EasyManua.ls Logo

Distech Controls ECLYPSE ECY-STAT - CHAPTER 3 IPv4 Communication Fundamentals; Network Configuration Methods

Distech Controls ECLYPSE ECY-STAT
124 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Table of Contents
5ECLYPSE Connected Thermostat (ECY-STAT)
CHAPTER 8
ECLYPSE Web Interface ............................................................................................................................... 42
Overview ................................................................................................................................................ 42
Web Interface Main Menu........................................................................................................... 43
Home Page ................................................................................................................................. 43
User Profile and Login Credentials ............................................................................................. 43
Network Settings .................................................................................................................................... 45
Ethernet ...................................................................................................................................... 45
Wireless Configuration................................................................................................................ 46
Network Diagnostics ................................................................................................................... 48
BACnet Settings..................................................................................................................................... 50
General .......................................................................................................................................50
Network IP Port........................................................................................................................... 51
User Management.................................................................................................................................. 52
Server/Client User Configuration ................................................................................................ 52
Password Policy.......................................................................................................................... 56
Radius Server/Client Settings ................................................................................................................ 57
RADIUS Server Settings............................................................................................................. 57
RADIUS Client Settings .............................................................................................................. 58
Single Sign On (SSO) Settings .............................................................................................................. 60
SSO Server Settings................................................................................................................... 61
SSO Client Settings ....................................................................................................................62
Setting Up the SSO Functionality ............................................................................................... 63
Setting Up the SSO Functionality through a Radius Server ....................................................... 67
Certificate Authentication with SSO ............................................................................................ 70
System Settings ..................................................................................................................................... 71
Device Information ...................................................................................................................... 71
Updating the Firmware................................................................................................................ 72
Export Audit Log ......................................................................................................................... 72
Extensions .................................................................................................................................. 73
Location and Time ...................................................................................................................... 75
Web Server Access ....................................................................................................................76
Licenses...................................................................................................................................... 80
Backup and Restore ................................................................................................................... 81
IoT .......................................................................................................................................................... 87
IoT Configuration ........................................................................................................................ 87
BLE Room Devices ................................................................................................................................ 90
BLE Room Devices..................................................................................................................... 90
CHAPTER 9
Configuring the ECLYPSE Wi-Fi Wireless Networks ..................................................................................... 93
Setting up a Wi-Fi Hotspot Wireless Network ........................................................................................ 93
Setting up a Wi-Fi Access Point Wireless Network................................................................................ 94
Setting up a Wi-Fi Client Wireless Network ...........................................................................................96
CHAPTER 10
Securing an ECY-STAT ................................................................................................................................. 98
Introduction ............................................................................................................................................98

Table of Contents

Related product manuals