ADDER ePower Switch 1 Guard Manual
Here you can view all the pages of manual ADDER ePower Switch 1 Guard Manual. The ADDER manuals for Extender are available online for free. You can easily download all the documents as PDF.
Page 31
30 Shutdown Outputs In this field, choose the output which will be used to trigger the Shutdown. - To select an output, select the output you want to add in the left field and click on the Arrow button, the output will then appear in the right field. - To remove the selected output, select this output in the right field and click on the Arrow button, the output will then appear in the left field. Device In this Drop-Down list, choose the device of which the power outlet will be used to...
Page 32
31 3.3.10. Misc / Control Panel This page is very helpful for the administrator because it gives a complete overview. At a glance, the administrator can check the status of the power outlet.
Page 33
32 3.3.11. Misc / Rule Panel This page shows all the rules the administrator has created and activated. The rules which have been executed can also be highlighted in different colours according to the emergency of the action. The highlight colours can be customized during the creation of the rule (Settings/Rules Page). For supervision purpose, the administrator can create special accounts which display only some specific rules. In the example below, the user Bill has the possibility to...
Page 34
33 3.3.12. Misc / Log The log file keeps a running log of events and activities occurring on the device. The logs are automatically cleared when the device is rebooted. The file will display 10 recent logs.
Page 35
34 3.3.13. Misc / Log Settings This page allows you to configure the logs. The Log file is used by the system to record actions, warnings, errors and problems. It is often quite useful to discover the causes of tricky problems. The messages recorded in the log file and sent as copy to a Syslog server are classified into 8 severity levels (Emergency, Alert, Critical, Error, Warning, Notice, Informational and Debug). Primary Syslog Server: Server Address and enter the address of the Syslog...
Page 36
35 4. POWER OUTLET CONTROL 4.1. via the Internet using a standard browser 1. Start your Web browser and type the IP address of your ePowerSwitch 1GR2. The browser displays the authentication dialog box. 2. Enter a user name and its corresponding password. The status of the ePowerSwitch 1G R2 is displayed. 3. In the drop-down list, choose the power control unit you want to control or the rule for which you want to know the status. The ON button allows you to switch ON the power...
Page 37
36 4.1. through the network using simple commands in your own program Developers who want to implement the power outlet control in own programs can access to a special page named hidden.htm and control individually the power outlets using simple commands. To configure the Hidden Page Account, go to Settings / Accounts. - To activate or deactivate this account, check or uncheck the corresponding checkbox. - To modify the Hidden page account, click on Edit next to the corresponding...
Page 38
37 Device In this drop-down list, choose the device from which one you want to add Inputs or Outputs to the current account. - Only properly connected devices or devices which already have been connected to the Power Switch appears in this field. - Each peripheral is clearly identified by its own ID followed by the name given during the configuration. Behind the ID can appear a character between brackets which has following meaning: - ! means that the corresponding device is properly connected...
Page 39
38 The first command must be preceded by a ? Commands can be concatenated using the character & Commands can be specified in upper case, lower case or mixed case Example: if you want to switch to OFF the Power Outlet #1, type in: http://192.168.100.201/hidden.htm?M0:O1=OFF Your Web browser will now display: Hidden Page 21 Dec 2010 02:42:08 Version: 2.1.0.0 M0:O1 LOff
Page 40
39 5. APPENDIX 5.1. Ping and Scan Methods ePowerSwitch 1GR2 has two methods to check whether an IP equipment (PC, server, router, Webcam...) is still alive: Address Pinging: The first method uses the well-known Ping command whereby a request is sent to a specific IP address. The Ping command, which is an echo request, enables you to determine through an ICMP protocol (Internet Control Message Protocol) if an IP device is available on the network. If the system reacts to this request,...