This document is an overview of the required steps to integrate a Gilbarco device, such as a Passport, with a Savi Gateway device.
Savi can provide a hostname for this device upon request on a per-location basis.
You may need to reach out to your Gilbarco managed network provider in order to set up all of the necessary network configurations.
The Savi Gateway must be configured allowing it to communicate out to the following URLs:
device.getsavi.com
api-prod.getsavi.com
streaming.getsavi.com
video-relay.getsavi.com
delta-data.balena-cloud.com
registry-data.balena-cloud.com
164870711359.dkr.ecr.us-west-2.amazonaws.com
pool.ntp.org
What you’ll need
The Savi Gateway Device
Ethernet Cable
Passport POS System
Back Office Computer (optional)
Plugin the Savi Gateway device’s power, and ethernet cable.
Locate your Passport router’s DMZ Port:
If the DMZ Port is taken AND there’s a computer (Back Office Computer) plugged directly (or with the help of a switch) into the port you’ll need to setup the Back Office Computer to do SFTP uploads
If the DMZ Port is available (no Back Office Computer installed) then plug the other end of the Savi Gateway device’s ethernet cable to the free DMZ port.
Once the installation is finished we’ll need to get into the Passport POS to configure the XML Gateway
Note: If a Back Office computer is already installed some of the next configurations might be already set. It is necessary to double-check that ALL of the configuration options listed below are checked.
Action | Service | Source Interface | Source | Destination | Time |
Allow | BOSShare [139] | DMZ | 10.5.60.15 - 10.5.60.15 | 10.5.48.2 - 10.5.48.2 | Always |
Allow | FTP [21] | DMZ | 10.5.60.15 - 10.5.60.15 | 10.5.48.2 - 10.5.48.2 | Always |
Action | Service | Source Interface | Source | Destination | Time |
Allow | DNS [53] | DMZ | 10.5.60.15 - 10.5.60.15 | Any | Always |
Allow | NNTP [119] | DMZ | 10.5.60.15 - 10.5.60.15 | Any | Always |
Allow | NVR [1935] | DMZ | 10.5.60.15 - 10.5.60.15 | Any | Always |
Allow | HTTP [443] | DMZ | 10.5.60.15 - 10.5.60.15 | Any | Always |
Allow | All Traffic [1] | LAN | 10.5.48.2 - 10.5.48.2 | 10.5.60.14 - 10.5.60.17 | Always |
Make sure you are logged in with administrator privileges inside the “Manager Workstation”
From the Store menu, select the option Back Office, this will bring up the Interface Configuration Screen
The Interface Configuration Screen will display with three tabs: Document Generation, XML Gateway Polling Options and XML File Import Options
Interface Format:
The latest version should always be selected (NACS XML v3.4)
Document Generation:
From the list, make sure to click “Shift Close” on the following reports:
Items Sales Movement
Merchandise Code Movement
Note: It is preferable to select “Shift Close” rather than “Store Close” even if the store runs only one shift per day.
Generation Options:
The following checkboxes must be selected:
Generate Transaction Level Detail (PJR) (IMPORTANT)
Enforce Document Type Definition (DTD)
Reassign PLUs to Assume Department Changes
Calculate Net Sales for Merchandise Code Movement and Items Sales Movement
Drop UPC Check Digit
Make sure to keep in mind:
Generate Acknowledgement Files does not need to be selected unless it is being used by another Back Office System.
Use Manifest must be left unchecked, if selected, Passport will not start file processing until the manifest file is received. (Only for Gateway Device installations).
Combine Transaction Level Detail Files (PJR) should be left unchecked.
Make sure to check the option Enable XML Gateway File Polling. Enter the following configurations:
Enter Backoffice User Name: Either your current Back Office User or SAVI
Enter Backoffice Password: Either your current Back Office Password or SAVIpassport2020
Enter Directory Path to Push XML Files To Either your current Back Office drive or C:\Passport\XMLGateway\BOOutbox
After you click “Save”, click “OK” on the top message, “Yes” on the second and “Yes” on the third.
Obtain the IP Address for the Edge Device.
You must obtain the FortiGate Demilitarized Zone (DMZ) Port IP Address from the Phillips 66 Help Desk (1-800-426-3696) to derive the IP Address for the Edge Device. When you call the Phillips 66 Help Desk, provide the following information:
Passport RV042 Firewall Router WAN IP Address
Site Dealer Number
Based on this information, the Phillips 66 Help Desk will provide you the FortiGate DMZ Port IP Address. You can obtain the Edge Device IP Address by adding 1 to the value of the fourth octet of the FortiGate DMZ Port IP Address.
The following IP Address settings are used as samples in these instructions. These values are samples only; DO NOT use them for configuring a live site.
Passport RV042 Firewall Router WAN IP Address: 10.80.138.11
FortiGate DMZ Port IP Address: 172.20.164.129
BOS IP Address (add one to the FortiGate DMZ Port IP Address 172.20.164.129 + 0.0.0.1): 172.20.164.130
Plug the Edge Device into the FortiGate DMZ port using a standard CAT-5 Cable (not a crossover cable).
Configure the Edge Device in admin. You must use the FortiGate DMZ WAN IP Address as the Edge Device Default Gateway when configuring the app in admin, for example:
IP Address: 172.20.164.130
Subnet Mask: 255.255.255.224
Default Gateway: 172.20.164.129
You must replace the new Back Office IP Address in the Pull and Push paths on the MWS > Set Up > Back Office > Back Office Interface > XMLGateway Polling Options with the Edge Device IP address.
The path directory must include the specific IP Address of the Edge Device (for example, 172.20.164.130). Ensure that you do not change the remaining values for paths.
Ensure that the following RV042 Firewall Router Access Rule settings are correctly configured for the Edge Device to communicate with the Passport Server:
Enable the BOSShare rule.
Set the Source IP Address to the Edge Device IP Address (for example, 172.20.164.130).
Change Source interface from DMZ to WAN.
Click Save Settings.
Also, change the drive mapping for all drives mapped to the Passport Server from 10.5.60.1 (V8.02) or 10.5.48.2 (earlier than V8.02) to the Passport Router WAN IP (for example, 10.80.138.11). When the Edge Device prompts for username and password, enter passport as the username and pmcs382000 as the password.
Finding BOSShare on CISCO Router:
Illustrative Document specific for Phillips 66 other configurations may vary
Installing an Additional Hub/Switch on the DMZ (10.5.60.X)
When more than two third-party devices require connections to the DMZ, it will be necessary to accommodate additional LAN connections. This procedure must be used to install a Linksys 10/100 8-port Workgroup Switch (Q13708-01A) as an expansion device on the DMZ
Ensure that both the Linksys switch and Firewall Router are powered on.
Connect a CAT-5 Modular Cable between Port 1 of the Linksys 10/100 8-port Workgroup Switch and the DMZ Port.
Connect third-party devices to Ports 2-8 as required, through a CAT-5 modular cable.
Getting Access to Linksys Router
Note: It might be needed to login into the Linksys Router to enable firewall rules. The following steps utilize the default username and password, please keep in mind that clients may have changed these to a different value.
Ensure that the IP address of your laptop is programmed to:
IP address: 10.5.48.18
Subnet Mask: 255.255.255.192
Default Gateway: 10.5.48.1
Connect a CAT-5 cable between Port 1 of the Firewall Router and your laptop
Type 10.5.48.1 in the address bar of your web browser and press enter.
Enter admin as the Username and GVR09RV042
Log into the firewall router’s configuration page
Acces Port Management and ensure that the DMZ interface is enabled
Click save setting for changes to take effect.