to the target NI device via the web. 2. After NetLinx Studio has established a connection to the target Master, click the OnLine Tree tab of the Workspace window to view the devices on the System. The default System value is one (1). 3. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. The communication method is highlighted in green on the bottom of the NetLinx Studio window.
19
4. After the Communication Verification dialog window verifies active communication between the PC and the NI unit, verify the NetLinx NXC Control Cards appear in the OnLine Tree tab of the Workspace window (FIG. 10).
On-board NI Master
Control cards (NI-4x00 ONLY) NetLinx Integrated Controller NetLinx Studio version
If the control card firmware is not up to date; download the latest firmware file from www.amx.com > Tech Center > Downloadable Files > Firmware Files > NXC-XXX. In this example, the NXC-VOL card contains out-of-date firmware and requires build 1.00.09.
5. If the NXC card firmware being used is not current, download the firmware file by first logging in to www.amx.com and then navigate to Tech Center > Firmware Files and from within the NetLinx section of the web page locate the NXC card entries. 6. Click on the desired Kit file link and after youve accepted the Licensing Agreement, verify you have downloaded the NetLinx NXC card firmware (Kit) file to a known location. 7. Verify you have downloaded the latest NetLinx Control Card firmware (Kit) file to a known location. 8. Select Tools > Firmware Transfers > Send to NetLinx Device from the Main menu to open the Send to NetLinx Device dialog (FIG. 11). Verify the targets Device and System numbers matches the value listed within the System folder in the Workspace window. 9. Select the Control Cards Kit file from the Files section (FIG. 11) (in our above example we chose to update the NXC-VOL4 card). 10. Enter the System and Device numbers associated with the desired Master (listed in the Workspace window). A device value of 00003 is the same as a value of 3. 11. Click the Reboot Device checkbox to reboot the NI unit after the firmware update process is complete and then re-detect the new NXC card firmware. 12. Click Send to begin the transfer. The file transfer progress is indicated on the bottom-right of the dialog (FIG. 11). 13. Click Close once the download process is complete. 14. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot.
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
20
System Number and Device Number must match the System and Device values listed in the Workspace window FIG. 11 Select Control Card firmware file for download page (via IP)
15. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*. 16. Cycle power to the Master (unplug and reconnect power to the unit).
This process of cycling power acts to reset the updated NetLinx Control Card and detect its new firmware update. It also serves to allow the Integrated Controller to detect and reflect the new firmware on the card to the NetLinx Studio display on the Workspace window.
17. After Studio has establish a connection to target Master, click the OnLine Tree tab of the Workspace window to view the devices on the System. The default System value is one (1). 18. Right-click the associated System number and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system.
The communication method is highlighted in green on the bottom of the NetLinx Studio window.
2. Click the Set Device/System to Factory Default button. This resets both the system value and device addresses (for definable devices) to their factory default settings. The system information (in the OnLine Tree tab of the Workspace window) refreshes and then displays the new information.
21
By setting the system to its default value (#1), Modero panels that were set to connect to the Master on another System value will not appear in the OnLine Tree tab of the Workspace window. For example: A Modero touch panel was previously set to System #2. The system is then reset to its default setting of System #1 and then refreshed from within the Workspace window. The panel will not reappear until the system is changed (from within the System Connection page on the Modero) to match the new value and both the Master and panel are rebooted.
3. Click Done to close the Device Addressing dialog. 4. Click Reboot (from the Tools > Reboot the Master Controller dialog) and wait for the System Master to reboot.
The STATUS and OUTPUT LEDs should begin to alternately blink during the incorporation. Wait until the STATUS LED is the only LED to blink.
5. Press Done once until the Master Reboot Status field reads *Reboot of System Complete*. 6. Click the OnLine Tree tab in the Workspace window to view the devices on the System.
The default System value is one (1).
7. Right-click the associated System number (or anywhere within the tab itself) and select Refresh System. This establishes a new connection to the specified System and populates the list with devices on that system. 8. Use Ctrl+S to save these changes to your NetLinx Project.
22
Click to access the three main sections of the WebConsole (initial view = WebControl)
Select this option to show/hide the Online Device Tree (showing all devices currently connected to this Master)
The webconsole is divided into three primary sections, indicated by three control buttons across the top of the main page (FIG. 13):
WebControl: This is the option that is pre-selected when the WebConsole is accessed. Use the options in the Manage WebControl Connections page to manage G4WebControl connections (see the WebConsole - WebControl Options section on page 27). Security: Click to access the System Security page. The options in this page allow you to configure various aspects of NetLinx System and Security on the Master (see the WebConsole - Security Options section on page 29). System: Click to access the System Details page. The options on this page allow you to view and configure various aspects of the NetLinx System (see the WebConsole - System Options section on page 43).
23
1. Open a web browser and type the IP Address of the target Master in the Address Bar. 2. Press Enter to access WebConsole for that Master. The initial view is the WebControl page (FIG. 12).
Device Tree
Click the Show Device Tree checkbox to show/hide the online device tree, which indicates all devices currently connected to this Master. Use the plus and minus symbols to the left of each item in the Device Tree to expand the view to include System devices, ports and individual Port settings. At the Port view, you can use the Device Tree to make specific port assignments (including Channel and Level assignments) (FIG. 14).
(all Collapsed)
Opens the Network Settings page for this device FIG. 14 Online Device Tree
24
FIG. 15 Example Network Settings page for a sample CV15 connected to the Master
Use the options on this page to view/edit the devices network settings. Refer to the System - Manage System section on page 43 for details.
ZeroConfig Networking
Use these radio buttons to enable/disable the new Zero-Configuration (zeroconf) client in the Master. By default, zeroconf is enabled (On option selected). With zeroconf enabled, the Master's web interface will be registered via zeroconf and can be viewed through a zeroconf browser plug-in such as Bonjour for IE.
25
26
Click on any link listed here to open a new G4WebControl window to view the indicated panel
Compression options
FIG. 16 Manage WebControl Connections page (populated with 1 compatible G4 touch panel)
To establish a secure connection between the touch panel and the target Master, the panel must be using a valid username and password (that can be matched to a previously configured user on the target Master) and the ICSP Connectivity option must be enabled within the System Level Security page.
Compression Options
The checkboxes at the bottom of this page allow you to choose from two compression options. Use compression to decrease response delay when viewing G4WebControl windows over a bandwidthrestricted network, or over the Internet. By default, compression options are disabled. Use Compression allows you to specify that the transmitted data packets be compressed. This speeds up the visual responses from the panel by minimizing the size of the information relayed through the web and onto the screen. Use Low Color allows you to specify the number of colors used to display the image from the panel be reduced. By reducing the numbers of colors, the size of the information is reduced and the response delay is decreased.
27
28
29
FTP Security is always enabled on the Masters. The Admin Change Password Security option (in the Group and User Level Security Details pages is enabled by default. All other security options are disabled by default.
Login Rules
There is no limit to the number of concurrent logins allowed for a single user. This allows for the creation of a single User that is provided to multiple ICSP devices (touch panels, for example) using the same login to obtain access to the Master. For example, if you had 50 devices connected to a Master, you would not have to create 50 individual user accounts-one for each device. Instead, you only need to create one which all 50 devices use for access. The first layer of security for the Master is to prompt a user to enter a valid username and password before gaining access to a secured feature on the target Master. Depending on the Security configuration, Users may be prompted to enter a valid username and password before gaining access to various features of the WebConsole. User access is specified by the administrator in the Group and User Level pages of the Security section.
This username and password information is also used by both G4 touch panels (within the System Connection firmware page) and AMX software applications such as NetLinx Studio v 2.4 to communicate securely with a Master using encrypted communication.
30
The. Security Settings option is only available on the NI-700/900 and NI-X100 series.
These are global options that enable or disable the login requirement for both users and groups. Check the Enabled option to make the Access options available for selection.
31
32
23 22
80 443
ICSP Connectivity and Encryption option
Secure
1319
21
FTP Port
NetLinx Master
Accepting Changes
Click the Accept button to save changes on this page. Accepting changes is instantaneous and does not require a reboot.
33
The IPSec Security Settings option is only available on the NI-700/900 and NI-X100 series.
Configuring Settings 1. Check the Enabled option to enable Security, and make the following CRL Checking options available (click the radio buttons to toggle on/off):
No CRL Checking: No CRL (Certificate Revocation List) checking will be done. CRL Checking: Only the certificate in question will be checked against the CRL. CRL Checking (All): Each certificate in an entire chain of certificates should be checked against the CRL.
2. Click the Update Settings button to save all changes to the Master. Uploading an Configuration File 1. Click the Browse button (next to the Upload Configuration File text box) to locate and select a NetLinx compatible configuration file from your PC (or LAN).
The configuration file name can use any suffix, but it will be re-suffixed to *.cfg by the Master.
2. Click the Submit button to transfer the selected configuration file to the Master. Managing Certificate Files
The Managing Certificate Files section of the page provides a display box that lists all of the existing Certificate Files resident on the Master.
A certificate is a cryptographically signed object that associates a public key and an identity. Certificates also include other information in extensions such as permissions and comments "CA" is short for "Certification Authority" - an trusted third party (or internal entity) that issues, signs, revokes, and manages these digital certificates.
The display is separated into three tabs (click to view the selected type of Certificate Files): Certificates: This tab displays all Identity certificates on the Master. CA Certificates: This tab displays all Certificate Authority (CA) certificates on the Master. CRL Certificates: This tab displays all Certificate Revocation List (CRL) certificates on the Master. To delete a Certificate from the Master, select a Certificate in any of the three tabs, and click Delete File.
34
The options in this page allow authorized users to assign and alter group properties such as creating, modifying, or deleting a groups rights, and also allows for the definition of the files/directories accessible by a particular group.
A Group represents a logical collection of individual users. Any properties possessed by a group are inherited by all members of that group.
Adding a New Group 1. Select the Group Level tab (in the Security section) to open the Group Security Details page. 2. Click the Add New Group button (see FIG. 21) to access the Add a group and modify settings page (FIG. 22). 3. In the Group Name field, enter a unique name for the new group.
The name must be a valid character string consisting of 4 - 20 alpha-numeric characters. The string is case sensitive and must be unique. The word "administrator" cannot be used for a new group name since it already exists by default.
4. Enable the security access rights you want to provide to the group. By default, all of these options are disabled. See the Group and User Security Access Options section on page 36 for details. 5. In the Group Directory Associations section, place a checkmark next to the directories (available on the target Master) to provide an authorized group with access rights to the selected directories.
35
FIG. 22 Group Level Security Settings Page (Add a group and modify settings page)
If you select a group directory, all lower groups in that tree will be selected.
6. Click the Accept button to save your changes to the target Master.
If there are no errors within any of the page parameters, a Group added successfully is displayed at the top of the page.
Security changes made from within the web browser are applied instantly, without the need to reboot.
36
23 22
80 443
ICSP Connectivity and Encryption option
Secure
1319
21
FTP Port
NetLinx Master
37
Click the Edit button to edit the Security Access options for the selected user group. Click Delete to delete the selected User Group from the Master.
Modifying the Properties of an Existing Group 1. Select the Group Level tab (in the Security section) to open the Group Security Details page. 2. Click the Edit button to open the Group Security Details page for the selected group (FIG. 25). 3. Modify the previously configured access rights by enabling / disabling the checkboxes. See the Group and User Security Access Options section on page 36 for details. 4. Modify the selected groups directory access rights in the Group Directory Associations section, as necessary (place / remove checkmarks next to the available directories). 5. Click the Accept button to save your changes to the Master.
If there are no errors with the modification of any of this pages parameters, a Group updated successfully is displayed at the top of the page.
38
Any properties possessed by groups (ex: access rights, update rights, directory associations, etc.) are inherited by users assigned to that particular group. Unchecking a security option (which is available within the associated group) does not remove that right from the user. The only way to remove a groups available security right from a target user is either to not associate a group to a user or to alter the security rights of the group being associated.
Deleting a Group 1. Select the Group Level tab (in the Security section) to open the Group Security Details page. 2. Press the Delete button to remove the selected group and refresh the page. The system will prompt you to verify this action - click OK to proceed.
If you are not logged into the Master, you receive a reminder message: "You must login before Security Settings can be changed". In this case, log into the Master and repeat the previous steps. If the group is associated with several users, you might get an error while trying to delete the group. If this happens, change the group association of those specific users utilizing the old group and either give them a new group or assign them (none) as a group. When you return to delete the desired group, you receive a message saying "Group deleted successfully".
39
A User represents a single client of the Master, while a Group represents a collection of Users. Any properties possessed by a Group are inherited by all of the Users in the group.
Adding a New User 1. Select the User Level tab (in the Security section) to open the User Security Details page. 2. Click the Add New User button (see FIG. 26) to access the Add/Modify User page (FIG. 27). 3. In the User Name field, enter a unique name for the new group.
The name must be a unique alpha-numeric character string (4 - 20 characters), and is case sensitive. The words "administrator" and "NetLinx" cannot be used since they already exist by default.
4. In the Group drop-down list, choose from a list of pre-configured Groups and associate these rights to the new user. 5. Enter a user password in both the Password and Password Confirm fields.
40
The password must be a unique alpha-numeric character string (4 - 20 characters), and is case sensitive.
6. Enable the security access rights you want to provide to the user. See the Group and User Security Access Options section on page 36 for details. 7. In the Group Directory Associations section, place a checkmark next to the directories (available on the target Master) to provide an authorized user with access rights to the selected directories. This selection includes any sub-directories that exist within the selection. 8. Click the Accept button to save your changes to the Master.
Any security changes made to the Master from within the web browser are instantly reflected within a Terminal session without the need to reboot.
Deleting a User 1. Select the User Level tab (in the Security section) to open the User Security Details page. 2. Press the Delete button to remove the selected User and refresh the page. The system will prompt you to verify this action - click OK to proceed.
41
Click to edit Access settings for this User Click to delete this User
FIG. 28 User Level Security Settings Page (Viewing User Security Settings Details)
If you are not logged into the Master, you receive a reminder message: "You must login before Security Settings can be changed". In this case, log into the Master and repeat the previous steps.
3. Reboot the Master via the Reboot button on the Manage System Page (select the System control button to access).
42
These tabs provide access to the various System Management features (default view = Manage System)
43
Changing the System Number On the Master 1. Enter the new numeric value into the New System Number field. 2. Click the Accept button to save this new value to the system on the target Master.
The message; "System number changed to X. Master must be rebooted for the change to take effect.", reminds you that the Master must be rebooted before the new settings take effect.
44
The System Number, Device Number, and Port Number fields are read-only. Instead of specifying these values for a System Device, select a device via the Device Tree to populate these fields with that devices information.
45
Controlling or Emulating a System Device 1. Select the device that you want to Control or Emulate, via the Device Tree: a. Click the Show Device Tree option to show the Device Tree window (if it is not already enabled). b. In the Device Tree, click on the Information (i) icon for the device that you want to control or emulate. This opens a Network Settings page showing network configuration details for the selected device. See the Device Network Settings Pages section on page 25 for details. c. Click on the Control/Emulate link. This opens a Control/Emulate Options page for the selected device (FIG. 31).
Click on Control/Emulate from within the devices Network Settings page to Control/Emulate that device
FIG. 31 Select Control/Emulate from within a selected Devices Network Settings page
2. Select either the Control or Emulate option. 3. In the Channel Code section, enter a valid Channel number to emulate Channel messages (i.e., Push/Release, CHON, and CHOFF) for the specified <D:P:S>.
The Channel number range is 1 - 65535.
46
Select the On or Off buttons to Emulate Channel ON (CHON) and Channel OFF (CHOFF) messages for the specified <D:P:S>.
4. Select the Push button to Emulate a push/release on the specified channel (not displayed if the Control option is selected). Click and hold the Push button to observe how the device/Master responds to the push message. 5. In the Level Code section, enter a valid Level number and Level data value for the specified <D:P:S> and press the Send button to transmit the level data.
The Level number range is 1 - 65535. The table below lists the valid Level data types and their ranges:
Level Data Type Minimum Value Maximum Value CHAR INTEGER SINTEGER LONG SLONG FLOAT 0 0 -32768 0 -2147483648 255 65535 32767 429497295 2147483647
-3.402823466e+38 3.402823466e+38
6. In the Command and String fields, enter any character strings that can be sent as either a String or Command, and press Send to transmit to the Master.
When entering a Send Command, do not include the "send c" or "send_command" in the statement - only type what would normally occur within the quotes (but don't include the quotes either). For example to send the "CALIBRATE" send command, type CALIBRATE (no quotes) rather than SEND_COMMAND <dev> "CALIBRATE". String Expressions start and end with double quotes (" "). Double quotes are not escaped, rather they are embedded within single quotes. String expressions may contain string literals, decimal numbers, ASCII characters and hexadecimal numbers (prepended with a $), and are comma-delimited. String Literals start and end with single quotes ('). To escape a single quote, use three single quotes (''').
47
The System Number, Device Number, and Port Number value fields are read-only (disabled). Instead of specifying these values for a System Device, select a device via the Device Tree to populate these fields with that devices values, as described below.
Enabling Diagnostics On a Selected System Device 1. Select the device that you want to Control or Emulate, via the Device Tree: a. Click the Show Device Tree option to show the Device Tree window (if it is not already enabled). b. In the Device Tree, click on the Information (i) icon for the device for which you want to enable or modify Diagnostics options. This opens a Network Settings page showing detailed
48
information on the selected device (including network configuration details). An example Network Settings page is shown in FIG. 33:
c. Click on the Diagnostics link. This opens a Diagnostics Options page for the selected device (FIG. 33).
Click on Diagnostics from within the devices Network Settings page to enable/modify diagnostics for that device
FIG. 33 Select Diagnostics from within a selected Devices Network Settings page
The currently selected device is also indicated in the Device field at the top of the page.
2. By default, all diagnostics are disabled (see FIG. 33). To enable diagnostic messages from this device, click on one of the Edit buttons along the bottom of the Diagnostics Options table.
49
This opens the Edit Options window (FIG. 34), where you can select which Diagnostics messages to enable or disable for this device.
Click to delete this device from the Diagnostics page (disables all diagnostics on this device) Click to apply changes Click to close the Edit Options window (without disabling diagnostics) Click to select from Presets (saved sets of enabled Diagnostic messages) Click to Store and Recall Presets To set Diagnostic Options for a different System Device, enter the devices System, Device and Port information in these fields (and press Update to add the specified device/diagnostics options to the Diagnostics page).
Click the checkboxes to enable/disable specific diagnostic messages Scroll down to see the entire list. (All Notifications enables all messages)
Once you have selected the diagnostics messages to enable, click Update to apply your changes, close the Edit Options window, and return to the Diagnostics page. Refer to the Diagnostics Options Definitions section on page 52 for definitions of each Diagnostic option.
3. The device that you just enabled diagnostics for appears in the Diagnostics Options page (identified by its Number, Device and Port assignments at the top of the Diagnostics Option list), with the currently enabled diagnostics indicated with a green checkmark (FIG. 35).
50
Each device is identified here by its System Number, Device and Port assignments Click to select a different Refresh Rate (default = 5 seconds)
Click to modify the diagnostics settings for this device, or to remove this device from the Diagnostics Options list
All returned messages are displayed in the Incoming Messages window. By default, all messages are refreshed every 5 seconds, as indicated by the Refresh Interval field. Use the Refresh Interval drop-down to specify how often your messages are updated (available values = 2 seconds, 5 seconds, or 10 seconds). The default setting is 5 seconds.
51
FIG. 36 Edit Options window indicating four devices with Diagnostics enabled
You can monitor diagnostics for up to eight System Devices in this page.
52
Presets are saved via cookies, so they do not persist across multiple browsers/ computers.
1. Click the Presets down arrow to open a list of previously stored Presets. By default, the only preset is called 0: All Devices, All Notifications. This default Preset cannot be modified. 2. Select an empty Preset (for example 1:) 3. Select the desired diagnostic options, and click Store. 4. A popup window prompts you to name this Preset. Enter a name and click OK.
To recall an existing Preset, select it from the drop-down list and click on Recall.
A Preset MUST be Recalled before clicking the Update button. If you do not press this button, none of the fields or checkboxes are modified or selected. In essence, all options become disabled.
53
Port Settings
Allows a user to modify the server settings; specifically those port assignments associated with individual services. All items can be either enabled/disabled via the Enabled checkboxes. The port number values (except the FTP port) can be modified in this page. The default port for each service is listed to the right.
54
55
Once any of the server port settings have been modified, press the Accept button to save these changes to the Master. Once these changes are saved, the following message appears: "Unit must be rebooted for the change to take effect". Click the Reboot button (from the top of the page) to remotely reboot the target Master. No dialog appears while using this button. The Device Tree then reads "Rebooting....". After a few seconds, the Device Tree refreshes with the current system information (indicating updated port numbers).
If the Device Tree contents do not refresh within a few minutes, press the browsers Refresh button and reconnect to the Master.
56
1. Click the Create SSL Certificate link (under SSL Certificate Options) to access the Create SSL Certificate window (FIG. 38).
2. Fill out the information in this window, according to the descriptions in the SSL Certificate Entries section below. 3. Click Create SSL Certificate to update the Master with the information entered on this page. This process can take several minutes. SSL Certificate Entries
The following table describes the SSL Certificate entries presented in the Create SSL Certificate window (FIG. 38):
SSL Certificate Entries
Entry Bit Length: Description Provides a drop-down selection with three public key lengths (512, 1024, 2048). A longer key length results in more secure certificates. Longer key lengths result in increased certificate processing times. Common Name: The Common Name of the certificate must match the URL Domain Name used for the Master. Example: If the address used is www.amxuser.com, that must be the Common name and format used. The Common Name can not be an IP Address. If the server is internal, the Common Name must be Netbios. For every website using SSL that has a distinct DNS name, there must be a certificate installed. Each website for SSL must also have a distinct IP Address. This domain name must be associated to a resolvable URL Address when creating a request for a purchased certificate. The address does not need to be resolvable when obtaining a free certificate. Action: Provides a drop-down selection with a listing of certificate actions: Display Certificate - Populates the Server Certificate fields with the information from the certificate currently installed on the Master. This action is used only to display the information contained in the certificate on the target Master. Create Request - Takes the information entered into these fields and formats the certificate so it can be exported to the external Certificate Authority (CA) for later receipt of an SSL Certificate. This action is used to request a certificate from an external source. Self Generate Certificate - Takes the information entered into the previous fields and generates its own SSL Certificate. This action is used when no previous certificate has been installed on the target Master, or a self-signed certificate is desired. Regenerate Certificate - Takes the information entered into the previous fields and regenerates an SSL Certificate. This action changes the Master Key. This method of certificate generation is used to modify or recreate a previously existing certificate already on the Master.
57
Creating a Request for an SSL Certificate 1. Click the Create SSL Certificate link in the Server Options page to open the Create SSL Certificate window. 2. Fill out the fields, according to the descriptions in the SSL Certificate Entries section on page 57. 3. Click the down arrow next to the Action field, and choose Create Request from the drop-down list. 4. Click the Create SSL Certificate button to accept the information entered into the above fields and generate a certificate file. Click Close to exit without making changes to the Master.
This refreshes the Server Certificate page, and if the certificate request was successful, displays a "Certified request generated" message.
Self-Generating an SSL Certificate 1. Click the Create SSL Certificate link in the Server Options page to open the Create SSL Certificate window. 2. Fill out the fields, according to the descriptions in the SSL Certificate Entries section on page 57. 3. Click the down arrow next to Action and choose Self Generate Certificate.
When this request is submitted, the certificate is generated and installed into the Master in one step.
4. Click Create SSL Certificate to save the new encrypted certificate information to the Master. Click Close to exit without making changes to the Master. Regenerating an SSL Server Certificate Request
This action allows you to is used to modify or recreate a certificate already on the Master. For example, if the company has moved from Dallas to Houston, all of the information is reentered exactly except for the City.
1. Click the Create SSL Certificate link in the Server Options page to open the Create SSL Certificate window. 2. Modify the certificate information as needed (see the SSL Certificate Entries section on page 57). 3. Click the down arrow next to Action and choose Regenerate Certificate.
58
4. Click Create SSL Certificate to save the newly modified certificate information to the Master. Click Close to exit without making changes to the Master.
Only use the Regenerate Certificate option when you have self-generated your own certificate. Do not regenerate an external CA-generated certificate.
Exporting an SSL Certificate Request 1. First follow the procedures outlined in the Creating a Request for an SSL Certificate section on page 58 to create a session-specific Master certificate. 2. Click the Export SSL Certificate link to display the certificate text file in the Export SSL Certificate window (FIG. 39).
3. Place your cursor within the certificate text field. The certificate text begins with the line that reads "-----BEGIN CERTIFICATE REQUEST-----" (scroll down to view the certificate text.) 4. Select all (Ctrl + A) of the certificate text.
You must copy all of the text within this field, including the -----BEGIN CERTIFICATE REQUEST----- and the -----END CERTIFICATE REQUEST----- portions. Without this text included in the CA submission, you will not receive a CA-approved certificate.
5. Copy (Ctrl + C) the text to the clipboard. 6. Paste (Ctrl + V) this text into the Submit Request field on the CAs Retrieve Certificate web page. 7. Choose to view the certificate response in raw DER format.
Note the Authorization Code and Reference Number (for use in the e-mail submission of the request).
8. Submit the request. 9. Paste the copied text into your e-mail document and send it to the CA with its accompanying certificate application.
When a certificate request is generated, you are creating a private key on the Master. You can not request another certificate until the previous request has been fulfilled. Doing so voids any information received from the previously requested certificate and it becomes nonfunctional if you try to use it.
Once you have received the returned CA certificate, follow the procedures outlined in the following section to import the returned certificate (over a secure connection) to the target Master.
59
1. Copy the returned certificate (signed by the CA) to your clipboard. 2. Click the Import SSL Certificate link to open the Import SSL Certificate window (FIG. 40).
3. Place the cursor inside the text box and paste the returned certificate text, in its entirety. 4. Click Import SSL Certificate to save the new certificate information to the Master.
Once a certificate has been received from an external CA and installed on a Master, do not regenerate the certificate or alter its properties. Regenerating a previously installed certificate, invalidates the certificate.
5. Click the Display Certificate link to confirm the new certificate was imported properly to the target Master.
A CA certificate can only be imported to a target Master only after both a selfgenerated certificate has been created and the SSL Enable feature has been selected on the Master. These actions configure the Master the secure communication necessary during the importing of the CA certificate.
60
Date and Time are only available if Stand Alone is selected as the Time Synch option.
The Clock Manager Options are separated into three tabs: Mode Settings - The Mode Manager in this tab allows you to set the Clock Manager Mode (Network Time or Stand Alone). Daylight Savings - The Daylight Savings Manager in this tab allows you to specify how and when to implement Daylight Savings rules on the clock. NIST Servers - The NIST Server Manager in this tab allows you to connect to a specific NIST (Internet Time Service) Server.
Setting the Mode for the Clock Manager 1. In the Mode Settings tab (FIG. 41), select a Time Synch option.
Network Time: This option allows the Master to manage its clock by connecting to a NIST (Internet Time Service) Server. When this option is selected, the Master will connect to the default NIST Server to get date and time information. You can select a different NIST Server (or specify the IP Address of a known NIST Server) in the NIST Servers tab (see the Selecting a Custom NIST Server section on page 63). Stand Alone: This option lets the Master use its own internal clock. When this option is selected, two additional fields are available on this tab: Date - Enter the current date in these fields (mm/dd/yyyy). Time - Enter the current time in these fields (hh/mm/ss).
61
2. Click Accept to save these settings to the Master. Setting Daylight Savings Rules 1. In the Daylight Savings tab (FIG. 42), enable Daylight Savings mode by clicking the On button.
2. Use the Offset drop-down menus to adjust the amount of time (hours and minutes) to offset Daylight Savings. By default, the offset is set to 1 hour.
Although most places that support Daylight Savings usually adjust the local time by one hour this doesn't cover all locations. To provide flexibility for such locations it is possible to configure a different daylight savings time offset.
3. Use the Starts fields to specify when Daylight Savings should start. The Starts rules include:
Select Fixed to specify the calendar date when the rule applies as a specific date ("March 21"). When Fixed is selected, use the Day, Month and Starts fields to specify the date and time (hh:mm) to start Daylight Savings time.
Select by Occurrence to specify the calendar date when the rule applies as a heuristic, ("the 3rd Sunday in March"). When by Occurrence is selected, use the Week of the Month, Day of the Week, Month and Starts fields to specify the occurrence to start Daylight Savings time.
The range is 1 through Last, where Last indicates the last occurrence of a particular day of the month. This is to accommodate months that include four weeks as well as those that include five.
62
4. Use the Ends fields to specify when Daylight Savings should end. The Ends rules match the Start rules, and follow the same logic. Select Fixed or by Occurrence, and specify the End date/time information accordingly. 5. Click Accept to save these settings to the Master. Selecting a Custom NIST Server
1. In the NIST Servers tab (FIG. 43), use the radio buttons to select one of the NIST Servers in the list. 2. Click Accept to save these settings to the Master. Adding a Custom NIST Server To the List 1. Click on the radio button next to the last (blank) entry in the NIST Server Manager list. 2. In the URL field, enter the URL of the NIST Server. The URL is used only to help you manage entries, and is not verified or used internally by the clock manager. 3. Enter the NIST Servers IP Address in the IP field. This is used internally and must be a valid IP address.
The strings entered into the URL and Location fields are not used to connect to NIST Servers. The IP Address (entered into the IP field) specifies the NIST Server(s) that will be used. As stated above, the address entered into the IP field must be must be a valid IP address (not a URL).
4. Enter the NIST Servers location in the Location field. This is used only to help the user manage entries and it is not verified or used internally by the clock manager. 5. Click Accept to save these settings to the Master.
63
Removing an NIST Server From the List 1. Click on the Remove (x) button to the right of a user-added NIST Server in the NIST Server Manager list. 2. Click Accept to save these settings to the Master.
The Add New License button allows for the addition of new license keys associated with currently used modules/products. Adding new License Keys requires the entry of both a Product ID and a Serial Key (example: i!-Voting). The Master confirms this registration information before running the module or product.
Adding A New License 1. Click the Add New License button to access the Add a License page (FIG. 45). 2. Enter the Product ID (certificate number) provided with the product into the Product ID fields.
Contact the AMX Sales department with both the product serial number (or certificate number) and the serial number of target Master to register your product and in turn receive the necessary Key information (typically 32 to 36 digits in length) which is then entered into the Key fields on this page.
3. Enter the Product Key into the Key fields. The Product Key is Master-specific and is typically provided by AMX upon registration.
64
Example: AMX Meeting Manager and i!-Voting applications are examples of products that require both a Product serial number and a Master-specific key prior to usage.
4. Press the Accept button to save the information. If there are no errors with the information on this page, a Key successfully added for Product ID XXXX is displayed at the top of the page. Removing a License 1. Click the Remove (x) icon to the left of the license that you want to remove. 2. The system will prompt you to verify this action before the license is removed from the Master. Click OK to proceed. 3. Press the Accept button to save the information.
65
Device Type: Displays a description of the target Master or connected device, and its current firmware version. Example: NI Master v3.01.323. File Name: Displays the program name and/or file resident on the device.
66
Refresh List: Click this button to regenerate the device listing by looking for broadcasting devices. This causes the Master to send out a message asking devices to resend their NDP device announcements. The list is then updated as those devices send back their announcements to the Master. The information displayed can not only include Masters and devices on this system but Masters and devices on other systems as well. By default, the target Master always appears in the list.
Due to system delays, message collisions, and multicast routing, not all devices may respond immediately.
Clear List: Click this button causes the entries to be temporarily deleted from the page, either until you refresh the list (using the Refresh List button), or until the Master begins to detect any multi-cast transmissions from System Devices.
67
Configuring Device Binding Options 1. Use the Configure Binding Options options to specify how the Master will manage Bound Devices:
Binding Options
Option Enable Auto Bind: Description This selection allows you to toggle the state of the automatic binding for DDD (On/Off). When auto-binding is enabled, the Master automatically attempts to connect any newly discovered device with an associated application device (defined in the running NetLinx application). Auto-binding can only be accomplished if the Master's firmware determines a one-to-one correlation between the newly discovered device and a single entry within the list of defined application devices (accessed via the Binding link at the top of this page).
68
Purge Bound Modules on Reset: This selection indicates that all modules should be deleted from the bound directory upon the next reboot. During the binding process, the associated Duet modules for a device are copied from the /unbound directory into a protected /bound area. Due to the dynamic nature of Java class loading, it is not safe to delete a running .JAR file. Therefore, this selection provides the administrator the capability of removing existing modules upon reboot by forcing a re-acquisition of the module at bind time. This selection is a one-time occurrence - upon the next reboot, the selection is cleared. Disable Module Search via Internet: This option toggles the capability of searching the Internet (either AMX's site or a device specified site) for a devices compatible Duet modules. This capability is automatically disabled if the Master does not have Internet connectivity. Upon enabling Internet connectivity, the AMX License Agreement is displayed. The License Agreement must be accepted for Internet Module search feature to be enabled. When this feature is enabled, the Master queries either AMX's Online database of device Modules and/or pulls Modules from a separate site specified by the manufacturer's device. You can later disable this feature by toggling this button.
2. Press the Accept button to save your changes. Managing Device Modules
Use the Manage Device Modules set of options to archive or delete modules from the Master. All modules currently present on the Master are indicated in the Module list. To archive a module:
1. Select a module and click the Archive Module button. 2. This action copies the selected module (*.JAR) file to your PC. 3. The system will prompt you to specify a target directory to save the module file to.
To delete a module: Select a module and click the Delete Module button. This action deletes the selected module from the / unbound directory.
69
Any corresponding module within the /bound directory will not be deleted. Bound modules must be deleted via the Purge Bound Modules on Reset selection described within the Configure Device Bindings section.
1. Click the Browse button next to the Select a module to upload text field to browse for Duet Modules on your PC/Network. 2. Select the JAR file that you want to upload to the Master. 3. Click the Submit button to upload a copy of the selected JAR file to the target Master's /unbound directory.
If a file of the same specified name already exists within the /unbound directory, the system will prompt you to confirm overwriting the existing file. Only JAR file types are allowed for Upload to the target Master.
The table on this page displays a list of all application-defined devices, including each devices "Friendly Name", the Duet virtual devices D:P:S assignment, the associated Duet Device SDK class (indicating the type of the device), and the physical devices D:P:S assignment. This information has to be pre-coded into the NetLinx file currently on the Master.
70
Example Code:
PROGRAM_NAME='DDD' DEFINE_DEVICE COM1 = 5001:1:0 COM2 = 5001:2:0 dvRECEIVER1 = 41000:1:0 dvDiscDevice = 41001:1:0
DEFINE_START
DYNAMIC_POLLED_PORT(COM2)
(***********************************************************) DEFINE_EVENT
Sample code can be found within the DEFINE_START section, as shown in FIG. 49:
71
FIG. 49 Manage Device Bindings page - showing the NetLinx code relation
This code gives the Master a heads-up notification to look for those devices meeting the criteria outlined within the code.
72
Each entry in the table has one of four buttons to the right of the Physical Device D:P:S assignment: Static Bound application devices will either be blank, or display a Release button: Static Bound application devices that have not yet detected a physical device attached to their associated port have a blank button. Once a physical device is detected and its associated Duet module has been started, a Release button is then displayed. Click Release to force the associated Duet module to be destroyed and the firmware then returns to detecting any physical devices attached to the port. Dynamic application devices either display a Bind or Unbind button: Dynamic application devices that have been bound display an Unbind button. When the user selects Unbind, any associated Duet module is then destroyed and the "link" between the application device and the physical device is then broken. Dynamic application devices that have not been bound to a physical device display a Bind button. When this button is selected, a secondary display appears with a listing of all available unbound physical devices that match the application device's Device SDK class type.
If a currently bound device needs to be replaced or a Duet Module needs to be swapped out, the device should be unbound and the new module/driver should then be bound.
The administrator/user can then select one of the available physical devices to bind with the associated application device. When the Save button is selected, the binding is created and a process begins within the target Master to find the appropriate Duet Module driver. Once a driver is found, the Duet Module is then started and associated with the specified application device (Duet virtual device). If the Cancel button is selected, the binding activity is then aborted.
If the manufacturer device does not support Dynamic Device Discovery (DDD) beaconing, you must use the Add New Device page to both create and manage those values necessary to add a dynamic physical device. This process is described in detail within the following section.
73
Hold the mouse cursor over the Device D:P:S assignment to open the Device Properties pop-up
Adding a User-Defined Device 1. Click the Add Device button (in the User-Defined Devices page) to access the Add User Defined Device page (FIG. 52):
74
SDK Class: Use the drop-down list to select the closest Device SDK class type match for the physical target device. The SDK-Class Types table (below) provides a listing of the available choices. GUID: Make: Enter the manufacturer-specified devices GUID (Global Unique Identification) information. Either the GUID or Make/Model must be specified in this field. Enter the name of the manufacturer for the device being used (ex: Sony, ONKYO, etc.) Up to 55 alpha-numeric characters Either the GUID or Make/Model must be specified within this field. Spaces in the name will be converted to underscores. Model: Enter the model number of the device being used (ex: Mega-Tuner 1000) Up to 255 alpha-numeric characters Either the GUID or Make/Model must be specified within this field. Revision Enter the firmware version used by the target device. Text is required within this field. The version must be in the format: major.minor.micro (where major, minor, and micro are numbers). An example is: 1.0.0 (revision 1.0.0 of the device firmware).
75
SDK-Class Types
Amplifier AudioConferencer AudioMixer AudioProcessor AudioTape AudioTunerDevice Camera Digital Media Decoder Digital Media Encoder Digital Media Server Digital Satellite System Digital Video Recorder Disc Device DocumentCamera HVAC IODevice Keypad Light Monitor Motor MultiWindow PoolSpa PreAmpSurroundSoundProcessor RelayDevice Receiver Security System Sensor Device SettopBox SlideProjector Switcher Text Keypad TV UPS Utility VCR VideoConferencer VideoProcessor VideoProjector VideoWall VolumeController Weather
3. Once you are done creating the profile for the new device, click the Add Property button to access the Name and Value fields property information for association with the new User Defined Device. 4. Click the Accept button. The new device is indicated in the list of discovered physical devices (in the User-Defined Devices page).
Searching For All Compatible Duet Modules for a Selected Device 1. Click the Search button for the device that you want to find a Duet Module for. This action initiates a search for compatible modules, based on the following options:
76
Unless the Disable Module Search via the Internet option was selected in the Manage Devices page (see the Manage Devices - Device Options section on page 68), the search includes a query of the AMX online database as well as any manufacturer specified URLs that match the IP Address of the physical device for a compatible module. If the device specified a URL in its DDD beacon, the file is retrieved from the URL either over the Internet or from the physical device itself, provided the device has an inboard HTTP or FTP server. If Module Search via Internet is NOT enabled, the search does NOT query the AMX online database nor will it pull any manufacturer specified URLs that do not match the IP Address of the physical device itself. Modules that are retrieved from either the Internet or from the manufacturer's device are then placed into the /unbound directory and automatically overwrite any existing module of the same name.
2. Once a list of all compatible modules is compiled, the Available Modules list is displayed on this page.
Each module is listed with its calculated match value. The greater the match value, the better the match between the Duet Module's properties and the physical device's properties.
3. Select a module and click the Accept button to associate the selected Duet module with the physical device.
This action will not affect any currently running Duet module associated with the physical device. The module is associated with the device upon reboot.
Hold the mouse cursor over the Physical Device IP Address to open the Device Properties pop-up
77
Polled Ports must be specified in the Masters code in order for this page to be populated.
78
Use the drop-down menus to modify the Port settings. Click Reset to Default Settings to return this port to its default configuration:
Default Port Settings
Baud Rate: Data Bits: Parity: Stop Bits: 485: 9600 8 None 1 Disabled
79
80
Programming
Programming
Overview
This section describes the Send_Commands, Send_Strings, and Channel commands you can use to program the Integrated Controller. The examples in this section require a declaration in the DEFINE_DEVICE section of your program to work correctly. Refer to the NetLinx Programming Language instruction manual for specifics about declarations and DEFINE_DEVICE information.
Master Send_Commands
These commands are specific to the Master and not the Controller. These commands are sent to the DPS 0:1:0 (the Master you are connected to). A device (<DEV>) must first be defined in the NetLinx programming language with values for the Device: Port: System (<D:P:S>).
Master Send_Commands
Command CLOCK Set the date and time on the Master. Description The date and time settings are propagated over the local bus. Syntax: SEND_COMMAND <DEV>,"'CLOCK <mm-dd-yyyy> <hh:mm:ss>'" Variables: mm-dd-yyyy = Month, day, and year. Month and day have 2 significant digits. Year has 4 significant digits. hh-mm-ss = Hour, minute, and seconds. Each using only 2 significant digits. Example: SEND_COMMAND 0,"'CLOCK 04-12-2005 09:45:31'" Sets the Master's date to April 12, 2005 with a time of 9:45 am.
81
Programming
82
Programming
83
Programming
The following commands enable or disable the LEDs on the Integrated Controller. In the examples: <DEV> = Port 1 of the device. Sending to port 1 of the NI-700 (affects all ports).
LED Send_Commands
Command LED-DIS Disable all LEDs (on 32 LED hardware) for a port. Description Regardless of whether or not the port is active, the LED will not be lit. Issue this command to port 1 to disable all the LEDs on the Controller. When activity occurs on a port(s) or Controller, the LEDs will not illuminate. Syntax: SEND_COMMAND <DEV>,"'LED-DIS'" Example: SEND_COMMAND Port_1,"'LED-DIS'" Disables all the LEDs on Port 1 of the Controller. LED-EN Enable the LED (on 32 LED hardware) for a port When the port is active, the LED is lit. When the port is not active, the LED is not lit. Issue the command to port 1 to enable the LEDs on the Controller (default setting). When activity occurs on a port(s) or Controller, the LEDs illuminate. Syntax: SEND_COMMAND <DEV>,'LED-EN' Example: SEND_COMMAND System_1,'LED-EN' Enables the System_1 Controller's LEDs.
RS-232/422/485 Send_Commands
RS-232/422/485 Send_Commands
Command B9MOFF Set the port's communication parameters for stop and data bits according to the software settings on the RS-232 port (default). Description Disables 9-bit in 232/422/455 mode. By default, this returns the communication settings on the serial port to the last programmed parameters. This command works in conjunction with the 'B9MON' command. Syntax: SEND_COMMAND <DEV>,"'B9MOFF'" Example: SEND_COMMAND RS232_1,"'B9MOFF'" Sets the RS-232 port settings to match the port's configuration settings.
84
Programming
85
Programming
86
Programming
87
Programming
88
Programming
The NI series of NetLinx Masters support Serial control via the IR/RX port when using firmware version 300 or greater.
IR RX Port Channels
IR / Serial Ports Channels
00001 - 00255 PUSH and RELEASE channels for the received IR code.
IR/Serial Send_Commands
The following IR and IR/Serial Send_Commands generate control signals for external equipment. In these examples: <DEV> = device.
IR/Serial Send_Commands
Command CAROFF Disable the IR carrier signal until a 'CARON' command is received. Description Syntax: SEND_COMMAND <DEV>,"'CAROFF'" Example: SEND_COMMAND IR_1,"'CAROFF'" Stops transmitting IR carrier signals to the IR_1 port. CARON Enable the IR carrier signals (default). Syntax: SEND_COMMAND <DEV>,"'CARON'" Example: SEND_COMMAND IR_1,"'CARON'" Starts transmitting IR carrier signals to the IR_1 port.
89
Programming
90
Programming
91
Programming
92
Programming
93
Programming
94
Programming
Input/Output Send_Commands
The following Send_Commands program the I/O ports on the Integrated Controller.
I/O ports: Port 4 (NI-700). Channels: 1 - 8 I/O channels. I/O Send Commands
Command GET INPUT Get the active state for the selected channels. Description An active state can be high (logic high) or low (logic low or contact closure). Channel changes, Pushes, and Releases generate reports based on their active state. The port responds with either 'HIGH' or 'LOW'. Syntax: SEND_COMMAND <DEV>,"'GET INPUT <channel>'" Variable: channel = Input channel 1 - 8. Example: SEND_COMMAND IO,"'GET INPUT 1'" Gets the I/O port's active state. The system could respond with: INPUT1 ACTIVE HIGH SET INPUT Set the input channel's active state. An active state can be high (logic high) or low (logic low or contact closure). Channel changes, Pushes, and Releases generate reports based on their active state. Setting an input to ACTIVE HIGH will disable the ability to use that channel as an output. Syntax: SEND_COMMAND <DEV>,"'SET INPUT <channel> <state>'" Variable: channel = Input channel 1 - 8. state = Active state HIGH or LOW (default). Example: SEND_COMMAND IO,"'SET INPUT 1 HIGH'" Sets the I/O channel to detect a high state change, and disables output on the channel.
95
Programming
96
Refer to the Terminal Commands section on page 99 for a listing of all commands available in a terminal session. Note that all commands in the table are available for both Program Port and Telnet sessions, with two exceptions: "Help Security" and "Resetadminpassword". These commands are only available via a Program Port connection.
1. In Windows, go to Start > Programs > Accessories > Communications to launch the HyperTerminal application to open the Connection Description dialog. 2. Enter any text into the Name field and click OK. This action invokes the Connect to dialog. 3. Click the down-arrow From the Connect Using field, and select the PC COM port being used for communication by the target Master and click OK when done. 4. From the Bits per second field, click the down-arrow and select the baud rate being used by the target Master. 5. Configure the remaining communication parameters as follows:
Data Bits: Parity: Stop bits: 8 None 1
97
6. Click OK to complete the communication parameters and open a new Terminal window. 7. Type echo on to view the characters while entering commands. If that does not work, press <Enter> key on your keyboard.
It is very important to execute the 'logout' command prior to disconnecting from a Master. Simply removing the RS-232 connector from the Program Port maintains your logged-in status until you either return to logout via a new session or reboot the target Master.
4. Press Enter.
Unless Telnet security is enabled, a session will begin with a welcome banner:
Welcome to NetLinx vX.XX.XXX Copyright AMX Corp. 1999-2006 >
If Telnet security is enabled, type in the word login to be prompted for a Username and Password before gaining access to the Master.
98
Login: User1 Password: ***** Login not authorized. Please try again.
After a delay, another login prompt will be displayed to allow you to try again. If after 5 prompts, the login information is not entered correctly, the following message will be displayed and the connection closed:
Login not allowed. Goodbye!
To restrict access to the Master via terminal connection, enable Configuration Security on the Master via the CONFIGURATION SECURITY option in the Security Options menu - see the Security Options Menu section on page 116 for details). With Configuration Security enabled, a valid user with Configuration Security access will have to login before being able to execute Telnet commands. If security is not enabled, these commands are available to all. If a connection is opened, but a valid a username / password combination is not entered (i.e. just sitting at a login prompt), the connection will be closed after one minute.
Terminal Commands
The Terminal commands listed in the following table can be sent directly to the Master via either a Program Port or a Telnet terminal session (with the exception of the "Help Security" and "Resetadminpassword" commands, which are only available to a Program Port (RS232) connection. In your terminal program, type "Help" or a question mark ("?") and <Enter> to access the Help Menu, and display the Program port commands described below:
Terminal Commands
Command ----- Help ----- <D:P:S> Description (Extended diag messages are OFF) <D:P:S>: Device:Port:System. If omitted, assumes Master. ? or Help CPU USAGE DATE Displays this list of commands. Diagnostic tool to calculate a running average of the current CPU usage of the Master. Displays the current date and day of the week. Example:
>DATE 10/31/2004 Wed
Sets the Master to holdoff devices (i.e. does not allow them to report ONLINE) until all objects in the NetLinx program have completed executing the DEFINE_START section. If set to ON, any messages to devices in DEFINE_START will be lost, however, this prevents incoming messages being lost in the Master upon startup. When DEVICE_HOLDOFF is ON, you must use ONLINE events to trigger device startup SEND_COMMANDs. By default, DEVICE HOLDOFF is OFF to maintain compatibility with Axcess systems where devices are initialized in DEFINE_START. Note: This command sets the state of the device holdoff. The GET DEVICE HOLDOFF command reveals whether the state is On or Off. Example:
>Device Holdoff ON Device Holdoff Set.
99
Displays the DNS configuration of a specific device including: Domain suffix Configured DNS IP Information Example:
>DNS LIST [0:1:0] Domain suffix:amx.com The following DNS IPs are configured Entry 1-192.168.20.5 Entry 2-12.18.110.8 Entry 3-12.18.110.7
Enables/Disables echo (display) of typed characters. Displays the state of the Masters device holdoff setting. Note: This command reveals the state of the device holdoff set using the DEVICE HOLDOFF ON|OFF command. Example:
>GET DEVICE HOLDOFF Device Holdoff is off.
Display the amount of memory allocated for Duet Java pool. This is the current Java memory heap size as measured in Megabytes. An example is a value of 5 = 5 MB. Displays the current ethernet configuration setting. Settings are either "auto" in which the ethernet driver will discover it's settings based on the network it is connected to OR <speed> and <duplex> where speed is either 10 or 100 and duplex is either full or half. Example:
>GET ETHERNET MODE Ethernet mode is auto.
Note: See SET ETHERNET MODE. GET IP <D:P:S> Displays the IP configuration of a device. If you enter GET IP without the D:P:S variable, the Master displays its D:P:S, Host Name, Type (DHCP or Static), IP Address, Subnet Mask, Gateway IP, and MAC Address. Example:
>GET IP [0:1:50] IP Settings for 0:1:50 HostName MLK_INSTRUCTOR Type DHCP IP Address 192.168.21.101 Subnet Mask 255.255.255.0 Gateway IP 192.168.21.2 MAC Address 00:60:9f:90:0d:39
100
Enables or disables ICSP monitoring out the specified IP port. By enabling icspmon on an IP port, an external application could connect to that port and "listen" on the ICSP traffic. Provides information about the current NetLinx IP Connections. Example:
>IP STATUS NetLinx IP Connections No active IP connections
IP STATUS
Enables/Disables IPSec security or displays current setting. Displays the largest free block of the Masters memory. Example:
>MEM The largest free block of memory is 11442776 bytes.
MSG ON|OFF
Enables/Disables extended diagnostic messages. MSG On sets the terminal program to display all messages generated by the Master. MSG OFF disables the display. Example:
> MSG ON Extended diagnostic information messages turned on. > MSG OFF Extended diagnostic information messages turned off.
Calculates incoming and outgoing messages over a time interval. Turns off a specified channel on a device. The device can be on any system that the Master you are connected to is able to reach. You can specify the device number, port, and system, or the name of the device that is defined in the DEFINE_DEVICE section of the program. Syntax:
OFF[name,channel]
-orOFF[D:P:S,channel]
Example:
>OFF[5001:7:4] Sending Off[5001:7:4]
101
-orON[D:P:S,channel]
Example:
>ON[5001:7:4] Sending On[5001:7:4]
Sets up a pass through mode to a device. In pass through mode, any string received by the device is displayed on the screen, and anything typed is sent as a string to the device. The device can be on any system that the Master you are connected to is able to reach. You can specify the device number, port, and system, or the name of the device that is defined in the DEFINE_DEVICE section of the program. Mode is exited by ++ ESC ESC. Display Format is set by ++ ESC n Where n = A, format = ASCII D, format = Decimal H = Hex Note: Refer to the ESC Pass Codes section on page 113 for detailed descriptions of the supported pass codes. Example:
>pass[5001:7:4] Entering pass mode.
Retrieve the current LED states. Pings an address (IP or URL), to test network connectivity to and confirms the presence of another networked device. The syntax is just like the PING application in Windows or Linux. Example:
>ping 192.168.29.209 192.168.29.209 is alive.
PROGRAM INFO
Displays a list of program files and modules residing on the Master. Example:
>PROGRAM INFO -- Program Name Info -- Module Count = 1 1 Name is i!-PCLinkPowerPointTest -- File Names = 2 1 = C:\Program Files\AMX Applications\i!PCLinkPowerPoint 2 = C:\Program Files\Common Files\AMXShare\AXIs\NetLinx.axi 2 = Name is MDLPP -- File Names = 2 1 C:\AppDev\i!-PCLink-PowerPoint\i!PCLinkPowerPointMod.axs 2 C:\Program files\Common Files\AMXShare\AXIs\NetLinx.axi
102
PWD
REBOOT <D:P:S>
RENEW DHCP
Renews/rReleases the current DHCP lease for the Master. Note: The Master must be rebooted to acquire a new DHCP lease. Example:
>RENEW DHCP
RESETADMINPASSWORD
This command resets the administrator password back to "password". Note: This command is only available to Program Port terminal sessions. It is not available to Telnet sessions (see the Overview section on page 97).
RESET FACTORY
Resets the Master to factory default state including removal of all security settings, removal of all user files, resetting to DHCP, and loading an empty NetLinx program. The Master will be effectively in an outof-box state. Sets the Master-to-Master route mode: Normal mode - allows a Master to communicate with any Master accessible via the routing tables (shown with the SHOW ROUTE command). This includes a directly-connected Master (route metric =1) and indirectly connected Masters (route metric greater than 1, but less than 16). Direct mode - allows communication only with Masters that are directly connected (route metric = 1). Indirectly connected Masters cannot be communicated within this mode. Examples:
>ROUTE Route >ROUTE Route MODE Mode MODE Mode DIRECT "Direct" Set NORMAL "Normal" Set
Sends a specified command to a device. The device can be on any system that the Master you are connected to can reach. You can specify the device number, port, and system; or the name of the device that is defined in the DEFINE_DEVICE section of the NetLinx Program. The data of the string is entered with the following NetLinx string syntax:
SEND_COMMAND 1:1:1,"'This is a test',13,10" SEND_COMMAND RS232_1,"'This is a test',13,10"
Allows the user to set a level on a device via the Master's Telnet/ program port interface.
103
Sets up the DNS configuration of a device. This command prompts you to enter a Domain Name, DNS IP #1, DNS IP #2, and DNS IP #3. Then, enter Y (yes) to approve/store the information in the Master. Entering N (no) cancels the operation. Note: The device must be rebooted to enable new settings. Example:
>SET DNS [0:1:0] -- Enter New Values or just hit Enter to keep current settings -Enter Enter Enter Enter Domain Suffix: DNS Entry 1 : DNS Entry 2 : DNS Entry 3 : amx.com 192.168.20.5 12.18.110.8 12.18.110.7
You have entered: Domain Name: amx.com DNS Entry 1: 192.168.20.5 DNS Entry 2: 12.18.110.8 DNS Entry 3: 12.18.110.7 Is this correct? Type Y or N and Enter -> Y Settings written. Device must be rebooted to enable new settings
Set the amount of memory allocated for Duet Java pool. This is the current Java memory heap size as measured in Megabytes. This feature is used so that if a NetLinx program requires a certain size of memory be allotted for its currently used Duet Modules, it can be reserved on the target Master. Valid values are: 2 - 8 for 32MB systems 2 - 36 for 64MB systems. This setting does not take effect until the next reboot. Note: If you are trying to accomplish this setting of the Duet Memory size via a NetLinx program, the program command "DUET_MEM_SIZE_SET(int)" should call REBOOT() following a set.
This command sets the current ethernet configuration settings auto OR speed = 10 | 100, duplex = full | half Example:
set ethernet mode auto set ethernet mode speed=100 duplex=full
104
Sets the Masters IP port listened to for HTTP connections. Note: The Master must be rebooted to enable new settings. Example:
>SET HTTP PORT Current HTTP port number = 80 Enter new HTTP port number (Usually 80) (0=disable HTTP): Setting HTTP port number to New HTTP port number set, reboot the master for the change to take affect.
Sets the Masters IP port listened to for HTTPS connections. Note: The Master must be rebooted to enable new settings. Example:
>SET HTTPS PORT Current HTTPS port number = 443 Enter new HTTPS port number (Usually 443) (0=disable HTTPS):
Once you enter a value and press the ENTER key, you get the following message:
Setting HTTPS port number to New HTTPS port number set, reboot the master for the change to take affect.
Sets the Masters IP port listened to for ICSP connections. Note: The Master must be rebooted to enable new settings. Example:
>SET ICSP PORT Current ICSP port number = 1319 Enter new ICSP port number (Usually 1319) (0=disable ICSP):
Once you enter a value and press the ENTER key, you get the following message:
Setting ICSP port number to New ICSP port number set, reboot the master for the change to take affect.
Sets the timeout period for ICSP and i!-WebControl TCP connections. Note: The new timeout value is immediately (no reboot required). Example:
>SET ICSP TCP TIMEOUT This will set the timeout for TCP connections for both ICSP and i!-WebControl.When no communication has been detected for the specified number of seconds, the socket connection is closed.ICSP and i!-WebControl have built-in timeouts and reducing the TCP timeout below these will cause undesirable results. The default value is 45 seconds. The current ICSP TCP timeout is 45 seconds Enter new timeout (in seconds):
Once you enter a value and press the ENTER key, you get the following message:
New timeout value set (in affect immediately).
