Schneider Electric InRow SC User Guide | Manualzz
InRow™ Air-Cooled Self-Contained
InRow™ SC
ACSC100, ACSC101
Online Guide
990–2809C
Release date 04/2018
www.schneider-electric.com
Legal Information
The Schneider Electric brand and any registered trademarks of Schneider Electric
Industries SAS referred to in this guide are the sole property of Schneider Electric
SA and its subsidiaries. They may not be used for any purpose without the owner's
permission, given in writing. This guide and its content are protected, within the
meaning of the French intellectual property code (Code de la propriété
intellectuelle français, referred to hereafter as "the Code"), under the laws of
copyright covering texts, drawings and models, as well as by trademark law. You
agree not to reproduce, other than for your own personal, noncommercial use as
defined in the Code, all or part of this guide on any medium whatsoever without
Schneider Electric's permission, given in writing. You also agree not to establish
any hypertext links to this guide or its content. Schneider Electric does not grant
any right or license for the personal and noncommercial use of the guide or its
content, except for a non-exclusive license to consult it on an "as is" basis, at your
own risk. All other rights are reserved.
Electrical equipment should be installed, operated, serviced, and maintained only
by qualified personnel. No responsibility is assumed by Schneider Electric for any
consequences arising out of the use of this material.
As standards, specifications, and designs change from time to time, please ask for
confirmation of the information given in this publication.
InRow™ SCACSC100, ACSC101
Table of Contents
Introduction ..................................................................................................7
Product Description ....................................................................................7
Unit overview........................................................................................7
Features ..............................................................................................7
IPv4 initial setup....................................................................................7
IPv6 Initial Setup...................................................................................8
Network Management with Other Applications ........................................8
Internal Management Features ....................................................................9
Overview..............................................................................................9
Access priority for logging on .................................................................9
Types of User Accounts.........................................................................9
Display Interface.......................................................................................10
Status LED.........................................................................................10
Check Log LED .................................................................................. 11
Warning Alarm LED ............................................................................ 11
Critical Alarm LED............................................................................... 11
How to Recover from a Lost Password ....................................................... 11
Watchdog Features ..................................................................................12
Overview............................................................................................12
Network Interface Watchdog Mechanism ..............................................12
Resetting the Network Timer................................................................12
Web User Interface ...................................................................................13
Introduction ..............................................................................................13
Overview............................................................................................13
Supported Web browsers ....................................................................13
How to Log On .........................................................................................13
Overview............................................................................................13
URL address format ............................................................................14
Home Screen ...........................................................................................15
Overview............................................................................................15
Monitoring the Status ...............................................................................16
Unit Status ...............................................................................................16
Overview............................................................................................16
Detailed Status ...................................................................................16
Run Hours..........................................................................................17
Group Status............................................................................................17
Group Overview..................................................................................17
Network Status.........................................................................................17
Current IPv4 settings...........................................................................18
Current IPv6 settings...........................................................................18
Domain name system status................................................................18
Port speed..........................................................................................18
Security and Network Control .................................................................19
Manage User Sessions .............................................................................19
Reset the Network Interface ......................................................................19
Configuring Your Settings ........................................................................20
Unit Configuration.....................................................................................20
990–2809C
3
InRow™ SCACSC100, ACSC101
Thresholds .........................................................................................20
Unit Configuration ...............................................................................20
Group Configuration .................................................................................21
Configuration......................................................................................21
Setpoints............................................................................................22
Security Menu ..........................................................................................23
Session Management .........................................................................23
Ping Response ...................................................................................23
Local Users ........................................................................................23
Remote Users Authentication ..............................................................25
Firewall ..............................................................................................27
Network Configuration ..............................................................................28
TCP/IP Settings for IPv4......................................................................28
TCP/IP Settings for IPv6......................................................................28
DHCP Response Options ....................................................................29
Port Speed .........................................................................................31
DNS Configuration ..............................................................................31
DNS Testing .......................................................................................32
Web Access .......................................................................................32
Web SSL Certificate Configuration .......................................................33
Console Settings ................................................................................33
SNMPv1 Access Configuration ............................................................34
SNMPv3 Access Configuration ............................................................35
Modbus Configuration .........................................................................36
FTP Server Access Configuration ........................................................36
Notification Menu......................................................................................36
Types of Notification............................................................................36
Configuring Event Actions ...................................................................37
E-Mail Notification Configuration ..........................................................38
SNMP Trap Receiver Configuration......................................................40
SNMP Traps Test Configuration ...........................................................40
General Menu ..........................................................................................41
Identification Screen ...........................................................................41
Date/Time Configuration......................................................................41
Create and Import Settings with the Configuration File ...........................42
Configure the Links Screen..................................................................42
Log Configuration .....................................................................................42
Identify Syslog Servers........................................................................42
Syslog Settings...................................................................................42
Syslog Test and Format Example .........................................................43
Tests............................................................................................................44
Set the Unit LED Lights to Blink .................................................................44
Logs and About Menus ............................................................................45
Event and Data Logs ................................................................................45
Event Log...........................................................................................45
Data Log ............................................................................................46
Firewall Log........................................................................................48
How to Use FTP or SCP to Retrieve Log Files.......................................48
About the Unit ..........................................................................................49
About the Network ....................................................................................49
Troubleshooting and Support.....................................................................51
4
990–2809C
InRow™ SCACSC100, ACSC101
Device IP Configuration Wizard ..............................................................52
Capabilities, Requirements, and Installation ...............................................52
How to Use the Wizard to Configure TCP/IP Settings.............................52
System Requirements .........................................................................52
Installation..........................................................................................52
Use the Wizard.........................................................................................52
Launch the Wizard ..............................................................................52
Configure the Basic TCP/IP Settings Remotely .....................................52
Configure or Re-Configure the TCP/IP Settings Locally..........................53
How to Export Configuration Settings ....................................................54
Retrieve and Export the .ini File .................................................................54
Summary of the Procedure ..................................................................54
Contents of the .ini File ........................................................................54
Detailed Procedures ...........................................................................54
The Upload Event and Error Message........................................................56
The Event and Its Error Messages .......................................................56
Messages in config.ini .........................................................................56
Errors Generated by Overridden Values ...............................................56
Related Topics .........................................................................................57
File Transfers .............................................................................................58
Updating the Firmware..............................................................................58
Firmware Module Files ........................................................................58
Troubleshooting ........................................................................................59
990–2809C
5
InRow™ SCACSC100, ACSC101
Introduction
Introduction
Product Description
Unit overview
The cooling units are Web-based, IPv6–ready products. They can manage
supported devices using multiple open standards such as the following:
•
Hypertext Transfer Protocol (HTTP)
•
Secure SHell (SSH)
•
Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
•
Simple Network Management Protocol versions 1 and 3 (SNMPv1, SNMPv3)
•
File Transfer Protocol (FTP)
•
Secure Copy (SCP)
•
Telnet
•
Syslog
•
RADIUS
•
Modbus TCP
•
Provides data and event logs.
•
Enables you to set up notifications through e-mail and SNMP traps.
•
Supports using a Dynamic Host Configuration Protocol (DHCP) or BOOTstrap
Protocol (BOOTP) server to provide the network (TCP/IP) address of the unit.
•
Supports using the Remote Monitoring Service (RMS).
•
Provides the ability to export a user configuration (.ini) file from a configured
unit to one or more unconfigured units.
•
Provides a selection of security protocols for authentication and encryption.
•
Communicates with StruxureWare Data Center Expert.
•
Provides one USB host port to support firmware upgrades in addition to the
retrieval of event, data log, and configuration files.
Features
IPv4 initial setup
You must define three TCP/IP settings for the unit before it can operate on the
network.
•
The IP address of the unit
•
The subnet mask of the unit
•
The IP address of the default gateway (only needed if you are going off
segment)
NOTE: Do not use the loopback address (127.0.0.1) as the default gateway.
Doing so disables the card. You must then log on using a serial connection and
reset the TCP/IP settings to their defaults.
For detailed information on how to use a DHCP server to configure
the TCP/IP settings for a unit, see DHCP Response Options, page
29
990–2809C
7
InRow™ SCACSC100, ACSC101
Introduction
IPv6 Initial Setup
IPv6 network configuration provides flexibility to accommodate your requirements.
IPv6 can be used anywhere an IP address is entered on this interface. You can
configure manually, automatically, or using DHCP.
See TCP/IP Settings for IPv6, page 28.
Network Management with Other Applications
These applications and utilities work with the unit:
8
•
PowerNet® Management Information Base (MIB) with a standard MIB browser
— Perform SNMP SETs and GETs and receive SNMP traps.
•
StruxureWare Data Center Expert — Collects, organizes, and distributes
critical alerts and key information, providing a unified view of complex physical
infrastructure environments from anywhere on the network.
•
Device IP Configuration Utility — Configure the basic settings of one or more
units over the network.
•
Security Wizard — Create components needed to help with security for the
unit when you are using Secure Sockets Layer (SSL) with related protocols
and encryption routines.
990–2809C
InRow™ SCACSC100, ACSC101
Introduction
Internal Management Features
Overview
Use the Web user interface (UI) to view the status and manage the unit. You can
also use SNMP to monitor the status of the unit.
Use Modbus RTU to view the network settings through the building management
system.
Access priority for logging on
You can enable more than one user to log on at the same time, where each user
has equal access.
See Session Management, page 23.
Types of User Accounts
The unit has various levels of access — Administrator, Device User, Read-Only
User, and Network-only User — and these are protected by user name and
password requirements.
•
A Super User/Administrator can use all of the menus in the UI and all of the
commands in the command line interface. Administrator user types can be
deleted. The default user name and password are both apc.
•
A Device User has read and write access to device-related screens.
Administrative functions like Session Management under the Configuration
> Security menu and Firewall under Logs are grayed out.
◦
•
•
The default user name is device, and the default password is apc.
A Read-only User has the following restricted access:
◦
Access through the Web UI and command line interface (CLI) only.
◦
Access to the same menus as a Device User above but without the
capability to change configurations, control devices, delete data, or use file
transfer options. Links to configuration options are visible but disabled.
(The Event and Data Logs display no button for this user to clear the log.)
◦
The default user name is readonly and the default password is apc.
A Network-only User can only log on using the Web user interface (UI) and
CLI (telnet not serial). A network-only user has read-write access to the
network-related menus only. There is no default name and password.
To set User Name and Password values for the top three account
types, see Local Users, page 23.
990–2809C
9
InRow™ SCACSC100, ACSC101
Introduction
Display Interface
Status
ES C
Check
Log
?
Warning
na 1582a
Critical
Item
Description
Function
Critical alarm LED
(red)
When illuminated, a critical alarm condition
exists that requires your immediate attention.
Warning alarm LED
(yellow)
When illuminated, a warning alarm condition
exists. Failure to correct this condition could
cause a critical alarm.
Check log LED
(yellow)
When illuminated, at least one new event has
been logged since the last time the log was
checked. Only events that pertain to the
operation of the cooling unit will activate this
LED.
Check log LED
(yellow)
When illuminated, the cooling unit is receiving
electrical power. When the LED is flashing, the
cooling unit is downloading firmware for the
controller. This may take a few minutes.
Liquid crystal display
(LCD)
View alarms, status data, context-sensitive
help, and modify configurable items.
Up and down arrow
keys
Select menu items and access information.
ESC key
Return to previous screen or cancel current
operation.
Enter key
Open menu items and input changes to the
cooling unit settings.
Help key
Display context-sensitive help. Press the help
key for information about each option on the
screen and for instructions on performing the
tasks.
Status LED
This LED indicates the status of the unit.
10
Condition
Description
Off
The unit has no power.
Solid green
The unit is receiving power.
Flashing green
The unit is receiving a firmware upgrade.
990–2809C
InRow™ SCACSC100, ACSC101
Introduction
Check Log LED
When yellow, this LED indicates a new critical alarm, warning alarm, or event has
occurred since the last time the event log was viewed from the display interface.
Warning Alarm LED
When yellow, this LED indicates that a warning alarm condition exists and may
require your attention to prevent it from deteriorating into a critical state. A new
alarm condition causes the display interface to beep every 30 seconds, if the
audible alarm is enabled. Press any function key to silence the audible alarm. If the
temperature returns to normal, the LED returns to normal.
Critical Alarm LED
When red, this LED indicates that a critical alarm condition exists and requires your
immediate attention. A new alarm condition causes the display interface to beep
every 30 seconds, if the audible alarm is enabled. Press any function key to silence
the audible alarm. The light continues to blink to show the critical status.
How to Recover from a Lost Password
You can use a local computer that connects to the display through the serial port to
access the command line interface.
1. Select a serial port on the local computer, and disable any service that uses
that port.
