Tosibox LOCK500I User Manual

USER MANUAL
TOSIBOX® Lock 100 TOSIBOX TOSIBOX TOSIBOX TOSIBOX
®
Lock 150
®
Lock 200
®
Lock 500
®
Key
1
Version 1.9
TABLE OF CONTENTS
2
1.1 TOSIBOX® Lock intended use 4
1.2 Important notice for wireless operation of TOSIBOX® Lock 5
1.3 Safety and hazards 5
1.1 Utilisation prévue de TOSIBOX® Lock 6
1.2 Avis important concernant le Fonctionnement sans fil du TOSIBOX® Lock 6
1.3 Sécurité et dangers 7
2. Overview to TOSIBOX® Key and Locks 8
2.1 TOSIBOX® Key 6
2.2 TOSIBOX
®
Locks 9
3. Getting started 16
4. TOSIBOX
®
Lock instructions 17
4.1.1 Deploying Lock in “Lock Mode” 17
4.1.2 Deploying Lock in “Client Mode” 18
4.2 Connecting Locks 19
4.3 Updating the Lock Software 19
4.4 USB Modem settings for the Lock 20
4.5 Internal modem settings for Lock 500i 20
4.6 WLAN settings for Lock 100, Lock 150 and Lock 500 20
4.7 Key connection settings for the Lock 20
4.8 Advanced settings for the Lock 21
4.9 Internet connection priorities 21
4.10 PoE 21
4.11 Service Port 21
4.12 Mounting instructions 24
4.13 Input powering options 26
4.14 Lock 500 - Digital In/Out port with 24V DC out 28
4.15 Lock 500 - Software configurable I/O 28
4.16 Lock 500 - Digital I/O SMS alert 30
5. TOSIBOX® Key instructions 30
5.1 Taking Master Key into use 32
5.2 Renaming and using devices 34
5.3 Adding extra Keys 36
5.4 Remote matching of extra Keys 41
5.5 PUK code for the Key 41
6. TOSIBOX® Mobile Client installation 42
6.1 Mobile Client for Android Devices 42
6.2 Mobile Client for iPhones and iPads 47
7. Troubleshooting 52
7. Dépannage 52
8. Maintenance instructions 53
8. Consignes d’entretien 53
9. Technical data 54
10. Limited Warranty 64
11. Legal Notices 65
11. Mentions légales 65
12. Declarations 66
3
®
Congratulations for choosing TOSIBOX
solution! It consists of modular components that offer unlimited expandability and flexibility. All products are compatible with each other as well as internet connection, operator, and device agnostic. The system works both in internal and external networks.
TOSIBOX
TOSIBOX
®
Key is a client used to access the network.
®
Lock is a router with firewall sharing access to devices.
In physical matching, the Key is inserted to the Lock’s USB port. The devices exchange their security certificates (and public keys). This trust relationship is the basis for all communication happening afterwards.
®
TOSIBOX
creates direct VPN tunnel between the physical devices. Only trusted
devices can access the network.
®
TOSIBOX
is globally audited, patented and performs at the highest security levels in the industry. The technology is based on two-factor authentication, automatic security updates and the latest encryption technology.
TECHNICAL SUPPORT
support@tosibox.com
FINLAND
+358 44 744 0065 Business hours: from 8 am till 4 pm Mon – Fri (UTC+2)
GLOBAL
+358 44 738 1778 Business hours: from 8 am till 4 pm Mon – Fri (UTC+2)
TOSIBOX HELPDESK
http://www.tosibox.com/support
HMI
TOSIBOX
Mobile Client
®
VPN tunnel
®
TOSIBOX
Key
®
through Internet
TOSIBOX
Lock
Firewall
PLC
Camera
PC
1. REGULATORY INFORMATION
4
1.1 TOSIBOX® LOCK INTENDED USE
The Lock is used for controlling other devices remotely over the Internet via a VPN connection. To be installed into a DIN rail, inside a cabinet with the controlled devices. Alternatively, the Lock may be standing on its rubber feet on a table or a shelf. The product conformity with the requirements is guaranteed only when using the antennas supplied with the product. The use of other antennas will void the conformity and is not allowed.
