30
ICC
Once the IP settings have been saved, another dialog box will open prompting to
reboot the device. Click
Reboot
for the changes to take effect.
Reboot Device
Opens a dialog box which prompts for a password to reboot the device. Enter
the case-sensitive system password (default is “icc”), then click
Reboot
. The
reboot cycle has completed when the displayed status changes from “Rebooting”
to “Ready” (note that this may require 20s or more to complete.) Clicking
Close
will then close the dialog box and cause the discovery utility to automatically
rescan the network.
Refresh List
Causes the discovery utility to rescan the network.
8.3
Timeout Configuration Tab
The gateway can be configured to perform a specific set of actions when network
communications are lost. This allows each address in the database to have its
own unique “fail-safe” condition in the event of network interruption. Support for
this feature varies depending on the protocol: refer to the protocol-specific
section of this manual for further information.
Note that this feature is only used with slave/server protocols. This is not the
same as the timeout value used for master/client protocols. For more information,
refer to section 8.4.
There are two separate elements that comprise the timeout configuration:
•
The timeout time
•
Timeout Object configuration
8.3.1
Timeout Time
The timeout time is the maximum number of milliseconds for a break in network
communications before a timeout will be triggered. This timeout setting is
configured at the protocol level as part of the port configuration, and used by the
protocol drivers themselves to determine abnormal loss-of-communications
conditions and, optionally, trigger a gateway-wide timeout processing event. If it is
not desired to have a certain protocol trigger a timeout processing event, then the
protocol’s timeout time may be set to 0 (the default value) to disable this feature.
Refer to section 8.4 for details.
8.3.2
Timeout Object Configuration
A timeout object is used by the gateway as part of the timeout processing to set
certain addresses of the database to “fail-safe” values. When a timeout event is
triggered by a protocol, the timeout objects are parsed and the configured 8-bit,