2. Connect the provided serial cable to the selected port on the computer and to
the configuration port on the display.
3. Run a terminal program (such as HyperTerminal®) and configure the selected
port for 9600 bps, 8 data bits, no parity, 1 stop bit, and no flow control.
4. Press Enter, repeatedly if necessary, to display the User Name prompt. If
you are unable to display the User Name prompt, verify the following:
•
The serial port is not in use by another application.
•
The terminal settings are correct as specified in step 3.
•
The correct cable is being used as specified in step 2.
5. Press the Reset button. The Status LED will flash alternately orange and
green. Press the Reset button a second time immediately while the LED is
flashing to reset the user name and password to their defaults temporarily.
6. Press Enter, repeatedly if necessary, to display the User Name prompt
again, then use the default, apc, for the user name and password. (If you take
longer than 30 seconds to log on after the User Name prompt is re-displayed,
you must repeat step 5 and log on again.)
7. At the command line interface, use the following commands to change the
Password setting, which is apc at this stage:
user –n <user name> –pw <user password>
For example, to change the Super User password to XYZ, type:
user –n apc –pw XYZ
8. Type quit or exit to log off, reconnect any serial cable you disconnected from
the computer, and restart any service you disabled on the unit.
990–2809C
11
InRow™ SCACSC100, ACSC101
Introduction
Watchdog Features
Overview
To detect internal problems and recover from unanticipated input, the display uses
internal, system-wide watchdog mechanisms. When it restarts to recover from an
internal problem, a System: Network Interface Restarted event is recorded in the
event log.
Network Interface Watchdog Mechanism
The display implements internal watchdog mechanisms to protect itself from
becoming inaccessible over the network. For example, if the display unit does not
receive any network traffic for 9.5 minutes (either direct traffic, such as SNMP, or
broadcast traffic, such as an Address Resolution Protocol [ARP] request), it
assumes that there is a problem with its network interface and restarts.
Resetting the Network Timer
To ensure that the display does not restart if the network is quiet for 9.5 minutes,
the display unit attempts to contact the default gateway every 4.5 minutes. If the
gateway is present, it responds to the display, and that response restarts the 9.5minute timer. If your application does not require or have a gateway, specify the IP
address of a computer that is running on the network and is on the same subnet.
The network traffic of that computer will restart the 9.5-minute timer frequently
enough to prevent the display from restarting.
12
990–2809C
InRow™ SCACSC100, ACSC101
Web User Interface
Web User Interface
Introduction
Overview
The Web user interface (UI) provides options to manage the unit and to view the
status of the unit.
See Web Access, page 32 for information on how to select, enable,
and disable the protocols that control access to the UI and to define
the Web-server ports for the protocols.
Supported Web browsers
You can use Microsoft® Internet Explorer® (IE) 7.x or higher (on Windows operating
systems only) or Mozilla® Firefox® 3.0.6 or higher (on all operating systems) to
access the unit through its UI. Other commonly available browsers might work but
have not been fully tested.
The unit cannot work with a proxy server. Before you can use a browser to access
the UI of the unit, you must do one of the following:
•
Configure the browser to disable the use of a proxy server for the unit.
•
Configure the proxy server so that it does not proxy the specific IP address of
the unit.
How to Log On
Overview
You can use the DNS name or the System IP address of the unit for the URL
address of the UI. Use your casesensitive user name and password to log on. If
you do not have a user name and password assigned, the default user name can
be used and differs by account type:
•
apc for Administrator
•
device for a Device User
•
readonly for a Read-Only User
The default password is apc for these three account types. There is no default for
a Network-only account type.
See also Types of User Accounts, page 9.
When HTTPS is enabled, the unit generates its own certificate. This certificate
negotiates encryption methods with your browser.
For more information, search for Security Handbook at www.
schneider-electric.com > Support > Download Documents and
Software.
990–2809C
13
InRow™ SCACSC100, ACSC101
Web User Interface
URL address format
Type the DNS name or IP address of the unit in the Web browser URL address
field and press Enter. When you specify a non-default Web–server port in Internet
Explorer, you must include http:// or https:// in the URL.
Common Browser Error Messages at Log-On
Error Message
Browser
Cause of the Error
”This page cannot be
displayed.”
Internet Explorer
”Unable to connect.”
Firefox
Web access is disabled,
or the URL was not
correct.
URL Format Examples
Example and Access Mode
URl Format
DNS name of Web1
HTTP
http://Web1
HTTPS
https://Web1
System IP address of 139.225.6.133 and a default Web server port (80)
HTTP
http://139.225.6.133
HTTPS
https://139.225.6.133
System IP address of 139.225.6.133 and a non-default Web server port
(5000)
HTTP
http://139.225.6.133:5000
HTTPS
https://139.225.6.133:5000
System IPv6 address of 2001:db8:1::2c0:b7ff:fe00:1100 and a nondefault Web server port (5000)
HTTP
14
http://[2001:db8:1::2c0:
b7ff:fe00:1100]:5000
990–2809C
InRow™ SCACSC100, ACSC101
Web User Interface
Home Screen
Overview
Home: On the Home screen of the Web user interface, you can view the device
name and location, temperature readings, active alarms, and the most recent
events recorded in the Event Log. To view the entire Event Log, click More
Events in the bottom-right of the Recent Device Events list.
One or more icons and accompanying text indicate the current operating status of
the unit.
Symbol
Description
No Alarm: No alarms are present.
Warning: An alarm condition requires attention and
could jeopardize your data or equipment if its cause is
not addressed.
Critical: A critical alarm exists that requires immediate
action.
In the upper-right corner of every screen, the same icons report the unit status. If
any Critical or Warning alarms exist, the number of active alarms also displays.
Icons and links: To make any screen the “home” screen (i.e., the screen that
displays first when you log on), go to that screen, and click
corner.
Click
in the top-right
to revert to displaying the Home screen when you log on.
At the lower-left on each screen of the interface, there are three configurable links
to useful Web sites. By default, the links access the URLs for these Web pages:
•
Link 1: APC Web Site
•
Link 2: Testdrive Demo
•
Link 3: APC Monitoring
To re-configure the links, see Configure the Links Screen, page 42.
990–2809C
15
InRow™ SCACSC100, ACSC101
Monitoring the Status
Monitoring the Status
Unit Status
Path: Main > Status > Unit
View information specific to this unit.
You can configure your unit and network using the Configuration
menu options. See Configuring Your Settings, page 20.
Overview
Path: Main > Status > Unit > Overview
•
Operating Mode: The unit is in one of the following modes:
◦
On: The unit is cooling.
◦
Standby: The unit is receiving power but not enabled for cooling.
◦
Idle: The unit is not operating in normal mode due to active alarms.
•
Compressor State: The current state of the compressor (On/Off).
•
Cool Output: The actual cooling output of the unit.
•
Cool Demand: The amount of cooling that the heat load currently requires.
•
Rack Inlet Temperature: The average air temperature entering the racks.
•
Supply Air Temperature: The temperature of the air leaving the unit.
•
Return Air Temperature: The temperature of the air entering the unit.
•
Condenser Outlet Temperature: The temperature of the air leaving the
condenser.
•
Condenser Inlet Temperature: The temperature of the air entering the
condenser.
•
Suction Temperature: The temperature of gas entering the compressor.
•
Airflow: The velocity at which air flows into or out of the unit.
•
Evaporator Fan Speed: The average revolutions per minute (RPM) of all
evaporator fans, given as percentage of the maximum fan speed.
•
Condenser Fan Speed: The average revolutions per minute (RPM) of all
condenser fans, given as percentage of the maximum fan speed.
Detailed Status
Path: Main > Status > Unit > Detailed Status
16
•
Input State: The state of the standby digital input.
•
Output State: The state of the output contact.
•
Filter Differential Pressure: The amount of pressure drop through the air
filter media.
•
Suction Pressure: The pressure of the low pressure (suction) refrigerant line.
•
Discharge Pressure: The pressure of the high pressure (discharge)
refrigerant line.
•
Superheat: The difference between the suction line temperature and the
evaporation saturation temperature.
990–2809C
InRow™ SCACSC100, ACSC101
Monitoring the Status
Run Hours
Path: Main > Status > Unit > Run Hours
The unit records the number of hours each of its components has been in
operation.
•
Air Filter Run Hours
NOTE: When the air filter is replaced, use the Air Filter Serviced button
to reset the maintenance alarm.
•
Condensate Pump Run Hours
•
Compressor Run Hours
•
Evaporator Fan 1 Run Hours
•
Evaporator Fan 2 Run Hours
•
Evaporator Fan 3 Run Hours
•
Condenser Fan 1 Run Hours
•
Condenser Fan 2 Run Hours
•
Condenser Fan 3 Run Hours
•
Left Fan Power Supply Run Hours
•
Right Fan Power Supply Run Hours
Group Status
Path: Main > Status > Group
View information related to the cooling group.
You can configure your unit and network using the Configuration >
Group menu options. See .
Group Overview
Path: Main > Status > Group > Overview
•
Cool Setpoint: The temperature set to maintain the room environment.
•
Supply Air Setpoint: The desired temperature of the air supplied by the unit.
•
Airflow: The combined airflow output of the units in the cooling group.
•
Rack Inlet Max Temperature: The highest rack inlet temperature reported by
any unit in the cooling group.
•
Rack Inlet Min Temperature: The lowest rack inlet temperature reported by
any unit in the cooling group.
•
Maximum Return Air Temperature: The highest return temperature reported
by any cooling unit in the cooling group.
•
Minimum Return Air Temperature: The lowest return temperature reported
by any cooling unit in the cooling group.
•
Cool Output: The combined output of the cooling group.
•
Cool Demand: The cooling output required to meet the current heat load of
the conditioned space.
•
Network Status
Path: Main > Status > Network
990–2809C
17
InRow™ SCACSC100, ACSC101
Monitoring the Status
The Network screen displays information about your network.
Current IPv4 settings
•
System IP: The IP address of the cooling unit.
•
Subnet Mask: The subnet mask for the sub-network.
•
Default Gateway: The default gateway address used by the network.
•
MAC Address: The MAC address of the cooling unit.
•
Mode: How the IPv4 settings are assigned: Manual, DHCP, or BOOTP.
•
DHCP Server: The IP address of the DHCP server. This is only displayed if
Mode is DHCP.
•
Lease Acquired: The date/time that the IP address was accepted from the
DHCP server.
•
Lease Expires: The date/time that the IP address accepted from the DHCP
server expires and will need to be renewed.
•
Type: How the IPv6 settings are assigned.
•
IP Address: The IP address of the unit.
•
Prefix Length: The range of addresses for the sub-network.
Current IPv6 settings
Domain name system status
•
Active Primary DNS Server: The IP address of the primary DNS server.
•
Active Secondary DNS Server: The IP address of the secondary DNS
server.
•
Active Host Name: The host name of the active DNS server.
•
Active Domain Name (IPv4/IPv6): The IPv4/IPv6 domain name that is
currently in use.
•
Active Domain Name (IPv6): The IPv6 domain name that is currently in use.
•
Current Speed: The current speed assigned to the Ethernet port.
Port speed
18
990–2809C
InRow™ SCACSC100, ACSC101
Security and Network Control
Security and Network Control
The Control menu options enable you to take immediate actions affecting active
user management and the security of your network.
Manage User Sessions
Path: Main > Control > Security > Session Management
The Session Management menu displays all active users currently connected to
the unit. To view information about a given user, click their user name. The
Session Details screen displays basic information about the user including what
interface they are logged-in to, their IP address, and user authentication. There is
also an option to Terminate Session for the user.
Reset the Network Interface
Path: Main > Control > Network > Reset/Reboot
This menu gives you the option to reset and reboot various components of the
network interface. Users have the option to Reboot Management Interface,
Reset All (option to exclude TCP/IP), or Reset Only (TCP/IP or Event
Configuration).
990–2809C
19
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Configuring Your Settings
With the Configuration menu options, you can set fundamental operational values
for your unit.
Unit Configuration
Thresholds
Path: Main > Configuration > Unit > Thresholds
Set alarms to alert you when components require service or there are high
temperature violations.
When the air temperature exceeds the temperature defined by the High
Temperature Threshold, an alarm will occur. Set High Temperature Thresholds
for the following:
•
Rack Inlet High Temperature Threshold: An alarm condition exists when the
temperature of the air entering the rack at the rack inlet sensor exceeds the
threshold.
•
Supply Ai Temperature High Threshold: An alarm condition exists when the
temperature of the air output from the cooling unit exceeds the threshold.
•
Return Air Temperature High Threshold: An alarm condition exists when
the temperature of the air entering the cooling unit at the temperature sensor
exceeds the threshold.