Lock 100/150: Office and residential environment
geographical area within a radius of 20 km from the centre of Ny-Ålesund, Svalbard, Norway.
Lock 200: Office, residential and light industrial environment Lock 500: Office, residential and light industrial environment
geographical area within a radius of 20 km from the centre of Ny-Ålesund, Svalbard, Norway.
Norway: Use of this radio equipment (Wi-Fi) is not allowed in the
Norway: Use of this radio equipment (Wi-Fi) is not allowed in the
1.2 IMPORTANT NOTICE FOR WIRELESS OPERATION OF TOSIBOX® LOCK
Because of the nature of wireless communications, transmission and reception of data can never be guaranteed. Data may be delayed, corrupted (i.e., have errors) or be totally lost. Although significant delays or losses of data are rare when wireless devices are used in a normal manner with a well-constructed network, TOSIBOX® Lock with cellular modem should not be used in situations where failure to transmit or receive data could result in damage of any kind to the user or any other party, including but not limited to personal injury, death, or loss of property.
Tosibox Oy and its affiliates accept no responsibility for damages of any kind resulting from delays or errors in data transmitted or received using TOSIBOX of the TOSIBOX® Lock with cellular modem to transmit or receive such data.
®
Lock with cellular modem, or for failure
1.3 SAFETY AND HAZARDS
At least 20 cm separation distance between the antennas and persons must be maintained at all times.
Do not operate your Lock with internal or external cellular modem:
In areas where blasting is in progress
Where explosive atmospheres may be present including refuelling
points, fuel depots, and chemical plants
Near medical equipment, life support equipment, or any equipment
which may be susceptible to any form of radio interference. In such areas, the Lock and the cellular modem MUST BE POWERED OFF. Otherwise, the cellular modem can transmit signals that could interfere with this equipment.
In an aircraft, the Lock and the cellular modem MUST BE POWERED
OFF. Otherwise, the Lock and the cellular modem can transmit signals that could interfere with various onboard systems and may be dangerous to the operation of the aircraft or disrupt the cellular network. Use of a cellular phone in an aircraft is illegal in some jurisdictions. Failure to observe this instruction may lead to suspension or denial of cellular telephone services to the offender, or legal action or both. Some airlines may permit the use of cellular phones while the aircraft is on the ground and the door is open. The Lock and the cellular modem may be used normally at this time.
5
1. INFORMATIONS RÉGLEMENTAIRE
6
1.1 DOMAINE D’APPLICATION DU TOSIBOX® LOCK
Le Lock permet de contrôler des équipements distants à travers Internet en créant une connexion VPN. Il peut être installé sur un rail DIN dans une armoire à côté des équipements à contrôler. Il peut aussi être posé sur ses patins en caoutchouc sur une table ou une étagère. La conformité des caractéristiques de l’équipement est seulement garantie avec l’installation des antennes livrées. L’utilisation d’autre antenne annulera la conformité et n’est pas autorisée.
Lock 100/150 : environnement de bureau et résidentiel
Norvège : l’utilisation radio (Wi-Fi) de cet équipement n’est pas autorisée dans une zone géographique située dans un rayon de
20 km à partir du centre de Ny-Ålesund, Svalbard, Norvège.
Lock 200 : environnement de bureau, résidentiel et industriel léger Lock 500 : environnement de bureau, résidentiel et industriel léger
Norvège : l’utilisation radio (Wi-Fi) de cet équipement n’est pas autorisée dans une zone géographique située dans un rayon de
20 km à partir du centre de Ny-Ålesund, Svalbard, Norvège.
