A PowerPoint Presentation on Theory of Operation and setup tutorial

advertisement
Teldat VisorALARM Plus2U
Honeywell IP Communicator
Tech Support Training
Nick Martello
Martello Consulting
Chesterfield, VA
100% Supervision
Part I: Introduction and Overview
•Model Review
•Part Numbers
•Ancillary parts
•Theory of Operation
© Martello Consulting, 2009
2
IP Communicator Review (Obsolete Models)
Picture
Model
Type of Alarm
Panel
supported
Sold in
IP
Supervision
to the ARC
Customer IP
server
supervision
mIP-Plus US Burglar/Intrusion USA, Canada
N/A
Rest of the
Burglar/Intrusion World (EMEA,
mIP-Plus RW
& Fire
LATAM,
ASIAPAC)
IPDACT
Fire
USA, Canada
© Martello Consulting, 2009
3
N/A
U/D over
the PSTN
U/D over
TCP/IP
UL Certificates &
Approvals
N/A
UL1023
UL1076
UL1610
ULC C1023-1974
ULC/ORD (C1076 M1986)
CAN/ULC S304 - M88
N/A
N/A
N/A
UL864
ULC Pending
Latest Models (IPDACT-2 and IPDACT-2UD)
Picture
Model
Type of Alarm
Panel supported
Sold in
mIP-UD US
Burglar/Intrusion
USA, Canada
mIP-UD RW
Burglar/Intrusion &
Fire
Rest of the
World (EMEA,
LATAM,
ASIAPAC)
IPDACT-2UD
Fire
USA, Canada
IP
Supervision
to the ARC
© Martello Consulting, 2009
4
Customer IP
server
supervision
U/D over
the PSTN
N/A
N/A
N/A
N/A
U/D over
TCP/IP
Honeywell Life System Part Numbers
IPDACT-2
Internet Communicator-Contact ID only.
Requires compatible FL panel equipped with
on-board or optional DACT. Requires 136mA
aux non-reset able power from FACP without
2UD modem. Includes cable from panel
primary Telco port to IPDACT. Photo shows
2UD model with modem plugged in.
IPDACT-2UD
Internet Communicator-Contact ID only.
Requires compatible FL panel equipped with
on-board or optional DACT. Requires 155mA
aux non-reset able power from FACP to
support on board 2UD modem. Includes
cable from panel primary Telco port to
IPDACT.
2UD
Modem option to turn IPDACT-2 into IPDACT2UD
IPBRKT
Bracket for mounting IPDACT inside MS9200UDLS common enclosure or in optional
HPP-300ULX power supply
IPSPLT
Splitter for dual phone lines to IPDACT input
cable.
© Martello Consulting, 2009
5
Parts List
IPENC
Optional cabinet for mounting IPDACT
next to compatible Fire-Lite FACP. Use
when connecting to older non
common enclosure panels such as MS9200UD or MS-9600. Includes IPBRKT
mounting bracket already installed.
HP300ULX
Optional UL listed Fire Aux power
supply for mounting IPDACT next to
compatible Fire Panel when additional
power is required for IPDACT.
VisorALARM 2U PLUS
PN: ALREH-220
UL Listed IP receiver for Teldat & FireLite IP communicators
© Martello Consulting, 2009
6
Additional Part numbers
NOTE: For purposes of this presentation, the Teldat mIP IP UL listed communicator models used in connection
to Honeywell Life System fire panels are known as models IPDACT-2 and IPDACT-2UD respectively.
© Martello Consulting, 2009
7
System Overview
90 second supervision
© Martello Consulting, 2009
8
Theory of Operation
•The IP Communicators replace the telephone line with an
Ethernet connection.
•No changes are made to the panel dialer setup.
•The IP card simulates a standard PSTN analog line to the
panel.
•During an event, the IP card senses off-hook status, counts
the digits of the dialed phone number then begins collecting
Contact ID data.
•The IP card “frames” the Contact ID data using UDP packets
with 512 bit AES encryption and forwards it to the receiver.
•The Receiver decrypts and un-packetizes the data and
presents ASCII data to automation software in a
preprogrammed format.
