Remote Alarm Manager OM
Remote Alarm Manager OM
Operating Manual
Copyright Notice
We at Schneider Electric have tried to make the information contained in this
document as accurate and reliable as possible. Nevertheless, Schneider Electric
disclaims any warranty of any kind, whether express or implied, as to any matter
whatsoever relating to this document, including without limitation the
merchantability or fitness for any particular purpose. Schneider Electric will, from
time to time, revise the product(s) described in this document and reserves the
right to make such changes without obligation to notify the purchaser. In no event
shall Schneider Electric be liable for any indirect, special, incidental or
consequential damages arising out of purchase or use of this document or the
information contained herein.
Do not use the product(s) for any other purposes than those indicated in this
document.
Only licensed users of the product(s) and the document(s) are permitted to use this document or any
information therein. Distribution, disclosure, copying, storing or use of the product(s), information or
illustrations in this document on the part of non-licensed users, in electronic or mechanical form, as a
recording or by other means, including but not limited to, photography or information storage and retrieval
systems, without the express written permission of Schneider Electric, will be regarded as a violation of
copyright laws and is strictly prohibited.
Contents
INTRODUCTION
1 About this Manual. . . . . . . . . . . . . . . . . . . . . . . . . 7
1.1 Structure . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.2 Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . 8
1.3 Acrobat (PDF) Conventions. . . . . . . . . . . . . 8
1.4 Typographic Conventions . . . . . . . . . . . . . . 8
1.5 Terminology. . . . . . . . . . . . . . . . . . . . . . . . 10
2 About the Remote Alarm Manager . . . . . . . . . . . 13
2.1 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
2.2 Summary of Key Features . . . . . . . . . . . . . 15
2.2.1 Alarms . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2.2 Intelligent Routing . . . . . . . . . . . . . . . . . . . 15
2.2.3 Acceptance . . . . . . . . . . . . . . . . . . . . . . . . . 15
2.2.4 Acknowledgement . . . . . . . . . . . . . . . . . . . 16
2.2.5 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.2.6 History . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
2.3 System Examples . . . . . . . . . . . . . . . . . . . . 17
2.4 How the Remote Alarm Manager Works . 19
OPERATING
3 Starting the Console . . . . . . . . . . . . . . . . . . . . . . 25
3.1 Starting the Console . . . . . . . . . . . . . . . . . . 25
3.2 Starting the engine service . . . . . . . . . . . . . 26
4 The Console Interface . . . . . . . . . . . . . . . . . . . . . 29
4.1 The Active Alarms Tab . . . . . . . . . . . . . . . 29
4.2 The Runtime Tab . . . . . . . . . . . . . . . . . . . . 31
4.3 The Configuration Tab. . . . . . . . . . . . . . . . 32
4.4 The File Menu . . . . . . . . . . . . . . . . . . . . . . 33
4.5 The Edit Menu . . . . . . . . . . . . . . . . . . . . . . 34
4.6 The Help Menu . . . . . . . . . . . . . . . . . . . . . 34
4.7 Alarm Banners . . . . . . . . . . . . . . . . . . . . . . 34
4.8 The Monitor . . . . . . . . . . . . . . . . . . . . . . . . 34
4.9 The Information Banner. . . . . . . . . . . . . . . 35
Note
We are continuously improving our documentation. This manual
may have been updated.
Please check http://extranet.tac.com for the latest version.
After reading this manual, you should understand how to use the soft-
ware to operate a Remote Alarm Manager Interface.
1.1 Structure
The manual is divided into the following parts:
• Introduction
The Introduction section contains information on how this man-
ual is structured and how it should be used to find information
in the most efficient way.
• Operating
The Operating section contains step-by-step descriptions of
how to carry out different tasks for day-to-day operation.
• Administering
The Administering section contains step-by-step descriptions of
tasks which are less frequent than day-to-day operation tasks.
