22
English
For program decrypt monitoring, it is advisable to enable it from this general menu and, if there are problems,
from those of the single programs (enabled from the input program list menu <
>)
For each monitored parameter, you can enable monitoring, personalise the alarm message text that will be sent
and, for certain parameters, set the function range or the min. and max. tolerance levels.
Important: monitoring can only be enabled for output programs.
NOTE: Click on “Apply” to save the changes.
In the green option bar at the top select “Configuration”-> “Monitoring”->“Log” to open the following screen:
In this screen you can display and search the log for events recorded during monitoring. It gives the event ID, the
related module, the date, time, value, if an alarm is generated or not and the event description.
8. OPERATIONS MENU
8.1 COPY CONFIGURATION
Select the dropdown menu OPERATIONS/COPY CONFIGURATION to access the menu to copy the configuration
between modules.
Fig. 16 shows the menu, select the module to copy from and the one to copy the configuration to.
Fig 16
Fig 15