Alarm Contacts For Monitoring Internal Power, And Software Traps - GarrettCom MAGNUM MAGNUM 6KM Hardware Installation And User's Manual

Magnum 6km series mobile ethernet switch
Table of Contents

Advertisement

Magnum 6KM Mobile Ethernet Switch Installation and User Guide
3.5

Alarm Contacts for monitoring internal power, and Software Traps

The Alarm Contacts feature, standard on Magnum 6KM's, provides two Form
Normally Closed (NC) contacts to which the user can attach two sets of status monitoring
wires at the green terminal block.
The first NC Alarm Contact is a "Software Alarm" (labeled S/W), operated by
user settings in the MNS-6K software. The user can disable the Software Alarm feature
with a software configuration command if desired. When the Software Alarm is enabled,
the Form C Normally Closed (NC) contact is held close during normal software
operation. A user-defined software malfunction, such as an SNMP Trap or a Software
Security violation or an S-Ring Fault, causes the contact to open and thus triggers an
alarm in the user's monitoring system
The second NC Alarm Contact is held closed when there is power on the main
board inside of the Switch. This provides a "Hardware Alarm" (labeled H/W) because
the NC contacts will open when internal power is lost, either from an external power
down condition or by the failure of the power supply inside of the Magnum Switch.
Useful info. about Alarm contacts:
1. There is a four pin M12 (D-key coded) provided next to the Console port.
2. The top two pins (1,2) are software operated
3. The bottom two pins (3,4) are hardware operated
4. These are both NC (normally closed) relays
5. The switch's software operation needs to be enabled and set to get the Alarm traps. For
detailed information about the Software Alarm and software control of SNMP alarm
traps, please reference the Magnum MNS-6K Software User Manual.
The Alarm Contacts are on the front left area (next to the Console port) of the
Magnum 6KM unit (labeled as ALARM).
www GarrettCom com
.
.
Fig 3.5a Alarm Contacts:
(1,2) are software operated
(3,4) are hardware operated
19
07/10

Advertisement

Table of Contents
loading

Table of Contents

Save PDF