YOKOGAWA GX10 User Manual
YOKOGAWA GX10 User Manual

YOKOGAWA GX10 User Manual

Smartdac plus, advanced security function /as
Hide thumbs Also See for GX10:
Table of Contents

Advertisement

User's
Manual
Y okogawa Electric Corporation
Model
GX10/GX20/GP10/GP20
Advanced Security Function (/AS)
User's Manual
IM 04L51B01-05EN
5th Edition

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GX10 and is the answer not in the manual?

Questions and answers

Summary of Contents for YOKOGAWA GX10

  • Page 1 User’s Manual Model GX10/GX20/GP10/GP20 Advanced Security Function (/AS) User’s Manual IM 04L51B01-05EN 5th Edition Y okogawa Electric Corporation...
  • Page 3: Introduction

    Please use this manual in conjunction with the standard user’s manual (IM 04L51B01-01EN (GX/GP) Although the display of GX20 is used in this manual, GX10/GP10/GP20 can be operated similarly. To ensure correct use, please read this manual thoroughly before beginning operation.
  • Page 4 • Every effort has been made in the preparation of this manual to ensure the accuracy of its contents. However, should you have any questions or find any errors, please contact your nearest YOKOGAWA dealer. • Copying or reproducing all or any part of the contents of this manual without the permission of YOKOGAWA is strictly prohibited. Trademarks • SMARTDAC+ and SMARTDACPLUS are registered trademark of Yokogawa Electric Corporation. • Microsoft and Windows are registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
  • Page 5: Conventions Used In This Manual

    Conventions Used in This Manual Unit Denotes 1024. Example: 768K (file size) Denotes 1000. Markings Improper handling or use can lead to injury to the user or damage to the instrument. This symbol appears on the instrument to indicate that the user must refer to the user’s manual for special instructions.
  • Page 6: Applicable Recorders

    Refers to the IM 04L51B01-02EN. Multi-batch Function Manual Model GX10/GX20/GP10/GP20/GM10 Multi-batch Function (/BT) User’s Manual Refers to the IM 04L51B01-03EN. Communication Command Manual Model GX10/GX20/GP10/GP20 Paperless Recorder Communication Command User’s Manual Refers to the IM 04L51B01-17EN. Universal Viewer Manual SMARTDAC+ STANDARD Universal Viewer User’s Manual...
  • Page 7: Table Of Contents

    Contents Introduction ..............................i Conventions Used in This Manual ......................iii Applicable Recorders ..........................iv What This Manual Explains ........................iv Revision History............................iv Chapter 1 Explanation of the Advanced Security Function Using the Advanced Security Function ................1-1 1.1.1 Operation Overview .......................1-1 1.1.2 GX/GP Operation Range .......................1-2 1.1.3 PC Software ...........................1-2 1.1.4...
  • Page 8 Contents Signing Display and Event Data ..................2-20 2.4.1 Signing Process ........................2-20 2.4.2 Signing In ..........................2-21 Viewing the Event Log ......................2-24 Chapter 3 Password Management Configuring the Password Management Function .............. 3-1 3.1.1 GX/GP KDC Client Settings ....................3-2 3.1.2 GX/GP Password Management Settings ................3-3 3.1.3 Testing the KDC Server Connection ..................3-3 Using the Password Management Function ..............
  • Page 9: Chapter 1 Explanation Of The Advanced Security Function

    Chapter 1 Explanation of the Advanced Security Function Using the Advanced Security Function This section gives a general overview of how to use the advanced security function. 1.1.1 Operation Overview Configuring Functions First, you need to configure the GX/GP functions. You have to configure the measurement settings and then register GX/GP users.
  • Page 10: Gx/Gp Operation Range

    1.1 Using the Advanced Security Function 1.1.2 GX/GP Operation Range The GX/GP Manages Measured Data in Its Internal Memory • You cannot change the measured data in the GX/GP internal memory. The only way you can delete the measured data is by initializing the internal memory. • From the GX/GP, you can only sign measurement data files in the internal memory. • Measured data in the internal memory can automatically be saved to a file on an external storage medium. During this operation, if a file with the same name exists on the external storage medium, it is overwritten unconditionally.
  • Page 11: Terminology

