Distech Controls ECLYPSE APEX User manual

User Guide
ECLYPSE APEX

2 ECLYPSE APEX
Document Revision History
£Version 1.0 – Sept 2021
– Release to market
Copyright
©, Distech Controls Inc., 2021. All rights reserved.
While all efforts have been made to verify the accuracy of information in this manual, Distech Controls
is not responsible for damages or claims arising from the use of this manual. Persons using this man-
ual are assumed to be trained HVAC professionals and are responsible for using the correct wiring
procedures, correct override methods for equipment control and maintaining safe working conditions
in fail-safe environments. Distech Controls reserves the right to change, delete or add to the informa-
tion in this manual at any time without notice.
Distech Controls, the Distech Controls logo, Allure, and Allure UNITOUCH are registered trademarks
of Distech Controls, Inc. BACnet is a registered trademark of ASHRAE. The
Bluetooth
® word mark and
logos are registered trademarks owned by Bluetooth SIG, Inc. and any use of such marks is under li-
cense. All other trademarks are property of their respective owners.
Document Revision History

Table of Contents
3ECLYPSE APEX
TABLE OF CONTENTS
CHAPTER 1
Introduction....................................................................................................................................................... 9
Overview .................................................................................................................................................. 9
About the ECLYPSE APEX Controller.......................................................................................... 9
About the IP Protocol Suite........................................................................................................... 9
About BACnet®............................................................................................................................. 9
About This User Guide............................................................................................................................. 9
Purpose of the User Guide ........................................................................................................... 9
Referenced Documentation .......................................................................................................... 9
ECLYPSE Introduction................................................................................................................ 10
Network Security......................................................................................................................... 10
Intended Audience ...................................................................................................................... 10
Conventions Used in this Document........................................................................................... 10
Related Documentation .............................................................................................................. 10
Acronyms and Abbreviations Used in this Document ............................................................................ 11
CHAPTER 2
Internet Protocol Suite Fundamentals ............................................................................................................ 12
About the Internet Network ....................................................................................................................12
Internet Protocol Suite Overview............................................................................................................ 12
CHAPTER 3
IPv4 Communication Fundamentals .............................................................................................................. 14
DHCP Versus Manual Network Settings................................................................................................ 14
Dynamic Host Configuration Protocol (DHCP) ...........................................................................14
Fixed IP Address or Hostname Management ............................................................................. 15
Networking Basics.................................................................................................................................. 15
IP Addressing.............................................................................................................................. 15
About the Subnetwork Mask ....................................................................................................... 15
CIDR Addressing ........................................................................................................................16
Private IPv4 Address Ranges ..................................................................................................... 16
Reserved Host Addresses .......................................................................................................... 16
Default Gateway ......................................................................................................................... 17
Domain Name System (DNS) ..................................................................................................... 17
About Routers, Switches, and Hubs ......................................................................................................18
Connecting a Router ................................................................................................................... 18
Network Address Translation / Firewall ......................................................................................18
IP Network Segmentation ...........................................................................................................19
CHAPTER 4
IP Network Protocols and Port Numbers........................................................................................................ 20
About Port Numbers............................................................................................................................... 20
IP Network Port Numbers and Protocols ...............................................................................................20
ECLYPSE Services that Require Internet Connectivity .........................................................................22

Table of Contents
4 ECLYPSE APEX
CHAPTER 5
Connecting IP Devices to an IP Network ....................................................................................................... 23
Connecting the IP Network ....................................................................................................................23
Wired Network Cable Requirements........................................................................................... 23
About the Integrated Ethernet Switch .........................................................................................24
Spanning Tree Protocol (STP).................................................................................................... 24
Connecting the Network Cable to the Controller......................................................................... 25
Wireless Network Connection ................................................................................................................ 25
About the 2.4 GHz ISM Band...................................................................................................... 26
Distance Between the Wi-Fi Adapter and Sources of Interference............................................. 26
About Wi-Fi Network Channel Numbers ..................................................................................... 26
Radio Signal Range .................................................................................................................... 27
Radio Signal Transmission Obstructions .................................................................................... 27
Where to Locate Wireless Adapters ........................................................................................... 28
Transmission Obstructions and Interference .............................................................................. 28
ECLYPSE Wi-Fi Adapter Mounting Tips..................................................................................... 28
Planning a Wireless Network ...................................................................................................... 30
ECLYPSE Wi-Fi Adapter Connection Modes ............................................................................. 32
Wi-Fi Client Connection Mode .................................................................................................... 32
Wi-Fi Access Point...................................................................................................................... 33
Wi-Fi Hotspot ..............................................................................................................................34
Wireless Bridge........................................................................................................................... 34
Wireless Network Commissioning Architectures.................................................................................... 36
Client to Access Point Configuration........................................................................................... 36
Client to Hotspot Configuration ................................................................................................... 37
CHAPTER 6
First Time Connection to an ECLYPSE Controller ......................................................................................... 38
Connecting to the Controller ..................................................................................................................38
Controller Identification ...............................................................................................................38
Ethernet Network Connection ................................................................................................................ 39
Network Connections for ECY Series Controllers....................................................................... 39
Wi-Fi Network Connection .....................................................................................................................40
Configuring the Controller ...................................................................................................................... 41
Using the XpressNetwork Utility.................................................................................................. 41
Using the Controller's Factory-default Hostname in the Web Browser....................................... 41
Using the Controller's IP Address in the Web Browser...............................................................42
Connecting to the Controller's Configuration Web Interface .................................................................. 42
Next Steps .................................................................................................................................. 42
CHAPTER 7
Supported RADIUS Server Architectures....................................................................................................... 43
Overview ................................................................................................................................................ 43
Authentication Fallback............................................................................................................... 43
RADIUS Server Architectures ................................................................................................................ 44
Local Credential Authentication ..................................................................................................44
ECLYPSE-Based Centralized Credential Authentication............................................................ 45
EC-Net-Based Centralized Credential Authentication ................................................................ 46
Configuring the EC-Net Station's RestService............................................................................47