1.2 INFORMATION IMPORTANTE POUR L’UTILISATION DU RÉSEAU SANS FIL DU TOSIBOX® LOCK
En raison de la nature des communications sans fils, les données transmises et reçues ne peuvent être garanties. Les données peuvent être retardées, corrompues (avoir des erreurs) ou être complètement perdues. Bien que les pertes ou les retards de données soient rares lorsque les équipements sont utilisés dans des conditions normales dans des réseaux construits avec les règles de l’art, le TOSIBOX® Lock avec un modem cellulaire ne devrait pas être utilisé dans les cas où les erreurs de transmission ou de réception de données pourraient entrainer des dommages de quelque nature que ce soit pour l’utilisateur ou pour une tierce partie, incluant mais ne limitant pas les blessures physiques, la mort ou la perte de jouissance.
Tosibox Oy et ses filiales ne pourront être tenues pour responsables des dommages de quelque nature que ce soit résultant de retards ou d’erreurs dans les données transmises ou reçues en utilisant un TOSIBOX par l’équipement TOSIBOX® Lock avec modem cellulaire lors de transmission ou réception de ces données.
®
Lock avec modem cellulaire ou des problèmes créés
1.3 SÉCURITÉ ET DANGERS
Une distance minimale de 20 cm entre les antennes et les personnes doit être respectée à tout moment.
N’utilisez pas votre Lock avec un modem cellulaire interne ou externe :
Dans les zones des explosions sont est en cours
Où des atmosphères explosives peuvent être présentes, y compris
des points de ravitaillement en carburant, des dépôts de carburant et des usines chimiques
À proximité d’équipements médicaux, d’équipements de survie, ou
de tout équipement susceptible de subir toute forme d’interférence radio. Dans ces zones, le Lock et le modem cellulaire DOIVENT ÊTRE ÉTEINTS, sous peine d’émission de signaux par le modem cellulaire susceptibles d’interférer avec ces équipements.
Le Lock et le modem cellulaire DOIVENT ÊTRE ÉTEINTS dans un avion.
Le Lock et le modem cellulaire sont susceptibles de transmettre des signaux pouvant brouiller les systèmes de embarqués pouvant nuire au bon fonctionnement de l’appareil ou interférer avec les réseaux radio. L’utilisation d’un téléphone cellulaire dans un avion est illégale dans certaines juridictions. Le non-respect de cette règle peut entraîner la suspension ou le refus des services de téléphonie cellulaire pour le contrevenant, ou des poursuites judiciaires, ou les deux. Certaines compagnies aériennes peuvent autoriser l’utilisation de téléphones cellulaires lorsque l’avion est au sol et que la porte est ouverte. Le Lock et le modem cellulaire peuvent être utilisés normalement à ce moment.
7
2. OVERVIEW TO TOSIBOX® KEY AND LOCKS
2.1 TOSIBOX® KEY
TOSIBOX® Key is an intelligent USB-connected device that contains a secure cryptoprocessor. The Key is used to establish a secure connection to the Lock. All TOSIBOX® Keys and Locks are interoperable.
SUB KEY
An additional Key that has restricted access rights.
BACKUP KEY
A duplicated backup copy of the Key. All matched Keys and Locks are automatically synchronized between the original Key and the Backup Key.
8
Key user interface (installed from the Key device). In the image you can see TOSIBOX® Lock devices which are matched with the TOSIBOX® Key and the network devices connected to each TOSIBOX® Lock.
2.2 TOSIBOX® LOCK
TOSIBOX® Lock is a device that accepts remote connections from matched Keys and creates private and secure access to connected network devices. The network devices that are connected to the Lock´s LAN port are automatically found. The Lock automatically distributes IP addresses for the Keys, Sub Keys and the network devices connected to LAN port(s) of the Lock. The Lock can also control network devices with fixed IP addresses.
Lock settings can be changed via service port, encrypted TOSIBOX VPN connection local network
®
9
Lock 100/150
SUB LOCK
A Sub Lock is a Lock that has been converted to Sub Lock mode. When connecting two Locks to each other, one must be in Sub Lock mode of operation.
