Table of contents
iii · G&D Vision IP series
Network functions of the devices .................................................................... 27
NTP server ...................................................................................................... 27
Time sync with an NTP server...................................................................... 27
Manual setting of time and date....................................................................28
Logging syslog messages .................................................................................. 29
Local logging of syslog messages .................................................................. 29
Sending syslog messages to a server .............................................................. 30
Viewing and saving local syslog messages ..................................................... 31
User authentication with directory services ....................................................... 31
Setting up two-factor authentication on the device ............................................ 34
Monitoring functions ...................................................................................... 36
Viewing all monitoring values .......................................................................... 36
Enabling/disabling monitoring values .............................................................. 37
Advanced features for managing critical devices ............................................... 38
Displaying the list of critical monitoring values ............................................. 38
Confirm the alarm of a critical device ........................................................... 38
Monitoring devices via SNMP ........................................................................ 39
Practical use of the SNMP protocol .................................................................. 39
Configuring an SNMP agent ............................................................................ 39
Adding and Configuring SNMP traps ............................................................... 42
Users and groups ............................................................................................. 44
Efficient rights administration .......................................................................... 44
The effective right ........................................................................................ 44
Efficient user group administration ............................................................... 45
Administrating user accounts ........................................................................... 45
Creating a new user account.........................................................................46
Activating two-factor authentication .............................................................47
Renaming a user account ............................................................................. 50
Changing the password of a user account...................................................... 50
Changing the user account rights .................................................................. 51
Changing a user account’s group membership............................................... 51
Enabling or disabling a user account ............................................................. 52
Deleting a user account ................................................................................52
Administrating user groups .............................................................................. 53
Creating a new user group ............................................................................ 53
Renaming a user group ................................................................................ 54
Changing the user group rights ..................................................................... 54
Administrating user group members ............................................................. 55
(De)activating a user group........................................................................... 55
Deleting a user group ................................................................................... 55
System rights ................................................................................................... 56
Rights for unrestricted access to the system (Superuser) ................................. 56
Changing the login right to the web application.............................................56
Rights to change your own password ............................................................57
Authorization to confirm a monitoring alarm................................................ 57