Table of Contents
5ECLYPSE APEX
Configuring the EC-Net Station's RadiusService........................................................................ 47
Information Technology Department-Managed Centralized Credentials Authentication ............ 48
CHAPTER 8
ECLYPSE Web Interface ............................................................................................................................... 49
Overview ................................................................................................................................................ 49
Web Interface Main Menu........................................................................................................... 50
Home Page ................................................................................................................................. 50
User Profile and Login Credentials ............................................................................................. 50
Network Settings .................................................................................................................................... 52
Ethernet ...................................................................................................................................... 52
Wireless Configuration................................................................................................................ 53
Network Diagnostics ................................................................................................................... 55
BACnet Settings..................................................................................................................................... 57
General ....................................................................................................................................... 57
Routing........................................................................................................................................ 58
Network IP Ports ......................................................................................................................... 58
Network MS/TP Ports .................................................................................................................60
Diagnostics ................................................................................................................................. 61
User Management.................................................................................................................................. 61
Server/Client User Configuration ................................................................................................ 61
Password Policy.......................................................................................................................... 66
Radius Server/Client Settings ................................................................................................................ 67
RADIUS Server Settings............................................................................................................. 67
RADIUS Client Settings .............................................................................................................. 68
Single Sign On (SSO) Settings .............................................................................................................. 69
SSO Server Settings................................................................................................................... 70
SSO Client Settings ....................................................................................................................70
Setting Up the SSO Functionality ............................................................................................... 72
Setting Up the SSO Functionality through a Radius Server ....................................................... 75
Certificate Authentication with SSO ............................................................................................ 78
System Settings ..................................................................................................................................... 79
Device Information ...................................................................................................................... 79
Updating the Firmware................................................................................................................ 80
Export Audit Log ......................................................................................................................... 80
Extensions .................................................................................................................................. 81
Location and Time ...................................................................................................................... 82
Web Server Access ....................................................................................................................83
Licenses...................................................................................................................................... 88
Backup and Restore ................................................................................................................... 89
IoT .......................................................................................................................................................... 95
IoT Configuration ........................................................................................................................ 95
IoT Best Practices....................................................................................................................... 97
Docker Container Deployment Example..................................................................................... 98
BLE Room Devices ................................................................................................................................ 99
BLE Room Devices................................................................................................................... 100
Beacons .................................................................................................................................... 104
CHAPTER 9
Configuring the ECLYPSE Wi-Fi Adapter Wireless Networks...................................................................... 107

Table of Contents
6 ECLYPSE APEX
Setting up a Wi-Fi Client Wireless Network .........................................................................................107
Setting up a Wi-Fi Access Point Wireless Network.............................................................................. 108
Setting up a Wi-Fi Hotspot Wireless Network ...................................................................................... 110
CHAPTER 10
Securing an ECLYPSE Controller ................................................................................................................ 112
Introduction .......................................................................................................................................... 112
Passwords............................................................................................................................................ 112
Change the Default Platform Credentials ................................................................................. 112
Use Strong Passwords ............................................................................................................. 112
Account Management and Permissions............................................................................................... 112
Use a Different Account for Each User ..................................................................................... 112
Use Unique Service Type Accounts for Each Project............................................................... 113
Disable Known Accounts When Possible ................................................................................. 113
Assign the Minimum Required Permissions .............................................................................113
Use Minimum Possible Number of Admin Users ...................................................................... 113
HTTPS Certificates ..............................................................................................................................113
Certificates ................................................................................................................................ 113
Additional Measures............................................................................................................................. 113
Update the Controller's Firmware to the Latest Release .......................................................... 113
External Factors ................................................................................................................................... 113
Install Controllers in a Secure Location .................................................................................... 113
Make Sure that Controllers are Behind a VPN ......................................................................... 114
CHAPTER 11
BACnet MS/TP Communication Data Bus Fundamentals ........................................................................... 115
BACnet MS/TP Data Transmission Essentials ....................................................................................115
BACnet MS/TP Data Bus is Polarity Sensitive.......................................................................... 115
Maximum Number of BACnet MS/TP Devices on a Data Bus Segment and Baud Rate .................... 116
Data Bus Segment MAC Address Range for BACnet MS/TP Devices..................................... 117
Device Loading .........................................................................................................................117
Data Bus Physical Specifications and Cable Requirements ................................................................ 119
Data Bus Topology and EOL Terminations.......................................................................................... 119
Function of EOL Terminations .................................................................................................. 119
When to Use EOL Terminations ............................................................................................... 120
When to use EOL Terminations with BACnet MS/TP Thermostats .......................................... 120
About Setting Built-in EOL Terminations .................................................................................. 121
Only a Daisy-Chained Data Bus Topology is Acceptable ......................................................... 122
Data Bus Shield Grounding Requirements .......................................................................................... 122
ECB 24V-Powered Controller Data Bus Shield Grounding Requirements ............................... 123
ECB-PTU Line-Powered Data Bus Controller Shield Grounding Requirements ...................... 124
Data Bus Shield Grounding Requirements When Mixing Both ECB 24V-Powered Controllers and
ECB-PTU Line-Powered Controllers......................................................................................... 124
Using Repeaters to Extend the Data Bus ............................................................................................125
Device Addressing ............................................................................................................................... 127
About the MAC Address ........................................................................................................... 127
BACnet MS/TP Data Bus Token-Passing Overview................................................................. 128
About Tuning the Max Info Frames Parameter......................................................................... 128

