Table of contents
2 · G&D Vision series (digital)
Logging syslog messages .................................................................................. 32
Local logging of syslog messages .................................................................. 32
Sending syslog messages to a server .............................................................. 33
Viewing and saving local syslog messages ..................................................... 34
User authentication with directory services ....................................................... 34
Monitoring functions ...................................................................................... 37
Viewing all monitoring values .......................................................................... 37
Enabling/disabling monitoring values .............................................................. 38
Advanced features for managing critical devices ............................................... 39
Displaying the list of critical monitoring values ............................................. 39
Confirm the alarm of a critical device ........................................................... 39
Monitoring devices via SNMP ........................................................................ 40
Practical use of the SNMP protocol .................................................................. 40
Configuring an SNMP agent ............................................................................ 40
Adding and Configuring SNMP traps ............................................................... 43
Users and groups ............................................................................................. 45
Efficient rights administration .......................................................................... 45
The effective right ........................................................................................ 45
Efficient user group administration ............................................................... 46
Administrating user accounts ........................................................................... 46
Creating a new user account.........................................................................47
Renaming a user account ............................................................................. 47
Changing the password of a user account...................................................... 48
Changing the user account rights .................................................................. 49
Changing a user account’s group membership............................................... 50
Enabling or disabling a user account ............................................................. 50
Deleting a user account ................................................................................51
Administrating user groups .............................................................................. 51
Creating a new user group ............................................................................ 51
Renaming a user group ................................................................................ 52
Changing the user group rights ..................................................................... 52
Administrating user group members ............................................................. 53
(De)activating a user group........................................................................... 53
Deleting a user group ...................................................................................53
System rights ................................................................................................... 54
Rights for unrestricted access to the system (Superuser) ................................. 54
Changing the login right to the web application.............................................54
Rights to change your own password ............................................................55
Authorization to confirm a monitoring alarm................................................ 55
Advanced functions of the KVM system ......................................................... 56
Identifying a device by activating the Identification LED .................................... 56
Saving and restoring the data of the KVM system ............................................. 56