105
Sets the number of entries allowed in the message log. Note: The Master must be rebooted to enable new settings. Example:
>SET LOG COUNT Current log count = 1000 Enter new log count (between 50-10000):
Once you enter a value and press the ENTER key, you get the following message:
Setting log count to New log count set, reboot the Master for the change to take affect.
Provides the capability to modify maximum message queue sizes for various threads. Example:
set queue size
This will set the maximum message queue sizes for several threads. Use caution when adjusting these values. Set Queue Size Menu: 1. Interpreter (factory default=2000, currently=600) 2. Notification Manager (factory default=2000, currently=200) 3. Connection Manager (factory default=2000, currently=500) 4. Route Manager (factory default=400, currently=200) 5. Device Manager (factory default=500, currently=500) 6. Diagnostic Manager (factory default=500, currently=500) 7. TCP Transmit Threads (factory default=600, currently=200) 8. IP Connection Manager (factory default=800, currently=500) 9. Message Dispatcher (factory default=1000, currently=500) 10. Axlink Transmit (factory default=800, currently=200) 11. PhastLink Transmit (factory default=500, currently=500) 12. ICSNet Transmit (factory default=500, currently=500) 13. ICSP 232 Transmit (factory default=500, currently=500) 14. UDP Transmit (factory default=500, currently=500) 15. NI Device (factory default=500, currently=500) Enter choice or press ESC.
106
Note: The "System Description", "System Contact" and "System Location" are the values that will be published for the Master via SNMP. The system must be rebooted once the new values are entered. SET SSH PORT Sets the Masters IP port listened to for SSH connections. Note: The Master must be rebooted to enable new settings. Example:
>SET SSH PORT Current SSH port number = 22 Enter new SSH port number (Usually 22) (0=disable SSH):
Once you enter a value and press the ENTER key, you get the following message:
Setting SSH port number to 22 New SSH port number set, reboot the Master for the change to take affect.
Sets the Masters IP port listened to for Telnet connections. Note: The Master must be rebooted to enable new settings. Example:
>SET TELNET PORT Current telnet port number = 23 Enter new telnet port number (Usually 23)(0=disable Telnet):
Once you enter a value and press the ENTER key, you get the following message:
Setting telnet port number to 23 New telnet port number set, reboot the Master for the change to take affect.
107
Once you enter a value and press the ENTER key, you get the following message:
Current Lontalk Threshold = 50 Enter new Lontalk Threshold (Between 1 and 2000) (Default=50):50 Current IP Threshold = 600 Enter new IP Threshold (Between 1 and 2000) (Default=200): 600 Setting Thresholds to: Interpreter 2000 Lontalk 50 IP 600 New thresholds set, reboot the Master for the changes to take affect.
SET TIME
Sets the current time. When the time is set on the Master, the new time will be reflected on all devices in the system that have clocks (i.e. touch panels). By the same token, if you set the time on any system device, the new time will be reflected on the systems Master, and on all connected devices. Note: This will not update clocks on devices connected to another Master (in Master-to-Master systems). Example: >SET TIME Enter Date: (hh:mm:ss) ->
Sets the Master's timeline/event max loopcount. Sets the UDP broadcast rate. A broadcast message is sent by the Master to allow devices to discover the Master. This command allows the broadcast frequency to be changed or eliminate the broadcast message. Example:
>SET UPD BC RATE Current broadcast message rate is 5 seconds between messages. Enter broadcast message rate in seconds between messages (off=0 ; default=5) (valid values 0-300):
Once you enter a value and press the ENTER key, you get the following message:
Setting broadcast message rate to 300 seconds between messages New broadcast message rate set.
108
SHOW BUFFERS
Displays a list of various message queues and the number of buffers in each queue Example:
show buffers Thread TX ----------- ---Axlink 0 UDP 0 IPCon Mgr 0 Con Manager Interpreter Device Mgr Diag Mgr Msg Dispatch Cfg Mgr Route Mgr Notify Mgr Total ---0 RX ---Queued ---0-Sent=NO Waiting=NO
0 0 0 0 0 0 0 0 ---0
---0 GrandTotal 0
Note: See SHOW MAX BUFFERS. SHOW COMBINE Displays a list of devices, levels, and channels that are currently combined. Example:
> SHOW COMBINE Combines -------Combined Device([33096:1:1],[96:1:1]) Combined Level([33096:1:1,1],[128:1:1,1],[10128:1:1,1]) Combined Device([33128:1:1],[128:1:1],[10128:1:1])
Displays a list of devices present on the bus, with their device attributes. Example:
>SHOW DEVICE [0:1:0] Local devices for system #1 (This System) --------------------------------------------------------------------------Device (ID)Model (ID)Mfg FWID Version 00000 (00256)NXC-ME260/64M (00001)AMX Corp. 00336 v3.00.312 (PID=0:OID=0) Serial=0,0,0,0,0,0,0,0,0,0,0,0, Physical Address=NeuronID 000531589201 (00256)vxWorks Image (00001) 00337 v3.00.312 (PID=0:OID=1) Serial=N/A (00256)BootROM (00001) 00338 v3.00.312 (PID=0:OID=2) Serial=N/A (00256)AXlink I/F uContr(00001) 00270 v1.03.14 (PID=0:OID=3) Serial=0000000000000000
109
Displays a list of various message queues and the maximum number of message buffers that were ever present on the queue. Example:
show max buffers Thread TX RX ----------- ---- ---Axlink 1 UDP 1 IPCon Mgr 0 (Total for TCP Connections TX=0) Con Manager Interpreter Device Mgr Diag Mgr Msg Dispatch Cfg Mgr Route Mgr Notify Mgr Total 8 17 8 1 0 0 0 0 ---- ---- ---2 34 GrandTotal 36
See SHOW BUFFERS. SHOW MEM Displays the memory usage for all memory types.
110
SHOW REMOTE
Displays the Remote Device List (Master-Master). This is a list of the devices this system requires input from and the types of information needed. If when a NetLinx Master connects to another NetLinx Master, the newly connecting system has a device that the local system desires input from; the new system is told what information is desired from what device. Note: The local system number is 1062. Example:
>SHOW REMOTE Device List of Remote Devices requested by this System Device Port System Needs -----------------------------------------------------00001 00001 00001 Channels Commands 00002 00001 00001 Channels Commands 33000 00001 00001 Channels Commands 00128 00001 00108 Channels Commands Strings Levels 33000 00001 00108 Channels Commands
SHOW ROUTE
Displays information about how this NetLinx Master is connected to other NetLinx Masters (routing information). Example:
>SHOW ROUTE Route Data: System Route Metric PhyAddress --------------------------------> 50 50 0 Axlink
111
TCP LIST
TIME
Displays the list of URL addresses programmed in the Master (or another system if specified). Example:
>URL LIST The following URLs exist in the URL connection list ->Entry 0-192.168.13.65:1319 IP=192.168.13.65 State=Connected Entry 1-192.168.13.200:1319 IP=192.168.13.200 State=Issue Connect
zeroconf [enable|disable|status]
Enable, disable or view the new zeroconf client in the Master. When zeroconf is enabled (default) the Master's web interface will be registered via zeroconf and can be viewed through a zeroconf browser plug-in such as Bonjour for IE.
112
1. In the Terminal session, type help security to view the available security commands. Here is a listing of the security help:
---- These commands apply to the Security Manager and Database ---logout setup security Logout and close secure session Access the security setup menus
The 'help security' and 'setup security' functions are only available via a direct RS232 Program Port connection. They are not available to Telnet sessions.
2. Type setup security to access the Setup Security menu, shown below:
113
>setup security
--- These commands apply to the Security Manager and Database ---1) Set system security options for NetLinx Master 2) Display system security options for NetLinx Master 3) Add user 4) Edit user 5) Delete user 6) Show the list of authorized users 7) Add group 8) Edit group 9) Delete group 10) Show list of authorized groups 11) Set Telnet Timeout in seconds 12) Display Telnet Timeout in seconds 13) Make changes permanent by saving to flash
3. The Setup Security menu shows a list of choices and a prompt. To select one of the listed choices, simply enter the number of the choice (1 - 13) at the prompt and press <Enter>.
Each option in the Setup Security menu displays a submenu specific to that option. The following subsections describe using each of the Setup Security menu options.
Changes made to the target Master from within the Terminal window are not reflected within the web browser, until the Master is rebooted and the web browser connection is refreshed. Any changes made to the Master, from within the web browser are instantly reflected within the Terminal session without the need to reboot.
114
115
14) Reset Database These functions are only visible to administrators. (administrator only function) If a user has been given "administrator rights", this additional menu option is displayed. This selection will reset the security database to its Default Security Configuration settings, erasing all users and groups that were added. This is a permanent change and you will be asked to verify this before the database is reset. 15) Display Database These functions are only visible to administrators. (administrator only function) If a user has been given "administrator rights", this additional menu option is displayed. This selection will display the current security settings to the terminal (excluding user passwords). It also displays all users (minus passwords), their group assignment (if any) and their rights, as well as all groups and their rights.
116
4) Delete Directory Association This selection will display any current directory associations assigned to the user, and then will prompt you to select the directory association you want to delete. 5) List Directory Associations 6) Change Access Rights This selection will display any current Directory Associations assigned to the user. This selection will display access the Access Rights menu, which allows you to set the rights assigned to the user. Note: See the Access Rights Menu section (below) for descriptions of each menu item. 7) Display User Record Contents This selection will display the group the user is assigned to and the current Access Rights assigned to the user.
4) Delete Directory Association This selection will display any current directory associations assigned to the group, and then will prompt you to select the directory association you want to delete. 5) List Directory Associations 6) Change Access Rights This selection will display any current Directory Associations assigned to the group. This selection will display access the Access Rights menu, which allows you to set the rights assigned to the group. Note: See the Access Rights Menu section (below) for descriptions of each menu item. 7) Display Access Rights This selection will display the current Access Rights assigned to the group.
117
2) Admin Change Password Access Enables/disables Administrator Change Password Access. The (Enable/Disable) account has sufficient access rights to change the administrator password if this option is enabled. 3) FTP Access (Enable/Disable) 4) HTTP Access (Enable/Disable) 5) Telnet Access (Enable/Disable) 6) Configuration Access (Enable/Disable) 5) ICSP Security (Enabled/Disabled) 6) ICSP Encryption Required (Enabled/Disabled) Enables/disables FTP Access. The account has sufficient access rights to access the NetLinx Master's FTP Server if this option is enabled. This selection enables/disables HTTP (Web Server) Access. The account has sufficient access rights to browse to the NetLinx Master with a Web Browser if this option is enabled. This selection enables/disables Telnet Access. The account has sufficient access rights to login to a Telnet session if this option is enabled. This selection enables/disables Configuration Access rights for the target Master. The account has sufficient access rights to access the Main Security Menu if this option is enabled. This selection enables/disables ICSP communication access. The account has sufficient access rights to initiate ICSP data communication. This selection enables/disables the need to require encryption of the ICSP communicated data. If enabled: - All communicating AMX components must authenticate with a valid username and password before beginning communication with the Master. - All communication must be encrypted.
Adding a Group 1. Type 7 and <Enter> at the Security Setup prompt (at the bottom of the Main Security Menu) to add a group account. A sample session response is:
The following groups are currently enrolled: administrator
2. Enter a name for the group. A group name is a valid character string (4 - 20 alpha-numeric characters) defining the group. This string is case sensitive, and each group name must be unique. 3. Press <Enter> to display the Edit Group menu.
118
Edit Group Menu: Add Directory Association 1. At the Edit Group prompt, type 1 to add a new directory association.
A Directory Association is a path that defines the directories and/or files that a particular user or group can access via the HTTP (Web) Server on the NetLinx Master. This character string can range from 1 to 128 alpha-numeric characters. This string is case sensitive. This is the path to the file or directory you want to grant access. Access is limited to the user (i.e. doc:user) directory of the Master. All subdirectories of the user directory can be granted access. A single '/' is sufficient to grant access to all files and directories in the user directory and it's subdirectory. The '*' wildcard can also be added to enable access to all files. All entries should start with a '/'. Here are some examples of valid entries:
Path / /* /user1 Notes Enables access to the user directory and all files and subdirectories in the user directory. Enables access to the user directory and all files and subdirectories in the user directory. If user1 is a file in the user directory, only the file is granted access. If user1 is a subdirectory of the user directory, all files in the user1 and its sub-directories are granted access. user1 is a subdirectory of the user directory. All files in the user1 and its sub-directories are granted access.
/user1/
/Room1/iWebControlPages/* /Room1/iWebControlPages is a subdirectory and all files and its subdirectories are granted access. /results.txt results.txt is a file in the user directory and access is granted to that file.
By default, all accounts that enable HTTP Access are given a '/*' Directory Association if no other Directory Association has been assigned to the account. When you are prompted to enter the path for a Directory Association, the NetLinx Master will attempt to validate the path. If the directory or file is not valid (i.e. it does not exist at the time you entered the path), the NetLinx Master will ask you whether you were intending to grant access to a file or directory. From the answer, it will enter the appropriate Directory Association. The NetLinx Master will not create the path if it is not valid. That must be done via another means, most commonly by using an FTP client and connecting to the FTP server on the NetLinx Master.
119
Directory Association: /*
Group 1: Rights:
Directory Association: /*
Security Options:
FTP Security Enabled Admin Change Password Security Enabled All other options disabled
The administrator user account cannot be deleted or modified with the exception of its password. Only a user with "Change Admin Password Access" rights can change the administrator password. The NetLinx user account is created to be compatible with previous firmware versions. The administrator group account cannot be deleted or modified. The FTP Security and Admin Change Password Security are always enabled and cannot be disabled.
120
121
122
All characters of a configuration line, both the action and the string, are case sensitive and white space is relevant. Lines beginning with a # symbol are considered comments and are subsequently ignored during the loading process. All references to the Masters IP address in configuration lines can be substituted by %LOCAL_ADDR% in order to provide flexibility and reuse of an IPSec Config file. At boot, all occurrences of %LOCAL_ADDR% will be replaced by the actual IP address of the Master. In this way, a single IPSec configuration file can be uploaded to multiple masters that are to be configured with the same IPSec configuration without having to specify the Masters local IP Address directly. The IPSec Configuration file is loaded onto the Master via the Masters Web interface under Security->IPSec Security Settings. The following are the list of configuration lines supported by the AMX IPSec Configuration file.