Table of Contents
7ECLYPSE APEX
About Tuning the Max Master Parameter ................................................................................. 129
Setting the Max Master and Max Info Frames .......................................................................... 129
Default Device Instance Number Numbering System for Distech Controls’ Controllers........... 129
Adopting a Numbering System for MAC Addresses, Device Instance Numbers, and Network
Numbers ................................................................................................................................... 129
Setting the Controller’s MAC Address ...................................................................................... 130
Inter-Building BACnet Connection ............................................................................................ 131
BACnet/IP Broadcast Management Device Service (BBMD) ................................................... 131
Power Supply Requirements for 24VAC-Powered Controllers ............................................................ 132
BACnet MS/TP is a Three-Wire Data Bus ................................................................................ 132
Avoid Ground Lift ......................................................................................................................132
Techniques to Reduce Ground Lift ...........................................................................................133
About External Loads................................................................................................................ 133
Transformer Selection and Determining the Maximum Power Run Length.............................. 133
Recommended 24V Power Cable............................................................................................. 133
24VAC Power Supply Connection ............................................................................................ 134
Power Wiring with APEX........................................................................................................... 134
CHAPTER 12
Subnetwork Installation Guidelines .............................................................................................................. 136
About the Subnetwork Data Bus .......................................................................................................... 136
Subnetwork Connection Method............................................................................................... 136
Subnetwork Module Compatibility and Supported Quantity Charts ..................................................... 136
Subnetwork Module Connection ............................................................................................... 137
Subnetwork Data Bus Length ...................................................................................................138
Cat 5e Cable Subnetwork Data Bus ....................................................................................................140
Cat 5e Cable Subnetwork Data Bus Cable Requirements ....................................................... 140
Cat 5e Cable Subnetwork Bus Topology and End-of-Line Terminations.................................. 142
Setting the Subnet ID Addressing for Room Devices ............................................................... 144
Setting the Allure UNITOUCH Sensor Subnet ID Address .................................................................. 145
Setting the Allure EC-Smart-Vue Sensor’s Subnet ID Address ........................................................... 147
Setting the Allure EC-Smart-Air and EC-Smart-Comfort Communicating Sensor Series’ Subnet ID Ad-
dress .................................................................................................................................................... 148
Setting the EC-Multi-Sensor Series’ Subnet ID Address .....................................................................150
Setting the EC-Multi-Sensor-BLE Subnet ID Address .........................................................................150
Setting the ECx-Light and ECx-Blind Series’ Subnet ID Address ........................................................ 151
Auto-assigned Subnet ID Address for Light and Blind Expansion Modules ............................. 152
Auto Learn Light and Blind/Shade Expansion Modules in EC-gfxProgram .............................. 152
Commissioning a Connected VAV Controller with an Allure EC-Smart-Vue Sensor ........................... 153
CHAPTER 13
Modbus TCP Configuration .......................................................................................................................... 154
Controller Modbus Support .................................................................................................................. 154
Modbus TCP Device Connection ......................................................................................................... 154
Device Addressing ............................................................................................................................... 154
About Device Addressing.......................................................................................................... 154

Table of Contents
8 ECLYPSE APEX
CHAPTER 14
Modbus RTU Communication Data Bus Fundamentals............................................................................... 156
Controller Modbus Support .................................................................................................................. 156
Modbus RTU Data Transmission Essentials........................................................................................ 156
Modbus RTU Data Bus is Polatiry Sensitive............................................................................. 156
Maximum Number of Modbus RTU Devices on a Data Bus Segment and Baud Rate........................ 157
Data Bus Segment Addressing Range for Modbus RTU Devices ............................................ 157
Data Bus Physical Specifications and Cable Requirements ................................................................ 158
Data Bus Topology and EOL Terminations.......................................................................................... 159
When to Use EOL Terminations ............................................................................................... 159
About Setting Built-in EOL Terminations .................................................................................. 160
Only a Daisy-Chained Data Bus Topology is Acceptable ......................................................... 160
Data Bus Shield Grounding Requirements .......................................................................................... 161
Modbus RTU Data Bus Shield Grounding Requirements......................................................... 161
Device Addressing ............................................................................................................................... 162
CHAPTER 15
Resetting or Rebooting the Controller .......................................................................................................... 163
Resetting or Rebooting the Controller.................................................................................................. 163
CHAPTER 16
ECY Controller Troubleshooting................................................................................................................... 164
CHAPTER 17
Allure EC-Smart-Vue Communicating Sensor Troubleshooting................................................................... 167
CHAPTER 18
Wi-Fi Network Troubleshooting Guide ......................................................................................................... 169
CHAPTER 19
Single Sign On (SSO) Troubleshooting........................................................................................................ 170