•The automation software or the receiver can provide the
kiss-off signal to the panel.
© Martello Consulting, 2009
9
Theory of Operation-UD
•The release of the 2UD models and firmware release 6.0
provides a modem feature to the IP communicator.
•This feature uses TCP/IP vs UDP to provide upload/download
services to the panel from anywhere in the Internet.
•The card contains a V.32 bis modem capable of up to 14,4KB
speeds-however most Honeywell Life System fire panels will
only operate at a max of 2400 baud.
•A special virtual port program is used on the programming PC
called UDPORT.exe. This program redirects modem signals
from the programming software from the standard ports to a
virtual Ethernet port.
•The software allows entry of the receiver’s IP address and
TCP port to use along with username and password.
© Martello Consulting, 2009
10
Theory of Operation UD-continued
•With standard remote programming via PSTN, the user
enters a panel phone number to call.
•This same number is also used as a database entry in the
subscriber field of the target IPDACT db record in the
receiver.
•Since the VisorALARM “knows” how to poll the remote card,
this subscriber field is used as a database lookup for which
panel to call.
•The on-board modem on the IP card converts the digital
encapsulated modem signals back to analog phone signals at
the remote site.
•The panel then sees a “ring” and answers the call.
© Martello Consulting, 2009
11
Standard Alarm Event Transmission Operation
Alarm Panel
Dialer
capture
mIP-2/
IPDACT-2UD Internet
Automation
Software (1)
VisorALARM
Serial
line
Line picked up
Calling
Contact-ID Alarm
Alarm Kissoff
Call Disconnect
(1)
IP Alarm
Alarm in wellknown format
Alarm ACK
Alarm Kissoff
The alarm is never lost on the way:
The Alarm is ACK’d only if the
Automation Software has kissed it off
Other Automation SW types: IBS, MICROKEY, MASterMind, BOLD, DICE
© Martello Consulting, 2009
12
Part II: Network Concepts
•IP Address Formats
•Subnetting
•Determining a Network Address
- IP Calc
•Private Networks and Subnets
•The importance of defining the receiver as “classless”
•Ping
•Traceroute
- http://Network Tools.com
•IP Transmission Concepts
•NAPT (Network Address Port Translation)
•Teldat Security Concepts (ARLY)
© Martello Consulting, 2009
13
IP Address Concepts
•IP address format: octet.octet.octet.octet
•The IP address and mask defines the IP network
address and host network address
•Example:
192.198.1.200 /24
Mask: “/24” = “255.255.255.0”
Network Host
•In order for a device to reach any host in a remote
(i.e. different) IP network, a default Gateway is
required.
•It is the default gateway’s responsibility to transfer
the IP traffic to the remote network.
© Martello Consulting, 2009
14
14
IP Addresses and Subnets
•Sub netting works by applying the concept of extended
network addresses to individual computer (and other
network device) addresses.
•An extended network address includes both a network
address and additional bits that represent the subnet
number... (see below)
•Together, these two data elements support a two-level
addressing scheme recognized by standard implementations
of IP. The network address and subnet number, when
combined with the host address, therefore support a threelevel scheme
© Martello Consulting, 2009
15
Understanding IP Addresses
Private Intranet
For every additional bit set to '1' in the mask,
another bit becomes available in the subnet number
to index additional subnets. A two-bit subnet number
can support up to four subnets, a three-bit number
supports up to eight subnets, and so on.
© Martello Consulting, 2009
16
Private Networks and Subnets
•The governing bodies that administer Internet Protocol have
reserved certain networks for internal uses.
•In general, intranets utilizing these networks gain more
control over managing their IP configuration and Internet
access.
•This sub-netting permits organizations to prohibit access to
machines from certain other machines.
•The default subnet masks associated with these private
networks are listed below.
© Martello Consulting, 2009
17
Classless Routing
•Classless Inter-Domain Routing (CIDR) is a mechanism
introduced to slow the growth of routing tables on routers
across the internet, and to help prevent waste of IP
addresses by allocating a subset (as opposed to whole
chunks) of a Class A, B ,or C network to ISP's and
organizations.
•It allows for address specified in CIDR notation, address
aggregation and easier delegation of address blocks.
•It is important to include the term classless in the receiver’s
config file just below the router entry.
•Failure to do so may cause routing problems and “lost”
mIPS.
•See “Fine Tuning” the configuration later in this
presentation.
© Martello Consulting, 2009
18
Basic Useful IP Tests-PING
•The ping utility checks whether a host is alive and reachable
or not. This is done by sending an ICMP Echo Request packet
to the host, and waiting for an ICMP Echo Reply from the
host. (See example below)
© Martello Consulting, 2009
19
Basic Useful IP Tests-Traceroute
•Traceroute is a program that can show the route over the
network between two systems, listing all the intermediate
routers a connection must pass through to get to its
destination.
•It can help determine why connections to a given server
might be poor, and can often help determine where exactly
the problem is.
•It can also show how systems are connected to each other,
letting you see how an ISP connects to the Internet as well as
how the target system is connected.
•Easy to use Traceroute tools are available even for Vista.
- Go to http://network-tools.com/
© Martello Consulting, 2009
20
Traceroute Example
© Martello Consulting, 2009
21
IP transmission basic concepts
Host A
TCP/UDP
Host B
Peer-to-peer
TCP/UDP
IP
IP
Link
Link
Def GW for host B
Def GW for host A
IP Network
© Martello Consulting, 2009
22
22
Teldat IP Basics -IPDACT Security
•Highest security level in the industry:
- All IP traffic exchanged is encrypted with a 512-bit AES algorithm
(Grade AA for UL1610).
- The configuration access is password protected.
•IPDACT installer & configuration passwords can be centrally
managed.
•Any IPDACT parameter can be managed from the central
station via individual IP address or group config pattern.
•Anti-device substitution protection based on non-writable
IPDACT specific information.
•Anti-replay protection to avoid man-in-the-middle attacks
- ‘sequential marked’ frames.
© Martello Consulting, 2009
23
Teldat IP Basics -Supervision
•Firewall compatibility:
- All communication begins at the IPDACT side so it becomes a trusted
host behind the customer’s firewall.
- The IPDACT to VisorALARM communication only requires one UDP
port.
•Low UDP bandwidth vs TCP/IP:
- Contact frame (once, when IPDACT boots up)  72 bytes
 Polling frames  24 bytes
 Alarm frames  56 bytes
•IP comm. supervision.
•PSTN supervision.
- Supported by both IPDACT and Fire panels.
- Alarm panel supervises in Fire scenarios.
© Martello Consulting, 2009
24
Teldat IP Basics- Communication Highlights: ARLY
Internet
ARLY protocol
• ARLY is the protocol used between the
mIP/IPDACT and the VisorALARM
• Three services run on ARLY
Alarm Transmission
Account Supervision
Upload / Download
• Saves bandwidth in the ARC’s IP service
- ARLY runs over UDP/IP  Less bandwidth consuming than TCP/IP solutions
• Reliable communications:
- ARLY adds robustness to UDP with packet sequencing and retransmissions
- Backup VisorALARM serves mIP/IPDACT’s if the Main VisorALARM is down
• Firewall friendly
- The Security Service just requires one open port in the ARC access Firewalls
- No open ports required in the customer’s Firewall
© Martello Consulting, 2009
25
The IP packet format & NAPT
IP SOURCE ADDRESS
IP
packet
IP DESTINATION ADDRESS
UDP SOURCE PORT
UDP DESTINATION PORT
ARLY PROTOCOL PAYLOAD
NAPT
Encapsulated
UDP packet
The IP packet sent by the IPDACT has private source IP address and source
UDP port
When the IP packet traverses the customer access router, on its way to the
Internet, the source IP address and UDP port is translated to public ones.
When the IP packet traverses the customer access router, on its way to the IPDACT
(opposite direction), inverse translation takes place: destination public IP address &
port is translated to the private ones.
© Martello Consulting, 2009
26
26
Scenario 1: IPDACT and VisorALARM behind a NAPT router
•In a typical scenario, the IPDACT and VisorALARM default
gateways are connected to the Internet.
•UDP frames transmitted to the Internet through these
gateways are hence modified according to NAPT (Network
Address Port Translation).
•The following diagram illustrates a network diagram for this
scenario as well as the UDP frame header parameters in
each network segment (subscriber network, the Internet and
the ARC network):
© Martello Consulting, 2009
27
IPDACT and VisorALARM behind a NAPT router
© Martello Consulting, 2009
28
IPDACT and VisorALARM behind a NAPT router
•As shown in the drawing, both routers need to do NAPT so
the transmitted UDP frame travels along the Internet with
the system public IP addresses (213.4.21.187 and
80.26.96.183 in the Figure). For the correct system operation,
the subscriber’s network firewall should allow:
- UDP traffic sent from the IPDACT (IP address: 192.168.1.2 in the
example) to the ARC public IP address (80.26.96.183 in the example).
© Martello Consulting, 2009
29
IPDACT and VisorALARM behind a NAPT router
•On transmission, the subscriber’s default gateway sets a
NAPT conversion entry in its cache memory, so the received
UDP traffic from the Internet can be forwarded back to the
IPDACT.
- UDP traffic received from the ARC (80.26.96.183). The subscriber’s
default gateway will forward this traffic to the IPDACT (192.168.1.2)
according to its cached NAPT entry.
© Martello Consulting, 2009
30
IPDACT and VisorALARM behind a NAPT router
•In analogy, the ARC network firewall should allow:
- UDP traffic received from the Internet to its serving port (port 80 in the
example). Traffic to this port should be triggered to the VisorALARM
(IP address: 172.24.4.1, serving port 80).
- UDP traffic sent from the VisorALARM to the Internet
© Martello Consulting, 2009
31
Teldat IP Basics -IPDACT Security
•Highest security level in the industry:
- All IP traffic exchanged is encrypted with a 512-bit AES algorithm
(Grade AA for UL1610).
- The configuration access is password protected.
•IPDACT installer & configuration passwords can be centrally
managed.
•Any IPDACT parameter can be managed from the central
station via individual IP address or group config pattern.
•Anti-device substitution protection based on non-writable
IPDACT specific information.
•Anti-replay protection to avoid man-in-the-middle attacks
- ‘sequential marked’ frames.
© Martello Consulting, 2009
32
Teldat IP Basics -Supervision
•Firewall compatibility:
- All communication begins at the IPDACT side so it becomes a trusted
host behind the customer’s firewall.
- The IPDACT to VisorALARM communication only requires one UDP
port.
•Low UDP bandwidth vs TCP/IP:
- Contact frame (once, when IPDACT boots up)  72 bytes
 Polling frames  24 bytes
 Alarm frames  56 bytes
•IP comm. supervision.
•PSTN supervision.
- Supported by both IPDACT and Fire panels.
- Alarm panel supervises in Fire scenarios.
© Martello Consulting, 2009
33
Part III: Servicing Receiver Customers
•Recommended Tools
•IPDACT programming
•Reducing Customer Frustration
•Initial Bench Receiver Settings
© Martello Consulting, 2009
34
Recommended Tools For Tech Support Site
• TeraTerm-Pro Shareware but better terminal program than
HyperTerminal which does not come with Vista or Windows 7.
- Used for programming:
 IPDACT via Telnet or serial connection
 VisorALARM Plus via Telnet or serial connection
• IPDACT Windows Programming Tool
- Used for programming IPDACT in field
 Actually a Windows application front end for Telnet
• VisorALARM Manager-A Windows application for Telnet
• FTP client (Available on Vista/Windows 7)
- Used for upgrading receivers
• RFU: Rabbit Field Utility
- Used for upgrading IPDACT firmware from a PC
• Ping-Used to determine access to an IP address
© Martello Consulting, 2009
35
Basic IP-Card Programming Requirements
•
•
•
•
•
•
•
IPDACT default access password (factory default is 24680).
This is NOT the install password
“Installator” password, required to execute the register
command. (Called “Installator” password to separate from
default access password)
If STATIC IP is to be used such as in an enterprise or
corporation: Obtain IP address, subnet mask and Internet
gateway for IPDACT from enterprise IT manager.