Unit Configuration
Path: Main > Configuration > Unit > Configuration
•
Unit Control: Select if the unit is a standby unit (Standby) or main unit (On).
•
Startup Delay: The delay begins when the cooling unit is started and
initialized. The cooling unit cannot begin operation until this delay expires. Use
the start-up delay to restart equipment sequentially in your room after a
scheduled downtime.
•
Idle On Leak Detect: When set to Yes, the cooling unit will enter idle mode if
a Water Detection Fault activates. Set to No to disable the cooling unit from
entering idle mode if a leak is detected.
NOTE: The leak sensor (Schneider Electric part number AP9325) is
optional.
NOTE: There are six alarms that will cause the cooling unit to enter idle
mode:
20
◦
Water Detection Fault (when Idle On Leak Detect is set to Yes)
◦
Condensate Pump Fault
◦
Cooling Failure
◦
Low Suction Pressure Fault
◦
High Discharge Pressure Fault
◦
Critical Sensor Failure
•
Input Normal State: Set the normal state of the contact (Open or Closed).
The cooling unit changes its operating mode to Closed when the actual state
differs from the normal state.
•
Output Normal State: Set the normal state of the contact (Open or Closed).
If the state of an alarm or event mapped to this contact changes from the
normal state, the contact also changes state.
•
Output Source: Define the type of output source (alarm), either Any Alarm or
Only Critical Alarms, that causes the output to change from its normal state.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Group Configuration
Path: Main Configuration > Group
The cooling group configuration settings determine which components are
available and how the cooling group should operate.
NOTE: All changes to settings must be performed by qualified personnel.
Configuration
Path: Main > Configuration > Group > Configuration
The Configuration section contains settings that identify the number of units
installed in this cooling group and the physical arrangement of those units.
•
Number of Units in Group: The number of units in this cooling group. Up to
12 units can be joined together to work as a single cooling group.
•
Configuration Type: Select the configuration type of the group, which is the
air flow control strategy for the cooling group.
•
•
•
990–2809C
◦
Spot: The cooling unit operates as a stand-alone unit.
◦
In-Row: Air flow is horizontal to allow in-row operation of the cooling group.
◦
RACS: Rack Air Containment System—Air flow in the enclosure is
controlled by a ducting system fitted to the enclosure. This is not a sealed
system.
Capacity Control: There are two setting options to determine how the cooling
unit cools:
◦
Discrete: Spot cooling configurations only. The cooling unit runs at a set
speed with the hot gas bypass valve (HGBV) fully closed. The compressor
comes on when the return air temperature reaches the cool setpoint plus
the cool deadband.
◦
Prop (Proportional): The cooling unit modulates the fan speeds and
HGBV to match the cooling output to the load demand.
Fan Speed Preference: Set the fan speed preference, then click Apply. In
Discrete mode, each fan speed setting directly sets the speed of the
evaporator fans. In RACS configurations, each fan speed setting specifies a
temperature difference between the supply air for the InRow SC cooling unit
and the air returned from the environment being cooled. The options are the
following:
Fan
Speed
Adjustment of Fan
Speed in Spot
(Discrete) Mode
Adjustment of Fan Speed in RACS
(Proportional) Automatic or
InRow (Proportional) Automatic
Mode
Low
60%
5.6°C (10°F) temperature difference
MediumLow
70%
8.3°C (15°F) temperature difference
Medium
80%
11.1°C (20°F) temperature
difference
MediumHigh
90%
13.9°C (25°F) temperature
difference
High
190%
16.7°C (30°F) temperature
difference
Altitude: Set the altitude (in feet or meters) of the unit above sea level. This
number is used to estimate the density of air and is a factor in pressure
measurement.
21
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Setpoints
Path: Main > Configuration > Group > Setpoints
•
Cool Setpoint: The air temperature setpoint the cooling units work to achieve
and then maintain during operation. In a Spot cooling configuration, the
cooling unit will bring the Return Air Temperature to the Cool Setpoint. In an
InRow configuration, the cooling units will bring the Rack Inlet Air
Temperature to the Cool Setpoint. In a RACS configuration, the cooling units
will match the air flow of the loads by controlling the difference between the
supply and return air temperatures as specified by the fan speed setting. The
setpoint must be within 18.0 – 26 °C (64.4 – 78.8°F).
•
Cool Deadband: The air temperature must exceed the Cool Setpoint plus
the Cool Deadband before the cooling unit turns on the compressor.
•
Supply Air Setpoint: The setpoint must be within 15.0– 30.2°C (59.0–86.4°
F). The Supply Air Setpoint will be the required temperature of the air
expelled into the surrounding environment.
NOTE: The Supply Air setting is defined by Schneider Electric
authorized personnel only when the cooling group is commissioned.
•
•
•
•
Capacity Control: There are two setting options to determine how the cooling
unit cools:
◦
Discrete: Spot cooling configurations only. The cooling unit runs at a set
speed with the hot gas bypass valve (HGBV) fully closed. The compressor
comes on when the return air temperature reaches the cool setpoint plus
the cool deadband.
◦
Prop (Proportional): The cooling unit modulates the fan speeds and
HGBV to match the cooling output to the load demand.
Fan Speed Preference: Set the fan speed preference, then click Apply. In
Discrete mode, each fan speed setting directly sets the speed of the
evaporator fans. In RACS configurations, each fan speed setting specifies a
temperature difference between the supply air for the InRow SC cooling unit
and the air returned from the environment being cooled. The options are the
following:
Adjustment of Fan
Speed in Spot
(Discrete) Mode
Adjustment of Fan Speed in RACS
(Proportional) Automatic or
InRow (Proportional) Automatic
Mode
Low
60%
5.6°C (10°F) temperature difference
MediumLow
70%
8.3°C (15°F) temperature difference
Medium
80%
11.1°C (20°F) temperature
difference
MediumHigh
90%
13.9°C (25°F) temperature
difference
High
190%
16.7°C (30°F) temperature
difference
Fan Mode: This selection allows air flow to be controlled automatically by the
cooling unit or manually by userselected fan speed preference. This property
only applies to Spot (Proportional), InRow, and RACS deployments.
◦
Auto: Air flow is automatically controlled by the unit.
◦
Manual: the air flow is fixed to the value of the Fan Speed Preference
property.
Active Flow Control Bias: This setting is used to change the bias of the
controller by adjusting the contained aisle pressure threshold. Zero is the
default setting. Only qualified service personnel can make changes to these
settings.
◦
22
Fan
Speed
Hot Aisle Containment (HACS)
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
– If the cooling units seem to be under-cooling, select Negative or
Slightly Negative to adjust the aisle pressure for additional cooling.
– If the cooling units seem to be over-cooling, select Positive or Slightly
Positive to adjust the aisle pressure for less cooling.
◦
Cold Aisle Containment (CACS)
– If the cooling units seem to be under-cooling, select Positive or
Slightly Positive to adjust the aisle pressure for additional cooling.
– If the cooling units seem to be over-cooling, select Negative or Slightly
Negative to adjust the aisle pressure for less cooling.
Setting
Blue LED—HACS
Red LED—CACS
Setpoint Green LED
Red LED—HACS
Blue LED—CACS
Positive
< –0.008 in. ±3%
0.004 ±0.0004 in.
> 0.016 in. ±3%
Slightly Positive
< –0.010 in. ±3%
0.002 ±0.0004 in.
> 0.014 in. ±3%
Zero
< –0.012 in. ±3%
0.000 ±0.0004 in.
> 0.012 in. ±3%
Slightly Negative
< –0.014 in. ±3%
–0.002 ±0.0004 in.
> 0.010 in. ±3%
Negative
< –0.016 in. ±3%
–0.004 ±0.0004 in
> 0.008 in. ±3%
Security Menu
Session Management
Path: Main > Configuration > Security > Session Management
Enabling Allow Concurrent Logins means that two or more users can log on at
the same time. Each user has equal access and each interface (HTTP, FTP, telnet
console, serial console (CLI), etc.) counts as a logged-in user.
Remote Authentication Override: The unit supports remote authentication dial-in
user service (RADIUS) storage of passwords on a server. However, if you enable
this override, the unit will allow a user with Serial Remote Authentication
Override enabled to log on using the password for local authentication.
See Local Users, page 23 and Remote Users Authentication, page 25.
NOTE: Remote Authentication Override only works for users logged-in
through the LCD display or through the serial cable.
Ping Response
Path: Main > Configuration > Security > Ping Response
Enable the IPv4 Ping Response check box to allow the cooling unit to respond to
network pings. This does not apply to IPv6.
Local Users
Use these menu options to view, and to set up access and individual preferences
(like displayed date format), for the unit display interface. This applies to users as
defined by their logon name.
Path: Main > Configuration > Security > Local Users > Management
From this menu, an administrator or super user can view the users that are allowed
access to the UI. Click on the user name to view details and to edit or delete a user.
Click Add User to add a user. On the resulting User Configuration screen, you
can add a user and withhold access by clearing the Access check box. The
maximum length for both the name and password is 64 characters, with less for
990–2809C
23
InRow™ SCACSC100, ACSC101
Configuring Your Settings
multi-byte characters. You have to enter a password. A PIN of four to eight digits
may also be designated.
To change an administrator/super user setting, you must supply the current
password as a security measure.
User Type
There are four levels of access (Administrator, Device User, Read-Only User, and
Network-Only User).
•
An Administrator can use all the menus in the Web interface and control
console. The default user name and password are both apc.
•
A Device User can access only the following:
•
◦
In the Web interface, the menus on the Group and Unit tabs and the event
and data logs, accessible under the Events and Data headings on the left
navigation menu of the Logs tab.
◦
In the control console, the equivalent features and options. The default
user name is device, and the default password is apc.
A Read-Only User has the following restricted access:
◦
Access through the Web interface only. You must use the Web interface to
configure values for the Read-Only User.
◦
Access to the same tabs and menus as a Device User, but without the
capability to change configurations, control devices, delete data, or use file
transfer options. Links to configuration options are visible but disabled, and
the event and data logs display no button to clear the log.
The default user name is readonly, and the default password is apc.
•
A Network-Only User has the following restricted access:
◦
Access through the Web interface only (UI) and CLI (telnet not serial). A
network-only user has read-write access to the network-related menus
only. There is no default name and password.
Touch Screen Remote Authentication Override
Use to configure whether or not this account can log in to the touch screen even
when the NMC authentication is set to RADIUS.
User Description
This is a general description of the user.
Session Timeout
Use to configure the length of time that the various UIs wait before logging-out this
user (three minutes by default). If you change this value, the user must log-off for
the change to take effect.
Serial Remote Authentication Override
The unit will allow a user with this enabled to log-on to the unit using the password
for local authentication. Remote Authentication Override must be enabled on the
Configuration > Security > Session Management screen for this to function.
User Preferences
Select options related to how users view information.
24
•
Event Log Color Coding: Select the check box to enable color-coding of
alarm text recorded in the event log based on severity. (System-event entries
and configuration-change entries do not change color because they are
considered informational events.)
•
Export Log Format: Exported log files can be formatted using CSV (commaseparated values) or tab delimited.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
See Event Log, page 45 for information on exporting logs.
•
Temperature Scale: Select the temperature scale for measurements in this
UI. US Customary corresponds to Fahrenheit, and Metric corresponds to
Celsius.
•
Date Format: Select the date form for the UI.
•
Language: Select the default language for the UI. This can be set when you
log on also. You can also specify different languages for e-mail recipients and
SNMP trap receivers.
See E-Mail Notification Configuration, page 38 and SNMP Trap
Receiver Configuration, page 40.
Path: Main > Configuration > Security > Local Users > Default Settings
Setting up defaults can make adding users quicker. Use this option to set defaults
for the options on the Management screen. A remote RADIUS user will also use
these default settings.
Remote Users Authentication
Path: Main > Configuration > Security > Remote Users > Authentication
Authentication
Specify how you want users to be authenticated at logon.
The following authentication and authorization functions of remote authentication
dial-in user service (RADIUS) are supported:
•
When a user accesses the unit or other network-enabled device that has
RADIUS enabled, an authentication request is sent to the RADIUS server to
determine the permission level of the user.
•
RADIUS user names are limited to 32 characters with the unit.
Select one of the following:
•
Local Authentication Only: RADIUS is disabled.
See Local Users, page 23.
•
RADIUS, then Local Authentication: Both are enabled. Authentication is
requested from the RADIUS server first. If the RADIUS server does not
respond, local authentication is used.
•
RADIUS Only: There is no local authentication.
If RADIUS Only is selected, and the RADIUS server is unavailable,
improperly identified, or improperly configured, remote access is unavailable
to all users. To regain access, you must use a serial connection to the
command line interface and change the access setting to local or radiusLocal.