9ECLYPSE APEX
CHAPTER 1
Introduction
Overview
This document describes best practices, specifications, wiring rules, and application information to im-
plement robust and reliable communications networks.
About the ECLYPSE APEX Controller
The ECLYPSE APEX Controller is a modular and scalable platform that is used to control a wide
range of HVAC applications. It uses IP protocol to communicate on wired Ethernet networks and Wi-Fi
to communication on wireless networks.
This user guide also explains how to connect to the ECLYPSE controller’s configuration interfaces.
About the IP Protocol Suite
Distech Controls’ ECLYPSE Series controllers use a widely used IP protocol to communicate with
each other and with other applications for control and supervision. What is commonly referred to as IP
is actually a multi-layered protocol suite that reliably transmits data over the public Internet and pri-
vately firewalled-off intranets. As integral part of our interconnected world, this protocol is used by ap-
plications such as the World Wide Web, email, File Transfer Protocol (FTP), datashares, and so on.
ECLYPSE Series controllers are able to work across geographic boundaries as a unified entity for
control and administration purposes.
About BACnet®
The BACnet® ANSI/ASHRAE™ Standard 135-2008 specifies a number of Local Area Network (LAN)
transport types. Distech Controls’ controllers support both BACnet/IP and BACnet Master-Slave/To-
ken-Passing (MS/TP) communications data bus (based on the EIA‑485 medium) as a local network for
inter-networking of supervisory controllers and field controllers.
About This User Guide
Purpose of the User Guide
This user guide does not provide and does not intend to provide instructions for safe wiring practices.
It is the user’s responsibility to adhere to the safety codes, safe wiring guidelines, and safe working
practices to conform to the rules and regulations in effect in the job site jurisdiction. This user guide
does not intend to provide all the information and knowledge of an experienced HVAC technician or
engineer.
This user guide shows you how to integrate ECLYPSE controllers into your IP network environment
while enforcing standard network security practices.
Referenced Documentation
The follow documentation is referenced in this document.
£Controller Hardware Installation Guides: These documents are available from the Distech Controls
Software Center
Introduction

10 ECLYPSE APEX
£Xpress
Network
Utility User Guide: This document is available on Distech Controls SmartSource
website
£EC-
gfx
Program User Guide: This document is available on Distech Controls SmartSource website
ECLYPSE Introduction
The ECLYPSE series is a modular and scalable platform that is used to control a wide range of HVAC
applications. It supports BACnet/IP communication and is a listed BACnet Building Controller (B-BC).
The ECLYPSE APEX Controller consists of an automation and connectivity server with built-in power
supply, and I/O extension modules.
This programmable controller provides advanced functionality such as customizable control logic,
Web-based design and visualization interface (ENVYSION embedded), logging, alarming, and sched-
uling.
This user guide also explains how to configure the ECLYPSE controller’s configuration interfaces.
Network Security
Maintaining the highest level of network security, especially when IP devices are connected to the In-
ternet requires specially trained personnel who are aware of the necessary techniques to ensure con-
tinued protection. This must include the implementation of a Virtual Private Network (VPN) to connect
with IP controllers over the Internet. It is also important to coordinate with Information Technology (IT)
department personnel the use of shared network resources.
At the first connection to an ECLYPSE Controller you will be forced to change the password to a
strong password for the admin account to protect access to the controller.
Intended Audience
This user guide is intended for system designers, integrators, electricians, and field technicians who
have experience with control systems, and who want to learn about how to make a successful IP net-
work installation. It is recommended that anyone installing and configuring the devices specified in this
user guide have prior training in the usage of these devices.
Conventions Used in this Document
This is an example of Note text. Wherever the note-paper icon appears, it means the associated text is
giving a time-saving tip or a reference to associated information of interest.
This is an example of Caution or Warning text. Wherever the exclamation icon appears, it means that there
may be an important safety concern or that an action taken may have a drastic effect on the device,
equipment, and/or network if it is improperly carried out.
Related Documentation
The follow documentation is referenced in this document. These documents are available on Distech
Controls SmartSource website.
£Always refer to the Hardware Installation Guide for the devices you are installing.
£EC-
gfx
Program User Guide
£Open-to-Wireless™ Application Guide
£Network Guide
Introduction

