I N S T A L L A T I O N
©Vantage, 11/6/2014 / IS-0602-A InFusion Controller II — MODEL: IC-36-II & IC-24-II page 5 of 7
New Controller Firmware/Design Center 3.3 Features
Design Center 3.3 is compatible with IC-1 and IC-II controllers.
Many of the new 3.3 features are available in both versions of
the InFusion Controller.
New Features
• Security
• Backup and Restore
• Enhanced Email Support
• Remote Location Firmware Updater – IC-II only
SECURITY
Security Levels and Users Table
Security
Levels
Level Requirements For Groups
dmin User
None
• No credentials required from
any connection
• No credentials required
from any connection
Remote
• Credentials required for all
remote connections
including Design Center
• Credentials required for all
remote connections using
Host Commands
• Connections from Design
Center; not allowed
Local
• Credentials required for all
local or remote connections
including Design Center
• Credentials required for all
local or remote connections
using Host Commands
• Connections from Design
Center; not allowed
Setting Up Controller/Project Security
1. By default project security will
be OFF when a new project is
started.
2. To turn on project security in a
new or existing project, click
on Settings and select Project
Security. The Project Security
Dialog opens.
3. Initially the Security Level is set to None and no Users and
Devices exist. If the security level is changed to Local or
Remote, at least one Admin user must be added before
exiting the dialog box.
4. To create a user press
Add User. The Add New
User dialog box opens.
5. Enter a Username and
Password and select
Admin or User to assign a
group.
6. Press Add to add the
new user.
a. Admin, have all
permissions selected
by default. Admin is
required by Design Center with security enabled.
b. Users, cannot connect to the controller from Design
Center. Users only have Read State and Write State
permissions using Host Commands.
i. Custom permissions may be selected for either
group member type.
7. The Remote security level requires proper credentials for
any remote connection.
8. The Local security level requires proper credentials for
local or remote connections – highest security level.
9. The security setting is sent to the controller when
programming or updating the system.
10. All security settings are saved with the project.
Exceptions to Security
1. IP Address Exception List
a. If a third party device is not capable of sending a
username/password, the IP Address of that device
can be entered into the exception list. This excludes
the device at that IP Address from security settings.
2. Serial Port Exception
a. If a third party device connected to a serial port is
unable to send a username/password, check the
Exclude from Security checkbox in Object Editor.
This excludes the device from the security settings.