For example, the command to change the access setting to local would be
radius -a local.
Radius
Path: Main > Configuration > Security > Remote Users > RADIUS
You can use a RADIUS server to authenticate remote users. Use this option to do
the following actions:
•
990–2809C
List the RADIUS servers (a maximum of two) available to the unit and the
time-out period for each.
25
InRow™ SCACSC100, ACSC101
Configuring Your Settings
•
Configure the authentication parameters for a new or existing RADIUS server
by clicking on a RADIUS server link.
The RADIUS Server menu for each RADIUS server contains the following options:
•
RADIUS Server: The name or IP address (IPv4 or IPv6) of the RADIUS
server.
•
Port: The port on which the RADIUS server listens to authenticate users. This
is port 1812 by default but can be changed to any unused port between 500032678.
•
Secret: The shared secret between the RADIUS server and the unit.
•
Reply Timeout: The time in seconds that the unit waits for a response from
the RADIUS server.
•
Test Settings: Enter the user name and password configured on the RADIUS
server order to test the configured settings.
•
Skip Test and Apply: Applies the RADIUS server settings without testing.
Configuring the RADIUS Server
You must configure your RADIUS server to work with the cooling unit.
Add the IP address of the unit to the RADIUS server client list (file).
•
Users must be configured with Service-Type attributes unless Vendor Specific
Attributes (VSAs) are defined. If no Service-Type attributes are configured,
users will have read-only access (on the UI only).
•
VSAs can be used instead of the Service-Type attributes provided by the
RADIUS server.
•
VSAs require a dictionary entry and a RADIUS user file. In the dictionary file,
define the names for the ATTRIBUTE and VALUE keywords, but not for the
numeric values. If you change numeric values, RADIUS authentication and
authorization will not work. VSAs take precedence over standard RADIUS
attributes.
Configuring a RADIUS server on UNIX® with shadow passwords
If UNIX shadow password files are used (/etc/passwd) with the RADIUS dictionary
files, the following two methods can be used to authenticate users:
•
If all UNIX users have administrative privileges, add the following to the
RADIUS “user” file. To allow only Device Users, change the APC-ServiceType to Device.
DEFAULT Auth-Type = System
APC-Service-Type = Admin
•
Add user names and attributes to the RADIUS “user” file, and verify the
password against /etc/passwd. The following example is for users bconners
and thawk:
bconners Auth-Type = System
APC-Service-Type = Admin
thawk Auth-Type = System
APC-Service-Type = Device
Supported RADIUS servers
FreeRADIUS and Microsoft IAS 2003 are supported. Other commonly available
RADIUS applications may work but have not been fully tested.
26
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Firewall
Path: Main > Configuration > Security > Firewall > Configuration
Enable or disable the overall firewall functionality. Any configured policy is also
listed, even if the firewall is disabled.
Path: Main > Configuration > Security > Firewall > Active Policy
Select an active policy from the available firewall policies. The validity of the policy
is also listed here.
Path: Main > Configuration > Security > Firewall > Active Rules
When a firewall is enabled, this lists the individual rules that are being enforced by
a current active policy. You can edit existing rules and add or delete new rules
here.
Path: Main > Configuration > Security > Firewall > Create/Edit Policy
Create a new policy or edit an existing one.
Path: Main > Configuration > Security > Firewall > Load Policy
Load a policy (with .fwl suffix) from a source external to this device.
Path: Main > Configuration > Security > Firewall > Test
Temporarily enforce the rules of a chosen policy for a time that you specify.
990–2809C
27
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Network Configuration
TCP/IP Settings for IPv4
Path: Main > Configuration > Network > TCP/IP > IPv4 Settings
The upper part of the screen displays any current IPv4 address, subnet mask,
default gateway, MAC address, boot mode, DHCP server, and lease dates of the
unit. Use the lower part of the screen to configure those settings, including
disabling IPv4.
•
Manual: Specify your IPv4 address, subnet mask, default gateway here.
•
BOOTP: At 32-second intervals, the device requests network assignment
from any BOOTP server:
•
◦
If it receives a valid response, it starts the network services.
◦
If previously configured network settings exist and it receives no valid
response to five requests (the original and four retries), it uses the
previously configured settings by default. This ensures that it remains
accessible if a BOOTP server is no longer available.
◦
If it finds a BOOTP server, but the request to that server does not work or
times out, the device stops requesting network settings until it is restarted.
DHCP: At 32-second intervals, the device requests network assignment from
any DHCP server.
◦
If a DHCP server is found, but the request to that server does not work or
times out, it stops requesting network settings until it is restarted.
◦
Optionally, you can set up the device with Require vendor specific
cookie to accept DHCP Address in order to accept the lease and start the
network services.
◦
Vendor Class: This should be APC. This is only available if BOOTP or
DHCP is selected.
◦
Client ID: The MAC address of the device. If you change this value, the
new value must be unique on the LAN. This is only available if BOOTP or
DHCP is selected.
◦
User Class: The name of the application firmware module. This is only
available if BOOTP or DHCP is selected.
TCP/IP Settings for IPv6
Path: Main > Configuration > Network > TCP/IP > IPv6 Settings
The upper part of this screen displays any current IPv6 settings of the unit. Use the
lower part of the screen to configure those settings, including disabling IPv6.
You have the option of using manual or automated IP addressing. It is possible to
use them both concurrently. For Manual, select the check box and then enter the
System IPv6 address and the Default Gateway.
Select the Auto Configuration check box to enable the system to obtain
addressing prefixes from the router (if available). It will use those prefixes to
automatically configure IPv6 addresses.
28
IPv6 Possible Formats
Description
fe80:0000:0000:0000:0204:61ff:fe9d:
f156
full form of IPv6
fe80:0:0:0:204:61ff:fe9d:f156
drop leading zeroes
fe80::204:61ff:fe9d:f156
collapse multiple zeroes to :: in the
IPv6 address
fe80:0000:0000:0000:0204:61ff:254.157.241.86
IPv4 dotted quad at the end
fe80:0:0:0:0204:61ff:254.157.241.86
drop leading zeroes, IPv4 dotted quad
at the end
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
IPv6 Possible Formats
Description
fe80::204:61ff:254.157.241.86
dotted quad at the end, multiple zeroes
collapsed
::1
localhost
fe80::
link-local prefix
2001::
global unicast prefix
For DHCPv6 Mode, see the table below.
Option
Description
Router
Controlled
When this radio box is selected, DHCPv6 is controlled by the M
(Managed Address Configuration Flag) and O (Other Stateful
Configuration Flag) flags received in IPv6 router advertisements.
When a router advertisement is received, the unit checks whether
the M and O flags are set. The unit interprets them as follows:
• Neither is set: Indicates that the local network has no DHCPv6
infrastructure. The unit uses Router Advertisements and
manual configuration to get non-link-local addresses and other
settings.
•
M, or M and O are set: In this situation, full DHCPv6 address
configuration occurs. DHCPv6 is used to obtain addresses
AND other configuration settings. This is known as “DHCPv6
stateful.”
Once the M flag has been received, the DHCPv6 address
configuration stays in effect until the interface in question has
been closed, even if subsequent Router Advertisement packets
are received in which the M flag is not set.
If an O flag is received first, then an M flag is received
subsequently, the unit performs full address configuration upon
receipt of the M flag.
•
Only O is set: In this situation, the unit sends a DHCPv6 InfoRequest packet. DHCPv6 is used to configure “other” settings
(such as location of DNS servers), but NOT to provide
addresses. This is known as “DHCPv6 stateless.”
Address
and Other
Information
DHCPv6 is used to obtain addresses AND other configuration
settings. This is known as “DHCPv6 stateful.”
NonAddress
Information Only
DHCPv6 is used to configure “other” settings (such as location of
DNS servers), but NOT to provide addresses. This is known as
“DHCPv6 stateless.”
Never
DHCPv6 is NOT used for any configuration settings.
DHCP Response Options
Each valid DHCP response contains options that provide the TCP/IP settings that
the unit needs in order to operate on a network. Each response also has other
information that affects the operation of the unit.
For more information, refer to FA156110 on FAQ, under the Support tab
at www.schneider-electric.com.
990–2809C
29
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Vendor Specific Information (option 43)
The unit uses this option in a DHCP response to determine whether the DHCP
response is valid. This option contains an option in a TAG/LEN/DATA format, called
the APC Cookie. This is disabled by default.
•
APC Cookie. Tag 1, Len 4, Data “1APC”
Option 43 communicates to the unit that a DHCP server is configured to
service devices.
The following, in hexadecimal format, is an example of a Vendor Specific
Information option that contains the APC cookie:
Option 43 = 0x01 0x04 0x31 0x41 0x50 0x43
TCP/IP Options
The unit uses the following options within a valid DHCP response to define its TCP/
IP settings. All of these options, except the first, are described in RFC2132.
•
IP Address (from the yiaddr field of the DHCP response, described in
RFC2131): The IP address that the DHCP server is leasing to the unit.
•
Subnet Mask (option 1): The Subnet Mask value that the unit needs to
operate on the network.
•
Router, i.e., Default Gateway (option 3): The default gateway address that the
unit needs to operate on the network.
•
IP Address Lease Time (option 51): The time duration for the lease of the IP
Address to the unit.
•
Renewal Time, T1 (option 58): The time that the unit must wait after an IP
address lease is assigned before it can request a renewal of that lease.
•
Rebinding Time, T2 (option 59): The time that the unit must wait after an IP
address lease is assigned before it can seek to rebind that lease.
Other Options
The unit also uses these options within a valid DHCP response. All of these
options except the Boot File Name are described in RFC2132.
30
•
Network Time Protocol Servers (option 42): Up to two NTP servers (primary
and secondary) that the unit can use.
•
Time Offset (option 2): The offset of the unit subnet, in seconds, from
Coordinated Universal Time (UTC).
•
Domain Name Server (option 6): Up to two Domain Name System (DNS)
servers (primary and secondary) that the unit can use.
•
Host Name (option 12): The host name that the unit will use (32-character
maximum length).
•
Domain Name (option 15): The domain name that the unit will use (64character maximum length).
•
Boot File Name (from the file field of the DHCP response, described in
RFC2131): The fully qualified directory-path to a user configuration file (.ini
file) to download. The siaddr field of the DHCP response specifies the IP
address of the server from which the unit will download the .ini file. After the
download, the unit uses the .ini file as a boot file to reconfigure its settings.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Port Speed
Path: Main > Configuration > Network > Port Speed
The port speed setting defines the communication speed of the Ethernet network
port. Your current setting is displayed in Current Speed.
You can change the setting by choosing a radio button under Port Speed.
•
For Auto-negotiation (the default), network devices negotiate to transmit at
the highest possible speed, but if the supported speeds of two devices are not
matched, the slower speed is used.
•
Alternatively, you can select 10 Mbps or 100 Mbps, each with the following
options:
◦
Half-Duplex (communication in only one direction at a time)
◦
Full-Duplex (communication in both directions on the same channel
simultaneously)
DNS Configuration
Path: Main > Configuration > Network > DNS > Configuration
The values under Domain Name System Status list your current status and
setup.
Use the options under Manual Domain Name System Settings to configure the
Domain Name System (DNS).
•
Override Manual DNS Settings: Enabling Override Manual DNS Settings
means that configuration data from other sources like DHCP take precedence
over the manual configurations here.
•
Primary DNS Server: Specify the Primary DNS Server and, optionally, the
Secondary DNS Server with IPv4 or IPv6 addresses. For the unit to send
email, you must at least define the IP address of the primary DNS server.
◦
The unit waits up to 15 seconds for a response from the primary DNS
server or the secondary DNS server. If the unit does not receive a
response within that time, email cannot be sent. Use DNS servers on the
same segment as the unit or on a nearby segment, but not across a widearea network (WAN).
◦
After you define the IP addresses of the DNS servers, test it.
•
System Name Synchronization: Enabling this synchronizes the DNS host
name with the unit system name. Click on the System Name link to define it.
•
Host Name: After you configure a host name here and a domain name in the
Domain Name field, users can enter a host name in any field in the unit
interface (except e-mail addresses) that accepts a domain name.
•
Domain Name (IPv4/IPv6): For the display interface, you only need to
configure the domain name here. In all other fields in this UI — except email
addresses — that accept domain names, the unit defaults to adding this
domain name when only a host name is entered.
To override the expansion of a specified host name by the addition of a
domain name, set this domain name field to its default, somedomain.com or
to 0.0.0.0.
To override the expansion of a specific host name entry (for example, when
defining a trap receiver), include a trailing period. The unit recognizes a host
name with a trailing period (such as mySnmpServer.) as if it were a fullyqualified domain name and does not append the domain name.