11ECLYPSE APEX
Acronyms and Abbreviations Used in this Document
Acronym Definition
ASHRAE American Society of Heating, Refrigeration, and Air-Conditioning Engineers
AP Access Point
APDU Application Protocol Data Units
API Application Programming Interface
ASCII American Standard Code for Information Interchange
BACnet® Building Automation and Control Networking Protocol
BAS Building Automation System
B-BC BACnet Building Controller
BBMD BACnet/IP Broadcast Management Device
CIDR Classless Inter-Domain Routing
DHCP Dynamic Host Configuration Protocol
DNS Domain Name System
EOL End Of Line
FTP File Transfer Protocol
HTML HyperText Markup Language
HTTP Hypertext Transfer Protocol
HTTPS Hypertext Transfer Protocol Secure
HVAC Heating, Ventilating, and Air Conditioning
ID Identifier
IP Internet Protocol
IPv4 Internet Protocol version 4
ISP Internet Service Provider
IT Information Technology
LAN Local Area Network
MAC Media Access Control
MB Megabyte
MHz Megahertz
MS/TP Master-Slave/Token-Passing
NAT Network Address Translation
NTP Network Time Protocol
PC Personal Computer
RADIUS Remote Authentication Dial-In User Service
REST Representational State Transfer
RTU Remote Terminal Unit (for Modbus)
SSID Service Set IDentification
TCP Transmission Control Protocol
UDP User Datagram Protocol
URL Uniform Resource Locator
USB Universal Serial Bus
VPN Virtual Private Network
WAN Wide Area Network
WPA Wi-Fi Protected Access
WWW World Wide Web
Introduction

12 ECLYPSE APEX
CHAPTER 2
Internet Protocol Suite Fundamentals
This chapter describes the Internet protocol operating principles necessary to configure the IP param-
eters of an IP controller.
About the Internet Network
The Internet is the world-wide interconnection of networks. At its root however, it is not one big net-
work, but a group of networks that communicate between each other by using standard protocols and
by using gateways between these networks called routers.
The structure of the Internet is decentralized and non-hierarchical. On the Internet, all communication
uses the Internet Protocol (IP) to communicate and all connected devices are identified by their IP ad-
dress. An Internet Registry allocates IP addresses to internet service providers to be used by their
users.
Data is sent across the network in packets. Each packet has a header that identifies the sender’s and
intended receiver’s IP addresses.
Internet Protocol Suite Overview
Internet Protocol (IP) is part of a multi-layered suite that together enables data communication. The
following descriptions are an overview of the IP suite protocol layers as used by IP devices:
£Physical layer (bits): This is the physical and device-to-device electrical connection layer otherwise
known as Ethernet. This layer defines:
– The requirements for the physical connection between devices (the signal medium). For exam-
ple, RJ-45 connectors (attached per TIA/EIA-568-A,), using Cat 5e data cable. The maximum
cable length between devices is 328 ft. (100 m) at 100 MB/s data rate.
– The electrical signal requirements for data packet transport.
– The data packet structure including data payload and the source and destination device’s MAC
addresses.
In the case of Wi-Fi connected devices, the link layer is the air interface defined by the Wi-Fi standard,
such as radio frequencies, data rates, authentication, data channel encryption, and so on.
£Data Link layer: This layer implements the ability for two devices to exchange data with each
other.
£Network layer: This layer implements the ability to connect multiple distinct networks with each
other. It provides the internetworking methods that allow data packets to travel from the source de-
vice to a destination device across network boundaries, such as a router through the use of an IP
address. See About Routers, Switches, and Hubs.
£Transport Layer (segments): This layer provides end-to-end communication data stream connec-
tion between two or more devices through a variety of protocols. However, it is the Transmission
Control Protocol (TCP), the most commonly used internet transport protocol that is used by Dis-
tech Controls IP controllers to communicate with each other. TCP creates a connection-oriented
channel between two applications; that is to say the data stream is error-checked, is sorted into
the correct sequence (missing data packets are re-transmitted) and this data stream has a port
number for addressing a specific application at the destination host computer.
£Session layer (data): This layer implements the protocol to open, close, and manage a session be-
tween applications such that a dialog can occur.
Internet Protocol Suite Fundamentals

13ECLYPSE APEX
£Presentation layer: This layer implements the display of media such as images and graphics.
£Applications layer: This layer implements the process-to-process communications protocol that in-
cludes among other services the BACnet/IP protocol, programming, debugging, WWW, and so on.
All of the above IP suite protocol layers must be fully functional for any two devices or controllers to
communicate with each other.
Internet Protocol Suite Fundamentals