    1.1 Using the Advanced Security Function 1.1.4 Terminology Administrator section 1.3 A type of user that can be registered on the GX/GP. An administrator has access to all operations. User section 1.3 A type of user that can be registered on the GX/GP. You can limit the range of operations that a user has access to.
  • Page 12: Recording And Saving Data

    Recording and Saving Data This section explains the types of data that a GX/GP with the /AS advanced security option can record and how to save them. 1.2.1 Data Types The types of data that the GX/GP can store to files are listed below. For information about file name extensions, see page 1-14.
  • Page 13: Data Recording And Storage Flowchart

    1.2 Recording and Saving Data 1.2.2 Data Recording and Storage Flowchart Measured data is recorded once to the internal memory and then saved to the external storage medium. Math Communication channel channel channel Data from other devices (through communication interfaces) Display Setting parameters Record Internal memory Screen image Save...
  • Page 14: Display And Event Data Recording Methods

    The measured data is partitioned and saved to files at set intervals. If the internal memory is full or if the number of display data files and event data files exceeds 500 for GX10/GP10 and GX20-1/GP20-1 or 1000 for GX20-2/GP20-2, files are overwritten from the oldest file.
  • Page 15: Manual Sampled Data

    1.2 Recording and Saving Data Recording Conditions of Event Data Item Description Channel type Same as display data. Recording interval Choices are available in the range of 100 ms to 30 min. You cannot choose a recording interval that is shorter than the scan interval. File generation A file is generated when the set data length is reached.
  • Page 16: Directories And File Saving On External Storage Medium

    1.2 Recording and Saving Data 1.2.7 Directories and File Saving on External Storage Medium Types of External Storage Medium • SD memory card (1 GB or more) • USB flash memory (/UH option) SD Memory Card Directory The directories that the GX/GP automatically creates in the SD memory card and the files that it saves are indicated below. Note • Do not place a file named “SET0” in the SD card.
  • Page 17 1.2 Recording and Saving Data Saved Files GX/GPs with the advanced security option create the following types of files. Type Extension Notes Display data file Event data file Setting file See page 1-14 and section 1.5. Manual sampled data file Snapshot data file Report data file (/MT option) xlsx...
  • Page 18: Saving Data To External Storage Medium

    1.2 Recording and Saving Data 1.2.8 Saving Data to External Storage Medium Auto Save The following type of files are automatically saved: display data, event data, manual sampled data, and report data (/MT option). Keep the SD memory card inserted in the drive at all times. The data in the internal memory is automatically saved to the SD memory card.
  • Page 19 1.2 Recording and Saving Data Data Saved to Display and Event Data Files The following data is saved to display and event data files. Contents of the display data and event data files • Header string (see section 1.14.1, “Setting the Save Directory, File Header, and File Name” in the User’s Manual) • Batch information (when the batch function is in use, see section 1.15, “Setting the Batch...
  • Page 20 1.2 Recording and Saving Data Save Operation (Always retain most recent data file/media FIFO) When saving the data files automatically, you can save the data so that the most recent data files are constantly retained in the SD memory card. This method allows you to use the GX/ GP continuously without having to replace the SD memory card.
  • Page 21 1.2 Recording and Saving Data Manual Save (Collectively Storing Unsaved Data) Unsaved data in the internal memory is stored in unit of files to the external storage medium (SD memory card or USB flash memory) when an external storage medium is inserted and a given operation is carried out.
  • Page 22 1.2 Recording and Saving Data File Name You can select what type of file name to use to save measured data to an SD memory card. The following three types are available. Structure Data Type Description Display data Event data 7-digit Date Extension...
  • Page 23 1.2 Recording and Saving Data Saving Data through Touch Operation You can carry out the following data save operations regardless of whether auto save or manual save is used. For operating instructions, see section 2.3.3, “Displaying a List of Data Files in the Internal Memory (Memory summary)”...
  • Page 24: Other Types Of Data That Can Be Stored

