User guide

2
CONTENTS
SAFETY INSTRUCTIONS: To be read before use! ...................................................................................... 3
1. DESCRIPTION .......................................................................................................................................... 4
1.1 Diagram ............................................................................................................................................... 4
1.2 Package list ......................................................................................................................................... 5
2. INSTALLATION ......................................................................................................................................... 6
3. CONFIGURATION .................................................................................................................................... 7
3.1. Configuration through the LAN using the Finder program ................................................................. 7
3.2. Configuration through an RS232 Terminal connection ...................................................................... 9
3.3. Configuration through the LAN using a standard Browser ............................................................... 10
3.3.1. General / IP configuration ...................................................................................................... 11
3.3.2. General / System time ............................................................................................................ 12
3.3.3. General / SNMP ..................................................................................................................... 13
3.3.4. General / Tools ....................................................................................................................... 14
3.3.5. Settings / Accounts ................................................................................................................. 15
3.3.5.1 Settings / Accounts .................................................................................................... 15
3.3.5.2 Settings / Accounts / Hidden Page account ............................................................... 17
3.3.6. Settings / Groups N/A............................................................................................................. 19
3.3.7. Settings / Peripherals N/A ...................................................................................................... 19
3.3.8. Settings / Rules ...................................................................................................................... 19
3.3.8.1. Settings / Rules - Schedule Rule .............................................................................. 21
3.3.8.2. Settings / Rules - Timer Rule .................................................................................... 23
3.3.8.3. Settings / Rules - Ping Monitoring Rule .................................................................... 25
3.3.8.4. Settings / Rules - Scan Monitoring Rule ................................................................... 27
3.3.9. Settings / Shutdowns.............................................................................................................. 29
3.3.10. Misc / Control Panel ............................................................................................................. 31
3.3.11. Misc / Rule Panel ................................................................................................................. 32
3.3.12. Misc / Log ............................................................................................................................. 33
3.3.13. Misc / Log Settings ............................................................................................................... 34
4. POWER OUTLET CONTROL ................................................................................................................. 35
4.1. via the Internet using a standard browser ........................................................................................ 35
4.1. through the network using simple commands in your own program ................................................ 36
5. APPENDIX ............................................................................................................................................... 39
5.1. Ping and Scan Methods ................................................................................................................... 39
5.2. Technical Data .................................................................................................................................. 40
5.3. Commonly used Ports ...................................................................................................................... 40
5.4. Syslog Messages: Severity Level Definitions ................................................................................... 41
STATEMENT OF CONFORMITY ................................................................................................................ 42