Table of contents
iii · G&D VisionXS series
Network functions of the devices .................................................................... 28
NTP server ...................................................................................................... 28
Time sync with an NTP server...................................................................... 28
Manual setting of time and date....................................................................29
Logging syslog messages .................................................................................. 30
Local logging of syslog messages .................................................................. 30
Sending syslog messages to a server .............................................................. 31
Viewing and saving local syslog messages ..................................................... 32
User authentication with directory services ....................................................... 32
Setting up two-factor authentication on the device ........................................... 35
Monitoring functions ...................................................................................... 37
Viewing all monitoring values .......................................................................... 37
Enabling/disabling monitoring values .............................................................. 38
Advanced features for managing critical devices ............................................... 39
Displaying the list of critical monitoring values ............................................. 39
Confirm the alarm of a critical device ........................................................... 39
Monitoring devices via SNMP ........................................................................ 40
Practical use of the SNMP protocol .................................................................. 40
Configuring an SNMP agent ............................................................................ 40
Adding and Configuring SNMP traps ............................................................... 43
Users and groups ............................................................................................. 45
Efficient rights administration .......................................................................... 45
The effective right ........................................................................................ 45
Efficient user group administration ............................................................... 46
Administrating user accounts ........................................................................... 46
Creating a new user account.........................................................................47
Activating two-factor authentication .............................................................48
Renaming a user account ............................................................................. 51
Changing the password of a user account......................................................51
Changing the user account rights .................................................................. 52
Changing a user account’s group membership............................................... 53
Enabling or disabling a user account ............................................................. 54
Deleting a user account ................................................................................54
Administrating user groups .............................................................................. 55
Creating a new user group ............................................................................ 55
Renaming a user group ................................................................................ 56
Changing the user group rights ..................................................................... 56
Administrating user group members ............................................................. 57
(De)activating a user group........................................................................... 57
Deleting a user group ................................................................................... 57
System rights ................................................................................................... 58
Rights for unrestricted access to the system (Superuser) ................................. 58
Changing the login right to the web application.............................................58
Rights to change your own password ............................................................59
Authorization to confirm a monitoring alarm................................................ 59