•
990–2809C
Domain Name (IPv6): Specify the IPv6 domain name here.
31
InRow™ SCACSC100, ACSC101
Configuring Your Settings
DNS Testing
Path: Main > Configuration > Network > DNS > Test
Use this option to send a DNS query that tests the setup of your DNS servers by
looking up the IP address.
View the result of a test in the Last Query Response field.
•
For Query Type, select the method to use for the DNS query, see the table
below.
•
For Query Question, specify the value to be used for the selected query type
as explained in the table.
Query
Type
Selection
Query Question to Use
By Host
The host name, the URL
By FQDN
The fully-qualified domain name: my_server.my_domain.com
By IP
The IP address of the server
By MX
The mail exchange address
Web Access
Path: Main > Configuration > Network > Web > Access
Use this option to configure the access method for the Web interface. In order to
activate any changes here, you must log off from the unit display interface.
•
HTTP: Select this check box to enable access through HTTP. HTTP does not
encrypt user names, passwords, and data during transmission.
•
HTTPS: Select this check box to enable access through HTTPS. HTTPS
encrypts user names, passwords, and data during transmission.
•
HTTP Port: The port used for HTTP connection. The port range is 5000–
32768: default is 80.
•
HTTPS Port: The port used for HTTPS connection. The port range is 5000–
32768: default is 443.
NOTE: You must use a colon (:) in the address field of the browser to
specify the port number. For example, for a port number of 5000 and an IP
address of 152.214.12.114 enter http(s)://152.214.12.114:5000.
•
32
Minimum Protocol: Select the minimum encryption protocol. There are four
available.
◦
SSL 3.0
◦
TLS 1.0
◦
TLS 1.1
◦
TLS 1.2
•
Require Authentication Cookie: If enabled, a session cookie will be used for
authentication tracking within the browser. The cookie will be removed upon
session end.
•
Limited Status Access: Select whether or not to display a read-only, public
Web page with basic device status. This feature is disabled by default and can
be set via the Use as default page option to show as the default landing page
when a user accesses the device with just the IP/hostname (no specific page
listed).
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
Web SSL Certificate Configuration
Path: Main > Configuration > Network > Web > SSL Certificate
Add, replace, or remove a security certificate. SSL (Secure Socket Layer) is a
protocol used to encrypt data between your browser and the Web server.
•
Status: The Status can be one of the following:
◦
Valid certificate: A valid certificate was installed or was generated by the
unit. Click on this link to view the contents of the certificate.
◦
Certificate not installed: A certificate is not installed or was installed by
FTP or SCP to an incorrect location. Using Add or Replace Certificate
File installs the certificate to the correct location: /ssl on the unit.
◦
Generating: The unit is generating a certificate because no valid certificate
was found.
◦
Loading: A certificate is being activated on the unit.
IMPORTANT: If you install an invalid certificate, or if no certificate is
loaded while SSL is enabled, the unit generates a default certificate, a
process which delays access to the interface for up to one minute. You
can use the default certificate for basic encryption-based security, but a
security alert message displays whenever you log on.
•
Add or Replace Certificate File: Browse to the certificate file created with the
Security Wizard.
•
Remove: Delete the certificate. See screen text also.
Console Settings
Console Access
Path: Main > Configuration > Network > Console > Access
Console access enables use of the command line interface (CLI).
You can enable access to the CLI through either Telnet or SSH or through both, by
using the Enable check boxes. Telnet does not encrypt user names, passwords,
and data during transmission whereas SSH does.
For the ports to be used to communicate with the unit, you can change the setting
to any unused port from 5000 to 32768 for additional security.
•
Telnet Port: This is 23 by default. You must then use a colon (:) or a space to
specify the non-default port, as required by your Telnet client program.
For example, for port 5000 and an IP address of 152.214.12.114, your Telnet
client requires one of the these commands:
telnet 152.214.12.114:5000 or telnet 152.214.12.114 5000
•
SSH Port: This is 22 by default. See the documentation for your SSH client for
the command line format required to specify a non-default port.
User Host Key Configuration
Path: Main > Configuration > Network > Console > SSH Host Key
If you are using SSH (Secure Shell Protocol) for console (CLI) access, you can
add, replace, or remove the host key on the User Host Key screen.
•
Status: The Status indicates whether the host key (private key) is valid. The
Status can be one of the following:
◦
SSH Disabled: No host key in use.
◦
Generating: The unit is creating a host key because no valid host key was
found.
◦
Loading: A host key is being activated on the unit.
◦
Valid: One of the following valid host keys is in the /ssh directory (the
required location on the unit):
– A 1024-bit or 2048-bit host key created by the Security Wizard
990–2809C
33
InRow™ SCACSC100, ACSC101
Configuring Your Settings
– A 2048-bit RSA host key generated by the unit
•
Add or Replace Host Key: Upload a host key file created by the Security
Wizard. To use an externally created host key, load the host key before you
enable SSH.
NOTE: To reduce the time required to enable SSH, create and upload a
host key in advance. If you enable SSH with no host key loaded, the unit
takes up to one minute to create a host key, and the SSH server is not
accessible during that time.
•
Remove: Delete the host key. See screen text also.
To use SSH, you must have an SSH client installed. Most Linux and other UNIX
platforms include an SSH client, but Microsoft Windows operating systems do not.
Clients are available from various vendors.
SNMPv1 Access Configuration
All user names, passwords, and community names for SNMP are transferred over
the network as plain text. If your network requires the high security of encryption,
disable SNMP access or set the access for each community to Read. (A
community with Read access can receive status information and use SNMP traps.)
When using StruxureWare Data Center Expert to manage a unit on the public
network of a StruxureWare system, you must have SNMPv1 or SNMPv3 enabled
in the unit interface. Read access will allow the StruxureWare device to receive
traps from the unit, but Write access is required while you use the unit user
interface to set the StruxureWare device as a trap receiver.
Path: Main > Configuration > Network > SNMPv1 > Access
Use SNMPv1 Access to enable or disable SNMP version 1 as a method of
communication with the unit.
Access Control
Path: Main > Configuration > Network > SNMPv1 > Access Control
You can configure up to four access control entries to specify which Network
Management Systems (NMSs) have access to the unit. To edit, click a community
name.
By default, one entry is assigned to each of the four available SNMPv1
communities. You can edit these settings to apply more than one entry to any one
community to grant access by several specific IPv4 and IPv6 addresses, host
names, or IP address masks.
•
By default, a community has access to the unit from any location on the
network.
•
If you configure multiple access control entries for any one community name, it
means that one or more of the other communities have no access to the
device.
•
Community Name: The name that an NMS must use to access the
community. The maximum length is 15 ASCII characters, and the default
names are public, private, public2, and private2.
•
NMS IP/Host Name: The IPv4 or IPv6 address, IP address mask, or host
name that controls access by NMSs. A host name or a specific IP address (for
example, 149.225.12.1) allows access only by the NMS at that location. IP
addresses that contain ‘255’ restrict access as follows:
•
◦
149.225.12.255: Access only by an NMS on the 149.225.12 segment.
◦
149.225.255.255: Access only by an NMS on the 149.225 segment.
◦
149.255.255.255: Access only by an NMS on the 149 segment.
◦
0.0.0.0 (the default setting) which can also be expressed as
255.255.255.255: Access by any NMS on any segment.
Access Type: The actions an NMS can perform through the community.
◦
34
Read: GETS only, at any time
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
◦
Write: GETS and SETS at any time
◦
Write+: Legacy mode that operates the same as Write
◦
Disable: No GETS or SETS at any time
SNMPv3 Access Configuration
Path: Main > Configuration > Network > SNMPv3 > Access
For GETs, SETs, and trap receivers, SNMPv3 uses a system of user profiles to
identify users. An SNMPv3 user must have a user profile assigned in the MIB
software program to perform GETs and SETs, to browse the MIB, and to receive
traps.
To use SNMPv3, you must have a MIB program that supports SNMPv3.
The unit supports SHA or MD5 authentication and AES or DES encryption.
Enable SNMPv3 Access under the Access menu enables this method of
communication with this device.
User Profiles
Path: Main > Configuration > Network > SNMPv3 > User Profiles
By default, User Profiles lists the settings of four user profiles configured with the
user names apc snmp profile1 through apc snmp profile4, with no
authentication and no privacy (no encryption). To edit the following settings for a
user profile, click a user name in the list.
•
User Name: The identifier of the user profile. SNMP version 3 maps GETs,
SETs, and traps to a user profile by matching the user name of the profile to
the user name in the data packet being transmitted. A user name can have up
to 32 ASCII characters.
•
Authentication Passphrase: A phrase of 15 to 32 ASCII characters (apc
auth passphrase by default) that verifies that the NMS communicating with
this device through SNMPv3 is the NMS it claims to be.
It also verifies that the message has not been changed during transmission,
and that the message was communicated in a timely manner. This indicates
that it was not delayed and that it was not copied and sent again later at an
inappropriate time.
•
Privacy Passphrase: A phrase of 15 to 32 ASCII characters (apc crypt
passphrase by default) that ensures the privacy of the data that an NMS is
sending to or receiving from this device through SNMPv3, by using encryption.
•
Authentication Protocol: The implementation of SNMPv3 supports SHA and
MD5 authentication. One of these must be selected.
•
Privacy Protocol: The implementation of SNMPv3 supports AES and DES as
the protocols for encrypting and decrypting data. You must use both a privacy
protocol and a privacy password, otherwise the SNMP request is not
encrypted.
In turn, you cannot select the privacy protocol if no authentication protocol is
selected.
Access Control
You can configure up to four access control entries to specify which Network
Management Systems (NMSs) have access to the unit. To edit, click a user name.
By default, one entry is assigned to each of the four user profiles. You can edit
these settings to apply more than one entry to any one user profile to grant access
by several specific IP addresses, host names, or IP address masks.
990–2809C
•
By default, all NMSs that use that profile have access to this device.
•
If you configure multiple access control entries for one user profile, it means
that one or more of the other user profiles must have no access to this device.
35
InRow™ SCACSC100, ACSC101
Configuring Your Settings
•
User Name: From the drop-down list, select the user profile to which this
access control entry will apply. The selections available are the four user
names that you configure through the User Profiles option.
•
NMS IP/Host Name: The IP address, IP address mask, or host name that
controls access by the NMS. A host name or a specific IP address (for
example, 149.225.12.1) allows access only by the NMS at that location. An IP
address mask that contains 255 restricts access as follows:
◦
149.225.12.255: Access only by an NMS on the 149.225.12 segment.
◦
149.225.255.255: Access only by an NMS on the 149.225 segment.
◦
149.255.255.255: Access only by an NMS on the 149 segment.
◦
0.0.0.0 (the default setting) which can also be expressed as
255.255.255.255: Access by any NMS on any segment.
Modbus Configuration
Use the Modbus menu to set up communications between the unit and the
building management system (BMS).
Path: Main > Configuration > Network > Modbus > TCP
•
Port: Enter a port: 502, 5000-32768.
FTP Server Access Configuration
Path: Main > Configuration > Network > FTP Server
Use this screen to enable access to an FTP server and to specify a port.
•
Access: FTP transmits files without encrypting them. For encrypted file
transfer, use Secure CoPy (SCP). SCP is automatically enabled when you
enable SSH, but you must disable the FTP Server here to enforce highsecurity
file transfer.
NOTE: At any time that you want a device to be accessible for
management by StruxureWare Data Center Expert, FTP Server must be
enabled in the display interface of that unit.
•
Port: The TCP/IP port of the FTP server (21 by default). The FTP server uses
both the specified port and the port one number lower. The allowed nondefault port numbers are indicated on the screen: 21, and 5001–32768.
NOTE: Configuring the FTP server to use a non-default port enhances
security by requiring users to append the port name to the IP address in
an FTP command line. The appended port name must be preceded by a
space or colon depending on the FTP client used.
Notification Menu
Types of Notification
You can configure notification actions to occur in response to an event. You can
notify users of an event in any of several ways:
•
•
Active, automatic notification: The specified users or monitoring devices are
contacted directly.
◦
E-mail notification
◦
SNMP traps
◦
Remote Monitoring Service
◦
Syslog notification
Indirect notification
◦
36
Event log: If no direct notification is configured, users must check the log to
determine which events have occurred.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
You can also log system performance data to use for device
monitoring. See Log Configuration, page 42 for information on
how to configure and use this data logging option.
◦
Queries (SNMP GETs)
For more information, see SNMP Trap Receiver Configuration,
page 40 and SNMP Traps Test Configuration, page 40. SNMP
enables an NMS to perform informational queries. For SNMPv1,
which does not encrypt data before transmission, configuring the
most restrictive SNMP access type (READ) enables
informational queries without the risk of allowing remote
configuration changes.