Lock 200
Lock 500/500i
LOCK 100/150 CONTENT
TOSIBOX® Lock 100/150
AC Adapter*
10
LOCK 200 CONTENT
TOSIBOX® Lock 200
AC Adapter*
DIN Rail Bracket
Antennas (2)
DC Feed Plug
* AC Adapter model is subject to change according to the market area.
USB Cable
Cable Saddle
Ethernet Cable
* AC Adapter model is subject to change according to the market area.
DC Feed Plug
Rubber Feet
DIN Rail Bracket
11
LOCK 500/500i CONTENT LOCK 500 POWER SOURCE KIT CONTENT
TOSIBOX® Lock 500/500i
(LTE ports only in Lock 500i)
LTE Antennas*
(only Lock 500i)
Ethernet Cable
WiFi Antennas
AC Power Source*
DC Conversion Cable
Digital I/O Connector
*) Antenna model is subject to change according to the market area.
Power Connector
SIM Card Slot Cover
*) AC Adapter model is subject to change according to the market area.
MODEL WIFI LTE POWER KIT WIFI ANT LTE ANT
TBL5iA x x x x TBL5iAPS x x x x x TBL5iB x x x x TBL5iBPS x x x x x TBL5iC x x x x TBL5iCPS x x x x x
AC Plug Adapters
LOCK CONNECTIONS
12
LOCK 100/150
WLAN antenna ports
1. 2. 3. 4. 5. 6. 7. 8.
10. 11. 12. 13. 14. 15.
9.
1. USB Port for matching and USB Modem
2. WAN Port
3. LAN1 Port
4. LAN2 Port
5. LAN3 Port
6. Service port
7. Reset button (not in use)
8. DC Power Input
Led indicators:
9. Power
10. WLAN
11. Service
12. LAN3
13. LAN2
14. LAN1
15. WAN
LOCK 200
13
1. DC Power Input
2. Reset button (not in use)
3. Power led indicator
9.
8.
7.
6.
5.
4.
3.
2.
1.
4. Info led indicator
5. WAN Port
6. Service Port
7. LAN1 Port
8. LAN2 Port
9. LAN3 Port
USB Port for matching and USB Modem
LOCK 500/500i
14
1.
2.
3.
4.
6.
5.
8.
7.
9.
* LAN3 Port can be configured as a Service Port
1. SIM card slot
2. USB Port for matching and USB Modem
3. Reset button for Service Port activation only
4. Digital I/O -Connection
10.
14.
15.
16.
17.
LED indicators:
14. Power
15. Internet
16. WiFi
17. LTE
Ethernet Connections:
11.
6. WAN Port
7. LAN3 Port*
5. LAN2 Port
12.
8. LAN1 Port
9. Power Connection
13.
10. WiFi Antenna Port 1
18.
19.
Ethernet Port Leds:
18. LAN2
20.
21.
19. WAN
20. LAN3
21. LAN1
11. LTE Antenna Port 2 (Lock 500i only)
12. WiFi Antenna Port 2
13. LTE Antenna Port 1 (Lock 500i only)
LOCK USER INTERFACE
15
Status bar shows general information.
Locks and Keys Green: Connected Red: Disconnected
Remotely controlled devices
Green: Connected Red: Disconnected
Details of the remotely controlled devices
Login using “admin” user. Password can be found on the bottom of the Lock
3. GETTING STARTED
THE FIRST DEPLOYMENT
1. Make sure the Lock is powered before
proceeding to matching the Key with the Lock. Insert the Key into the USB port of the Lock. When the LED on the Key turns off, the matching is complete (approximately 10 seconds). Remove the Key from the Lock. You can also match additional Locks to the same Key.
2 - 3. Connect the Lock to your network according to
your use case. Remember to make sure that the Lock has a working internet connection.
4. Connect the Key to your computer and install the
Key software. Follow the section ”Deploying the Key”.
5. Secure TOSIBOX
be used for controlling and monitoring devices remotely.
