Delete Network First Capture
Delete Network First Capture deletes the device's network first capture relationship to the network environment to which it is currently registered.
When a Gen5 ERT or meter enters a network, it executes a security certificate exchange with the network to establish the relationship between the device and the network as a trusted one. After the device establishes a trusted relationship to the network it registers itself with the network. However, it is possible that the first network the device establishes a trusted relationship is not the network that it should remain registered with.
The Delete Network First Capture command prompts you for inputs. The inputs vary by device. Expand the device type you're working with for its input details. For descriptions of the results, see Result and success fields.

Field |
Description |
---|---|
Endpoint ID |
Type or scan the ID number of the device you are working with. This number is assigned to each device at the time of manufacture. It uniquely distinguishes the device from all others. |

Field |
Description |
---|---|
Endpoint ID |
Type or scan the ID number of the device you are working with. This number is assigned to each device at the time of manufacture. It uniquely distinguishes the device from all others. |
Warning |
This will clear the application keys and it will take a minimum of 24 hours to reestablish security to the existing head end system. The head end system will not be able to read this module until security is reestablished. |

Field |
Description |
---|---|
Endpoint ID |
Type or scan the ID number of the device you are working with. This number is assigned to each device at the time of manufacture. It uniquely distinguishes the device from all others. |
Warning |
This will clear the application keys and it will take a minimum of 24 hours to reestablish security to the existing head end system. The head end system cannot read this module until security is reestablished. |

Field |
Description |
---|---|
Endpoint ID |
Type or scan the ID number of the device you are working with. This number is assigned to each device at the time of manufacture. It uniquely distinguishes the device from all others. |
Warning |
This will clear the application keys and it will take a minimum of 24 hours to reestablish security to the existing head end system. The head end system cannot read this module until security is reestablished. |

Field |
Description |
---|---|
Endpoint ID |
Type or scan the ID number of the device you are working with. This number is assigned to each device at the time of manufacture. It uniquely distinguishes the device from all others. |
Warning |
This will clear the application keys and it will take a minimum of 24 hours to reestablish security to the existing head end system. The head end system cannot read this module until security is reestablished. |