Z2 Controller Operations Manual
Interoperability Now
3-1
Z2C Installation and Operation Manual
3
Web-Based Configuration
This section provides instructions on how to log in to the Z2 Controller’s Graphical User
Interface (GUI) and perform initial network configuration. User types and permissions, channel
configurations, and other setup information is addressed in other sections.
The Z2C is standards-compliant and therefore supports standards-compliant web browsers,
including Internet Explorer (must be IE 10 or higher), Edge, Firefox, Chrome, Opera and Safari.
It is always best to use the most current version of any web browser.
Note that due to ongoing upgrades and enhancements, the device’s web pages may not be
identical to those shown in this manual. This should not affect functionality.
3.1
Initial Log In - Set up IP Address and Subnet Mask
As with any device with a static IP address, it will be necessary to set up the Z2 Controller to
operate on the LAN where it is to be deployed. The first step is to log in using
the unit’s factory
default IP address of 192.168.1.200, with a default subnet mask of 255.255.255.0.
Connect the Z2 Controller via Ethernet cable directly to the Ethernet Port of the computer that
will be used to access and configure it. Set the computer to a static IP address of 192.168.1.xxx
(where xxx is a number between 2 and 199) and a subnet mask of 255.255.255.0.
Plug in the unit’s power supply and turn the unit on via its front panel power switch. The Z2
Controller’s front panel LEDs will flash while the unit boots up (approximately 90 seconds).
Follow through to Section 3.3 to get instructions for logging in and changing the network
configuration parameters.
3.2
Log In
Upon browsing to the Z2C’s IP address, the login screen will appear.
The default name and
password are both “su” for superuser with the superuser’s full-capability permission set.
Note: For best security, it is strongly advised to change the default
username and password before putting the unit in service, however it is
not required to continue setup. See Section 4 for instructions about
adding/changing user names and passwords, as well as associating
appropriate permission sets with individual users.
Figure 3-1: System Login