![Ross NK RCP-NKM User Manual Download Page 32](http://html1.mh-extra.com/html/ross/nk-rcp-nkm/nk-rcp-nkm_user-manual_1488797032.webp)
4–14 • Setting Up the RCP-NKM
RCP-NKM User Guide (v3.0)
Each key acknowledges that it has been pressed by flashing briefly.
4.
Press the
Macro
<
n
> key again to end the recording process.
The existing macro is overwritten with the new macro.
Configuring a Macro
Macros can be configured in DashBoard using the Macro Events tab.
To configure a macro using the Macro Events tab
1.
Assign a macro to a key (see “
2.
Select the
Macro Events
tab.
3.
In the
Num. Rows.
box of the macro, enter or select the number of events to be assigned.
4.
Click
Update
to add the events to the
Event
column of the macro.
5.
In the
Function
column, use the list to select the function to perform for the event. The options are as follows:
•
Switch
— performs a standard crosspoint switch.
•
Macro
— performs a macro within the executed macro.
•
Protect
— creates a protect condition on the destination of the selected crosspoint (see “
6.
In the
Output
column, perform the following:
a.
Double-click the
Output
box.
b.
Enter a destination for the event.
c.
Press
Enter
.
7.
In the
Input
column, perform the following:
a.
Double-click the
Input
box.
b.
Enter a source for the event.
c.
Press
Enter
.
8.
In the
Level Mask
column, select the level mask or masks for the device affected by the macro.
Each function can occur on any available level, independent of any other function within the same macro
event.
9.
Repeat Steps 5 to 8 for any remaining events of the macro.
10.
Send the current document to the device by clicking
Send Configuration
located on the lower Device
Configuration window (see “
Sending a Document to a Device
Assigning a Protect Key
To prevent switching of critical crosspoints by others, assign a protect key for use on the RCP-NKM. The protect
function ensures that the selected destination can only receive the selected source across the selected levels. Once
protected, the selected levels on a destination cannot be switched by other remote control panels (or by the same
remote control panel if
Block All Panels
is selected). The source is not protected, and can be freely routed to other
destinations if required. You can protect any number of destinations. For more information see “
You can also use the protect key to lock the RCP-NKM against all key presses (see “
Assigning a Protect Key
Protect keys can be assigned using DashBoard.
Summary of Contents for NK RCP-NKM
Page 1: ...RCP NKM User Guide...
Page 6: ......
Page 10: ...1 2 Introduction RCP NKM User Guide v3 0...
Page 14: ...2 4 RCP NKM Overview RCP NKM User Guide v3 0...
Page 54: ...6 2 Troubleshooting RCP NKM User Guide v3 0...
Page 56: ...7 2 Hexadecimal to Router Level Conversion RCP NKM User Guide v3 0...