page 24 of 11
A TZ Business |
ixp.tz.net
| © 2015
TZ
®
, TZ Centurion
™
, TZ SlideHandle
™
, TZ Radial
™
, TZ SMArt
™
and TZ Sensors
™
are trademarks of TZ Limited. Patents Pending.
TZ Centurion
™
Bridge
TZ Centurion
™
Bridge Model 7130CF Series
8.5.1. SD Backup and Recovery
For quick recovery or information in the event of miss
configuration or hardware reset, the TZ Centurion Bridge
has the ability to backup to and recover from an installed
SD card. To maintain information granularity and allow the
user to save and recover certain information while discarding
other information, the backup and recovery functions
separate data into logical chunks that can be selected for
backup or recovery via provided check boxes. Each check
box is named according to the data type it is associated
with. Selecting a check box and then pressing “Backup
Select to SD” button will result in the selected data being
written in files to the SD card’s “./BACKUP” directory.
Similarly, selecting a check box and pressing the “Recover
Selected from SD” button will result in the system locating
the specific data on the SD card and, if the file exists,
loading the data back into the TZ Centurion Bridge. Further
information on each specific data chunk and associated
backup file is detailed in the following sections.
>
Devices: The “Devices” data includes all the information
found under the “Device Config” main tab. This includes
the following information for each devices: the primary
and secondary names, unlock timeout setting, input
names, input types, input log rates, output names, output
types, serial number, firmware, and batch code. When
checked during a backup function, the resulting file will
be named “TZDev.dat.” When checked during a recovery
function, the system will look for the “TZDev.dat” file
and, if found load the data contained within back into the
onboard device table.
>
RFIDs: The “RFID” data includes all RFIDs stored under
the “Users/RFID” Tab including the RFID number, user
name, and access credentials. When checked during
a backup function the resulting file will be named
“TZRFID.dat”. When checked during a recovery
function, the system will look for the “TZRFID.dat” file
and, if found, will load the data contained within back
into the onboard RFID user table.
>
Network Settings: The “Network Settings” are those
found under the “System/Settings” tab. This includes the
DHCP settings, IP Address, Gateway, Subnet Mask, and
Primary and Secondary DNS. When checked during a
backup function, the resulting file will be named
“TZIP.dat.” When checked during a recovery function,
the system will look for the “TZIP.dat” file and, if found,
will load the data contained within back into the
Network Settings.
>
Bridge & Aux IO: The “Bridge & Aux IO” data includes the
user settable information under the “System/About this
Centurion
™
Bridge” tab, including the Bridge’s Primary
and Secondary names as well as the Temperature
Unit selection. In addition, the Bridge’s Auxiliary I/O
settings are also saved with this checkbox. Auxiliary I/O
information includes the Primary and Secondary Input
and Output names, Input log rates, Input and Output
Types, and the Output Function settings. When checked
during a backup function, the resulting file will be named
“TZBridge.dat.” When checked during a recovery
function, the system will look for the “TZBridge.dat” file
and, if found, will load the data contained within back into
the Bridge’s non-volatile onboard memory.
>
Users: The “User” data includes all the users stored
under the “Users/LOGINS” tab including the Login Name,
Password, Full Name, Web Permission and access
credentials. When checked during a backup function,
the resulting file will be named “TZUsers.dat”. When
checked during a recovery function, the system will look
for the “TZUsers.dat” file and, if found, will load the data
contained within back into the user table.
>
Alarms: The “Alarm” data includes any alarm that
has been setup under the “Alarm Config” Tab. This
information includes the alarm Title, Source, Min and
Max Triggers, Min and Max Reset and alarm Action.
When checked during a backup function, the resulting
file will be named “TZAlarm.dat”. When checked during
a recovery function, the system will look for the
“TZAlarm.dat” file and, if found, will load the saved
alarms back into the Alarms table.
>
SNMP Settings: The “SNMP” data includes all the
information found under the “System/SNMP” tab. This
includes the System Name, System Contact, System
Location, Read Only and Read/Write Community Strings,
Trap Receiver IP Address, and Enable feature settings.
When checked during a backup function the resulting file
will be named “TZSNMP.dat.” When checked during a
recovery function, the system will look for the “TZAlarm.
dat” file and, if found, will load the saved SNMP settings
back found within back into the Bridge’s non-volatile
onboard memory.
8.5.2. Re-boot System
Clicking this button will perform a soft reboot of the system.
All devices and settings of the system are kept and reread
from non-volatile memory when the system re-boots.