    1.2 Recording and Saving Data 1.2.9 Other Types of Data That Can Be Stored Setting Parameters When the Settings Are Changed For a description of the function, see section 1.5. Setting parameters You can save the GX/GP setting parameters to an SD memory card or to USB flash memory (/UH option).
  • Page 25: Login Function

    Login Function You can allow only registered users to use the GX/GP. For the setting procedure, section 2.2. For operating instructions, section 2.3. 1.3.1 Logging In and Out Using Touch Operation You need to enter user identification information (a user name, user ID (when in use), and password) to log in to the GX/GP in the following cases.
  • Page 26: User Levels

    1.3 Login Function 1.3.3 User Levels There are three user levels: Administrator, User, and Monitor user. Number of users that can be registered: 100 User Level Description Administrator Admin An administrator has access to all operations. User User A user cannot access security settings. Nor can a user perform A/D calibration, enable the advanced security function, configure the encryption function or create keys for encryption/certificate, or upload...
  • Page 27 1.3 Login Function Monitor User Administrators register Monitor users. Item Description Login methods Touch operation Users can log in using touch operation. Only monitoring is possible. The user cannot configure or operate the GX/GP except for changing the password. Communication Users can log in through the FTP server or Web application.
  • Page 28 1.3 Login Function Explanation of User Privileges (User Property) • Operations performed using communication commands are also limited. However, operations can always be performed through Modbus communication, regardless of the settings. section 2.2 in the Communication Command Manual • Operations assigned by the event action function are always performed, regardless of the operation-restriction settings. If the event is a “User Function Key,” the operation will be restricted.
  • Page 29: Login Restrictions

    1.3 Login Function 1.3.4 Login Restrictions Logging In with the Same User Name Simultaneous login is possible by the same user from multiple PCs. Logging in Simultaneously Multiple users can simultaneously log in to the GX/GP through touch operation and communication. Serial communication Log in using touch operation Universal Viewer, Web browser, etc.
  • Page 30: Password Management

    Password Management The password management function enables you to manage access to the GX/GP by using the Kerberos v5 authentication protocol. For the setting procedure and operating instructions, see section Chapter 3, “Password Management”. System Configuration The following figure shows the configuration of the authentication system. KDC server Host account (Windows Server 2008/Windows Server 2003...
  • Page 31: Audit Trail Function

    Audit Trail Function The audit trail function records histories of operations. It saves event logs and also setup files when the settings change. You do not need to perform any special settings to use this function. The figure below indicates what items are recorded to the event log (operations and setting changes).
  • Page 32: Event Log

    1.5 Audit Trail Function 1.5.2 Event Log The event log records operations and setting changes on the GX/GP in chronological order. The event log is saved in the measurement data file. For information about the display, see section 2.5. Description: section Appendix 1 Recorded Operations • Operations that affect the measured data, such as record start and message writing, are recorded.
  • Page 33: Event Log And Setting File When Recording Is Not In Progress

    1.5 Audit Trail Function 1.5.4 Event Log and Setting File When Recording Is Not in Progress When you change the settings, the changes are logged in the event log. At the same time, a setting file is saved to the SET0 directory (fixed) on the SD memory card. For information about the display, see section 2.5. Note •...
  • Page 34: Event Log And Setting File When Recording Is In Progress

    1.5 Audit Trail Function 1.5.5 Event Log and Setting File When Recording Is in Progress The setting changes are recorded in the event log. You can configure the GX/GP to automatically write into the measured data a message indicating that the settings have changed. The GX/GP does not save a setting file. For the setting procedure, see section 1.10.4, “Setting Trend Display Conditions,”...
  • Page 35 1.5 Audit Trail Function Writing Change Messages You can configure the GX/GP so that a message is written automatically when any of the following settings are changed during recording. Setup Item Message Alarm On/Off Alarm settings Type Value Hysteresis Logging Output type Output No.
  • Page 36: Set0 Directory Operations