14 ECLYPSE APEX
CHAPTER 3
IPv4 Communication Fundamentals
This chapter describes IPv4 Communication operating principles.
DHCP Versus Manual Network Settings
The following methods can be used to set the network settings:
£Manually set network settings allow precise control over the network’s configuration. This option
may require an in-depth understanding of arcane networking details – much of which is covered in
this guide. See Networking Basics.
£Use the router’s DHCP setting to automatically connect devices to the network by negotiating the
appropriate settings with the device. This option may not be applicable to all networks; for exam-
ple, the network administrator does not want to use DHCP and has supplied information to manu-
ally configure the device’s IP interface.
No matter which option is chosen, it will be necessary to coordinate with Information Technology (IT)
department personnel the use of shared network resources.
Dynamic Host Configuration Protocol (DHCP)
The Dynamic Host Configuration Protocol (DHCP) is a router feature that dynamically allocates config-
uration parameters to connected devices such as IP, DNS, and default gateway addresses. Enabling
DHCP on a router normally eliminates the need to manually configure network settings on connected
devices. The implementation of DHCP on most routers allows a device to be assigned a fixed IP ad-
dress by associating a specific IP address to a device’s MAC address.
Devices that use ECLYPSE’s internal router with the DHCP option (Hotspot/AP mode) cannot be assigned
fixed IP addresses according to the device’s MAC address.
Figure1: Typical Router Configuration to Assign a Device’s MAC Address to a Fixed IP Address
If your router supports DHCP and you have access to the router’s configuration interface, this is the
most straight-forward way to configure your network. Ensure that all devices that require a fixed IP ad-
dress use a manually assigned IP address.
IPv4 Communication Fundamentals

15ECLYPSE APEX
Fixed IP Address or Hostname Management
Why should ECLYPSE IP controllers use a fixed IP address or use hostname Management? To pro-
gram or to access an IP controller, you must be able to connect to it. Like a postal address, a fixed IP
address that is always assigned to the same device allows you to consistently connect to and work
with the same device.
An alternative to using a fixed IP address is to use the controller’s Hostname Management which al-
lows a controller to be identified by a nickname such as
Office_205
instead of the controller’s IP ad-
dress. The hostname can be used in a Web browser’s address bar or in the EC-
gfx
Program’s Connect
to screen.
Networking Basics
When manually configuring the TCP/IP interface on an ECLYPSE IP controller (the DHCP option is
not used), an IP address, subnetwork mask, and a default gateway are required in the Network Set-
tings.
IP Addressing
The most widely used internet addressing scheme is IPv4. It codes an IP address in 32 bits.
An IPv4 address is made up of two parts defined by a subnetwork mask; the network portion (which
identifies a specific network or subnetwork) and the host portion (which identifies a specific device).
About the Subnetwork Mask
Devices on the same sub-network can address IP packets to each other directly without routing. The
range of IP addresses available in a sub-network is defined by the subnetwork mask. This is also
called the subnetwork mask’s ‘address space’. The subnetwork mask is coded in 32 bits as follows.
An IP packet addressed to a device on another network portion will have to be routed through the
router’s WAN port as such an address is not local. BACnet/IP broadcast discovery messages such as
“Who-Is” do not pass through network routers that separate subnetworks. This means that BACnet/IP
controllers on different subnetworks will not normally communicate with each other.
BBMD allows broadcast message to pass through a router: on each subnet, a single device has
BBMD enabled. Each BBMD device ensures BACnet/IP connectivity between subnets by forwarding
broadcast messages found on its subnetwork to each other, and then onto the local subnetwork as a
broadcast message. See BBMD Settings.
IPv4 Communication Fundamentals

16 ECLYPSE APEX
Network Class CIDR Subnetwork
Mask
Block
Size
Number of Subnetworks
according to the Network Type
Number of Hosts
according to the Network Type
Class A Class B Class C Class A Class B Class C
←Class A Network→
/8 255.0.0.0 256 1 16777214
/9 255.128.0.0 128 2 8388606
/10 255.192.0.0 64 4 4194302
/11 255.224.0.0 32 8 2097150
/12 255.240.0.0 16 16 1048574
/13 255.248.0.0 8 32 525286
/14 255.252.0.0 4 64 262142
/15 255.254.0.0 2 128 131070
←Class B Network→
/16 255.255.0.0 256 256 1 65534 65534
/17 255.255.128.0 128 512 2 32766 32766
/18 255.255.192.0 64 1024 4 16382 16382
/19 255.255.224.0 32 2048 8 8190 8190
/20 255.255.240.0 16 4096 16 4094 4094
/21 255.255.248.0 8 8192 32 2046 2046
/22 255.255.252.0 4 16384 64 1022 1022
/23 255.255.254.0 2 32768 128 510 510
←Class C Network→
/24 255.255.255.0 256 65536 256 1 254 254 254
/25 255.255.255.128 128 131072 512 2 126 126 126
/26 255.255.255.192 64 262144 1024 4 62 62 62
/27 255.255.255.224 32 524288 2048 8 30 30 30
/28 255.255.255.240 16 1048576 4096 16 14 14 14
/29 255.255.255.248 8 2097152 8192 32 6 6 6
/30 255.255.255.252 4 4194304 16384 64 2 2 2
CIDR Addressing
Another way to express the subnetwork mask is through CIDR addressing (Classless Inter-Domain
Routing) which is written as a slash and a number which represents the number of true bits set in the
subnetwork mask. For example, the subnetwork mask 255.128.0.0 is 11111111 10000000 00000000
00000000 in binary or /9.
An IP address can be expressed with its CIDR subnetwork mask in the form of 192.168.0.0/24 for ex-
ample.
Private IPv4 Address Ranges
Each IP address class has a private address range. Private IPv4 addresses cannot be routed over the
Internet.
Distech Controls IP controllers will normally be assigned to a private IP address and are connected to
the LAN ports of a router, thereby keeping them behind a firewall from the internet while allowing them
to freely communicate to each other and to other trusted devices.
The following IPv4 address ranges are reserved for private networks.
Network Class IP Address Range Number of Addresses Largest CIDR Block (subnetwork mask)
A 10.0.0.0 - 10.255.255.255 16,777,216 10.0.0.0/8 (255.0.0.0)
B 172.16.0.0 - 172.31.255.255 1,048,576 172.16.0.0/12 (255.240.0.0)
C 192.168.0.0 - 192.168.255.255 65,536 192.168.0.0/16 (255.255.0.0)
Reserved Host Addresses
The first and the last IP addresses are reserved for special use on all subnetwork IP address ranges:
IPv4 Communication Fundamentals