123
DESCRIPTION This rule is used to specify IKE authentication information between the host and a peer. This rule may be called multiple times to define a set of peers with which the host will conduct IKE negotiations. NOTE Specifying KEYPFS to this function will not enable perfect forward secrecy when negotiating with the peer unless a DHGROUP is also specified in the Phase 2 attributes, set via spdSetPropAttrib. Rule Value: configString A string formatted as follows: peerIpAddress,interfaceIpAddress,proposalName,PFS, authenticationMethod,authenticationInfo where - peerIpAddress is the address of the IKE peer. - interfaceIpAddress is the local IP address that is to communicate with the peer. - proposalName is an existing Phase 1 proposal name, defined via ikeSetProp. - authenticationMethod is PSK (pre-shared key) or RSA (certificate support). - authenticationInfo depends on authenticationMethod. See below. When authenticationMethod is PSK, authenticationInfo is the pre-shared key, represented as printable ASCII. When authenticationMethod is RSA, authenticationInfo is a string formatted as follows: localKey,localKeyPassword,localCertificate[,PEER_CERT,peerCertifica te] localKey - The filename where the local peer's key is stored. localKeyPassword - The password for the local peer's key. Specify NOPASS if there is no password. Note that the maximum password length is MAX_PRIVATE_KEY_PASSWORD_LENGTH. localCertificate - The filename where the local peer's certificate is stored. peerCertificate - The filename where the remote peer's certificate is locally stored. If PEER_CERT is specified, any certificate payload(s) received from the remote IKE peer during IKE phase 1 negotiation will be ignored and the certificate specified in peerCertificate will be used to authenticate the remote peer. All keys and certificates are stored on the local file system, in the directory set by the project facility parameter IKE_CERT_PATH.
124
ikeAddPeerAuth (Cont.)
EXAMPLES Using a pre-shared key for IPv4: ikeAddPeerAuth=100.100.100.4,100.100.100.1,mm_grp2,NOPFS,PSK, thisisatest Using a pre-shared key for IPv6: ikeAddPeerAuth=3ffe:2::2,3ffe:1::2,mm_grp2,NOPFS,PSK,thisisatest Using certificates for IPv4: ikeAddPeerAuth=192.168.1.36,192.168.1.35,ph1_g1_1,NOPFS,RSA, local_key.key,mypassword,local_cert.crt,PEER_CERT,peer_cert.crt ikeAddPeerAuth=192.168.1.36,192.168.1.35,ph1_g1_1,NOPFS,RSA, local_key.key,mypassword,local_cert.crt ikeAddPeerAuth=192.168.1.36,192.168.1.35,ph1_g1_1,NOPFS,RSA, local_key.key,NOPASS,local_cert.crt Config String Format Pre-defined proposal names peerIpAddress,interfaceIpAddress,proposalName,authenticationMethod, authenticationInfo The following are proposal names already defined inside the AMX Firmware and available for use in the ikeAddPeerAuth configuration: mm_g2=mm_3des_sha,mm_3des_md5,mm_des_sha,mm_des_md5 Attributes: DHGROUP=G2, LIFETIME=28800 sec mm_g1=mm_3des_sha,mm_3des_md5,mm_des_sha,mm_des_md5\n" Attributes: DHGROUP=G1, LIFETIME=28800 sec mm_prop=mm_des_md5 Attributes: DHGROUP=G2, LIFETIME=300 sec mm_prop1= mm_des_md5 Attributes: DHGROUP=G2, LIFETIME=3600 sec Additional IKE proposals and attributes can be created with the next two APIs.
125
ikeSetProp
ikeSetProp
NAME SYNOPSIS ikeSetProp create a Phase 1 proposal ikeSetProp=configString Rule Value: configString A string formatted as follows: proposalName,transformName,[transformName][,transformName]... where - proposalName is a unique name for a Phase 1 proposal. - transformName is an existing Phase 1 transform name, defined via ikeSetXform. EXAMPLES Config String Format Pre-defined proposal names ikeSetProp=mm_group2,mm_3des_sha,mm_3des_md5,mm_des_sha,mm_des_md5 proposalName,transformName,[transformName][,transformName] A transform consists of an encryption algorithm and a hash algorithm. The first value is the encryption, the second the hash. mm_3des_sha=3DES,SHA-1 mm_3des_sha2_256=3DES,SHA2-256 mm_3des_sha2_384=3DES,SHA2-384 mm_3des_sha2_512=3DES,SHA2-512 mm_3des_md5=3DES,MD5
DESCRIPTION This rule creates a Phase 1 proposal with previously defined Phase 1 transform names.
126
ikeSetPropAttrib
ikeSetPropAttrib
NAME SYNOPSIS ikeSetPropAttrib set attributes of an IKE Phase 1 proposal ikeSetPropAttrib=configString Rule Value: configString A string formatted as follows: proposalName,attributeType,attributeValue,[attributeType,attributeV alue]... proposalName is the name of an existing Phase 1 proposal. Valid attribute type/value pairs are shown in the following table: Attribute Type DHGROUP UNITOFTIME LIFETIME Attribute Value G1 for DH Group 1 or G2 for DH Group 2 SECS, MINS, or HRS for seconds, minutes or hours; default is minutes. Default is 28800 seconds. If the lifetime is greater than 0 and less than PHASE1_MIN_LIFE_IN_SECS, then it defaults to PHASE1_MIN_LIFE_IN_SECS, which is defined in ike.h.
DESCRIPTION This rule sets the attributes for a previously defined IKE Phase 1 proposal.
SOFTLIFETIME Default is 75% of the LIFETIME. If the soft lifetime is greater than 0 and less than PHASE1_MIN_LIFE_IN_SECS then it defaults to PHASE1_MIN_LIFE_IN_SECS, which is defined in ike.h. EXAMPLES Config String Format ikeSetPropAttrib=mm_group2,DHGROUP,G2 ikeSetPropAttrib=mm_group2,LIFETIME,28880,UNITOFTIME,SECS proposalName,attributeType,attributeValue,[attributeType, attributeValue]
127
128
SpdAddTunnel
SpdAddTunnel
NAME SYNOPSIS spdAddTunnel create a tunnel mode policy in the SPD spdAddTunnel=pConfStr Rule Value: pConfStr A stringValue specifier formatted as follows: protocolSelector[/destinationPort/sourcePort], destinationAddressSelector, sourceAddressSelector,directionality, useSelectors,keyManager,saProposalName, tunnelEndpointAddress where: - protocolSelector is a decValue IANA protocol number or ANY (6 for TCP or 17 for UDP). - destinationPort is a decValue port number or ANY. - sourcePort is a decValue port number or ANY. - destinationAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - sourceAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN (for inbound) or OUT (for outbound). If IN, this policy applies to traffic coming into the current host. If OUT, it applies to traffic going out of the current host. A mirrored policy is automatically created for the opposite traffic flow. - useSelectors is PACKET (use packet selectors) or POLICY (use policy selectors). - keyManager is MANUAL (manual negotiation) or IKE (key negotiation). - saProposalName is an SA proposal name. - tunnelEndpointAddress is the remote gateway. You must specify a single valid IPv4 or IPv6 host address. You cannot specify multiple endpoints. EXAMPLES IPv4: spdAddTunnel=ANY,0.0.0.0/0,10.8.30.30,OUT,POLICY,MANUAL, qm_sa_default,10.9.9.180 IPv6: spdAddTunnel=ANY,::/0,3ffe:4::1,OUT,POLICY,MANUAL,qm_sa_default, 3ffe:1::2 Config String Format protocolSelector[/destinationPort/sorucePort], destinationAddressSelector,sourceAddressSelector,directionality, useSelector,keyManager,saProposalName,tunnelEndpointAddress
129
SpdAddBypass
SpdAddBypass
NAME SYNOPSIS spdAddBypass create a bypass policy in the SPD spdAddBypass=pConfStr Rule Value: pConfStr A stringValue specifier formatted as follows: protocolSelector[/destinationPort/sourcePort], destinationAddressSelector, sourceAddressSelector, directionality,mirroring where - protocolSelector is a decValue IANA protocol number or ANY (6 for TCP or 17 for UDP). - destinationPort is a decValue port number or ANY. - sourcePort is a decValue port number or ANY. - destinationAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - sourceAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN (for inbound) or OUT (for outbound). If IN, this policy applies to traffic coming into the current host. If OUT, it applies to traffic going out of the current host. - mirroring is NOTMIRRORED or MIRRORED. NOTMIRRORED creates a policy only in the specified direction. MIRRORED creates two policies, one in each direction. EXAMPLES IPv4: spdAddBypass=17/0/17185,0.0.0.0/0,0.0.0.0/0,OUT,NOTMIRRORED IPv6: spdAddBypass=17/0/17185,::/0,::/0,OUT,NOTMIRRORED Config String Format protocolSelector[/destinationPort/sorucePort], destinationAddressSelector,sourceAddressSelector,directionality, mirroring
130
SpdAddDiscard
SpdAddDiscard
NAME SYNOPSIS spdAddDiscard create a discard policy in the SPD spdAddDiscard=pConfStr Rule Value: pConfStr A stringValue specifier formatted as follows: protocolSelector[/destinationPort/sourcePort], destinationAddressSelector, sourceAddressSelector, directionality,mirroring where - protocolSelector is a decValue IANA protocol number or ANY (6 for TCP or 17 for UDP). - destinationPort is a decValue port number or ANY. - sourcePort is a decValue port number or ANY. - destinationAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - sourceAddressSelector is an address in the format: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN (for inbound) or OUT (for outbound). If IN, this policy applies to traffic coming into the current host. If OUT, it applies to traffic going out of the current host. - mirroring is NOTMIRRORED or MIRRORED. NOTMIRRORED creates a policy only in the specified direction. MIRRORED creates two policies, one in each direction. EXAMPLES IPv4: spdAddDiscard=17/17185/0,0.0.0.0/0,0.0.0.0/0,IN,NOTMIRRORED IPv6: spdAddDiscard=17/17185/0,::/0,::/0,IN,NOTMIRRORED Config String Format protocolSelector[/destinationPort/sorucePort], destinationAddressSelector,sourceAddressSelector,directionality, mirroring
131
SpdSetProp
SpdSetProp
NAME SYNOPSIS spdSetProp add Phase 2 transforms to a Phase 2 proposal spdSetProp=pConfStr Rule Value: pConfStr A stringValue specifier formatted as follows: proposalName,transformName[,transformName...] where - proposalName is a unique Phase 2 proposal name. - transformName is the name of an existing Phase 2 transform. You can specify up to eight transform names. EXAMPLES Config String Format Pre-defined proposal names spdSetProp=proposal_foo,ah_xform proposalName,transformName,[,transformName] The following are Phase II proposal names already defined inside the AMX Firmware and available for use.
ah_g1_transport=ah_sha,ah_md5 Attributes: DHGROUP=G1, ENCAP=TRANSPORT HARDLIFETIME=1800 SOFTLIFETIME=1500 ah_g2_transport=ah_sha,ah_md5 Attributes: DHGROUP=G2 ENCAP=TRANSPORT HARDLIFETIME=1800 SOFTLIFETIME=1500 ah_g1_tunnel=ah_sha,ah_md5 Attributes: DHGROUP=G1 ENCAP=TUNNEL HARDLIFETIME=1800 SOFTLIFETIME,1500
DESCRIPTION This rule adds one or more existing Phase 2 transforms to a Phase 2 proposal.
132
SpdSetProp (Cont.)
esp_g1_transport=esp_3des_sha,esp_3des_md5,esp_3des,esp_des_sha,esp_des_md5, esp_des,esp_null_sha,esp_null_md5 Attributes: DHGROUP=G1 ENCAP=TRANSPORT HARDLIFETIME=1800 SOFTLIFETIME,1500 esp_g2_transport=esp_3des_sha,esp_3des_md5,esp_3des,esp_des_sha,esp_des_md5, esp_des,esp_null_sha,esp_null_md5 Attributes= DHGROUP=G2 ENCAP=TRANSPORT HARDLIFETIME=1800 SOFTLIFETIME=1500
esp_g1_tunnel=esp_3des_sha,esp_3des_md5,esp_3des,esp_des_sha,esp_des_md5,esp_ des,esp_null_sha,esp_null_md5 Attributes = DHGROUP=G1 ENCAP=TUNNEL HARDLIFETIME=1800 SOFTLIFETIME=1500 esp_g2_tunnel=esp_3des_sha,esp_3des_md5,esp_3des,esp_des_sha,esp_des_md5,esp_ des,esp_null_sha,esp_null_md5 Attributes= DHGROUP=G2 ENCAP=TUNNEL HARDLIFETIME=1800 SOFTLIFETIME=1500
ESP Transforms esp_3des_sha =ESP_3DES,SHA esp_3des_md5=ESP_3DES,MD5 esp_3des_hmac_sha=ESP_3DES,HMAC-SHA esp_3des_hmac_sha2_256=ESP_3DES,HMAC-SHA2-256 esp_3des_hmac_sha2_384=ESP_3DES,HMAC-SHA2-384 esp_3des_hmac_sha2_512=ESP_3DES,HMAC-SHA2-512 esp_3des_hmac_ripemd=ESP_3DES,HMAC-RIPEMD esp_3des_aes,ESP_3DES=AES-XCBC-MAC esp_3des_hmac_md5=ESP_3DES,HMAC-MD5 esp_3des=ESP_3DES
133
SpdSetProp (Cont.)