Default IP is 192.168.0 100 with subnet of 255.255.255.0
(Card ships defaulted to DHCP)
IPDACT account number or client number
IP addresses of the Primary and Secondary VisorALARM
central station receivers
UDP Port number to use
© Martello Consulting, 2009
36
IPDACT Windows Installer Tool
Automatically finds IPDACT
© Martello Consulting, 2009
37
IPDACT Windows Installer Tool
Automatically finds IPDACT
© Martello Consulting, 2009
38
IPDACT Windows Installer Tool
© Martello Consulting, 2009
39
Eliminate Setup Frustration
•Central Station Operators should contact tech support before
opening the box!
•Obtain or download programming tools including TeraTerm
Pro.
•Downloads:
- Download the latest version of VisorALARM Manager.
- After determining firmware version decide if receiver needs firmware
upgrade before continuing.
 This can be accomplished via the monitor program inside VM or via simple
serial terminal connection and turning it on.
© Martello Consulting, 2009
40
Eliminate Setup Frustration for New Customers
•If possible, set up receiver on bench before mounting in
rack
•Connect via serial cable to set basic parameters such as:
- IP address
- Gateway
- Port numbers
•After preliminary settings, system can be rack mounted and
accessed via Telnet from the programmer’s desk.
•This process will eliminate a lot of frustration!
© Martello Consulting, 2009
41
Tera-Term Pro setup
•Using the supplied DB9M to DB9F serial cable connect to
receiver first via serial port.
•Set Tera-Term window to 40 lines –this allows more of the
config to be seen without scrolling
© Martello Consulting, 2009
42
A new session of Tera-Term is defaulted to COM 1
•Connect first via the DB9 serial port on the back of the
receiver –setup is standard 9600, 8, n, 1
© Martello Consulting, 2009
43
Initial Settings
•Upon connection, hit enter to start the session
•Enter manager for User:
•Enter 24680 for password and the following should appear:
© Martello Consulting, 2009
44
Changing IP address of the receiver
•Determine existing IP address (should be 192.168.0.200)
•At the * prompt, enter p 4 (p-space-4) and the following
screen should appear:
© Martello Consulting, 2009
45
Changing IP address of the receiver
•At the Config> prompt, type “show all” and the following
screen will scroll to the bottom of the config file: (exit) Note
the IP address below:
© Martello Consulting, 2009
46
Changing IP address of the receiver
•At the Config> prompt, Enter the following commands,
protocol ip
•The receiver will respond with the following prompt:
•IP config>
© Martello Consulting, 2009
47
Changing IP address of the receiver
• Type the following text to change the IP address
• IP Config>address Ethernet 0/0 XXX.XXX.XXX.XXX (spc) 255.255.0.0 or
what ever the mask to be used.
• Keep in mind the mask works in conjunction with the network numbers
to limit the number of machines that can exist on the network or to
divide subnets to prevent machines from accessing other machines.
• Once this is complete, the user can connect with VisorALARM Manager.
This will make the setup go much faster and cause less frustration.
• To exit from IPCONFIG, type exit to return to Config>
• Save the configuration by type sa (save)
• Respond to “save configuration? –type y (yes)
• Then type <CtrL>P to exit to the * prompt
• Type re for restart to start the receiver with the changed IP address.
© Martello Consulting, 2009
48
Part IV VisorALARM Manager
•Logging In
•Set Global Parameters
•The Monitor Program
- Determining Firmware Rev and Bios Rev
- Determining mIP on-line/off line-status
•Adjusting User-Defined Contact ID Codes
•Viewing Registered Accounts
•Setting up Configuration Patterns
© Martello Consulting, 2009
49
VisorALARM Manager Initial Setup
•VisorALARM Manager is actually a Visual Basic front end to
Telnet.
•If the actual IP address is not entered correctly, the session
will not start.
•Enter does not work-click on OK with the mouse.