    1.5 Audit Trail Function 1.5.6 SET0 Directory Operations Save Operation (When not using media FIFO) If there is not enough free space on the SD memory card, the GX/GP cannot save the setting parameters in the internal memory to the SD memory card. When this happens, an error occurs, and the setting parameters cannot be changed.
  • Page 37: Signature Function

    Signature Function Signing is the act of attaching the following approval information to a measurement data file. • Pass or fail judgment • Comment • Name of the user who attached the information and time when the information was attached For the setting procedure, see section 2.2. For operating instructions, see section 2.4. 1.6.1 Signable Files Display and event data files (.GSD and .GSE extensions) can be signed.
  • Page 38: Signing From The Gx/Gp

    1.6 Signature function 1.6.3 Signing from the GX/GP From the GX/GP, you can only sign measurement data files in the internal memory. You can sign measurement data files that have been saved to an external storage medium using the standard PC software, Universal Viewer. • You can show display or event data on the signature screen (historical trend screen) and sign it.
  • Page 39: Unique Specifications Of Gx/Gp With Advanced Security

    Unique Specifications of GX/GP with Advanced Security 1.7.1 Functions That Differ from Those of GX/GPs without Advanced Security or GX/GPs Whose Advanced Security Is Disabled The main functions that have not been explained thus far in this manual that differ with the functions of GX/GPs without advanced security or GX/GPs whose advanced security is disabled are explained in the table below.
  • Page 40: Functions That Differ From Those Of The Dx1000/Dx1000N/Dx2000

    1.7 Unique Specifications of GX/GP with Advanced Security 1.7.2 Functions That Differ from Those of the DX1000/DX1000N/DX2000 The main differences between the GX/GP advanced security function and the DX1000/ DX1000N/DX2000 advanced security function are explained in the table below. Item Specification for DXs with Advanced Specification for GX/GPs with Reference Security Advanced Security Setting modes There are two modes: Setting mode, There is no distinctions by modes.
  • Page 41: Advanced Security Limitations

    Advanced Security Limitations If you install the /AS option and enable advanced security, the following limitations are applied to the standard functions. Item When Advanced Security Is When Advanced Security Is Disabled Enabled Number of user registrations Number of event logs 3000 Touch-operation security Off, Login, Operation Lock...
  • Page 42 Blank...
  • Page 43: Chapter 2 Logging In, Logging Out, And Signing

    Chapter 2 Logging In, Logging Out, and Signing Enabling the Advanced Security Function You can enable and disable the advanced security function as you like. If you disable the advanced security function, the functions that you can use on the GX/GP are the same as those of the standard product.
  • Page 44 2.1 Enabling the Advanced Security Function Advanced security function Setup Item Selectable Range or Options Default Value On/Off Off/On On/Off Set this to On to enable the advanced security function. If you change this setting, all data including recorded data will be initialized, and the GX/GP will restart.
  • Page 45: Registering Users And Setting The Signature Method

    Registering Users and Setting the Signature Method Procedure for Configuring the Login and Signature Features for the First Time When the advanced security function is enabled, the GX/GP is configured so that you can operate it without logging in. First, register an administrator. After you register an administrator, a user, or a monitor user, you will have to log in before you can use the GX/ For an explanation of this function, see section 1.3, “Login Function”...
  • Page 46 2.2 Registering Users and Setting the Signature Method Operation without Login Set the operations that users can carry out without being logged in. Options Description Allows only login operation. Allows login operation and switching the operation screen Password management Setup Item Selectable Range or Options Default Value On/Off...
  • Page 47 2.2 Registering Users and Setting the Signature Method Password retry Setup Item Selectable Range or Options Default Value Password retry Off, 3 times, 5 times 3 times Password retry Set a total number of failed password-entry attempts that results in user invalidation. Options Description 3, 5...
  • Page 48: Registering Users

