CONTENTS
SAFETY INSTRUCTIONS: To be read before use!...................................................................................... 4
1. DESCRIPTION.......................................................................................................................................... 5
1.1 Diagram............................................................................................................................................... 5
1.2 Package list......................................................................................................................................... 6
2. INSTALLATION......................................................................................................................................... 7
3. CONFIGURATION .................................................................................................................................... 8
3.1. Configuration through the LAN using the Finder program ................................................................. 8
3.2. Configuration through an RS232 Terminal connection.................................................................... 10
3.2.1. Serial port configuration ......................................................................................................... 10
3.2.2. Restore to default factory settings.......................................................................................... 11
3.2.3. Restore to default administrator password ............................................................................ 11
3.3. Configuration through the LAN using a standard Browser............................................................... 12
3.3.1. General / IP configuration ...................................................................................................... 13
3.3.2. General / System time............................................................................................................ 14
3.3.3. General / SNMP..................................................................................................................... 15
3.3.4. General / Tools....................................................................................................................... 16
3.3.5. Settings / Accounts................................................................................................................. 17
3.3.5.1 Settings / Accounts.................................................................................................... 17
3.3.5.2 Settings / Accounts / Hidden Page account............................................................... 19
3.3.6. Settings / Groups N/A............................................................................................................. 21
3.3.7. Settings / Peripherals N/A...................................................................................................... 21
3.3.8. Settings / Rules...................................................................................................................... 23
3.3.8.1. Settings / Rules - Schedule Rule.............................................................................. 25
3.3.8.2. Settings / Rules - Timer Rule.................................................................................... 27
3.3.8.3. Settings / Rules - Ping Monitoring Rule.................................................................... 29
3.3.8.4. Settings / Rules - Scan Monitoring Rule................................................................... 31
3.3.9. Settings / Shutdowns.............................................................................................................. 33
3.3.10. Misc / Control Panel............................................................................................................. 35
3.3.11. Misc / Rule Panel ................................................................................................................. 36
3.3.12. Misc / Log............................................................................................................................. 37
3.3.13. Misc / Log Settings............................................................................................................... 38
4. POWER OUTLET CONTROL................................................................................................................. 39
4.1. via the Internet using a standard browser........................................................................................ 39
4.2. through a serial connection.............................................................................................................. 40
4.2. through the network using simple commands in your own program................................................ 41
5. APPENDIX............................................................................................................................................... 44
5.1. Ping and Scan Methods ................................................................................................................... 44
5.2. Technical Data.................................................................................................................................. 45
5.3. Commonly used Ports...................................................................................................................... 45
5.4. Syslog Messages: Severity Level Definitions................................................................................... 46
STATEMENT OF CONFORMITY................................................................................................................ 47
3