ContentsvNaming the EMX .............................................................................................................110Modifying the Network Configuration...............................................................................110Modifying Network Service Settings ................................................................................120Setting the Date and Time...............................................................................................127Setting Default Measurement Units.................................................................................131Configuring the Feature Port ...........................................................................................132Configuring the Auxiliary Port ..........................................................................................133Configuring the Serial Port ..............................................................................................135Setting the Cascading Mode ...........................................................................................136Specifying the Device Altitude .........................................................................................143Setting Data Logging .......................................................................................................144Configuring SMTP Settings .............................................................................................145Configuring Data Push Settings ......................................................................................147Checking the Internal Beeper State ................................................................................148User and Role Management......................................................................................................149Creating a User Profile ....................................................................................................149Modifying a User Profile ..................................................................................................152Deleting a User Profile.....................................................................................................153Setting Up Your Preferred Measurement Units...............................................................153Setting Up Roles ........................................................................................................................154Creating a Role................................................................................................................155Modifying a Role ..............................................................................................................155Deleting a Role ................................................................................................................156Access Security Control.............................................................................................................157Forcing HTTPS Encryption..............................................................................................157Configuring the Firewall...................................................................................................157Setting Up User Login Controls .......................................................................................164Setting Up Role-Based Access Control Rules ................................................................168Setting Up a TLS Certificate ......................................................................................................172Certificate Signing Request .............................................................................................173Creating a Self-Signed Certificate ...................................................................................175Installing Existing Key and Certificate Files.....................................................................177Downloading Key and Certificate Files............................................................................177Setting Up External Authentication ............................................................................................178Gathering the External Authentication Information..........................................................178Adding Authentication Servers ........................................................................................180Sorting the Access Order ................................................................................................184Testing the Server Connection ........................................................................................184Editing Authentication Server Settings ............................................................................185Deleting Authentication Server Settings..........................................................................185Disabling External Authentication....................................................................................185Enabling External and Local Authentication Services.....................................................186Event Rules and Actions............................................................................................................187Components of an Event Rule.........................................................................................187Creating an Event Rule ...................................................................................................188Sample Event Rules ........................................................................................................226A Note about Infinite Loop ...............................................................................................228Modifying an Event Rule..................................................................................................229Modifying an Action .........................................................................................................231Deleting an Event Rule or Action.....................................................................................231A Note about Untriggered Rules......................................................................................232