    2.2 Registering Users and Setting the Signature Method 2.2.2 Registering Users Path GX/GP: MENU key > Browse tab > Setting > Setting menu Security settings > User settings Hardware configurator: Security settings > User settings 1 Appears when, in Basic settings, Touch operation or Communication of the security function is set to Login Description Setup Item...
  • Page 49 2.2 Registering Users and Setting the Signature Method User level Set the user level. The user level of User number 1 is fixed to Admin. Options Description Admin The system administrator. An administrator has access to all operations. User A common user. A user cannot access security settings. Nor can a user perform A/D calibration, enable the advanced security function, set encryption, encryption of certificate, or key creation, upload I/O module firmware or measurement mode settings.
  • Page 50: Setting User Properties

    2.2 Registering Users and Setting the Signature Method Authority number Select the authority number to apply restrictions to functions. For details on how to set the user property, see section 2.2.3, “Setting User Properties”. Sign in property Set this to On to restrict the sign in level that a user can use to sign at. Authority of sign in Set the authority of sign in to restrict the signature.
  • Page 51 2.2 Registering Users and Setting the Signature Method Data save Set this to Lock to restrict the data save operations below. Operation Save display data Save event data Manual sample Snapshot Timer reset Match time timer reset Message Set this to Lock to restrict message writing operation. Batch Set this to Lock to restrict the batch operations below.
  • Page 52: Configuring The Sign In Settings

    2.2 Registering Users and Setting the Signature Method External media Set this to Lock to restrict the external media operations below. Operation Save and load files Display a list of files Manually save data Manual save Alarm save Save stop Create certificate signature request Install certificate Install intermediate certificates System operation...
  • Page 53 2.2 Registering Users and Setting the Signature Method Recording stop action Setup Item Selectable Range or Options Default Value Sign in Off/On Sign in Set this to On to display a signature screen (historical trend screen) for signing in when recording is stopped through touch operation or the START/STOP key.
  • Page 54: Setting Signature Restrictions

    2.2 Registering Users and Setting the Signature Method 2.2.5 Setting Signature Restrictions Path GX/GP: MENU key > Browse tab > Setting > Setting menu Security settings > Sign in property Hardware configurator: Security settings > Sign in property 1 Appears when, in Basic settings, Touch operation or Communication of the security function is set to Login Description Setup Item...
  • Page 55: Activating Modules (For Module Swapping)

    2.2 Registering Users and Setting the Signature Method 2.2.7 Activating Modules (for module swapping) If you replace a module with another module (same type) after system reconfiguration, you need to activate the module or else the measured data will result in errors. If the identified module is different from the actual module, you can activate the module from the System information screen.
  • Page 56: Logging In And Out

    Logging In and Out When you log in for the first time, you will be prompted to change the password. For information about the function, see section 1.3, “Login Function”. Login Process MENU key When user ID When user ID is in use is not in use User name/password...
  • Page 57 2.3 Logging In and Out Note • You cannot use the same combination of user ID and password as another user. • Enter the password using 6 to 20 characters, A a # 1 • You cannot use a character string that contains the following characters: SP (space) ' ; DEL (7f) • You cannot specify the same password as the current password. Operation complete When a Password Has Been Set Press MENU. If the GX/GP is configured to use user IDs, a screen for selecting the user name opens. If the GX/GP is configured to not use user IDs, a login screen (for entering the user name and password) appears. Proceed to step 3. Tap a user name. A login screen (for entering the user ID and password) appears. If the GX/GP is configured to use user IDs, set the user ID and password, and tap OK.
  • Page 58 Be sure to manage the passwords to prevent this from happening. If you become unable to log in as an administrator, contact your nearest Yokogawa dealer. Clearing the User-Locked Icon (Only administrators can perform this operation) Log in as an administrator.
  • Page 59 2.3 Logging In and Out Notification When a User Lock Out Condition Occurs E-mail Notification An e-mail notification can be sent when a user lock out condition occurs. The following settings are necessary: • SMTP client settings • E-mail settings For the setting procedure, see section 1.21.3, “Configuring the SMTP Client Function,” and section 1.21.4, “Setting E-mail Transmission Conditions (When the SMTP client function is on),”...
  • Page 60 2.3 Logging In and Out Status Output A signal can be output from a DO channel using the event action function to indicate whether there are users that are logged in. The following settings are necessary: • DO channel range setting • Event action function For the setting procedure, see section 1.6, “Configuring DO Channels (Digital output channels)”...
  • Page 61: Logging Out