The unit supports the use of the RFC1628 MIB (Management Information Base).
See SNMP Trap Receiver Configuration, page 40 for information on how you can
set up a trap receiver. The 1628 MIB group of three events only works with that
MIB, not the alternative Powernet MIB. They can be configured like any event (see
Configuring Event Actions, page 37).
Configuring Event Actions
By Event
Path: Main > Configuration > Notification > Event Actions > By Event
By default, logging an event is selected for all events. To define event actions for
an individual event:
1. To find an event, click on a column heading to see the lists under the Device
Events or System Events categories.
2. Or you can click on a sub-category under these headings, like Security or
Temperature. Click on the event name to view or change the current
configuration, such as recipients to be notified by e-mail, or Network
Management Systems (NMSs) to be notified by SNMP traps.
If no Syslog server is configured, items related to Syslog configuration are not
displayed.
When viewing details of an event configuration, you can enable or
disable event logging or Syslog, or disable notification for specific email recipients or trap receivers, but you cannot add or remove
recipients or receivers. To add or remove recipients or receivers,
see the following:
•
See Identify Syslog Servers, page 42
•
See E-Mail Notification Configuration, page 38.
•
See SNMP Trap Receiver Configuration, page 40.
By Group
Path: Main > Configuration > Notification > Event Actions > By Group
To configure a group of events simultaneously:
1. Select how to group events for configuration:
•
Select Events by Severity, and then select one or more severity levels.
You cannot change the severity of an event.
•
Select Events by Category, and then select all events in one or more
pre-defined categories.
2. Click Next to move to the next screen to do the following:
•
Select event actions for the group of events.
◦
990–2809C
To select any action except Logging (the default), you must first have
at least one relevant recipient or receiver configured.
37
InRow™ SCACSC100, ACSC101
Configuring Your Settings
◦
If you selected Logging and have configured a Syslog server, select
Event Log or Syslog on the next screen.
See Log Configuration, page 42.
3. Click Next to move to the next screen to do the following:
•
If you selected Logging on the previous screen, select Enable
Notifications or Disable Notification.
•
If you selected Email Recipients on the previous screen, select the email recipients to configure.
•
If you selected Trap Receivers on the previous screen, select the trap
receiver to configure.
4. Click Next to move to the next screen to do the following:
•
If you are configuring Logging settings, view the pending actions and
click Apply to accept the changes or click Cancel to revert to the previous
settings.
•
If you are configuring Email Recipients or Trap Receivers, select
Enable Notifications or Disable Notificationand set the notification
timing settings.
5. Click Next to move to the next screen to do the following:
•
View the pending actions and click Apply to accept the changes or click
Cancel to revert to the previous settings.
Notification Parameters
These configuration fields define e-mail parameters for sending notifications of
events. These are usually accessed by clicking the receiver or recipient name
Field
Description
Delay n time
before
sending
If the event persists for the specified time, the notification is
sent. If the condition clears before the time expires, no
notification is sent.
Repeat at an
interval of n
The notification is sent repeatedly at the specified interval (the
default is every two minutes until the condition clears).
Up to n times
During an active event, the notification repeats for this number
of times.
or
Until condition
clears
The notification is sent repeatedly until the condition clears or is
resolved.
For events that have an associated clearing event, you can also set these
parameters. (An example of an event with its clearing event is RD: Fan 2 Error
Detected and RD: Fan 2 Error Corrected).
E-Mail Notification Configuration
Use Simple Mail Transfer Protocol (SMTP) to send e-mail to up to four recipients
when an event occurs. To use the e-mail feature, you must define the following
settings:
•
The IP addresses of the primary and, optionally, the secondary Domain Name
System (DNS) servers.
•
The IP address or DNS name for the SMTP Server and From Address.
•
The e-mail addresses for a maximum of four recipients.
•
You can use the To Address setting of the recipients option to send e-mail to
a text-based screen.
Path: Main > Configuration > Notification > E-mail > Server
38
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
This screen lists your primary and secondary DNS servers and displays the
following fields:
•
From Address: The contents of the From field in e-mail messages sent by
the cooling unit:
◦
In the format user@ [IP_address] (if an IP address is specified as Local
SMTP Server)
◦
In the format user@domain (if DNS is configured and the DNS name is
specified as Local SMTP Server) in the e-mail messages
NOTE: The local SMTP server may require that you use a valid user
account on the server for this setting. See the server documentation.
•
SMTP Server: The IPv4/ IPv6 address or DNS name of the local SMTP
server.
NOTE: This definition is required only when the SMTP server is set to
Local.
•
Authentication: Enable this if the SMTP server requires authentication.
•
Port: The SMTP port number, with a default of 25. The range is 1–65535.
•
User Name, Password, and Confirm Password: If your mail server requires
authentication, enter your user name and password here. This performs a
simple authentication, not SSI.
•
Use SSL/TLS: Select when encryption is used.
◦
Never: The SMTP server does not require nor support encryption.
◦
If Supported: The SMTP server advertises support for STARTTLS but
does not require the connection to be encrypted. The STARTTLS
command is sent after the advertisement is given.
◦
Always: The SMTP server requires the STARTTLS command to be sent
on connection to it.
◦
Implicitly: The SMTP server only accepts connections that begin
encrypted. No STARTTLS message is sent to the server.
•
Require CA Root Certificate: This should only be enabled if the security
policy of your organization does not allow for implicit trust of SSL connections.
If this is enabled, a valid root CA certificate must be loaded onto the unit for
encrypted e-mails to be sent.
•
File Name: This field is dependent on the root CA certificates installed on the
unit and whether or not a root CA certificate is required.
Path: Main > Configuration > Notification > E-mail > Recipients
Specify up to four e-mail recipients. Click on a name to configure the settings.
•
Generation: Enables (default) or disables sending e-mail to the recipient.
•
To Address: The user and domain names of the recipient. To use e-mail for
paging, use the email address for the recipient pager gateway account (for
example, [email protected]). The pager gateway will generate the
page.
To bypass the DNS lookup of the IP address of the mail server, use the IP
address in brackets instead of the email domain name, e.g., use jsmith@[xxx.
xxx.x.xxx] instead of [email protected]. This is useful when DNS lookups
are not working correctly.
NOTE: The recipient pager must be able to use text-based messaging.
•
Format: The long format contains name, location, contact, IP address, serial
number of the device, date and time, event code, and event description. The
short format provides only the event description.
•
Server: Select one of the following methods for routing e-mail:
◦
990–2809C
Local: This is through the site-local SMTP server. This recommended
setting ensures that the e-mail is sent using the site-local SMTP server.
Choosing this setting limits delays and network outages and retries
sending e-mail for many hours. When choosing the Local setting you must
also enable forwarding at the SMTP server of your device and set up a
special external e-mail account to receive the forwarded e-mail. Check with
your SMTP server administrator before making these changes.
39
InRow™ SCACSC100, ACSC101
Configuring Your Settings
◦
Recipient: This is the SMTP server of the recipient. The unit performs an
MX record look-up on the recipients e-mail address and uses that as its
SMTP server. The e-mail is only sent once so it could easily be lost.
◦
Custom: This setting enables each e-mail recipient to have its own server
settings. These settings are independent of the settings given under SMTP
Server.
Path: Main > Configuration > Notification > E-mail > SSL Certificates
Load a mail SSL certificate on the unit for greater security. The file must have an
extension of .crt or .cer. Up to five files can be loaded at any given time.
When installed, the certificate details also display here. An invalid certificate will
display “n/a” for all fields except File Name.
Certificates can be deleted using this screen. Any e-mail recipients using the
certificate should be manually modified to remove reference to this certificate.
Path: Main > Configuration > Notification > E-mail > Test
Send a test message to a configured recipient.
SNMP Trap Receiver Configuration
Path: Main > Configuration > Notification > SNMP Traps > Trap Receivers
With Simple Network Management Protocol (SNMP) traps, you can automatically
get notifications for significant unit events. They are a useful tool for monitoring
devices on your network.
The trap receivers are displayed by NMS IP/Host Name, where NMS stands for
Network Management System. You can configure up to six trap receivers.
To configure a new trap receiver, click Add Trap Receiver. To edit (or delete) one,
click its IP address/host name.
•
Trap Generation: Enable (the default) or disable trap generation for this trap
receiver.
•
NMS IP/Host Name: The IPv4/ IPv6 address or host name of this trap
receiver. The default, 0.0.0.0, leaves the trap receiver undefined.
•
Language: Select a language from the drop-down list. This can differ from the
UI and from other trap receivers
Select either the SNMPv1 or SNMPv3 .radio button to specify the trap type.
For an NMS to receive both types of traps, you must separately configure two
trap receivers for that NMS, one for each trap type.
•
•
SNMPv1: Settings for SNMPv1.
◦
Community Name: The name (“public” by default) used as an identifier
when SNMPv1 traps are sent to this trap receiver.
◦
Authenticate Traps: When this option is enabled (the default), the NMS
identified by the NMS IP/Host Name setting will receive authentication
traps (traps generated by invalid attempts to log on to this device).
SNMPv3: Settings for SNMPv3.
◦
User Name: Select the identifier of the user profile for this trap receiver.
If you delete a trap receiver, all notification settings configured under Configuring
Event Actions, page 37 for the deleted trap receiver are set to their default values.
SNMP Traps Test Configuration
Path: Main > Configuration > Notification > SNMP Traps > Test
•
Last Test Result: The result of the most recent SNMP trap test. A successful
SNMP trap test verifies only that a trap was sent; it does not verify that the trap
was received by the selected trap receiver. A trap test succeeds if all of the
following are true:
◦
40
The SNMP version (SNMPv1 or SNMPv3) configured for the selected trap
receiver is enabled on this device.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
•
◦
The trap receiver itself is enabled.
◦
If a host name is selected for the To address, that host name can be
mapped to a valid IP address.
To: Select the IP address or host name to which a test SNMP trap will be sent.
If no trap receiver is configured, a link to the Trap Receiver configuration
screen is displayed.
General Menu
This menu contains miscellaneous configuration items including device
identification, date and time, exporting and importing your unit configuration
options, the three links at the bottom left of the screen, and consolidating data for
troubleshooting purposes.
Identification Screen
Path: Main > Configuration > General > Identification
Define the Name, the Location (the physical location), and the Contact (the
person responsible for the device) used by
•
The SNMP agent of the unit
•
StruxureWare Data Center Expert
Specifically, the name field is used by the sysName, sysContact,
and sysLocation object identifiers (OIDs) in the SNMP agent of the
unit. For more information about MIB-II OIDs, see the PowerNet®
SNMP Management Information Base (MIB) Reference Guide,
available at www.schneider-electric.com.
The Name and Location fields also identify the device when you register for the
Remote Monitoring Service.
You may leave a System Message of up to 256 characters.
Date/Time Configuration
Path: Main > Configuration > General > Date/Time > Mode
Set the time and date used by the unit. You can change the current settings
manually or through a Network Time Protocol (NTP) Server.
With both, you select the Time Zone. This is your local time difference with
Coordinated Universal Time (UTC), also known as Greenwich Mean Time (GMT).
•
•
990–2809C
Manual Mode: Do one of the following:
◦
Enter the date and time for the unit.
◦
Select the check box Apply Local Computer Time to apply the date and
time settings of the computer you are using.
Synchronize with NTP Server: Have an NTP (Network Time Protocol)
Server define the date and time for the unit. By default, any unit on the private
side of a StruxureWare Data Center Expert obtains its time settings by using
StruxureWare Data Center Expert as an NTP server.
◦
Override Manual NTP Settings: If you select this, data from other sources
(typically DHCP) take precedence over the NTP configurations you set
here.
◦
Primary NTP Server: Enter the IP address or domain name of the primary
NTP server.
◦
Secondary NTP Server: Enter the IP address or domain name of the
secondary NTP server, when a secondary server is available.
41
InRow™ SCACSC100, ACSC101
Configuring Your Settings
◦
Update Interval: Define, in hours, how often the unit accesses the NTP
Server for an update. Minimum: 1; Maximum: 8760 (1 year).
◦
Update Using NTP Now: Initiate an immediate update of the date and
time by the NTP Server.
Path: Main > Configuration > General > Date /Time > Daylight Savings
Daylight Saving Time (DST) is disabled by default. You can enable traditional
United States DST, or enable and configure a customized daylight saving time to
match how Daylight Saving Time is implemented in your local area.
When customizing DST, the system puts the clock forward by an hour when the
time and date you specify under Start is reached and puts the clock back an hour
when the time and date you specify under End is reached.