1.2 Prerequisites
To be able to benefit from the contents in this manual, it is recom-
mended that you are familiar with your BMS(s) and that you read the
Remote Alarm Manager Engineering Manual.
! Warning
• Alerts you that failure to take, or avoid, a specific action
might result in physical harm to you or to the hardware.
Caution
• Alerts you to possible data loss, breaches of security, or
other more serious problems.
Important
• Alerts you to supplementary information that is essential to
the completion of a task.
Note
• Alerts you to supplementary information.
Tip
• Alerts you to supplementary information that is not essential
to the completion of the task at hand.
Advanced
• Alerts you that the following information applies to complex
tasks or tasks restricted by access.
1.5 Terminology
Term Description
CD Compact Disk
ID Identification
MB Mega Bytes
PC Personal Computer
Term Description
Note
This manual, together with the Remote Alarm Manager
Engineering Manual and the Remote Alarm Manager
Advanced Scripting Guide, is available as a PDF file in the
C:\Program Files\Schneider Electric\Binary\Remote
Alarm Manager\Manuals folder after installation, also via
the Start - All Programs - Schneider Electric - Remote
Alarm Manager menu option.
DNN
Alarms
DNN
UNC532
UNCx96
The Remote
Alarm Manager sends
alarm messages to Fax
2.2.3 Acceptance
Acceptance applies to messages (or more correctly alarm messages)
which the Remote Alarm Manager sends to recipients.
The acceptance process determines whether a message is repeated to
the same recipient or sent (perhaps again) to other recipients. Accep-
tance is made via SMS text, WAP-enabled mobile phones, Web
2.2.4 Acknowledgement
Acknowledgments generally apply to alarms as they arrive at the
Remote Alarm Manager. Acknowledgements made in the BMS are
passed through and shown in the ‘Active Alarms’ area of the Console
(subject to any filtering in the BMS Interface). Acknowledgement of
alarms in the Remote Alarm Manager is achieved in the Active
Alarms area of the Console or the Active Alarms section of the Web
page or WAP mobile phone interface.
Acknowledgements made in the Remote Alarm Manager can be
passed back to MicroNet View provided there is a "user association",
and with limitations, to TAC Vista.
An alarm being acknowledged can:
• Stop transmission of further alarm messages.
• Generate a message informing of the acknowledgement.
An alarm being cleared can:
• Stop transmission of further alarm messages.
• Send an alarm clear message.
2.2.5 Security
Access to the Remote Alarm Manager Console is available only to
identified users.
User privileges specify the actions users can perform.
2.2.6 History
All Remote Alarm Manager events, including configuration changes,
are logged.
History can be easily browsed using a navigation tree and is accessible
from the Console.
PSTN
BMS Modem
Fax
Remote Alarm
Manager
SMS
GSM Modem
SMS
GSM Network
Fax
PSTN
TAP Service
BMS Modem
Software
Remote Alarm Modem
Manager
GSM Modem
GSM Modem
Internet
GSM Network
WAP
WAP Gateway
SMS
WEB Browser WAP
SMS
WEB Browser
Note
The response of the Remote Alarm Manager to Busy or Refuse
varies according to configuration. The previous paragraph
describes general behaviour.
3 If you are not prompted to log on, MicroNet View user access
control may be being used (see Page 66), or your Windows
login username may cause an automatic logon to the Remote
Alarm Manager (see Page 38 for details of how to set up auto-
matic logon).
When you have logged in, the Console is displayed, as shown next.
The Console contains three tabs:
• Active Alarms
• Runtime
• Configuration (only displayed if the level of access rights is set
to ‘Administrator’.
These tabs are explained in the next chapter.
Note that the name of the current user (in this case the Administrator)
is displayed in the bottom right hand side of the Console.
1 Click Close.
2 At the node (PC) where the Engine is located, Select Start - All
Programs - Schneider Electric - Remote Alarm Manager -
Computer Configuration. The Remote Alarm Manager
Computer Configuration Wizard will be displayed:
4 Click Yes. The services will be re-started and you can now start
the console as described at the beginning of this chapter.