esp_des_sha=ESP_DES,SHA esp_des_md5=ESP_DES,MD5 esp_des_hmac_sha=ESP_DES,HMAC-SHA esp_des_hmac_sha2_256=ESP_DES,HMAC-SHA2-256 esp_des_hmac_sha2_384=ESP_DES,HMAC-SHA2-384 esp_des_hmac_sha2_512=ESP_DES,HMAC-SHA2-512 esp_des_hmac_ripemd=ESP_DES,HMAC-RIPEMD esp_des_aes=ESP_DES,AES-XCBC-MAC esp_des_hmac_md5=ESP_DES,HMAC-MD5 esp_des=ESP_DES
esp_aes_cbc_sha=ESP_AES-CBC,SHA esp_aes_cbc_md5=ESP_AES-CBC,MD5 esp_aes_cbc_hmac_sha=ESP_AES-CBC,HMAC-SHA esp_aes_cbc_hmac_sha2_256=ESP_AES-CBC,HMAC-SHA2-256 esp_aes_cbc_hmac_sha2_384=ESP_AES-CBC,HMAC-SHA2-384 esp_aes_cbc_hmac_sha2_512=ESP_AES-CBC,HMAC-SHA2-512 esp_aes_cbc_hmac_ripemd=ESP_AES-CBC,HMAC-RIPEMD esp_aes_cbc_aes=ESP_AES-CBC,AES-XCBC-MAC esp_aes_cbc_hmac_md5=ESP_AES-CBC,HMAC-MD5 esp_aes_cbc=ESP_AES-CBC esp_aes_cbc_192_sha=ESP_AES-CBC,KEY_LENGTH,192,SHA esp_aes_cbc_192_md5=ESP_AES-CBC,KEY_LENGTH,192,MD5 esp_aes_cbc_192_hmac_sha=ESP_AES-CBC,KEY_LENGTH,192,HMAC-SHA esp_aes_cbc_192_hmac_sha2_256=ESP_AES-CBC,KEY_LENGTH,192,HMAC-SHA2-256 esp_aes_cbc_192_hmac_sha2_384=ESP_AES-CBC,KEY_LENGTH,192,HMAC-SHA2-384 esp_aes_cbc_192_hmac_sha2_512=ESP_AES-CBC,KEY_LENGTH,192,HMAC-SHA2-512 esp_aes_cbc_192_hmac_ripemd=ESP_AES-CBC,KEY_LENGTH,192,HMAC-RIPEMD esp_aes_cbc_192_aes=ESP_AES-CBC,KEY_LENGTH,192,AES-XCBC-MAC esp_aes_cbc_192_hmac_md5=ESP_AES-CBC,KEY_LENGTH,192,HMAC-MD5 esp_aes_cbc_192=ESP_AES-CBC,KEY_LENGTH,192 esp_aes_cbc_256_sha=ESP_AES-CBC,KEY_LENGTH,256,SHA esp_aes_cbc_256_md5=ESP_AES-CBC,KEY_LENGTH,256,MD5 esp_aes_cbc_256_hmac_sha=ESP_AES-CBC,KEY_LENGTH,256,HMAC-SHA esp_aes_cbc_256_hmac_sha2_256=ESP_AES-CBC,KEY_LENGTH,256,HMAC-SHA2-256 esp_aes_cbc_256_hmac_sha2_384=ESP_AES-CBC,KEY_LENGTH,256,HMAC-SHA2-384 esp_aes_cbc_256_hmac_sha2_512=ESP_AES-CBC,KEY_LENGTH,256,HMAC-SHA2-512 esp_aes_cbc_256_hmac_ripemd=ESP_AES-CBC,KEY_LENGTH,256,HMAC-RIPEMD esp_aes_cbc_256_aes=ESP_AES-CBC,KEY_LENGTH,256,AES-XCBC-MAC esp_aes_cbc_256_hmac_md5=ESP_AES-CBC,KEY_LENGTH,256,HMAC-MD5 esp_aes_cbc_256=ESP_AES-CBC,KEY_LENGTH,256
134
SpdSetProp (Cont.)
esp_aes_ctr_192_sha=ESP_AES-CTR,KEY_LENGTH,192,SHA esp_aes_ctr_192_hmac_sha=ESP_AES-CTR,KEY_LENGTH,192,HMAC-SHA esp_aes_ctr_192_hmac_sha2_256=ESP_AES-CTR,KEY_LENGTH,192,HMAC-SHA2-256 esp_aes_ctr_192_hmac_sha2_384=ESP_AES-CTR,KEY_LENGTH,192,HMAC-SHA2-384 esp_aes_ctr_192_hmac_sha2_512=ESP_AES-CTR,KEY_LENGTH,192,HMAC-SHA2-512 esp_aes_ctr_192_hmac_ripemd=ESP_AES-CTR,KEY_LENGTH,192,HMAC-RIPEMD esp_aes_ctr_192_aes=ESP_AES-CTR,KEY_LENGTH,192,AES-XCBC-MAC esp_aes_ctr_192_hmac_md5=ESP_AES-CTR,KEY_LENGTH,192,HMAC-MD5 esp_aes_ctr_192_md5=ESP_AES-CTR,KEY_LENGTH,192,MD5 esp_aes_ctr_256_sha=ESP_AES-CTR,KEY_LENGTH,256,SHA esp_aes_ctr_256_hmac_sha=ESP_AES-CTR,KEY_LENGTH,256,HMAC-SHA esp_aes_ctr_256_hmac_sha2_256=ESP_AES-CTR,KEY_LENGTH,256,HMAC-SHA2-256 esp_aes_ctr_256_hmac_sha2_384=ESP_AES-CTR,KEY_LENGTH,256,HMAC-SHA2-384 esp_aes_ctr_256_hmac_sha2_512=ESP_AES-CTR,KEY_LENGTH,256,HMAC-SHA2-512 esp_aes_ctr_256_hmac_ripemd=ESP_AES-CTR,KEY_LENGTH,256,HMAC-RIPEMD esp_aes_ctr_256_aes=ESP_AES-CTR,KEY_LENGTH,256,AES-XCBC-MAC esp_aes_ctr_256_hmac_md5=ESP_AES-CTR,KEY_LENGTH,256,HMAC-MD5 esp_aes_ctr_256_md5=ESP_AES-CTR,KEY_LENGTH,256,MD5
135
SpdSetPropAttrib
SpdSetPropAttrib
NAME SYNOPSIS spdSetPropAttrib set attributes of an IKE Phase 2 proposal spdSetPropAttrib=pConfStr Rule Value: pConfStr A stringValue specifier formatted as follows: proposalName,attributeType,attributeValue[,attributeType, attributeValue...] - proposalName is the name of an existing Phase 2 proposal. - attributeType is an attribute type from the table below. - attributeValue is an attribute value from the table below. Attribute Type ANTIREPLAY DHGROUP ENCAP UNITOFTIME Attribute Value DISABLED or ENABLED (default) NONE (default) for no PFS, G1 for D-H Group 1, G2 for D-H Group 2 TUNNEL or TRANSPORT SECS (default), MINS, or HRS attributeValue is converted to seconds. If attributeValue > 0 and attributeValue < PHASE2_MIN_HARD_LIFE_IN_SECS then it defaults to PHASE2_MIN_HARD_LIFE_IN_SECS, which is defined to be 120 seconds. Behavior is undefined if attributeValue=0. SOFTLIFETIME Default is 75% of HARDLIFETIME. attributeValue is converted to seconds. If attributeValue > 0 and attributeValue < PHASE2_MIN_SOFT_LIFE_IN_SECS then it defaults to PHASE2_MIN_SOFT_LIFE_IN_SECS, which is defined to be 90 seconds. Behavior is undefined if attributeValue=0. HARDLIFESIZE Default is 4608000 KB. If attributeValue > 0 and attributeValue < PHASE2_MIN_HARD_LIFE_IN_KB then it defaults to PHASE2_MIN_HARD_LIFE_IN_KB, which is defined to be 2560 KB. Behavior is undefined if attributeValue=0. SOFTLIFESIZE 0 for no lifesize; default is 75% of HARDLIFESIZE. If attributeValue > 0 and attributeValue < PHASE2_MIN_SOFT_LIFE_IN_KB then it defaults to PHASE2_MIN_SOFT_LIFE_IN_KB, which is defined to be 1920 KB. Behavior is undefined if attributeValue=0. PSKEEPALIVE DISABLED, ENABLED, or GLOBAL (default) Sets the keep-alive flag for protection suites created using this proposal. If you choose ENABLED, all protection suites derived from this proposal will renew when their soft lifetimes expire. If you choose GLOBAL, the global keep-alive flag will be consulted when soft lifetimes expire.
DESCRIPTION This rule sets or modifies the attributes of an existing IKE Phase 2 proposal.
136
SpdSetPropAttrib (Cont.)
EXAMPLES spdSetPropAttrib=ah_default,DHGROUP,G2 spdSetPropAttrib=ah_default,ENCAP,TUNNEL,HARDLIFESIZE,4608000 spdSetPropAttrib=proposal_foo,DHGROUP,G1,ENCAP,TRANSPORT, HARDLIFETIME,140,SOFTLIFETIME,120 Config String Format proposalName,attributeType,attributeValue[,attributeType,attributeV alue]
spdSetSA
spdSetSA
NAME SYNOPSIS spdSetSA create an SA proposal in the SPD create an SA proposal in the SPD spdSetSA=pConfStr
DESCRIPTION This rule creates an SA proposal in the SPD. An SA proposal is a list of proposals. IKE sends the list to the peer during negotiation. Rule Value: pConfStr A stringValue specifier formatted as follows: saName,proposalName,proposalNumber[,proposalName,proposalNumber...] where - saName is unique Phase 2 SA name. - proposalName is the name of an existing proposal with its attributes already set. You can specify up to four proposal names. - proposalNumber is the proposal number, which determines the ordering and combination of proposals in the SA proposal. When combining ESP and AH transforms, you may configure an ESP tunnel policy with an AH tunnel policy, or an ESP transport policy with an AH transport policy, by using the same proposal number for both policies. EXAMPLES spdSetSA=qm_sa_default,esp_tunnel,1,ah_tunnel,1,esp_tunnel_A,2, esP_tunnel_B,3 spdSetSA=qm_sa_default,esp_transport,1,ah_transport,1 spdSetSA=qm_sa_default,esp_tunnel,1,ah_tunnel,2 Config String Format Pre-defined Security Association (SA) proposal names saName, proposalName,proposalNumber[,proposalName,proposalNumber] The following are Phase II SA proposal names already defined inside the AMX Firmware and available for use. qm_sa_g1_transport=esp_g1_transport,1,ah_g1_transport,2 qm_sa_g2_transport=esp_g2_transport,1,ah_g2_transport,2 qm_sa_g1_tunnel=esp_g1_tunnel,1,ah_g1_tunnel,2 qm_sa_g2_tunnel=esp_g2_tunnel,1,ah_g2_tunnel,2
137
DESCRIPTION This rule adds a bypass Security Association (SA). After adding an SA, mkmCommit must be called to commit the SA to the Security Association Database (SADB). Rule Value: cptr_mkm_sa A string formatted as follows: saNumber,protocolSelector[/destinationPort/sourcePort]>, destinationAddressSelector,sourceAddressSelector, directionality,mirroring where - saNumber is a decValue, a unique number to be assigned to the SA. - protocolSelector is the IANA IP protocol number, decValue | ANY. Use 6 for TCP or 17 for UDP. - destinationPort and sourcePort are: decValue | ANY. - destinationAddressSelector and sourceAddressSelector are: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN | OUT. If IN then this policy applies to traffic coming into the current host. If OUT it applies to traffic going out of the current host. A mirrored policy will automatically be created for the opposite traffic flow. - mirroring is NOTMIRRORED | MIRRORED. NOTMIRRORED will create a policy only in the specified direction. MIRRORED will create two policies, one in each direction. EXAMPLES IPv4: mkmAddBypass=8,17/ANY/17185,0.0.0.0/0,0.0.0.0/0,OUT,NOTMIRRORED IPv6: mkmAddBypass=8,17/ANY/17185,::/0,::/0,OUT,NOTMIRRORED" Config String Format saNumber.protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector,directionality, mirroring
138
mkmAddDiscard
mkmAddDiscard
NAME SYNOPSIS mkmAddDiscard add a discard Security Association mkmAddDiscard=cptr_mkm_sa
DESCRIPTION This rule adds a discard Security Association (SA). After adding an SA, mkmCommit must be called to commit the SA to the Security Association Database (SADB). Rule Value: cptr_mkm_sa A string formatted as follows: saNumber protocolSelector[/destinationPort/ sourcePort],destinationAddressSelector,sourceAddressSelector, directionality,mirroring where - saNumber is a decValue, a unique number to be assigned to the SA. - protocolSelector is the IANA IP protocol number, decValue | ANY. Use 6 for TCP or 17 for UDP. - destinationPort and sourcePort are decValue | ANY. - destinationAddressSelector and sourceAddressSelector are: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN | OUT. If IN then this policy applies to traffic coming into the current host. If OUT it applies to traffic going out of the current host. A mirrored policy will automatically be created for the opposite traffic flow. - mirroring is NOTMIRRORED | MIRRORED. NOTMIRRORED will create a policy only in the specified direction. MIRRORED will create two policies, one in each direction. EXAMPLES IPv4: mkmAddDiscard=9,17/ANY/17185,0.0.0.0/0,0.0.0.0/0,IN,NOTMIRRORED IPv6: mkmAddDiscard=9,17/ANY/17185,::/0,::/0,IN,NOTMIRRORED Config String Format saNumber.protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector,directionality, mirroring
139
mkmAddTransport
mkmAddTransport
NAME SYNOPSIS mkmAddTransport add a transport mode Security Association mkmAddTransport=cptr_mkm_sa
DESCRIPTION This rule adds a transport mode Security Association (SA). After adding an SA and setting the associated transform ID and keys, mkmCommit must be called to commit the SA to the Security Association Database (SADB). Rule Value: cptr_mkm_sa A string formatted as follows: saNumber,protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector, directionality,networkInterfaceAddress where - saNumber is a decValue, a unique number to be assigned to the SA. - protocolSelector is the IANA IP protocol number, decValue | ANY. Use 6 for TCP or 17 for UDP. - destinationPort and sourcePort are: decValue | ANY. - destinationAddressSelector and sourceAddressSelector are: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN | OUT. If IN then this policy applies to traffic coming into the current host. If OUT it applies to traffic going out of the current host. A mirrored policy will automatically be created for the opposite traffic flow. - networkInterfaceAddress is the IP address of the network interface to which the inbound SA is bound. EXAMPLES IPv4: mkmAddTransport=5,6/2001/ANY,100.100.100.4,100.100.99.1, OUT,100.100.99.1 IPv6: mkmAddTransport=5,6/2001/ANY,3ffe:2::2,3ffe:1::2,OUT,3ffe:1::2 Config String Format saNumber.protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector,directionality, networkInterfaceAddress
140
mkmAddTunnel
mkmAddTunnel
NAME SYNOPSIS mkmAddTunnel add a tunnel mode Security Association mkmAddTunnel=cptr_mkm_sa
DESCRIPTION This rule adds a tunnel mode Security Association (SA). After adding an SA and setting the associated transform ID and keys, mkmCommit must be called to commit the SA to the Security Association Database (SADB). Rule Value: cptr_mkm_sa A string formatted as follows: saNumber,protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector,directionality, tunnelEndpointIPAddress,networkInterfaceAddress where - saNumber is a decValue, a unique number to be assigned to the SA. - protocolSelector is the IANA IP protocol number, decValue | ANY. Use 6 for TCP or 17 for UDP. - destinationPort and sourcePort are: decValue | ANY. - destinationAddressSelector and sourceAddressSelector are: ipAddress1[-ipAddress2 | /ipMaskPrefix]. - directionality is IN | OUT. If IN then this policy applies to traffic coming into the current host. If OUT it applies to traffic going out of the current host. A mirrored policy will automatically be created for the opposite traffic flow. - tunnelEndpointIPAddress is the identity of the remote gateway, for example "10.9.9.180" for the IPv4 address. - networkInterfaceAddress is the IP address of the network interface to which the inbound SA is bound. EXAMPLES IPv4: mkmAddTunnel=6,17/ANY/ANY,100.100.100.0/24,100.100.200.4, OUT,100.100.100.4,100.100.99.1") mkmAddTunnel=7,ANY,10.8.30.30,0.0.0.0/0,IN,100.100.100.4, 100.100.99.1 IPv6: mkmAddTunnel=6,17/ANY/ANY,3ffe:2::/64,3ffe:3::1,OUT,3ffe:2::2, 3ffe:1::2 mkmAddTunnel=7,ANY,3ffe:3::1,::/0,IN,3ffe:2::2,3ffe:1::2 Config String Format saNumber.protocolSelector[/destinationPort/sourcePort], destinationAddressSelector,sourceAddressSelector,directionality, tunnelEndpointIPAddress,networkInterfaceAddress
141
mkmSetInboundAH
mkmSetInboundAH
NAME SYNOPSIS mkmSetInboundAH set the transform ID and key for an inbound AH SA mkmSetInboundAH=cptr_value_string Rule Value: cptr_value_string A string formatted as follows: saNumber,spi,ahTransformID,key where - saNumber is a unique unsigned integer specified by the user. - spi is the decValue for the security parameter index, an unsigned long. SPI >255 and SPI < SPI_BOUNDARY, which is defined as 2048. - ahTransformID is: MD5 | SHA | HMAC-MD5 | HMAC-SHA | HMAC-SHA2-256 | HMAC-SHA2-384 | HMAC-SHA2-512 | HMAC-RIPEMD | AES-XCBC-MAC Note that MD5 (deprecated) is equivalent to HMAC-MD5; SHA (deprecated) is equivalent to HMAC-SHA. - key is the authentication algorithm key in hexadecimal. It must be 32 characters for MD5; 40 characters for SHA; 64 characters for SHA2-256; 96 characters for SHA2-384; 128 characters for SHA2-512; and 40 characters for RIPEMD. The traffic selectors for the transport or tunnel SA should be added before attempting to set the transform and keys for the same Security Association (identified by SA Number). EXAMPLES Config String Format mkmSetInboundAH=0,258,HMAC-MD5,123456789ABCDEF0FEDCBA987654321 saNumber.spi,ahTransformID,key
DESCRIPTION This rule sets the transform ID and key for an inbound AH SA.