    2.3 Logging In and Out Logging in to the Web Application When you access the Web application, a login window appears. Log in by entering the user name and password. Even when password management is enabled, log in by entering the user name and password.
  • Page 62: Signing Display And Event Data

    Signing Display and Event Data You can sign display and event data from the signature screen (historical trend display). You can sign a unit of data when: • You are logged in as a user with signature privileges. • The files are in the internal memory (even if the data is in the internal memory, you cannot sign it unless it has been saved to files). • The data has not already been signed in the same place. • All the data that you want to sign can be displayed. For example, the GX/GP can display up to 1000 alarms. You cannot sign a file that has more than 1000 alarms.
  • Page 63: Signing In

    2.4 Signing Display and Event Data 2.4.2 Signing In Procedure Showing the Signature Screen Press MENU. The menu screen appears. Tap the Browse tab and then Memory summary/Data save. The memory summary appears. Tap the data you want to sign. The memory information screen appears. Tap Go to Sign in.
  • Page 64 2.4 Signing Display and Event Data Signing Data (Attaching approval information) On the signature screen (historical trend screen), perform the procedure below. Press MENU. The menu screen appears. Tap Context and then Go to Sign in. The Select sign in level screen appears. You can also use the shortcut that appears when you tap the screen to switch to the Select sign in level screen.
  • Page 65 2.4 Signing Display and Event Data Viewing Signature Information (Sign In Information) You can view signature information in data files on the Data information screen. You can verify whether the data file loaded into the GX/GP is abnormal (changed by some means). If the file condition is abnormal, an icon indicating this condition appears in the File name line on the Data information screen.
  • Page 66: Viewing The Event Log

    Viewing the Event Log Procedure Press MENU. The menu screen appears. Tap the Browse tab and then Log. The log select screen appears. Tap Event. The event log appears. Tap an entry to display detailed information. Scroll Tap an event item to display detailed information.
  • Page 67: Chapter 3 Password Management

    Chapter 3 Password Management Configuring the Password Management Function Configuration Flowchart To use the password management function, you must configure the KDC server and GX/GP. First configure the KDC server and then the GX/GP. KDC server Configure the KDC server. configuration Time synchronization Synchronize the GX/GP time to the KDC server time. GX/GP Configure the GX/GP KDC client settings.
  • Page 68: Gx/Gp Kdc Client Settings

    3.1 Configuring the Password Management Function 3.1.1 GX/GP KDC Client Settings You need to specify the following GX/GP KDC client settings. For information about the function, see section 1.4, “Password Management” . DNS settings Configure the DNS settings if necessary. See section 1.21.1, “Setting Basic Communication Conditions,” in the User’s Manual. SNTP client settings For the password management function to work, the times on the KDC server and the GX/ GP must be synchronized.
  • Page 69: Gx/Gp Password Management Settings