®
connection is now ready to
1.
3.
5.
16
2.
4.
4. TOSIBOX® LOCK INSTRUCTIONS
17
4.1.1 DEPLOYING LOCK IN “LOCK MODE”
HMI
®
TOSIBOX
Lock
Firewall
TOSIBOX
Mobile
Client
VPN tunnel
®
TOSIBOX
Key
®
through Internet
With its factory default settings, the Lock is connected to the Internet via its WAN port or a USB modem which can be connected to the USB port of the Lock. In this mode, the Lock creates its own protected local network for the connected devices. In this configuration, only devices that are connected to the Lock by cable or via WLAN access point are accessible with the Key.
Note:
See “USB Modem settings for the Lock” (page 18) to connect a USB modem to
the Lock’s USB port.
If the Lock is connected to a DHCP enabled network via any of its LAN ports
(LAN1, LAN2 or LAN3) the Lock’s own LAN functionality can be restored by resolving any DHCP conflicts by removing improper LAN connections to the Lock.
CONNECTING NETWORK DEVICES TO THE LOCK
A) Connecting device(s) that use dynamic IP addresses (DHCP)
Devices with a DHCP client enabled will automatically connect to the Lock. Plug the device(s) into the Lock’s LAN port(s) and go!
B) Connecting device(s) with Fixed IP addresses by configuring
the DEVICE to the LOCK:
PLC
Camera
PC
1. Before connecting device to Lock, connect to device per device manufacturer’s instructions on your PC and assign a new static IP address to device(s) from the Lock’s IP range printed on the bottom label of the Lock. Do not add same IP address. We recommend adding the next IP sequential address ABOVE the IP address on the lock, and so forth for each additional device. (*Note: Lock’s IP and netmask address can also be found in the service port at Network > LAN)
2. Plug the device(s) into the Lock’s LAN port(s) and go!
C) Connecting device(s) with Fixed IP addresses by configuring
the LOCK to the DEVICE:
1. Get the device(s’) IP address(es) and netmask.
2. Connect your PC to the Lock’s service port and log in following the step 1 on page 17 “Updating the Lock software”.
3. Go to Network->LAN and change the IP address in the “IPv4 address” field to the next IP address above the IP address of the device (step 1). Also check that the “IPv4 netmask” field corresponds to the netmask set on the device and change it if necessary.
4. Plug the device(s) into the Lock’s LAN port(s) and go!
5. ADVANCED/ENTERPRISE USERS ONLY: Go to Network>LAN DHCP SERVER and set the “Start” value so that it’s higher than all used static addresses. Set the limit value to a suitable value so that it covers the rest of the unused addresses in the LAN range. For example, the range 192.168.5.50 – 192.168.5.254 contains 205 addresses so the “Start” value would be 50 and the “Limit”value would be 205.
18
4.1.2 DEPLOYING LOCK IN “CLIENT MODE”
Client mode can be used for connecting the Lock to an existing network (e.g. an office network). In this mode, the Lock joins the network like any other device (e.g. a PC) and provides remote users with access to other devices in the same network. The Lock will obtain its address from the DHCP, so the local network needs to have a working DHCP server that allocated IP addresses.
A) Connecting network devices in Client Mode
1. Log into the Lock’s web user interface as admin and open the LAN settings by clicking Network > LAN.
2. Change the LAN interface protocol field to “DHCP Client”. Click the “Switch Protocol” button and click “Save”.
3. Plug in a cable from the local network into one of the Lock’s LAN ports and go!
PC
TOSIBOX
Key
VPN tunnel
®
through Internet
Note:
Do not connect Internet to the Lock’s WAN Port or a USB modem to the USB
port. Doing so will automatically deactivate the Client Mode and revert the Lock’s LAN settings back to factory defaults.
Do no connect the controlled devices to any LAN port.
The Lock will scan the entire LAN network for connected devices and will
grant device access to any user with a matched Key. Please keep this in mind when considering network and information security.
