Transcript Overview

RNI C

ONFIGURATION AND

M

ANAGEMENT

O

VERVIEW

© 2013 Sensus. All rights reserved.

C-PAMRAMI-WG-0137-01

2

The goal of this module is to:

Introduce the configuration and management tasks performed by an RNI System Administrator on a regular basis.

3

Following this module, you should be able to:

1.

Identify the overall administration process flow.

4 Configuration and Management Workflow

Configuration and Management Overview

Security

• User Access Control • System Access Control • Data Access Control

System Operation

• Meter Groups • Reporting

Components

• Meter Reprogramming • Meter Firmware Download

5 Configuring and Managing System Security

Configuration and Management Overview

• What are the tools and features available to control user access, data access, system access, and physical access to the system?

– User accounts?

– SSL certificates for my RNI servers?

– Firewall and remote access?

– Secured communications between components?

6 Configuring and Managing RNI System Operation

Configuration and Management Overview

• • • How can I perform actions on a group of meters, rather than one at a time?

How do I manage reports?

– What needs to be configured to obtain daily read reports?

– What formats are available?

– Where do you manage the report generation process?

How do I manage jobs?

– What types of jobs are run?

– Which jobs are enabled by default?

– What tools are available to investigate failing jobs?

– How do I create new jobs?

7 Configuring and Managing Components

Configuration and Management Overview

• • How can I reprogram meters that have been installed with incorrect information?

What is the process for downloading firmware upgrades to meters?

8

9

Question

:

1.

Which of the following describes the recommended administration process flow?

a) Configure system operation, configure security features, manage component configuration b) Configure security features, configure system operation, manage component configuration c) Manage component configuration, configure security features, configure system operation d) None of the above