
L-IP User Manual
121
LOYTEC
Version 6.1
LOYTEC electronics GmbH
Figure 114: An alarm log.
Figure 115: Exporting an alarm log to a CSV-file.
The alarm log can by transferred to another application using Copy & Paste or by export to
a CSV-file (see Figure 115).
9.5.6 Node List Config
The node list is used for node monitoring (see Section 9.2.3). It must contain all the nodes,
which should be monitored by the L-IP Redundant. If bus loop monitoring is used the order
of the nodes in the list should represent the order of the nodes along the bus to be able to
detect the point of fracture in case of a cable break: The node with index 1 must be the node
closest to loop port 1 while the last node in the list must be the node closest to loop port 2.