In cases where access rights need to be restricted, switch on MAC/IP
Filtering (under Advanced Settings) or set up the Lock in its factory default configuration.
In this mode, the Lock’s inbuilt firewall does not protect the devices in the
LAN network.
Client Mode is deactivated from the Lock’s web user interface
PC
Server
Router
L A N
PC/Laptop
TOSIBOX
Lock
Printer
®
4.2 CONNECTING LOCKS
With TOSIBOX® Locks one can connect machines in separate places so that the connection between them is permanently and automatically on. One example is a real-time protected connection between home and office. This is made with a Lock/Sub Lock solution (see accompanying image Connecting Locks). To Lock 100 and Lock 150 can be connected to up to 10 Sub Locks, to Lock 200 and Lock 500 can be connected to up to 50 Sub Locks.
First match the Key to all the Locks to be connected as described in section “Instructions for TOSIBOX
CONNECTING LOCKS
1. Insert a matched Key to the USB port of the computer.
2. Choose ”Devices” from the Key user menu and ”Connect Locks” from the drop down menu.
3. Choose the Locks that you want to connect together and choose ”Next”.
4. Choose the Lock that you want to attach the Sub Locks. The other Locks will be changed to Sub Lock operating mode.
5. Confirm the selection > Save > matching is ready.
Note: The connections will come into effect when the Locks have access to the Internet.
The Sub Lock ends of the connection in the picture do not have their own DHCP service. If the connection between the Lock and the Sub Lock is interrupted, the network devices connected with the Sub Lock can no longer connect to the Internet and each other.
®
Key and Lock setup”.
19
Lock
Sub Lock Sub Lock Sub Lock
Sublock Sublock Sublock
4.3 UPDATING THE LOCK SOFTWARE
1. a. Connect the computer to the service port of the Lock with an ethernet cable. First check that you have access to the Internet via the service port. Open an internet browser and type http://172.17.17.17 into the address field to access the Lock user interface. Do not type “www” before the “http://” in the address.
b. Alternatively you can also log in remotely. When the connection between the Key and the Lock is active, double click the Lock symbol in the Key user interface.
2. Log in using “admin” for the user ID. The default admin password is visible on the bottom of the Lock.
20
3. Choose “Settings” > “Software update”. If there is a software update available for the Lock, you can start the update by clicking the “Start software update” button.
4. Wait until the update has been downloaded and installed. Do not interrupt the power of the Lock during the software update process. The update is complete when the software gives a notice “Software updated successfully”.
Automatic software updates are activated as a default setting. You can select the time when the automatic update of the released software is allowed. You can deactivate the automatic software update from the Lock user interface.
Choose “Settings” > “Software update” > uncheck the box “Auto­update enabled”.
4.4 USB MODEM SETTINGS FOR THE LOCK
You can connect the Lock to the Internet with a USB Modem. For information on supported modems go to: http://www.tosibox.com/support.
1. Log in as admin user, select “Network” > “USB Modem”.
2. Either use the Automatic APN setting or fill in the APN and if necessary the PIN field according to the SIM card settings. For APN settings information, please contact your mobile operator.
3. Confirm the selection > Save.
4. Connect a Tosibox supported USB Modem to the USB port of the Lock.
4.5 INTERNAL MODEM SETTINGS FOR LOCK 500I
You can connect the Lock to the Internet with an internal Modem. Before inserting or removing the SIM card(s), disconnect the Lock
power supply.
1. Log in as admin user, select “Network” > “Internal Modem”
2. Either use the Automatic APN setting or fill in the APN and if necessary the PIN field according to the SIM card settings. For APN settings information, please contact your mobile operator.
3. Confirm the selection > Save.
4.6 WLAN SETTINGS FOR LOCK 100, LOCK 150
AND LOCK 500
On Lock 100, Lock 150 and Lock 500 you can configure the WLAN as Client (providing Internet access for the Lock) or as Access Point (providing access to Lock LAN and Internet for wireless devices). For detailed set-up instructions visit http://www.tosibox.com/support.