•
If your local DST always starts or ends on the fourth occurrence of a specific
weekday of a month (e.g., the fourth Sunday), select Fourth/Last. If a fifth
Sunday occurs in that month, you should still choose Fourth/Last.
•
If your local DST always starts or ends on the last occurrence of a specific
weekday of a month, whether it is the fourth or the fifth occurrence, select
Fifth/Last.
Create and Import Settings with the Configuration File
Path: Main > Configuration > General > User Config File
You can speed up and simplify the configuration of new devices by re-using the
existing configuration settings with this option. Use Upload to transfer
configuration data to this interface and Download to transfer from this interface
(and then use the file to configure another interface). The default name of the file is
config.ini.
Configure the Links Screen
Path: Main > Configuration > General > Quick Links
Use this option to view and change the URL links displayed at the bottom-left of
each screen of the interface.
To reconfigure a link, click the link name in the Name column. You can reset the
links to their defaults at any time by clicking on Reset to Defaults.
Log Configuration
Identify Syslog Servers
Path: Main > Configuration > Logs > Syslog > Servers
Click Add Server to configure a new Syslog server.
•
Syslog Server: Uses IPv4/ IPv6 addresses or host names to identify from one
to four servers to receive Syslog messages sent by the unit.
•
Port: The user datagram protocol (UDP) port that the unit will use to send
Syslog messages. The default UDP port assigned to Syslog is 514.
•
Protocol: Select either UDP or TCP.
•
Language: Select the language for any Syslog messages.
Syslog Settings
Path: Main > Configuration > Logs > Syslog > Settings
•
42
Message Generation: Enable the generation and the logging of Syslog
messages for events that have Syslog configured as a notification method.
990–2809C
InRow™ SCACSC100, ACSC101
Configuring Your Settings
See Configuring Event Actions, page 37.
•
Facility Code: Selects the facility code assigned to the Syslog messages of
the unit (User, by default).
NOTE: User best defines the Syslog messages sent by the unit. Do not
change this selection unless advised to do so by the Syslog network or
system administrator.
•
Severity Mapping: This section maps each severity level of the unit or
environment events to available Syslog priorities. The local options are
Critical, Warning, and Informational. You should not need to change the
mappings.
◦
Emergency: The system is unusable
◦
Alert: Action must be taken immediately
◦
Critical: Critical conditions
◦
Error: Error conditions
◦
Warning: Warning conditions
◦
Notice: Normal but significant conditions
◦
Informational: Informational messages
◦
Debug: Debug-level messages
The following are the default settings for the Local Priority settings:
◦
Critical is mapped to Critical
◦
Warning is mapped to Warning
◦
Informational is mapped to Info
To disable Syslog messages, see Configuring Event Actions, page 37.
Syslog Test and Format Example
Path: Main > Configuration > Logs > Syslog > Test
Send a test message to the Syslog servers (configured through Identify Syslog
Servers, page 42). The result will be sent to all configured Syslog servers.
Select a severity to assign to the test message and then define the test message.
Format the message to consist of the event type (for example, APC, System, or
Device) followed by a colon, a space, and the event text. The message can have a
maximum of 50 characters.
•
The priority (PRI): The Syslog priority assigned to the message event, and the
facility code of messages sent by the unit.
•
The Header: A time stamp and the IP address of the unit.
•
The message (MSG) part:
◦
The TAG field, followed by a colon and space, identifies the event type.
◦
The CONTENT field is the event text, followed (optionally) by a space and
the event code.
Example: APC: Test Syslog is valid.
990–2809C
43
InRow™ SCACSC100, ACSC101
Tests
Tests
Set the Unit LED Lights to Blink
Path: Main > Tests > Network > LED Blink
If you are having trouble finding your unit, enter a number of minutes in the LED
Blink Duration field, click Apply, and the LED lights under the panel on the right
side of the display will blink.
44
990–2809C
InRow™ SCACSC100, ACSC101
Logs and About Menus
Logs and About Menus
Event and Data Logs
The event log records individual occurrences. The data log, by contrast, provides
you with a snapshot of your system by recording values at regular time intervals.
Event Log
By default, the log displays all events recorded during the last two days, starting
with the latest events.
Additionally, the log records any event that sends an SNMP trap, except SNMP
authentication failures, and abnormal internal system events.
You can enable color coding for events on the Main > Configuration > Security >
Local Users > Management screen.
By default, the event log displays the most recent events first. To see the events
listed together on a Web page, click Launch Log in New Window.
To open the log in a text file or to save the log to disk, click on the floppy disk icon (
) on the same line as the Event Log heading.
You can also use FTP or Secure CoPy (SCP) to view the event log. See
How to Use FTP or SCP to Retrieve Log Files, page 48.
Filter Event Logs
Use filtering to omit information you do not want to display.
•
Filtering the log by date or time: Use the Last or From radio buttons. (The
filter configuration is saved until the unit restarts.)
•
Filtering the log by event severity or category:
1. Click Filter Log.
2. Clear a check box to remove it from view.
3. After you click Apply, text at the upper-right corner of the Event Log
page indicates that a filter is active. The filter is active until you clear it or
until the unit restarts.
•
Removing an active filter:
1. Click Filter Log.
2. Click Clear Filter (Show All).
3. As Administrator, click Save As Default to save this filter as the new
default log view for all users.
The following are important points on filtering:
•
Events are processed through the filter using OR logic. If you apply a filter, it
works regardless of the other filters.
•
Events that you cleared in the Filter By Severity list never display in the filtered
Event Log, even if selected in the Filter by Category list.
•
Similarly, events that you clear in the Filter by Category list never display in the
filtered Event Log.
Delete Event Log
To delete all events, click Clear Log. Deleted events cannot be retrieved.
To disable the logging of events based on their assigned severity level
or their event category, see Configuring Event Actions, page 37.
990–2809C
45
InRow™ SCACSC100, ACSC101
Logs and About Menus
Launch Log in New Window
Click Launch Log in New Window to launch the event log in a new browser
window that provides a larger view of the graph.
With reverse lookup enabled, when a network-related event occurs, both the IP
address and the domain name for the network device with the event are logged in
the event log. If no domain name entry exists for the device, only its IP address is
logged with the event.
Since domain names generally change less frequently than IP addresses, enabling
reverse lookup can improve the ability to identify addresses of networked devices
that are causing events.
Reverse lookup is disabled by default. You should not need to enable it if you have
no DNS server configured or have poor network performance because of heavy
network traffic.
Use Event Log Size to specify the maximum number of log entries.
IMPORTANT: When you re-size the event log in order to specify a maximum
size, all existing log entries are deleted. When the log subsequently reaches
the maximum size, the older entries are deleted.
Data Log
Use the data log to display measurements about the unit, the power input to the
unit, and the ambient temperature of the unit.
The steps to display and re-size the data log are the same as for the event log,
except that you use menu options under Data instead of Events.
Filter Data Log
Use filtering to omit information you do not want to display.
Filter Log by Date or Time
Use the Last or From radio buttons. (The filter configuration is saved until the unit
restarts.)
Delete Data Log
To delete all events, click Clear Data Log. Deleted events cannot be retrieved.
Data Graphing
Data log graphing provides a graphical display of logged data and is an
enhancement of the existing data log feature. How the graphing enhancement
displays data and how efficiently it performs will vary depending on your computer
hardware, computer operating system, and the Web browser you use to access
the interface of the unit.
NOTE: JavaScript® must be enabled in your browser to use the graphing
feature. Alternatively, you can use FTP or SCP to import the data log into a
spreadsheet application, and graph data in the spreadsheet.
•
Graph Time: Select Last to graph all records or to change the number of
hours, days, or weeks for which data log information is graphed. Select a time
option from the drop-down menu. Select From to graph data logged during a
specific time period.
NOTE: Enter time using the 24-hour clock format.
46
•
Apply: Click Apply to graph the data.
•
Launch Graph in New Window: Click Launch Log in New Window to
launch the data log in a new browser window that provides a larger view of the
graph.
990–2809C
InRow™ SCACSC100, ACSC101
Logs and About Menus
Log Intervals
Define, in the Log Interval setting, how frequently data is searched for and stored
in the data log. When you click Apply, the number of possible storage days is
recalculated and display at the top of the screen. When the log is full, the oldest
entries are deleted.
NOTE: Because the interval specifies how often the data is recorded, the
smaller the interval, the more times the data is recorded and the larger the log
file.
Data Log Rotation
Rotation causes the contents of the data log to be appended to the file you specify
by name and location. Use this option to set up password-protection and other
parameters.
•
FTP Server: The IP address or host name of the server where the file will
reside.
•
User Name/Password: The user name with password required to send data
to the repository file. This user must also be configured to have read and write
access to the data repository file and the directory (folder) in which it is stored.
•
File Path: The path to the repository file.
•
Filename: The name of the repository file (an ASCII text file), e.g. datalog.txt.
Any new data is appended to this file: it does not overwrite it.
•
Unique Filename: Select this check box to save the log as mmddyyyy_
<filename>.txt, where filename is what you specified in the Filename field.
Any new data is appended to the file but each day has its own file.
•
Delay n hours between uploads: The number of hours between uploads of
data to the file (max. 24 hours).
•
Upon failure, try uploading every n minutes: The number of minutes
between attempts to upload data to the file after a failed upload.
•
Up to n times: The maximum number of times the upload will be attempted
after it fails initially.
•
Until upload succeeds: Attempt to upload the file until the transfer is
completed.
Data Log Size
Use Data Log Size to specify the maximum number of log entries.
IMPORTANT: When you resize the data log in order to specify a maximum
size, all existing log entries are deleted. When the log subsequently reaches
the maximum size, the older entries are deleted.
990–2809C
47
InRow™ SCACSC100, ACSC101
Logs and About Menus
Firewall Log
Path: Main > Logs > Firewall
If you create a firewall policy, firewall events will be logged here.
For more information on implementing a policy, see Firewall, page 27.
The information in the log can be useful to help the technical support team solve
problems. Log entries contain information about the traffic and the rules action
(allowed, discarded). When logged here, these events are not logged in the main
Event Log .
A Firewall log contains up to 50 of the most recent events. The Firewall log is
cleared when the display reboots.
How to Use FTP or SCP to Retrieve Log Files
A Super User/Administrator or Device User can use FTP or SCP to retrieve a tabdelineated event log file (event.txt) or data log file (data.txt) and import it into a
spreadsheet. Both reside on the unit.
•
The file reports all events or data recorded since the log was last deleted or, in
the case of the data log, truncated because it reached maximum size.
•
The file includes information that the event log or data log does not display.
◦
The version of the file format (first field)
◦
The date and time the file was retrieved
◦
The Name, Contact, and Location values and IP address of the unit
◦
The unique Event Code for each recorded event (event.txt file only)
◦
The unit uses a four-digit year for log entries. You may need to select a
four-digit date format in your spreadsheet application to display all four
digits.
Use SCP to Retrieve the Files
Enable SSH on the unit to use SCP to retrieve files.
See Console Settings, page 33.
To retrieve the event.txt file, use the following command:
scp <username@hostname> or <ip_address>:event.txt./event.txt
To retrieve the data.txt file, use the following command:
scp <username@hostname> or <ip_address>:data.txt./data.txt
Use FTP to Retrieve the Files
To use FTP to retrieve the event.txt or data.txt file:
1. At a command prompt, type ftp and the IP address of the unit, and press
Enter.
If the Port setting for the FTP Server option has been changed from its default
(21), you must use the non-default value in the FTP command.
For Windows-based FTP clients, use the following command, including
spaces. (For some FTP clients, you must use a colon instead of a space
between the IP address and the port number.)
ftp>open ip_address port_number
48
990–2809C
InRow™ SCACSC100, ACSC101
Logs and About Menus
To set a non-default port value to enhance security for the FTP
Server, see FTP Server Access Configuration, page 36. You can
specify any port from 5001 to 32768.
2. Use the case-sensitive User Name and Password for the Super User/
Administrator or Device User to log on. For Administrator, apc is the default
for the user name and password. For the Device User, the defaults are
device for user name and apc for password.
3. Use the get command to transmit the text of a log to your local drive.
ftp>get event.txt
or
ftp>get data.txt
4. You can use the del command to clear the contents of either log.
ftp>del event.txt
or
ftp>del data.txt
You will not be asked to confirm the deletion.
•
If you clear the data log, the event log records a deleted-log event.
•
If you clear the event log, a new event.txt file records the event.
5. Type quit at the ftp> prompt to exit from FTP.
About the Unit
Path: Main > About > Device
The information displayed varies according to the device used.
