Icsp Connectivity Security Example - AMX NI-700 Webconsole & Programming Manual

Netlinx integrated controllers firmware version 4.0 or higher
Hide thumbs Also See for NI-700:
Table of Contents

Advertisement

ICSP Connectivity Security Example

If ICSP connectivity is enabled, a valid username and password is required to communicate with the NetLinx Master via an ICSP
connection (TCP/IP, UDP/IP and RS-232). This is used with communication amongst various AMX hardware and software
components.
User Access
LDAP Server Conf iguration
An ICSP user should be configured for a specific Master and
should be set up as a normal user.
Example:
dn: uid=ICSPUser,ou=people,ou=Dallas, dc=example,dc=com
objectClass: inetOrgPerson
objectClass: organizationalPerson
objectClass: person
objectClass: top
cn: ICSP User
sn: User
uid: ICSPUser
userPassword: password
Note: The DN of this user must be added as a member to the
administrator groupOfNames objectClass on the server.
NetLinx Integrated Controllers (Firmware v4)- WebConsole & Programming Guide
Appendix A: LDAP Implementation Details
Master Conf iguration
1) On the System Security Details page, disable LDAP by clearing the LDAP
Enabled checkbox and disable ICSP Connectivity by clearing the ICSP
Connectivity checkbox.
2) Click the User level tab and navigate to the User Security Details page.
3) Create a new user by clicking Add New User.
4) Enter the User name and password as set up on the LDAP server (for
example: ICSPUser and password).
5) Set all Access privileges.
6) Click the Accept button to complete adding the new user.
7) Return to the System Security Details page, and enter the common
name (cn) of the groupOfNames objectClass that contains the
member DN of the ICSP user that was just configured, and enable
ICSP Connectivity, Encrypt ICSP Connection and LDAP by clicking on
the appropriate checkboxes.
Note: If there is a mismatch with the username or password, the AMX
hardware or software component will not be allowed access. If there is a
mismatch with the access privileges, the master will use the privileges
value stored on the server.
110

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents