Contents
v
Naming the EMX .............................................................................................................110
Modifying the Network Configuration...............................................................................110
Modifying Network Service Settings................................................................................120
Setting the Date and Time...............................................................................................127
Setting Default Measurement Units.................................................................................131
Configuring the Feature Port ...........................................................................................132
Configuring the Auxiliary Port ..........................................................................................133
Configuring the Serial Port ..............................................................................................135
Setting the Cascading Mode ...........................................................................................136
Specifying the Device Altitude .........................................................................................143
Setting Data Logging .......................................................................................................144
Configuring SMTP Settings .............................................................................................145
Configuring Data Push Settings ......................................................................................147
Checking the Internal Beeper State ................................................................................148
User and Role Management......................................................................................................149
Creating a User Profile ....................................................................................................149
Modifying a User Profile ..................................................................................................152
Deleting a User Profile.....................................................................................................153
Setting Up Your Preferred Measurement Units...............................................................153
Setting Up Roles ........................................................................................................................154
Creating a Role................................................................................................................155
Modifying a Role..............................................................................................................155
Deleting a Role ................................................................................................................156
Access Security Control.............................................................................................................157
Forcing HTTPS Encryption..............................................................................................157
Configuring the Firewall...................................................................................................157
Setting Up User Login Controls .......................................................................................164
Setting Up Role-Based Access Control Rules ................................................................168
Setting Up a TLS Certificate ......................................................................................................172
Certificate Signing Request .............................................................................................173
Creating a Self-Signed Certificate ...................................................................................175
Installing Existing Key and Certificate Files.....................................................................177
Downloading Key and Certificate Files............................................................................177
Setting Up External Authentication ............................................................................................178
Gathering the External Authentication Information..........................................................178
Adding Authentication Servers ........................................................................................180
Sorting the Access Order ................................................................................................184
Testing the Server Connection ........................................................................................184
Editing Authentication Server Settings ............................................................................185
Deleting Authentication Server Settings..........................................................................185
Disabling External Authentication....................................................................................185
Enabling External and Local Authentication Services.....................................................186
Event Rules and Actions............................................................................................................187
Components of an Event Rule.........................................................................................187
Creating an Event Rule ...................................................................................................188
Sample Event Rules ........................................................................................................226
A Note about Infinite Loop ...............................................................................................228
Modifying an Event Rule..................................................................................................229
Modifying an Action .........................................................................................................231
Deleting an Event Rule or Action.....................................................................................231
A Note about Untriggered Rules......................................................................................232
Summary of Contents for EMX2-888
Page 19: ...Chapter 1 Introduction 5 Retrieval of the link local IPv4 address See IPv4 Address on page 72...
Page 71: ...Chapter 4 Connecting External Equipment Optional 57...
Page 148: ...Chapter 6 Using the Web Interface 134 LHX 20 SHX 30 LHX 40 PowerLogic PM710...
Page 526: ...Appendix H RADIUS Configuration Illustration 512 Note If your EMX uses PAP then select PAP...
Page 531: ...Appendix H RADIUS Configuration Illustration 517 14 The new attribute is added Click OK...
Page 532: ...Appendix H RADIUS Configuration Illustration 518 15 Click Next to continue...