1. CIMPLICITY Quick Start Guide
This article will discuss how to make a connection from WIN-911 to CIMPLICITY and includes the following topics:
- Where to install WIN-911 with CIMPLICITY
- Accessing WIN-911
- CIMPLICITY Security
- Creating a CIMPLICITY Project
- Watchdogs (Optional)
- Configuring Notifiers
- Configuring a Callout List (Tactics & Strategies)
- Bringing Alarms into WIN-911
- Troubleshooting using LogViewer
- Opening a Support Case
For more information on getting started, please review the CIMPLICITY Installation Checklist.
A. Where to Install WIN-911
When integrating WIN-911 into an existing GE CIMPLICITY system, there is one recommended architecture to use:
- A single GE CIMPLICITY Application with a single WIN-911 system
WIN-911 can be installed wither on the CIMPLICITY client machine, or where the CIMPLICITY Project is running.
You can read additional information in the Nodes and Licensing Document. It is available on our website. Click on Resources, then Documentation. Look in the first section, WIN-911 Standard/Interactive/Advanced.
B. Accessing WIN-911
WIN-911 is configured with a web-driven interface that resides in the Internet Information Services (IIS) of the WIN-911 host computer. There are two ways to open this website:
- Clicking the shortcut that was created in the WIN-911 host's start menu.
- Opening a browser anywhere on the WIN-911 network and entering the WIN-911 Configuration URL.
The WIN-911 Configuration website can be accessed from any computer that is on the WIN-911 network if you have the proper credentials. Simply open a browser and enter the URL: http://'WIN911 computer name'/WIN911.
The last segment of the URL does not contain a hyphen in WIN911. For example: if WIN-911 is installed on a computer named COMP1 and you are a remotely located user (say on computer COMP6), you would start internet explorer and enter http://COMP1/WIN911.
If security enabled in your install of GE CIMPLICITY then you will need to have the CIMPLICITY username and password that has access to the HMI and can acknowledge alarms. These settings are configured by your CIMPLICITY administrator.
C. Creating a CIMPLICITY Project
Open the WIN-911 configurator and select Alarming > CIMPLICITY > Project.
Only the data sources you installed will appear.
Enter the name of the CIMPLICITY project you wish to monitor. The name is case sensitive and must match the project name as it appears in CIMPLICITY.
CIMPLICITY users can be assigned a password to enhance operational security. If a password is configured for the WIN-911 username enter it here, otherwise, leave this field empty.
The health alarm monitors WIN-911's connection with the project. If the project connection is lost WIN-911 will trigger an alarm that can be dispatched an alarm notifier.
Enter the text of the alarm message you wish to be dispatched in the event of a data source connection loss.
Select the strategy you wish WIN-911 to use when dispatching the health alarm notification.
A numeric attribute from 1 to 1000 that designates the urgency of an alarm event. It can be used as an organizational tool and be used in a tactic to determine how an alarm is dispatched and which alarm has priority over another. The default severity is 500.
Labels (Used by Advanced Tactics)
Labels are optional attributes for organizing alarms in a logical manner. They can represent function, location, severity, or another category that serves the project requirements.
D. Watchdogs (Optional)
CIMPLICITY supports watchdog timers, which may be used to alert users when communications are lost between WIN-911 and CIMPLICITY. WIN-911 must monitor an alarm condition that cycles in and out of alarm on a specific time interval. The watchdog timer would then be set to a value greater than the interval. If the timer expires prior to the change of alarm state then WIN-911 will trigger a watchdog alarm.
Open the WIN-911 configurator and select Alarming > CIMPLICITY > Watchdogs.
Enter a name for this watchdog.
An extra text field for context concerning the Watchdog alarm.
Each Point ID can have up to 32 characters, any combination of upper-case letters and numbers, and special characters, with some restriction (see CIMPLICITY documentation for these).
Specify the timeout interval that WIN-911 will wait for an alarm condition change to occur before triggering the Watchdog. Enter time (in seconds) from 5 to 900.
Select severity level the alarm will be assigned (0 through 1000).
Select defined Strategy (See Notification for information on setting up Strategies).
E. Configuring Notifiers
WIN-911 offers four different options for delivering alarm notifications; email, SMS, Voice and the WIN-911 Mobile App. The next step in the process is to create the Gateway connection for all desired notification methods and add the users as contacts in WIN-911. If you are not familiar with this process review the instructional How-to videos.
F. Configuring a Callout List (Tactics & Strategies)
This section will define how to create a notification list and using Tactics and Strategies. Alarms will trigger a strategy, which will then start a Tactic (callout list). If you're not familiar with this process, review the Tactics & Strategies Video.
The term tactic in WIN-911 refers to the callout list of users to be notified in the event of an alarm. Basic tactics are available with any WIN-911 license, while the Advanced Tactics are available only on the advanced license.
Retries - Additional notification events
Delay Between Retries - Time between notification retry.
Delay After - Allow time for the user to address the alarm before moving onto the next contact.
A strategy is the list of policies put in place when the alarm occurs. This includes the starting, stopping and re-notification actions. The alarm will occur which will start the strategy. Basic Strategies (shown here) are available on any license, and the Advanced Strategies require the Advanced license.
Start Tactic – Which callout list will be started
Stop Condition – When to stop the callout list.
Renotify on Any State Change – If the alarm changes states between unacknowledged/acknowledged or Active/Inactive, then the users in the tactic would be renotified. The stating, stopping and renotifying policies should be determined by the end-user during the configuration of WIN-911.
G. Bringing Alarms into WIN-911
To bring alarms into WIN-911, the CIMPLICITY data source supports two different methods. These are Filters and Imports.
It is recommended you use Filters, as it is a dynamic process. As such, Filters do not consume as much memory and other resources of the server.
For more information, please watch the GE CIMPLICITY Alarm Filters and Import video.
H. Testing and Troubleshooting
By now all the following steps have been completed:
- Connection between WIN-911 and CIMPLICITY
- Optional: Heartbeats
- Notifier Gateways
- Notifier Connections (people)
- Tactics and Strategies
- Alarms Brought Into WIN-911
The next step is to trigger a test alarm and verify it was sent to the proper user. If the alarm does not appear use the WIN-911 Log Viewer to troubleshoot the alarm.
1. Open windows explorer and find the Log Viewer tool
2. Verify the alarm was sent to the appropriate strategy:
3. Double click the alarm for more information about the dispatch process:
To create a support case, you will need either your Maintenance Support number or your CD Tracking number. You can create a Case online or contact the product support line: (512)326-1011.