4 | XSERI E S G5 | 21 06026MNAA
8.6 Initial measurement application setup .......................................................................... 62
8.7 Configure communication ........................................................................................... 64
8.7.1 Configure COM1 ........................................................................................... 64
8.7.2 Configure COM2 ........................................................................................... 67
8.7.3 Configure for network communication ............................................................. 68
8.7.4 Enable and configure Ethernet ....................................................................... 68
8.7.5 Enable Wi-Fi ................................................................................................ 69
8.7.6 Enable Bluetooth .......................................................................................... 71
8.8 Commission the device .............................................................................................. 74
8.8.1 Validate the device measurement ................................................................... 74
8.8.2 Place the device in service ............................................................................. 74
8.8.3 Optional volume reset (recommended) ........................................................... 75
9 Configure security (recommended) ................................................................................ 76
9.1 Access points ............................................................................................................ 76
9.2 Communication interfaces .......................................................................................... 76
9.2.1 User-enabled services ................................................................................... 76
9.2.2 Open Transmission Control Protocol (TCP) ports ............................................... 77
9.3 Denial of service (DOS) thresholds rates ...................................................................... 78
9.4 Security guidelines .................................................................................................... 78
9.5 Configure bi-level security with security switch ............................................................. 79
9.6 Configure Role-Based Access Control (RBAC) ................................................................ 81
9.6.1 Default access roles ...................................................................................... 81
9.6.2 Setup and create a new RBAC security control file ............................................ 81
9.6.3 Edit the security file ...................................................................................... 83
9.6.4 Create a new user account ............................................................................ 83
9.6.5 Enable RBAC authentication on communication ports ........................................ 84
9.6.6 Use default RBAC credentials ......................................................................... 85
9.7 Secure the SSH/SFTP service ...................................................................................... 87
9.7.1 Supported SSH/SFTP accounts ....................................................................... 87
9.7.2 SSH/SFTP authentication............................................................................... 87
9.7.3 Update default SSH/SFTP keys ....................................................................... 88
10 Service and maintenance ............................................................................................. 100
10.1 Preserve data and configuration ................................................................................ 100
10.1.1 Collect data ............................................................................................... 100
10.1.2 Save the device configuration ...................................................................... 101
10.2 Change the XSeries
G5
clock ....................................................................................... 105
10.2.1 Backward or forward clock change not crossing an hour boundary .................... 106
10.2.2 Forward clock change crossing an hour boundary ........................................... 106
10.2.3 Backward clock change crossing an hour boundary ......................................... 106
10.3 Remove and replace parts ........................................................................................ 106
10.4 Restart the system .................................................................................................. 106
10.4.1 Restart types overview ............................................................................... 106
10.4.2 Warm restart with onboard RESET button ..................................................... 107
10.4.3 Warm restart from the device loader ............................................................ 108