•
Model Number
•
Serial Number
•
Firmware Revision
•
Hardware Revision
About the Network
Path: Main > About > Network
Hardware Factory
This hardware information is useful for troubleshooting problems with your unit.
Management Uptime refers to the length of time this management interface has
been running continuously; that is, the length of time since the unit has been warm
or cold started.
Network Management Card
This information is the serial number of the Network Management Card embedded
in the display interface.
Application Module, APC OS (AOS), and APC Boot Monitor
This information is useful for troubleshooting and for determining if updated
firmware is available.
•
990–2809C
Name: The name of the firmware module. The APC AOS module is always
named aos, and the boot monitor module is always named bootmon.
49
InRow™ SCACSC100, ACSC101
Logs and About Menus
•
Version: The version number of the firmware module. Version numbers of the
modules may differ, but compatible modules are released together. Never
combine application modules and AOS modules from different releases.
NOTE: If the boot monitor module must be updated, a boot monitor
module is included in the firmware release. Otherwise, the boot monitor
module that is installed on the card is compatible with the firmware update.
•
50
Date/Time: The date and time at which the firmware module was loaded
990–2809C
InRow™ SCACSC100, ACSC101
Logs and About Menus
Troubleshooting and Support
Path: Main > About > Support
There are three links to useful websites. These links access the URLs for these
Web pages:
•
Link 1: Knowledge Base
•
Link 2: Company Contact Information
•
Link 3: Software and Firmware Downloads
Technical Support Debug Information Download
With this option, you can consolidate various data in this interface into a single ZIP
file for troubleshooting purposes and customer support. The data includes the
event and data logs, the configuration file, and complex debugging information.
Click Generate Logs to create the file and then Download. You are asked
whether you want to view or save the ZIP file.
990–2809C
51
InRow™ SCACSC100, ACSC101
Device IP Configuration Wizard
Device IP Configuration Wizard
Capabilities, Requirements, and Installation
How to Use the Wizard to Configure TCP/IP Settings
•
Remotely over your TCP/IP network to discover and configure any
unconfigured cooling units on the same nettwork segment as the computer
running the Wizard.
•
Through a direct connection from a serial port of your computer to the cooling
unit to configure or reconfigure it.
System Requirements
The Wizard runs on Windows® 2000, Windows 2003, Windows Vista®, Windows
XP, Windows 7, Windows Server 2008, Windows 8, and Windows 2012.
Installation
To install the Wizard from a downloaded executable file:
1. Go to www.schneider-electric.com.
2. Download the Device IP Configuration Wizard.
3. Run the executable file in the folder to which you downloaded it.
Use the Wizard
NOTE: Most software Firewalls must be temporarily disabled for the Wizard to
discover unconfigured units.
Launch the Wizard
The installation creates a shortcut link in the Start menu to launch the Wizard.
Configure the Basic TCP/IP Settings Remotely
Prepare to Configure the Settings
Before you run the Wizard:
1. Contact your network administrator to obtain valid TCP/IP settings.
2. If you are configuring multiple unconfigured units, obtain the MAC address of
each one to identify it when the Wizard discovers it. (The Wizard displays the
MAC address on the screen on which you then enter the TCP/IP settings.)
•
The MAC address is accessible on the Web suer interface on the Main >
About > Display > Device screen.
Run the Wizard to Perform the Configuration
To discover and configure unconfigured units over the network:
1. From the Start menu, launch the Wizard. The Wizard detects the first cooling
unit that is not configured.
2. Select Remotely (over the network), and click Next >.
3. Enter the system IP, subnet mask, and default gateway for the cooling unit
identified by the MAC address. Click Next >.
52
990–2809C
InRow™ SCACSC100, ACSC101
Device IP Configuration Wizard
On the Transmit Current Settings Remotely screen, if you select the Start a
Web browser when finished check box, the default Web browser connects
to the cooling unit after the Wizard transmits the settings.
4. Click Finish to transmit the settings. If the IP address you entered is in use on
the network, the Wizard prompts you to enter an IP address that is not in use.
Enter a correct IP address, and click Finish.
5. If the Wizard finds another unconfigured cooling unit, it displays the screen to
enter TCP/IP settings. Repeat this procedure beginning at step 3, or to skip
the cooling unit whose MAC address is currently displayed, click Cancel.
Configure or Re-Configure the TCP/IP Settings Locally
1. Contact your network administrator to obtain valid TCP/IP settings.
2. Connect the serial configuration cable (which came with the cooling unit) from
an available communications port on your computer to the serial port of the
card or device. Make sure no other application is using the computer port.
3. From the Start menu, launch the Wizard application.
4. If the cooling unit is not configured, wait for the Wizard to detect it. Otherwise,
click Next >.
5. Select Locally (through the serial port), and click Next >.
6. Enter the system IP, subnet mask, and default gateway for the cooling unit,
and click Next >.
On the Transmit Current Settings Remotely screen, if you select the Start a
Web browser when finished check box, the default Web browser connects
to the cooling unit after the Wizard transmits the settings.
7. Click Finish to transmit the TCP/IP settings. If the IP address you entered is in
use on the network, the Wizard prompts you to enter an IP address that is not
in use. Enter a correct IP address, and click Finish.
If you selected Start a Web browser when finished in step 6, you can now
configure other parameters through the Web interface of the device.
990–2809C
53
InRow™ SCACSC100, ACSC101
How to Export Configuration Settings
How to Export Configuration Settings
Retrieve and Export the .ini File
Summary of the Procedure
An Administrator can retrieve the .ini file of a unit and export it to another unit or to
multiple units.
1. Configure one unit to have the settings you want to export.
2. Retrieve the .ini file from that unit.
3. Customize the file to change at least the TCP/IP settings.
4. Use a file transfer protocol supported by the unit to transfer a copy to one or
more other units. For a transfer to multiple units, use an FTP or SCP script or
the Schneider Electric .ini file utility.
Each receiving unit uses the file to re-configure its own settings and then deletes it.
Contents of the .ini File
The config.ini file you retrieve from the unit contains the following:
•
section headings and keywords (only those supported for the device from
which you retrieve the file): Section headings are category names enclosed in
brackets ([ ]). Keywords, under each section heading, are labels describing
specific unit settings. Each keyword is followed by an equals sign and a value
(either the default or a configured value).
•
The override keyword: With its default value, this keyword prevents the
exporting of one or more keywords and their device-specific values, e.g., in
the [NetworkTCP/IP] section, the default value for Override (the MAC
address of the cooling unit) blocks the exporting of values for the SystemIP,
SubnetMask, DefaultGateway, and BootMode.
Detailed Procedures
Retrieving
To set up and retrieve an .ini file to export:
1. If possible, use the interface of a unit to configure it with the settings to export.
Directly editing the .ini file risks introducing errors.
2. To use FTP to retrieve config.ini from the configured unit:
a. Open a connection to the unit, using its IP address:
ftp> open ip_address
b. Log on using the Administrator user name and password.
c. Retrieve the config.ini file containing the unit settings:
ftp> get config.ini
The file is written to the folder from which you launched FTP.
Customizing
You must customize the file before you export it.
1. Use a text editor to customize the file.
54
•
Section headings, keywords, and pre-defined values are not casesensitive, but string values that you define are case-sensitive.
•
Use adjacent quotation marks to indicate no value. For example,
LinkURL1="" indicates that the URL is intentionally undefined.
•
Enclose in quotation marks any values that contain leading or trailing
spaces or are already enclosed in quotation marks.
990–2809C
InRow™ SCACSC100, ACSC101
How to Export Configuration Settings
•
To export scheduled events, configure the values directly in the .ini file.
•
To export a system time with the greatest accuracy, if the receiving
cooling units can access a Network Time Protocol server, configure
enabled for NTPEnable:
NTPEnable=enabled
Alternatively, reduce transmission time by exporting the [SystemDate/
Time] section as a separate .ini file.
•
To add comments, start each comment line with a semicolon (;).
2. Copy the customized file to another file name in the same folder:
•
The file name can have up to 64 characters and must have the .ini suffix.
•
Retain the original customized file for future use.
IMPORTANT: The file that you retain is the only record of your
comments.
Transfer the File to a Single Unit
To transfer the .ini file to another unit, do either of the following:
•
From the Web user interface of the receiving unit, select the Administration
tab, General on the top menu bar, and User Config File on the left navigation
menu. Enter the full path of the file, or use Browse.
•
Use any file transfer protocol supported by units, i.e., FTP, FTP Client, SCP, or
TFTP). The following example uses FTP:
1. From the folder containing the copy of the customized .ini file, use FTP to
log in to the unit to which you are exporting the .ini file:
ftp> open ip address
2. Export the copy of the customized .ini file to the root directory of the
receiving unit:
ftp> put filename.ini
Export the File to Multiple Units
To export the .ini file to multiple units:
990–2809C
•
Use FTP or SCP, but write a script that incorporates and repeats the steps
used for exporting the file to a single unit.
•
Use a batch processing file and the Schneider Electric .ini file utility.
55
InRow™ SCACSC100, ACSC101
How to Export Configuration Settings
The Upload Event and Error Message
The Event and Its Error Messages
The following event occurs when the receiving cooling unit completes using the .ini
file to update its settings:
Configuration file upload complete, with number valid values
If a keyword, section name, or value is invalid, the upload by the receiving unit
succeeds, and additional event text states the error.
Event Text
Description
Configuration file warning: Invalid
keyword on line number.
A line with an invalid keyword or value
is ignored.
Configuration file warning: Invalid
value on line number.
Configuration file warning: Invalid
section on line number.
If a section name is invalid, all
keyword/value pairs in that section are
ignored.
Configuration file warning: Keyword
found outside of a section on line
number.
A keyword entered at the beginning of
the file (i.e., before any section
headings) is ignored.
Configuration file warning:
Configuration file exceeds maximum
size.
If the file is too large, an incomplete
upload occurs. Reduce the size of the
file, or divide it into two files, and try
uploading again.
Messages in config.ini
A device associated with the cooling unit from which you download the config.ini
file must be discovered successfully in order for its configuration to be included. If
the device is not present or, for another reason, is not discovered, the config.ini file
contains a message under the appropriate section name, instead of keywords and
values.
If you did not intend to export the configuration of the device as part of the .ini file
import, ignore these messages.
Errors Generated by Overridden Values
The Override keyword and its value will generate error messages in the event
log when it blocks the exporting of values.
See Contents of the .ini File, page 54 for information about which
values are overridden.
Because the overridden values are device-specific and not appropriate to export to
other cooling units, ignore these error messages. To prevent these error
messages, you can delete the lines that contain the Override keyword and the
lines that contain the values that they override. Do not delete or change the line
containing the section heading.
56
990–2809C
How to Export Configuration Settings
InRow™ SCACSC100, ACSC101
Related Topics
On Windows operating systems, instead of transferring .ini files, you can use the
Device IP Configuration Wizard to update the basic TCP/IP settings of units and
configure other settings through their user interface.
See Device IP Configuration Wizard, page 52.
990–2809C
57
InRow™ SCACSC100, ACSC101
File Transfers
File Transfers
Updating the Firmware
When you update the firmware on the unit, you obtain the latest features,
performance improvements, and bug fixes.
Updating here means placing the module files on the unit; there is no installation
required. Check regularly on www.schneider-electric.com for any new updates.
NOTE: You will need to select the language pack if you require your display
interface to be available in a language other than English.
Firmware Module Files
A firmware version has three modules, and they must be updated (that is, placed
on the unit) in this order:
Module
Description
Boot monitor (bootmon)
Roughly equivalent to the BIOS of a
PC
American Power Conversion
Operating System (AOS)
Can be considered the operating
system of the unit
Application
Specific to the unit device type
(Each module contains one or more Cyclical Redundancy Checks (CRCs) to
protect its data from corruption.)
The boot monitor module, the AOS, and the application file names share the same
basic format:
apc_hardware-version_type_firmware-version.bin
58
•
apc: Indicates the context.
•
hardware-version: “hw0n” where ‘n’ identifies the hardware version on which
you can use this file.
•
type: Identifies which module.
•
version: The version number of the file.
•
bin: Indicates that this is a binary file.
990–2809C
InRow™ SCACSC100, ACSC101
Troubleshooting
Troubleshooting
If necessary, call Technical Support describing the nature of the fault and its
possible cause displayed on the control panel.
990–2809C
59
Schneider Electric
35 rue Joseph Monier
92500 Rueil Malmaison
France
+ 33 (0) 1 41 29 70 00
www.schneider-electric.com
As standards, specifications, and design change from time to time,
please ask for confirmation of the information given in this publication.
© 2018 – 2018 Schneider Electric. All rights reserved.
990–2809C
Was this manual useful for you? Yes No
Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Download PDF

advertisement