
1164-EnertexKNXIPSecureRouter_US-2.odt, 201 -03-25 Seite 5 von 1
Key, Key Parameter A series of numbers known only to the ETS project. These numbers are
used to transform the data in both directions: encryption and decryption.
FDSK (Factory Default Setup Key) The initial factory key. This key is used when
commissioning the initial programming. A new key is loaded into the device, whereby this
process is encrypted with the FDSK. The FDSK key is then no longer valid. It is reactivated only
when resetting to factory settings.
Backbone For IP routers, this is always the IP network.
Multicast An IP address in the network over which all the routers of a backbone communicate.
Tunnel connections do not need this address. Multicast connections are always established with
the UDP protocol. Unlike TCP communication, an UDP telegram can always be lost. This is e.g.
for WLAN connections very likely. Therefore, the routing backbone should always be realized
with an Ethernet cable connection, as this is almost 100% transmission safe.
Backbonekey The routing protocol communicates in secure mode with encrypted telegrams.
The key for encryption must be the same for all participants and is loaded into the device. The
ETS generates the necessary backbone key on its own.
Tunnellin A KNX point-to-point connection on the TCP / IP network, which is established with
UDP or TCP protocol. Tunneling communication is reliable and has incorporated a link layer for
that purpose. Therefore independent of the ethernet connection, e.g. Cable or WLAN, and
regardless of the TCP / IP protocol (UDP or TCP), no data is lost. With UDP, however, the
restriction is that the data link layer works with a one-second timeout. For Enertex devices, this
timeout can be adjusted in the advanced setup.
Telnet A simple TCP server on port 23 that enables direct text-based communication with the IP
device. Telnet is a de facto standard used at the window level, e.g. with "Putty" is addressed.
Secure Mode If the device is parameterized via the ETS so that the communication is only
encrypted, this is referred to as secure mode.
Plain Mode If the device is parameterized via the ETS so that the communication is only
unencrypted, this is called unsecured mode.
ETS 5.6.6 and ETS 5.7.0
Version requirements
For error-free operation of the devices in secure mode, ETS 5.7.x or higher is required.
In plain mode, the device can basically be programmed as of ETS 5.6.6. Although the secure
mode can be parameterized, it is not fully implemented in this version. If the device is therefore
to be operated secure, we recommend working with version 5.7 or higher.
Special behavior
If you program the individual address in the ETS 5.6.6 with its own nd a tunnel connection, the
ETS will throw an error message at the end. This is to be ignored, the assignment of the address
has nevertheless been made.
If no tunnel addresses are assigned in the application, all tunnels are set by the ETS to
15.15.255. Communication via the tunnel connection can then be considerably disturbed or not
possible.
If the device is integrated in a secure project, the ETS saves the parameterization of this
particular device including secure parameters. If the device is reset to factory settings, the ETS
(5.6 or 5.7) only addresses the device in encrypted form. Therefore, communication with the
ETS can no longer be established. In this case, only deleting the application and restarting the
ETS will help.
If an update of Windows runs in the background, strange phenomenon can occasionally occur
with the communication between the device and the ETS. In this case, wait for the end of the
update and restart Windows.
Topolo y
Enertex
® Bayern GmbH – Ebermannstädter Straße 8 - 1301 Forchheim - Deutschland - [email protected]e