Note
In normal operating mode, the Engine is started when the the PC is
started. Refer to Chapter 3 of the Remote Alarm Manager Engi-
neering Guide.
The left hand pane displays the alarm groups. The right hand pane dis-
plays any alarms in a given group (scroll across to see acknowledge-
ment details). The following groups are at the top level:
• The Remote Alarm Manager group, which contains any sys-
tem alarms, such as those generated if an interface stops.
Note
There can be more than one source (BMS) interface; each will
have its own structure. The number of columns in the right hand
pane is also determined by the source BMS.
Green bell – Alarm has cleared, but has not yet been
acknowledged.
Yellow bell – Alarm does not require acknowledgement.
Note
If the text in the right hand pane is blue (when not highlighted,
there is an associated Active Action.
If the text is ‘greyed out’ (both panes), there is a fault associated
with the interface.
The right hand pane contains detailed data relating to the selected
option in the left hand pane.
The options on the Configuration tab enable you to change the config-
uration settings. Although the Remote Alarm Manager should have
been configured at the time of installation, it is likely that end users
will need to modify the system configuration from time to time.
Table 4.1 lists typical configuration tasks that should be carried out by
end users, and provides a cross reference for further information.
5 Common Console
Operations
The following are common end user operating procedures for a fully
configured and operational Remote Alarm Manager:
• Setting up Automatic Logon
• Modifying Active Actions
• Acknowledging Active Alarms
• Suppressing Alarm Actions
• Setting Up Duty Exceptions
• Reviewing ‘On Duty’ Alarm Actions
• Displaying Alarm Banners.
These procedures may take place at the Remote Alarm Manager con-
sole on a day-to-day basis. Other less common end user procedures i.e.
user and recipient management and the modification of duty rosters
are covered in the Administering part of this manual (see Section 7,
“User and Recipient Management”).
Other less common procedures e.g, printer replacement, change of
interface type such as replacing a traditional modem with a GSM
modem are covered in the Remote Alarm Manager Engineering Man-
ual.
Note
Each time you shut down the Remote Alarm Manager, you must
press one or more of the Shift/Ctrl/Alt keys simultaneously in the
combination selected, before closing the console dialog, otherwise
the console will not shut down. When restarting the console, you
will no longer need to use your user ID and password.
Note
Alarms acknowledged through the Remote Alarm Manager are not
automatically acknowledged in Sigma (although they can be in
MicroNet View if you are configured to have a ‘user association’
with that BMSSome acknowledgements (with limitations) can
also be passed back to TAC Vista.
5 Enter the times and dates you wish to start and stop suppression
of the alarm actions.
Note
If no filters are present, or if you wish to reconfigure a filter, refer
to the Remote Alarm Manager Engineering Manual.
To Review History:
1 Click the Runtime tab.
2 Click Log. The logs are grouped in folders by date. Alarms,
messages and user activity are among the activities recorded.
The level of logging for the Engine can be set in the System
folder of the Configuration tab. In addition, the level of logging
for the interfaces can be set in the Debugging page of each inter-
face. Refer to the Remote Alarm Manager Engineering Manual.
6 Message Management
6.1 General
It is assumed for the purposes of this chapter that the person who is
responsible for the day-to-day operation of the Remote Alarm Man-
ager console is called the operator and that any person who receives
messages from the Remote Alarm Manager is called a recipient.
USR PASS USR PASS USR PASS USR PASS USR PASS
A 123 B 123 R 123 OFF X ON
USR PASS
OK 123
USR PASS
YES 123
Key:
USR = User ID
PASS = Password
123 = Message number
X = Number of hours off duty
Key:
>1 = Multiple.
Sim = Simultaneous delivery to Recipients.
Rot = Rotational delivery to Recipients.
C = Action Closed immediately.
CD = Action Closed after Delay.
NR = Message passed to Next Recipient.
NR+ = Message passed to Next Recipient; recipient will receive further
messages.
