Alarm Contacts For Monitoring Internal Power, And Software Traps - GarrettCom magnum 6kl Installation And User Manual

Managed edge switch
Table of Contents

Advertisement

Magnum 6KL Managed Edge Switch Installation and User Guide
3.5
Alarm Contacts for monitoring internal power, and Software
Traps
The Alarm Contacts feature, standard on Magnum 6KL's, provides two Form
C Normally Closed (NC) contacts to which the user can attach two sets of status
monitoring wires at the green terminal block.
The first NC Alarm Contact is a "Software Alarm" (labeled S/W), operated by
user settings in the MNS-6K software. The user can disable the Software Alarm feature
with a software configuration command if desired. When the Software Alarm is enabled,
the Form C Normally Closed (NC) contact is held close during normal software
operation. A user-defined software malfunction, such as an SNMP Trap or a Software
Security violation or an S-Ring Fault, causes the contact to open and thus triggers an
alarm in the user's monitoring system
The second NC Alarm Contact is held closed when there is power on the main
board inside of the Switch. This provides a "Hardware Alarm" (labeled H/W) because
the NC contacts will open when internal power is lost, either from an external power
down condition or by the failure of the power supply inside of the Magnum Switch.
Useful info. about Alarm contacts:
1. There are four terminal blocks (1,2,3,4) provided next to the Console port.
2. The left two pins (1,2) are hardware operated
3. The right two pins (3,4) are software operated
4. These are both NC (normally closed) relays
5. The switch's software operation needs to be enabled and set to get the Alarm traps. For
detailed information about the Software Alarm and software control of SNMP alarm
traps, please reference the Magnum MNS-6K Software User Manual.
The Alarm Contacts are on the front left area (next to the Console port) of the
Magnum 6KL unit and are green in color as shown in the picture.
www GarrettCom com
.
.
Fig 3.5a Alarm Contacts:
(1,2) are hardware operated
(3,4) are software operated
25
11/09

Advertisement

Table of Contents
loading

Table of Contents