    3.1 Configuring the Password Management Function Certification key Setup Item Selectable Range or Options Default Value Host principal — Character string (up to 20 characters, A a # 1 Realm name — A a # 1 Character string (up to 64 characters, Password — A a # 1 Character string (up to 20 characters, Encryption type ARC4, AES128, AES256...
  • Page 70 3.1 Configuring the Password Management Function KDC Server Configuration Example This section provides a KDC server configuration example. This example assumes that the KDC server is running on an English version of Windows Server 2008, and Active Directory is enabled. Overview The steps necessary in Active Directory of Windows Server 2008 are creating a host account, changing the properties, mapping the host principal to the host account, and creating a keytab file (can be omitted).
  • Page 71 3.1 Configuring the Password Management Function Type “gx” in the First name, Full name, and User logon name boxes. Type “record-as1” in the Password box. Select the Password never expires check box. Click Finish. IM 04L51B01-05EN...
  • Page 72 3.1 Configuring the Password Management Function Changing the Properties of the Created Host Account Select the following check boxes. Clear all other check boxes. This account supports Kerberos AES 256 bit encryption Password never expires • The Password never expires check box was already selected in step 3, so it is selected in this dialog box. • Clearing all the encryption check boxes is equivalent to selecting RC4. “host” is not included before mapping.
  • Page 73 –ptype KRB5_NT_PRINCIPAL –crypto All –out C:\yokogawa\gx.keytab A file named gx.keytab is created in the C:\yokogawa folder. Creating a User Account in Active Directory and Changing the Properties Create a GX/GP user in Active Directory. Change the user account properties to match those of the host account.
  • Page 74 3.1 Configuring the Password Management Function About Mapping Mapping is the association between the host principal and host account. In the example below, setup item “princ” is associated with setup item “mapuser.” This is done using the ktpass tool. • Open a Command Prompt window, and enter the ktpass command. ktpass Settings Setup Item Windows Server 2003 Windows Server 2008, Example...
  • Page 75 3.1 Configuring the Password Management Function ktpass execution example (Windows Server 2008) This execution example is different from what is shown in “ktpass Settings” on the previous page. GX/GP Configuration Configure the GX/GP as follows. For the configuration procedure, see section 3.1.1, “GX/GP KDC Client Settings” Item Description Host principal Realm name Set the realm name.
  • Page 76: Using The Password Management Function

    Using the Password Management Function 3.2.1 Logging In and Out Logging In Log in by entering the user name and password. Procedure Press MENU. The login screen appears. Enter the user name and password, and then tap OK. You will be logged in. Operation complete Note Even if you enter a password, you may not be able to log in because of a network error or a problem with the settings.
  • Page 77: Error Messages And Corrective Actions

    Error Messages and Corrective Actions Errors That Occur during Authentication Code Message Description and Corrective Action E004 Incorrect input character string. Enter a proper character string. E251 Invalid user name or password. Enter the correct name or password. E252 The login password is incorrect. Check the password. If the password is lost, the password must be initialized by an administrator.
  • Page 78 3.3 Error Messages and Corrective Actions Other Messages Code Message Description and Corrective Action E836 KDC test connection succeeded. — E837 Login may be impossible in incorrect KDC client settings. — 3-12 IM 04L51B01-05EN...
  • Page 79: Appendix 1 Event Log Contents

    Appendix Appendix 1 Event Log Contents Event Log Operation Display Details Error log Error Error### Error code Message ###: Error code A/D calibration operation A/D calibration A/DCalExec Unit/slot Login operations Power off PowerOff Power on PowerOn Login Login Logout Logout User invalidation UserLocked User number Control operations Mode change...
  • Page 80: Appendix 1 Event Log Contents

    Appendix 1 Event Log Contents Operation Display Details (English) Scale image save SaveScale Group number Custom display save SaveCustom Display number Parameter save SaveParameter Certificate save SaveCert All settings save SaveAll Report load LoadReport Report format/report type Scale image load LoadScale Group number Custom display load LoadCustom Display number Parameter load...
  • Page 81 Appendix 1 Event Log Contents Operation Display Details (English) Calibration correction/set point CCModePntSet Channel number change Mode (before and after change) Number of set points (before and after change) Calibration correction value change SetCCValue Channel number Set number (1 to 12) Calibration correction value (before and after change) Output calibration value (before and after change) Save directory change SetDirectory...
  • Page 82 Appendix 1 Event Log Contents Operation property Factor Description OPERATE GX/GP key operation, touch operation (including bar-code) COMMU Operation via communication (including Web) SERIAL Operation via serial communication EXTERNAL Operation from Modbus and the like Only when the user accessing from the PC is invalidated REMOTE Remote control operation ACTION...

This manual is also suitable for:

Gx20Gp10Gp20

Table of Contents

Save PDF