NR-1 = Message passed to Next Recipient; recipient will receive all ex-
cept one of further messages.
NR0 = Message passed to Next Recipient; recipient will not receive fur-
ther messages.
By default, ‘Your messages’ is the first page displayed. This will dis-
play all current messages for a user.
The available pages are described as follows:
• Your messages - displays all your current messages. On this
page you can select Accept, Busy or Refuse as required. The
Note
You can use two methods of addressing this PC:
• Use the IP address, in the format:
http://12.157.73.26:781/
• Use the PC name, in the format:
http://wsukb0qs41j:781/. You can find the computer name in
the System section of the Control Panel.
Accepting a message
To accept a message:
1 In the Action drop-down list, select either Accept, Busy or
Refuse, relating to the message you have received.
2 Click the Submit button. The message will disappear from the
list, and the Remote Alarm Manager will respond, if appropri-
ate, depending on how the interface is configured.
Note
You can also accept a message using the same method as above
after clicking an Active Action in the Active Actions page.
Note
The layout and method of selection of the options in the WAP
interface may vary from the examples shown depending on the
type of mobile phone you are using.
Note
You can use two methods of addressing this PC:
• Use the IP address, in the format:
http://12.157.73.26:782/
• Use the PC name, in the format:
http://wsukb0qs41j:782/. You can find the computer name in
the System section of the Control Panel.
For further details of PC addressing for the WAP interface,
refer to the Remote Alarm Manager Engineering Manual.
Accepting a message
To accept a message:
1 Select and display the message from the Your msg list:
Note
For further details of the formatting of WAP messages, refer to the
Remote Alarm Manager Engineering Manual.
The message will then disappear from the screen and the Remote
Alarm Manager will respond, if appropriate, depending on how
the interface is configured.
Acknowledging an alarm
To acknowledge an alarm:
The alarm will now show who acknowledged the alarm and the
time of acknowledgement.
Note
If you switch on user access control in the MicroNet View inter-
face, make sure you also switch it on in the MicroNet View Project
Manager, otherwise full access will be given to the Remote Alarm
Manager, without the need to log on.
Note
The association with Windows option is displayed only if a Win-
dows Logon interface has been set up.
Association page - Select a main system and enter the main sys-
tem login name of the user. Repeat for other main systems as
required.
Access page - Used to set the user’s privileges when using the
Remote Alarm Manager. Slide the controls up/down to choose
the required privileges. The on-screen text, which changes as
you slide the controls, explains the currently-selected privileges.
You cannot change the local access privileges for the first-cre-
ated user (fixed as Administrator).
Tip
You can select pages in any order by clicking the name of the page
in the left hand side of the User Configuration Wizard. When a
page is selected, an arrow will appear next to the page name. In the
example shown above, the Access page has been selected.
Note
When attempting to delete a user, a Deletion Blocked message
may be displayed (see below). This will inform you that the user
cannot be removed for the reasons given. You may have to delete
or revise other configuration components first (e.g. Recipients,
Alarm Actions).
You can set up several recipients that relate to the same person. This
enables the same person to be reached by different methods (e.g.
mobile phone or fax).
Note
When attempting to delete a recipient, a Deletion Blocked mes-
sage may be displayed (see below). This will inform you that the
recipient cannot be removed for the reasons given. You may have
to delete or revise other configuration components first (e.g. Alarm
Actions).
• The Type page (which is only shown when there is more than
one recipient in the Green or White period) shows that the two
recipients in the Green period are selected to be on duty inde-
pendently for one week at a time.
• Note, however, that the Schedule page does not show that Rob-
ert Avery and George White are on duty on alternate weeks as
set up in the Type page.
Note
When attempting to delete a duty roster, a Deletion Blocked mes-
sage may be displayed (see below). This will inform you that the
duty roster cannot be removed for the reasons given. You may
have to delete or revise other configuration components first (e.g.
Alarm Actions).
www.schneider-electric.com/buildings