17ECLYPSE APEX
The first IP Address is the Network ID. Networks with different network IDs are considered to be dis-
tinct. By default, no direct communication can take place between two networks that have different
Network IDs. This prevents computers on one network from being accessed by computers on another
network. When one department or organization is on one network, it is segregated from computers on
other networks.
Last IP Address is the Broadcast Address: this is used for a specific type of network traffic that is des-
tined to every host in the subnetwork range of IP addresses. For example, the device’s DHCP client
uses the broadcast address to find the network’s DHCP server.
For Example, with a typical class C private network:
Subnetwork Mask = 255.255.255.0
Network ID = 192.168.1.0
Gateway = 192.168.1.1
Broadcast Address = 192.168.1.255
Usable IP Addresses = 192.168.1.2 - 192.168.1.254
Default Gateway
Two hosts on the same subnetwork can directly communicate with each other. When a host wants to
communicate to an IP address that is not in the subnetwork address range, the host sends the packet
to the default gateway. The default gateway is usually the router’s IP address and is usually set in the
routers administration interface. For more information about IP routing, see About Routers, Switches,
and Hubs.
Certain ECLYPSE controller services use the default gateway. See ECLYPSE Services that Require In-
ternet Connectivity.
Domain Name System (DNS)
When you want to connect to another computer or service on the Internet (to a Website for example),
rarely would you want to use the IP address to make the connection as it would be a pain to remem-
ber the numeric IP address for each and every site you want to visit. The Domain Name System
(DNS) was created to allow internet users to take advantage of a meaningful Uniform Resource Loca-
tor (URL) such as
http://www.distech-controls.com/
to connect to an IP address without having to know
the server’s or computer’s numerical IP address. The DNS does this by looking up the URL and pro-
viding the numeric IP address to the requesting computer. Should the IP address of a computer/server
be changed, the DNS server can be updated with its new IP address, thereby ensuring that other net-
worked computers can still find this computer/server through its URL.
Set the DNS IP address of the Domain Name System (DNS) servers in routers and in IP controllers
that have manually-configured IP parameters. Between one and three DNS IP address is usually pro-
vided by the Internet Service Provider (ISP). The second and third DNS addresses are for failover
should the first DNS become unavailable.
If you do not know the address of your DNS server(s), try the following publicly-available DNS server
addresses: primary = 8.8.8.8 and secondary = 4.4.4.4
Some ECLYPSE controller services use DNS to resolve Web addresses thereby allowing the service
to operate. See ECLYPSE Services that Require Internet Connectivity.
IPv4 Communication Fundamentals

18 ECLYPSE APEX
About Routers, Switches, and Hubs
The differences between a hub, switch, and router are discussed in the table below.
Device Type Description
Hub
Every incoming data packet is repeated on every other port on the device. Due to this, all traffic is
made available on all ports which increase data packet collisions that affect the entire network, thus
limiting its data carrying capacity.
Switch A switch creates a one-to-one virtual circuit that directs IP packets directly to the port that the
destination computer is connected to.
Router
Like a switch, a router learns the IP addresses of all devices connected to any of its RJ-45 ports to
create a routing table. If a data packet arrives at the router’s port with a destination IP address that is:
– Found in the router’s routing table, the router forwards the data packet to the appropriate port
for the device that has this IP address.
– For a network with a different network ID than the current network ID, the router forwards the
data packet to the uplink port where the next router will again either recognize the network ID
and route the data packet locally or again forwards the data packet to the uplink port. By be-
ing exposed to traffic, a router adds to its routing table the pathways necessary to resolve a
data packet's pathway to its final destination, by passing through one or more routers if nec-
essary.
Connecting a Router
The way a router is connected to other devices changes its function.
1
UPLINK
2 3 4
1
UPLINK
2 3 4
ROUTER
A
ROUTER
B
Connection to use ROUTER A as a router
To
Device
To
Device
To
Device
To
Device
To
Device
To
Device
To
Device
To
WAN
1
UPLINK
234
1
UPLINK
234
ROUTER
A
ROUTER
B
Connection to NOT use ROUTER A as a router
To
Device
To
Device
To
Device
To
Device
To
Device
To
Device
To
WAN
UPLINK
Function is
Not Used
Figure2: The Way a Router is Connected Changes its Function
On some routers, the uplink port is marked as WAN (Wide Area Network) and the numbered ports are
to be connected to the LAN (Local Area Network) devices.
Network Address Translation / Firewall
A router’s uplink port provides Network Address Translation (NAT) and firewall functions.
NAT is a method to hide the private IP addresses of a range of devices (connected to LAN ports) be-
hind a single IP address presented at the WAN uplink port. NAT uses a mechanism to track requests
to WAN IP addresses and readdresses the outgoing IP packets on exit, so they appear to originate
from the router itself. In the reverse communications path, NAT again readdresses the IP packet’s
destination address back to the original source private IP address.
Due to this tracking mechanism, only requests originating from the LAN side can initiate communica-
tions. A request from the WAN to the router cannot be mapped into a private address as there is no
outbound mapping for the router to use to properly readdress it to a private IP address. This is why a
NAT acts as a firewall that blocks unsolicited access to the router’s LAN side.
Most routers allow you to open a port in the firewall so that WAN traffic received at a specific port num-
ber is always forwarded to a specific LAN IP address. The standard port numbers used by ECLYPSE
controllers is explained in chapter IP Network Protocols and Port Numbers.
IPv4 Communication Fundamentals

