0183 Bad Crc Of Security Setting In Efi Variable

2 views
Skip to first unread message

Karri Pretty

unread,
Aug 3, 2024, 6:12:37 PM8/3/24
to respstotmanku

Why is this happening as we have this on multiple devices. We lock the BIOS down due to the company policy. Users can not clear this . I want to know why this is happening on random devices. It seems to be when the power gets low and then the tmp chip gets disabled and the users then can not log on. You have to clear this by going into the BIOS as an admin and enabling the tmp chip in the security tab settings. Any ideas would be great- this is on a Gen 2 E15 Think Pad.

You could create a Win 10 battery report to check the battery status. Compare the Design Capacity value versus the Full Charge capacity value. That should let you know if they're any good or not and at least may eliminate the battery as the potential problem if they're OK.

When NMEA-0183 output is enabled, a subset of NMEA-0183 messages can be output to external instruments and equipment connected to the receiver serial ports. These NMEA-0183 messages let external devices use selected data collected or computed by the GNSS receiver.

All messages conform to the NMEA-0183 version 3.01 format. All begin with $ and end with a carriage return and a line feed. Data fields follow comma (,) delimiters and are variable in length. Null fields still follow comma (,) delimiters, but contain no information.

I completely agree with your observations. It is usually not too difficult to connect the (+) phase outputs to the appropriate inputs, but handling the signal grounds or the (-) phase outputs and inputs can be very confusing. I suspect that some manufacturers have provided unbalanced or single-ended outputs yet have marked the signal ground with a (-), implying a differential output and adding to the confusion of how to properly connect them.
When you add other variables to the interconnection, such as baud rate, it can be come even more frustrating.
My current NMEA-0183 interconnections resemble yours, although slightly neater.

NMEA-0183 does specify a baud rate so that should not be a variable. Most of the time you can wire the NMEA (-) to ground on both sides, the transmit and the receive units, that is unless isolation is actually required (NMEA is supposed to be opto isolated.) Then one wire is required from the power strip to the comms strip and you can connect the negitives of all units into it. NMEA 2000 might not be the answer that people think as it is not really widely supported even now, there are still many units without it and of course all the existing units out there. NMEA 0183 will be with us for a long time to come I think.

I have worked the commercial marine electronics field for some 30 years and disagree with your argument. Once the professional approach is followed NMEA 0183 is a better system to me. First neatness always is important, not just for looks but the integrity of the connections. Last thing I want is to begin working on a wiring mess like you show and have wires pop off because they are not secured. Second only the toy electronics uses single wire and DC ground, that is just asking for trouble. As for no standard plug or connector, that provides ultimate flexibility in connecting, no plugs to match up or terminators required. The baud rate should be available from the equipment manual, then set accordingly. There usually are only two baud rates used 4800 low speed and 38,400 high speed. A laptop with a simple data reader can check the data, confirm sentences and baud rate. Once there is a problem on the NMEA2000 backbone it can shut down the whole network. Then you must disconnect plugs while keeping the terminations in place until the defective part is found. Or invest in an expensive NMEA2000 meter.

This manual documents Venus OS Large. Venus OS is the the software running on our Cerbo GX monitoring device as well as other GX devices. Venus OS Large is an extended version of the common software, adding Node-RED and Signal K server.

Node-RED offers PLC like programming for connecting hardware devices, APIs and online services. It provides a browser-based editor that makes it easy to wire together flows. With it, one can for example program a functionality such as activating a relay based on a temperature measurement combined with time. Or make far more complex algorithms, tying relays, measurements, or other data available from Venus OS or elsewhere together. All without having to write real source code. Node-RED is also called Low-code programming for event-driven applications.

The the official Signal K documentation provides more information about Signal K itself. Note that many of the information about how to install Signal K does not apply: it comes pre-installed on the Victron GX devices when installing Venus OS Large.

To access the Node-RED flow editor, type :1881/. Note that it might be necessary to replace venus.local by an IP address, for example like this: :1881/. It is normal for the browser to show a security warning. Proceed according to browsers instructions.