© Martello Consulting, 2009
50
VisorALARM Manager Initial Setup
•Enter Username and Password (defaults are manager,
24680)
•Click OK
© Martello Consulting, 2009
51
Successful Retrieval
Global Tab
Retrieve Config
© Martello Consulting, 2009
52
Start Monitor
Global Parameters
Set all IP addresses for receiver, router/gateway, and NTP host
Set IP address of unit on network used to supervise the network (IP
address to monitor) This should be a machine that is on 24/7.
Set parameters of automation software emulation
Set User Name and password
Set TCP upload/download parameters
© Martello Consulting, 2009
53
Monitor Program
To open the monitor program, click the icon with the
lightning bolt in the upper right hand corner of VA
Manager
The first tab shows license and version numbers as
well as a virtual representation of receiver front panel
LED condition.
The second tab will show all registered remote IP
communicators including IP address, software version
number and status, (alive, contacted, loss reported.)
© Martello Consulting, 2009
54
Monitor Program
© Martello Consulting, 2009
55
mIP Status Screen
© Martello Consulting, 2009
56
User-Defined Contact ID Codes
Change to 311
Battery Fault
© Martello Consulting, 2009
57
User-Defined Codes
Here you can change some contact ID codes that report to
automation
Note that the alarm reported from input number 1 on the
mIP/IPDACT communicator should be changed to 311 “battery
missing/trouble”
• This is used to monitor aux power supplies when connecting to a non-UL listed
fire panel.
Note that some codes do not restore.
© Martello Consulting, 2009
58
Registered Accounts
Req. for UD
© Martello Consulting, 2009
59
Registered Accounts
This screen shows all registered accounts
Accounts can be deleted from the system on this screen
For upload/download, the central station operator must fill in the
subscriber telephone number provided by the installer/dealer.
Other parameters can be changed and updated or pushed out to
the remote communicator.
© Martello Consulting, 2009
60
Config Patterns
© Martello Consulting, 2009
61
Config Patters
Here you control the registration process of remote communicators
When an installer registers a remote card to the receiver, the receiver
overwrites the flash memory of the remote communicator with
information from the assigned pattern
The pattern ID is the key database index to a set of remote
communicators but it is also the public side of the encryption key.
• Note that most central station pick one general configuration pattern. However, if a
customer uses a maintenance receiver (such as a county school system) to receive trouble
alarms, then it is critical that a separate configuration pattern be used for that specific
customer.
• Download the document called Understanding Configuration Patterns from
www.martelloconsulting.com for more understanding.
© Martello Consulting, 2009
62
Part V-Fine Tuning via CONFIG
•All commands administered via VisorALARM manager plus
additional configurations can be administered via direct
command line interface (CLI)
•Requires use of a terminal program such as TeraTerm.Pro or
Hyperterminal. Hyperterminal no longer ships with Vista or
Windows 7. TeraTerm works on both operating systems and
is shareware.
•TeraTerm Pro can be used initially via the serial port to set
up the basic IP address. Note that early versions of
VisorALARM Manger GUI will not permit removal of default
address.
•Once setup, the user can connect remotely via Telnet over
IP.
© Martello Consulting, 2009
63
VisorALARM console terminal access
•Authenticated access.
- The console is a command line interface (CLI)  text mode.
- The console structure is always the same (local and remote).
•PC Serial Port to VisorALARM connection:
- Standard DB9 cable from the PC COM to the VisorALARM AUX port.
- TeraTerm serial port (COM):
- Speed: 9600 bps.
- Data bits: 8.
- Parity: None.
COM
- Stop bits: 1.
- Flow control: None.
~
AC INPUT
100-240 V~;1-0.5 A
47-63 Hz
SLOT 1
WAN 1
Computer
© Martello Consulting, 2009
64
AUX.
To prevent electric shock,
CAUTION!do not remove cover.
VisorALARM console remote terminal access
•Telnet connection to the VisorALARM IP address:
•Firewall compatibility:
- The telnet is a TCP connection to the VisorALARM port 23.
- We can set a different port.
IP1
IP
telnet
© Martello Consulting, 2009
65
VisorALARM console terminal layout
Serial Num.