19ECLYPSE APEX
IP Network Segmentation
For efficient network planning, normally the IP controllers will be assigned to their own network seg-
ment of an IP network or subnetwork. This is done as shown in the figure below.
1
UPLINK
234
1
UPLINK
234
Router for
HVAC IP
Controllers
Company
Computer
Network
Gateway Router
To
Device
To
Device
To
Device
To IP
Controller
To IP
Controller
To IP
Controller
To IP
Controller
Network
LAN
ISP Modem (Fiber, Cable, DSL)
To ISP Network
Figure3: Network Segment for HVAC IP Controllers
For certain wireless topologies, a wireless router can be used to connect to the controller. In this sce-
nario, a wireless operator interface (laptop or tablet) can be used for commissioning as shown in the
figure below. If the laptop has a Supervisor installed, it can be used to program ECB series controllers
connected to the RS-485 port of the Connected System Controller.
Figure4: Network Segment for HVAC IP Controllers with a Wireless Access Point
If a wireless router is unavailable or is out-of-range, an ECLYPSE Wi-Fi adapter can be connected to
an controller’s USB port to add wireless connectivity. See Wireless Network Connection.
IPv4 Communication Fundamentals

20 ECLYPSE APEX
CHAPTER 4
IP Network Protocols and Port Numbers
This chapter describes the IP Network Protocols and Port Numbers used by the ECLYPSE controller.
About Port Numbers
In an IP packet, a port number is an extension of the packet’s IP address and completes the destina-
tion address for a communications session. By convention, the packet’s port number is associated
with a protocol used between software applications and is used to uniquely identify a communications
endpoint for a specific application or process running on a computer. This allows a multitude of appli-
cations to share a single physical connection to the Internet while allowing distinct communication
channels between different applications.
For example, your web browser listens to port 80 on your computer to receive HTML web pages sent
from a web server on port 80.
The standard port numbers used by controllers is explained in IP Network Port Numbers and Protocols.
Sometimes, two applications might use the same port number to communicate. To sort out this con-
flict, the following methods can be used.
£In the configuration of some applications, the port number can be changed from its default setting.
Should you change it, you must also change it on the corresponding application also so that the
port numbers will match.
£Routers have features such as port forwarding that can change an incoming packet’s port number
coming from the Wide Area Network (WAN) to another port number on the Local Area Network or
vice versa.
IP Network Port Numbers and Protocols
This section lists the IP Network Protocols to communicate over IPv4 networks. The corresponding de-
fault in-bound port number is also shown.
Service Default Port
Number (Protocol)
Description Where can this port
number be changed?
SMTP 25 (TCP) Outgoing Email server port number.
See the EC-
gfx
Program User
Guide, Resources
Configuration.
DNS 53 (TCP, UDP) Domain Name Server URL lookup. –
DHCP 67 (UDP) The router’s DHCP service that allows a device to auto-
configure a devices’ IP settings. –
HTTP 80 (TCP)
EC-
gfx
Program Debugging Values (REST service):
After the control logic or code has been sent to the
controller, a live debugger allows programmers to
execute code, view input/output values, and
troubleshoot errors in real-time.
ENVYSION: The ENVYSION server presents system
status, trending visualization, real-time equipment
visualization, schedule configuration, alarm monitoring,
and dashboard functions to a Web browser operator
interface.
Web Configuration Interface: This is the network
configuration interface for wired and wireless IP network
interfaces.
See System Settings. If this is
used with EC-Net, this
parameter can be changed in
the RestService and
WebService.
IP Network Protocols and Port Numbers
Table of contents
Other Distech Controls Control System manuals

Distech Controls
Distech Controls DA-020S Series Manual

Distech Controls
Distech Controls Allure EC-Smart-Comfort Series User manual

Distech Controls
Distech Controls Allure ECW-Sensor Series User manual

Distech Controls
Distech Controls EC-BOS-8 User manual

Distech Controls
Distech Controls EC-BOS-6AX Programming manual