142
mkmSetInboundESP
mkmSetInboundESP
NAME SYNOPSIS mkmSetInboundESP set the transform ID and key for an inbound ESP SA mkmSetInboundESP=configuration_string
DESCRIPTION This rule sets the transform ID and key for an inbound Encapsulating Security Payload (ESP) Security Association (SA). Rule Value: configuration_string A string formatted as follows: saNumber,spi,espTransformID,attributeType,attributeValue [,attributeType,attributeValue]... where - saNumber is a unique unsigned integer specified by the user. - spi is the decValue for the security parameter index, an unsigned long. spi >255 and spi < SPI_BOUNDARY, which is defined as 2048. - espTransformID is: ESPDES | ESP3DES | ESP_DES | ESP_3DES | ESPAES | ESP_AES | ESPAESCTR | ESP_AES-CTR | ESPNULL | ESP_NULL Note that ESP transform names of the form ESPxxx are deprecated; the preferred names are of the form ESP_xxx and the deprecated forms will be removed in the future. Attribute types and values are shown in the following table Attribute Type DECKEY AUTHALG Attribute Value Decryption key in hexadecimal format; must be 16 characters for DES, 48 characters for 3DES and 32 characters for AES. MD5 | SHA | HMAC-MD5 | HMAC-SHA | HMAC-SHA2-256 | HMAC-SHA2-384 | HMAC-SHA2-512 | HMAC-RIPEMD | AES-XCBC-MAC Authentication key in hexadecimal format; must be 32 characters for MD5; 40 characters for SHA; 64 characters for SHA2-256; 96 characters for SHA2-384; 128 characters for SHA2-512; and 40 characters for RIPEMD.
AUTHKEY
The traffic selectors for the transport or tunnel SA should be added before attempting to set the transform and keys for the same Security Association (identified by SA Number). Note that MD5 (deprecated) is equivalent to HMAC-MD5; SHA (deprecated) is equivalent to HMAC-SHA. EXAMPLES Config String Format mkmSetInboundESP=00,258,ESP_DES,DECKEY,2134657812435687,AUTHALG, HMAC-MD5,AUTHKEY,123456789ABCDEF0FEDCBA9876543210 saNumber.spi,espTransformID,attributeType,attributeValue [,attributeType,attributeValue]
143
mkmSetOutboundAH
mkmSetOutboundAH
NAME SYNOPSIS mkmSetOutboundAH set the transform ID and key for an outbound AH SA mkmSetOutboundAH=cptr_value_string Rule Value: cptr_value_string A string formatted as follows: saNumber,spi,ahTransformID,key where - saNumber is a unique unsigned integer specified by the user. - spi is the decValue for the security parameter index, an unsigned long. SPI >255 and SPI < SPI_BOUNDARY, which is defined as 2048. - ahTransformID is: MD5 | SHA | HMAC-MD5 | HMAC-SHA | HMAC-SHA2-256 | HMAC-SHA2-384 | HMAC-SHA2-512 | HMAC-RIPEMD | AES-XCBC-MAC Note that MD5 (deprecated) is equivalent to HMAC-MD5; SHA (deprecated) is equivalent to HMAC-SHA. - key is the authentication algorithm key in hexadecimal. It must be 32 characters for MD5; 40 characters for SHA; 64 characters for SHA2-256; 96 characters for SHA2-384; 128 characters for SHA2-512; and 40 characters for RIPEMD. The traffic selectors for the transport or tunnel SA should be added before attempting to set the transform and keys for the same Security Association (identified by SA Number). EXAMPLES Config String Format mkmSetOutboundAH=0,258,HMAC-MD5,123456789ABCDEF0FEDCBA987654321 saNumber.spi,ahTransformID,key
DESCRIPTION This rule sets the transform ID and key for an outbound AH SA.
144
mkmSetOutboundESP
mkmSetOutboundESP
NAME SYNOPSIS mkmSetOutboundESP set the transform ID and key for an outbound ESP SA mkmSetOutboundESP=configuration_string
DESCRIPTION This rule sets the transform ID and key for an outbound Encapsulating Security Payload (ESP) Security Association (SA). Rule Value: configuration_string A string formatted as follows: saNumber,spi,espTransformID,attributeType,attributeValue [,attributeType,attributeValue]... where - saNumber is a unique unsigned integer specified by the user. - spi is the decValue for the security parameter index, an unsigned long. SPI >255 and SPI < SPI_BOUNDARY, which is defined as 2048. - espTransformID is: ESPDES | ESP3DES | ESP_DES | ESP_3DES | ESPAES | ESP_AES | ESPAES-CTR | ESP_AES-CTR | ESPNULL | ESP_NULL Note that ESP transform names of the form ESPxxx are deprecated; the preferred names are of the form ESP_xxx and the deprecated forms will be removed in the future. Attribute types and values are shown in the following table: Attribute Type ENCKEY AUTHALG Attribute Value Decryption key in hexadecimal format; must be 16 characters for DES, 48 characters for 3DES and 32 characters for AES. MD5 | SHA | HMAC-MD5 | HMAC-SHA | HMAC-SHA2-256 | HMAC-SHA2-384 | HMAC-SHA2-512 | HMAC-RIPEMD | AES-XCBC-MAC Authentication key in hexadecimal format; must be 32 characters for MD5; 40 characters for SHA; 64 characters for SHA2-256; 96 characters for SHA2-384; 128 characters for SHA2-512; and 40 characters for RIPEMD. IV Initialization Vector for encryption; must be 16 characters for DES and 3DES and 32 characters for AES.
AUTHKEY
The traffic selectors for the transport or tunnel SA should be added before attempting to set the transform and keys for the same Security Association (identified by SA Number). Note that MD5 (deprecated) is equivalent to HMAC-MD5; SHA (deprecated) is equivalent to HMAC-SHA. EXAMPLES mkmSetOutboundESP="00,258,ESP_DES,ENCKEY,2134657812435687, IV,1001100110011001,AUTHALG,HMAC-MD5,AUTHKEY, 123456789ABCDEF0FEDCBA9876543210 Config String Format saNumber.spi,espTransformID,attributeType,attributeValue [,attributeType,attributeValue]
145
spdAddTransport=ANY,192.168.220.57,%LOCAL_ADDR%,OUT,PACKET,IKE,qm_sa_g2_transport spdAddTransport=ANY,192.168.220.37,%LOCAL_ADDR%,OUT,PACKET,IKE,qm_sa_g2_transport
146
The Enabled checkbox turns on and off the entire IPSec feature. The CRL radio buttons indicate the level of Certificate Revocation List checking that is performed for IPSec connections.
CRL Checking checks the sources certificate while CRL Checking (All) checks all of the certificates in a sources certificate chain. If either CRL Checking or CRL Checking (All) are selected, then at least one certificate must be present in the CRL Certificates directory on the Master.
The Upload Configuration File section provides the capability to upload the IPSec Config file onto a Master. Simply browse to the files location on a PC, select the file, and select Submit. The file will be uploaded to its proper location on the Master.
There is no delete capability for the Config file. New uploads overwrite the existing Config file.
The Certificates, CA Certificates and CRL Certificates sub-pages provide the ability to upload certificates, certificate authority certificates and certificate revocation list certificates respectively onto the Master. Simply browse to the location of the certificate data on the PC, select the file and select Submit. The selected file will be uploaded to the appropriate directory on the Master.
To delete a certificate file, simply select the desired file and select Delete. This will cause the file to be removed from the Master.
147
148
(*-----------------------------------------------------------------------------------*) (* Added v1.28, Clock Manager Time Server Entry Structure *) (*-----------------------------------------------------------------------------------*) STRUCTURE CLKMGR_TIMESERVER_STRUCT { CHAR CHAR CHAR CHAR CHAR } IS_SELECTED; IS_USER_DEFINED; IP_ADDRESS_STRING[48]; URL_STRING[32]; LOCATION_STRING[32]; (* TRUE/FALSE *) (* TRUE/FALSE *) (* Allow enough room for IPv6 in the future *) (* Example: time.organization.net *) (* Example: Boulder, Colorado, US *)
(* Added v1.28, Clock Manager *) INTEGER CLKMGR_MODE_NETWORK = $01; (* Used to enable Clock Manager Functionality *)
behavior. *)
149
Library Calls
The NetLinx.axi file that ships with NetLinx Studio includes the following Clock Manager-specific library calls:
NetLinx.axi - Library Calls
CLKMGR_IS_NETWORK_SOURCED() CLKMGR_SET_CLK_SOURCE (CONSTANT INTEGER MODE) CLKMGR_IS_DAYLIGHTSAVINGS_ON() CLKMGR_SET_DAYLIGHTSAVINGS_MODE (CONSTANT INTEGER ONOFF) CLKMGR_GET_TIMEZONE() CLKMGR_SET_TIMEZONE (CONSTANT CHAR TIMEZONE[]) CLKMGR_GET_RESYNC_PERIOD() Returns FALSE/0 or TRUE/1. The default setting is FALSE/0. Can be set to CLKMGR_MODE_NETWORK or CLKMGR_MODE_STANDALONE. Returns FALSE/0 or TRUE/1. The default setting is FALSE/0. Can be set to ON/TRUE or OFF/FALSE. Returns Timezone as a string in the format: UTC[+|-]HH:MM Input string must have the correct format: UTC[+|-]HH:MM Returns the Clock Manager's re-sync period in minutes. The default setting is one (1) hour. This setting has no effect if the Clock Manager mode is set to STANDALONE. CLKMGR_SET_RESYNC_PERIOD (CONSTANT INTEGER PERIOD) CLKMGR_GET_DAYLIGHTSAVINGS_OFFSET (CLKMGR_TIMEOFFSET_STRUCT T) Sets the re-sync period to the specified minute value. The upper bound is 480 minutes (i.e., 8 hours). Populates the TIMEOFFSET structure with the current Daylight Savings Offset configured. The function returns a negative SLONG value if it encounters an error. CLKMGR_SET_DAYLIGHTSAVINGS_OFFSET (CONSTANT CLKMGR_TIMEOFFSET_STRUCT T) CLKMGR_GET_ACTIVE_TIMESERVER (CLKMGR_TIMESERVER_STRUCT T) Sets the Daylight Savings Offset to the specified value. Populates the TIMESERVER structure with the currently active time server's data. The function returns a negative SLONG value if it encounters an error. CLKMGR_SET_ACTIVE_TIMESERVER (CONSTANT CHAR IP[]) CLKMGR_GET_TIMESERVERS (CLKMGR_TIMESERVER_STRUCT T[]) Sets the time server entry that has the matching IPADDRESS to the IP parameter as the active time server entry. Populates the currently configured time server entries from the Clock Manager into the specified TIMESERVER array. The function returns a negative SLONG value if it encounters an error, otherwise the return value is set to the number of records populated into the CLKMGR_TIMESERVER_STRUCT array. CLKMGR_ADD_USERDEFINED_TIMESERVER (CONSTANT CHAR IP[], CONSTANT CHAR URL[], CONSTANT CHAR LOCATION[]) CLKMGR_DELETE_USERDEFINED_TIMESERVER (CONSTANT CHAR IP[]) Adds a user-defined time server entry.
Deletes the user-defined entry that has its IPADDRESS matching the parameter.
150
151
152
153
10/08
2008
AMX. All rights reserved. AMX and the AMX logo are registered trademarks of AMX. AMX reserves the right to alter specifications without notice at any time.