Node-RED is a tool for connecting hardware devices, APIs and online services in new and interesting ways. It provides a browser-based editor that makes it easy to wire together flows. With it, one can for example program a functionality such as activating a relay based on a temperature measurement. Or make far more complex algorithms, tying relays, measurements, or other data available from Venus OS or elsewhere together. All without having to write real source code, as Node-RED calls Low-code programming for event-driven applications.

The Node-RED editor can be accessed from your LAN at :1881/. For some systems, you'll have to replace venus.local by the ip-address. You can also access the Node-RED editor from VRM, where it is available via the Venus OS Large menu.

For developers: source code for the node-red-contrib-victron modules is here, and note that updating is not possible from either the Node-RED editor as the commandline. The recommended way to get to the new node-red-contrib-victron version is to await a new Venus OS large build.

Its not possible to control the alarm relay nor the AC-out 2 contactor of our inverter/chargers. Also, there are no plans to make them controllable remotely, which includes no plans to make them controllable from within Node-RED either.

The only charger which has a relay that is controllable is the Smart IP43 Charger. To use that for remote control, set its mode, using the VictronConnect app, to be remote controllable. Note that its use is limited: the relay is only powered (and thus only controllable) when the charger is switched on. It doesn't work when it's turned off with AC connected. This limitation applies to the 230V models as well as the later 120V/240V models.

Once that is done, you can find the nodes in the palettes on the left. Once the dashboard has been configured and deployed, an extra tile will appear in the Venus OS Large menu on VRM, allowing to connect to the dashboard via VRM.

WARNING: the vast majority of systems using Node-RED will not, and should not (!), have to modify any of the files here described. Venus OS itself, including Venus OS large and Node-RED, is made such that its not necessary to dive into the command line.

To access data from the VRM API, a VRM access token is needed. This is done by going to the access token part of VRM and add a new token. Once generated, store the access token in your password vault as you won't be able to retrieve it again.

Since Venus OS 2.90 and on wards, Node-RED no longer runs as user root, but as user nodered. This means that the Node-RED flows are only allowed to access files and directories that are owned by the nodered user. These files typically start below /data/home/nodered/. So modifying the storage location to something like /data/home/nodered/storage.txt ought to work.

In case you see that there is a newer version Victron pallette available online, and thats not yet shipping in a Venus OS Large version, then the only option is to wait: a new Venus OS Large version is usually made available shortly after updating that pallette.

Password protection of Node-Red is linked to the remote console. If a password is set for the remote console, this password is also used for securing Node-Red. The username is admin, the password is the remote console password.

No, at least not into the node-red instance which comes as part of Venus OS Large. To @signalk/node-red-embedded, we recommend to use the node-red plugin/instance that can optionally be installed into signalk:

This is seen when trying to remove a module that has been previously uninstalled, but left some files behind. After which Node-RED is incapable of completely removing the module. This is probably a remnant of upgrading an old version of Node-RED to a newer. What we've seen is that the module is still on the disk, but Node-RED no longer is aware of it in its configuration. The way to recover from this is to add the module to the Node-RED configuration again. This can be done by performing the following steps:

Another implication might be that you need to prepend the connection with https instead of http and change the port from 1880 to 1881. So you should connect to :1881/ for Node-RED. If your browser still wants to connect to the old http way, you may get an ERR_EMPTY_RESPONSE. Adjust the url in your browser to connect to the https site instead.

Finally, if you want to use the Node-RED command line interface for administration, you will run into the Error: self signed certificate error. This can be solved by setting the NODE_EXTRA_CA_CERTS environment variable to /data/etc/ssl/venus.local.crt like so:

There are some nodes that are only able to connect to a http site. In that case you probably also want to enable http on port 1880. This can be achieved by creating (or adding to) a user configuration file /data/home/nodered/.node-red/settings-user.js, containing:

In order to keep the context data, it is needed to store the context to disk. This can be achieved by creating (or adding to) a user configuration file /data/home/nodered/.node-red/settings-user.js, containing:

c80f0f1006
Reply all
Reply to author
Forward
0 new messages