Standalone Configuration Mode - Johnson Controls Tyco 8200-1466-01 Quick Start Manual

Ip-acm ethernet door module
Table of Contents

Advertisement

Standalone configuration mode

To configure the IP-ACM v2 in Standalone mode, complete the following steps:
1. If there is no DHCP network, or the installer prefers configuring the IP-ACM v2 before putting it on the network,
switch SW1-1 to ON.
2. Apply power using the PoE (J1) or the local power port.
3. Perform a factory reset, see
4. The IP-ACM starts with a static IP address of: 192.168.1.111. Connect a laptop or PC, statically configured in the
192.168.1.0/24 subnet, directly to the IP-ACM v2 with an Ethernet cable.
5. Open a web browser and enter the IP address: https://192.168.1.111.
• There is limited access to the IP-ACM v2 Configuration/Status web page on a system with Windows 8 or Windows 10 operating
NOTE
system using Internet Explorer 11 or Edge browser on IPv4 and IPv6.
• Internet Explorer 9 does not display content correctly for the IP-ACM v2 web page.
• If using Internet Explorer and you receive a Certificate Error indicating "There is a problem with this website's security certificate",
click Continue to this website (not recommended).
• If using Goggle Chrome and you receive an error indicating "Your connection is not private", click ADVANCED and then click
Proceed to x.x.x.x (unsafe).
6. Enter the password: iSTAR, and then click Login.
7. Make edits that you require to the following fields on the IP-ACM web page: IP-Type, Alloc Type, IP-ACM Addr,
IP-ACM NetMask, IP-ACM Gateway, IP-ACM DNS, and iSTAR IP Addr.
8. Click Save.
Ensure you click Logout on the IP-ACM Configuration/Status Web Page instead of exiting the browser through the X in the upper-
NOTE
right corner so you can access this web page when you want to. If you close IP-ACM Configuration/Status Web Page from the X in the
upper-right corner and then re-open a new web page to the same URL, a message appears stating that the IP-ACM session is
currently locked by the IP Address of the machine where you closed the web page. The locked session times out after being idle for
five minutes. You can then try accessing the URL again.
9. Switch SW1-1 to OFF.
10. Reboot the IP-ACM v2 before putting the module back on the network.
• Saved changes do not take effect until the board is rebooted.
NOTE
• When you initially configure the IP-ACM v2 using the iSTAR Configuration Utility (ICU), you can only use one IP address of the
Ultra GCM board for configuration. The GCM board has two Ethernet connections, so if the GCM switches to a different IP
address from the initial configuration, communication from the IP-ACM v2 to the GCM board is lost.
802.1X port-based authentication configuration
802.1X is a port-based authentication. Credentials, such as user name and password or digital certificate, are
forwarded to the authenticator. The authenticator then forwards the credentials to the authentication server for
verification. If the authentication server determines the credentials are valid, access resources located on the protected
side of the network are allowed.
■ 802.1X is supported on IP-ACM v2.
■ 802.1X is disabled by default.
■ EAP-TLS authentication and EAP-PEAP authentication with MSCHAPv2, MD5, or GTC are supported.
■ Factory reset clears the 802.1X configuration and sets 802.1X back to disabled.
14
Factory reset
on
Page
10, while SW1-1 is in the ON position.

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents