Previous page Configuring Communication Settings of a HID Integration Module's Controller  Configuring the dynamic user saving Next page


When an event occurs (for example, a relay changes its state or an invalid access card is read), a message is created and sent to the event log.

To configure a controller's event log, go to the setup panel of the corresponding object and find the Event Logger Task settings parameter group.

To configure the event log:

  1. In the Event log path drop-down list, select the event log's name path and filename (1).
  2. In the Max. number of messages in field, enter the maximum number of messages in the event log (2).
  3. In the Sent to host after number occur fields, enter a number and a time period. When the entered number of messages are accumulated or the entered time period elapses, the messages are sent to the HID server (3).

    Note:

    The event log assigns a numeric ID (between 0 and 255) to each message. For each message, the greater its ID, the higher its priority.
  4. In the Sending delay, sec field, enter a time period (in seconds). After creating a message, the system first waits for this time period to elapse and then sends the message to the event log (4).
  5. To set the time when messages are downloaded to the HID Server, click the Download by time of day button (5).
    The Download by time of day window opens.

    Attention!

    Since there are no default time-of-day boot records, it is necessary to add at least one record before writing the configuration to the controller (see Managing the HID configuration). Otherwise, if no entries are added, and the configuration is written to the controller, then such a controller will start to cyclically reconnect to the HID Server.

    1. Click Add (1), then go to the Time of day (3) column and enter the time when messages are downloaded to the HID Server (in HH:MM:SS format).
    2. Enter as many times of day as needed.

      Note:

      You may enter a maximum of 4 times of day when messages are downloaded to the HID Server.

      Note:

      To delete a time of day, select the relevant row in the table and click Delete (2).
    3. Click Apply to save the changes. This brings you back to the controller's setup panel (4).

      Note:

      To come back to the controller's setup panel without saving the changes, click Cancel (5).
  6. In the Upper alarm limit field, enter the upper alarm limit for the communication channels (6).
  7. In each of the three Lower alarm limit fields (ch1, ch2, and ch3), enter the lower alarm limit for each of the communication channels (7).
  8. If you want to use encryption, select the Use encryption checkbox (8).
  9. In the Delimiter drop-down list, select the delimiter symbol to be used in messages (9).
  10. In the Dateformat drop-down list, select the date format to be used in messages (10).
  11. In the Sending method drop-down list, select the method for sending messages (11).
  12. To set the IP addresses of the servers for sending messages (hosts), click the Host IPs button (12).
    The Host IP addresses window opens.

    1. Click Add (1), go to the Host IP address column, and enter the IP address of a server (3).
    2. Add as many servers as needed.

      Note:

      You may add a maximum of 9 servers.

      Note:

      To delete a server, select the relevant row in the table and click Delete (2).
    3. Click Apply to save the changes. This also brings you back to the controller's setup panel (4).

      Note:

      To come back to the controller's setup panel without saving changes, click Cancel (5).
  13. In the Host port field, enter the HID Server's port (13).
  14. In the Listen port field, enter a port number. This is the port for receiving messages from the HID Server (14).
  15. In the Minutes of inactivity before disconnect, enter a time period (in minutes).When this time period elapses and no events occur, the connection is broken (15).
  16. In the Seconds before retry if connect fails, enter a time period (in seconds). After the connection is lost, the system first waits for this time period to elapse and then tries to reestablish the connection (16).
  17. If you do not want to break the connection when no events occur, select the Do not disconnect in case of inactivity checkbox(17).
  18. Click Apply to save the changes.

The event log is now configured.