Main Process (P 1)
Firmware
release
© Martello Consulting, 2009
66
Console processes
Console access
*config
Cntrl-P
Main
process
*
Configuration
Config >
Cntrl-P
*monitor
*P 3
*event
Cntrl-P
Event
Visualization
*P 2
*P 4
Monitoring
© Martello Consulting, 2009
67
67
Main process commands (P 1)
*LOAD ?
ACTIVATE
DEACTIVATE
IMMEDIATE
RACTIVATE
RDEACTIVATE
Interactive help command
*?
MONITOR
CONFIG
RUNNING-CONFIG
FLUSH
INTERCEPT
LOAD
LOGOUT
PROCESS
RESTART
STATUS
TELNET
VRF-TELNET
*LOGOUT
Do you wish to end connection (Yes/No)?
*RESTART
Are you sure to restart the system(Yes/No)? Y
Restarting. Please wait .......................................
APP DATA DUMP......................................
Running application
Flash configuration read
Initializing
*TELNET 192.168.0.100
Trying to connect...
(Press Control S to come back to local router)
Telnet connection closed.
*TELNET
Telnet destination [192.168.0.100]?
Telnet source [192.6.2.176]?
Telnet port [23]?
Trying to connect...
(Press Control S to come back to local router)
© Martello Consulting, 2009
68
68
Configuration process (P 4)
•Where all the VisorALARM configuration commands are
present.
•Hierarchic tree structure: Configuration sub-processes.
•In order to activate a new configuration:
- Execute the required configuration commands.
- Exit the configuration sub process ([subprocess] config>exit)
- Save the configuration (Config>save-yes).
- Quit P 4 (Ctrl+P) and restart the VisorALARM (* restart)
© Martello Consulting, 2009
69
69
Useful console configuration commands (I)
•Add a new user/password with different console passwords
- Config> user <name> password <pwd>
- Config> user <name> access-level <acc_level>
•To erase an existing user/password insert a no before the
command
- Config>no user<name> password >pwd>
•To show the entire configuration:
- Config>Show Config
•To delete the entire configuration
- Config>no configuration
•To delete a single item
- Config>no <item> as in Config>no mip 1234
© Martello Consulting, 2009
70
Useful console configuration commands (I)
•To configure IP address
- Config>protocol IP (To exit type quit)
•ARLY configuration access
-p4
- List devices returns the following:
© Martello Consulting, 2009
71
Useful console configuration commands (II)
• To access the ARLY directly:
© Martello Consulting, 2009
72
A complete VisorALARM configuration (III)
• The VisorALARM configuration process is divided into the
following groups:
1. Serial connection with the automation software (in the ARLY
interface)
2. IP configuration (in protocol IP)
3. Alarm reception interface (in the ARLY interface)
4. Receiver protocol type
1. Receiver ID & line ID
5. Connectivity parameters (in the ARLY interface)
1. UDP port
2. External reference IP address
© Martello Consulting, 2009
73
A complete VisorALARM configuration (III)
6. Backup receiver information (in the ARLY interface)
7. User configurable events (in the ARLY interface)
1. IPDACT patterns (in the ARLY interface)
8. Advanced configuration:
1. NTP configuration for the clock synchronization in backup
scenarios.
2. SEPI serial interface configuration for the serial printer.
9. TVRP configuration for local redundancy scenarios.
10.Trace and event activation (in the event configuration sub-process).
© Martello Consulting, 2009
74
A complete VisorALARM configuration (III)
•As a rule, the easiest way to configure a VisorALARM receiver
is using Teldat’s customized “configuration scripts”.
•To configure the VisorALARM with a script:
- Connect to the console via Telnet or Serial connection.
- Type “p 4” and hit ENTER to log into the “Config>” prompt.
- Select all the configuration script content and save it using notepad as
a basic txt file.
- Edit the saved text file with any new information.
- From your saved file and paste it in the “Config>” prompt.
- Save the configuration and restart the VisorALARM.
- In the new bootup, the configuration is activated.
- NOTE: newer formatted mIPS require the line does not wrap prior to
pasting back into the config.
© Martello Consulting, 2009
75
75
VisorALARM configuration script template (III)
© Martello Consulting, 2009
76
VisorALARM configuration script template (III)
© Martello Consulting, 2009
77
Download