4.7 KEY CONNECTION SETTINGS FOR THE LOCK
You can change the Key connection type from Layer 3 -routed (default) to Layer 2 -bridged (“Connection type” > “Layer 2-bridged”).
On Layer 2 connections you can allow connections from Lock to Key. Log into the Lock as admin, select “Settings” > “Keys and Locks” > remove selection “Deny access towards client”
For more details on Layer 2 and Layer 3 connections visit http://www.tosibox.com/support.
21
4.8 ADVANCED SETTINGS FOR THE LOCK
On the Advanced settings page you can configure LAN and Internet access restrictions and security related settings.
1. Log in as admin
2. Choose “Settings” > “Advanced settings”
3. Confirm changes > Save
4.9 INTERNET CONNECTION PRIORITIES
Several alternative Internet connections can be used by the Lock:
1. WAN
2. USB modem
3. WLAN (Lock 100, Lock 150 and Lock 500 only)
4. Internal modem (Lock 500i only) One of the available connections can be selected as a main
connection and the other connections can be set as backup connections. In the event that the main connection is interrupted, the connection is automatically shifted to preselected backup connections according to the priority setting (eg. WAN port > USB Modem). The connection is switched back to the main connection once it is available again.
4.10 POE
(LOCK 200 ONLY)
The “PoE out” port supports PoE output, with auto detection feature. This means you can connect laptops and other non-PoE devices without damaging them. The PoE on “PoE out” outputs approximately 2V below input voltage and supports up to 0.58A (So e.g. 24V PSU will provide 22V/0.58A output to the “PoE out” port).
The device accepts powering from the power jack or from the “PoE in” port (passive PoE)
1. DC power jack (5.5mm outside and 2mm inside diameter, female center pin positive) accepts 8-27V DC +/-10%
2. The “PoE in” port accepts passive Power over Ethernet 8-27V DC +/-10%
Under maximum load, the power consumption of this device is 7W.
4.11 SERVICE PORT
On Lock 100, Lock 150 and Lock 200 a dedicated Service Port is available. On Lock 500, LAN3 port can be configured as Service port by pressing the reset button for 3 seconds when there is no cable in LAN3. When completed, the Internet status LED will blink for three seconds. Lock Management Interface can then be accessed by entering http://172.17.17.17 on the address bar of your browser. Assigning the port back to LAN range can be done following the same procedure or by restarting the device.
22
4.12 MOUNTING INSTRUCTIONS
LOCK 100/150 QUICK INSTALLATION TO DIN RAIL
The bottom of the Lock has integrated hooks that allow a quick installation to DIN rail with the LAN/WAN ports facing upwards.
LOCK 100/150 SECURE INSTALLATION TO DIN RAIL
For environment where a more robust installation method is needed or another installation orientation is wanted, the Lock can be installed to DIN rail with the clip and screws included in
Lock 100/150 with DIN rail bracket
the sales package. There are M4 threaded mounting holes on the bottom of the equipment. The screws shall be placed through the bottom sticker which has the hole locations indicated. Use only the screws included in the sales package. Using longer screws pose a risk of damaging the device internal electronics. More versatile installation options to DIN rail, such as angle brackets are available from an authorized TOSIBOX® reseller as an accessory.
LOCK 100/150 WALL MOUNTING
The bottom of the Lock has two keyhole shaped openings that allow the Lock to be installed on the wall with countersunk screws.
LOCK 200 INSTALLATION TO DIN RAIL
The Lock can be installed to DIN rail with the clip and screws included in the sales package. There are M3 threaded mounting holes on three sides of the equipment. For attachment on either of the narrow sides, the screws with length of 10 mm shall be used. For attachment on the bottom of the Lock, the screws with length of 6mm shall be used. The screws shall be placed through the bottom sticker which has the hole locations indicated.
See pictures 1 - 4 for the mounting options.
Loading...
+ 49 hidden pages