動(dòng)環(huán)網(wǎng)管2.x課件10-v2idatacenter_第1頁
動(dòng)環(huán)網(wǎng)管2.x課件10-v2idatacenter_第2頁
動(dòng)環(huán)網(wǎng)管2.x課件10-v2idatacenter_第3頁
動(dòng)環(huán)網(wǎng)管2.x課件10-v2idatacenter_第4頁
動(dòng)環(huán)網(wǎng)管2.x課件10-v2idatacenter_第5頁
已閱讀5頁,還剩20頁未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、Training Courseware on V2.0 Security Data Center Course Objectives Know the functions of the security data center Know the running environment of the security data center Know how to operate the security data center 2Configuring and Using the Security Data Center 1Overview of the Security Data Cente

2、r Course Outline Overview of the Security Data CenterOverviewLocated at the center of the E-guard NMS, the security console software processes and maintains the information on access control, card reader, PMU image, PMU alarm, and EISU USB image. The security data center is networked through TCP/IP

3、communication, communicates with the PMU and E-guard NMS, and receives, analyzes, and processes the card scanning information, alarm information, image information, and access control data. It provides daily settings, functions of the access controller, and functions related to the PMU image and EIS

4、U USB image. 1.1. Installation Environment Software Environment:Operating system:Windows 2003 5.X database system: Sybase Open Client 11.9.2 12.5.3 client 1.6 database system: Microsoft SQL Server 2005(sp 3)Spread 7.0 control Hardware Environment: CPU: Intel P4 3.0 or peer compatible CPU (or above)M

5、emory: 2,048 MBHard disk: 200 GB or above Display card: 128 MB independent display card or above Display: 17-inch Super VGA; support the resolution of 1024x768, 100M Ethernet card of 24-bit color depth 2. Configuring and Using the Security Data Center 2.1 Installation1. Double-click the setup progra

6、m ZXM10-AppService.exe, and select the iDataCenter module. The setup program automatically checks whether any required plug-in unit is not available. Click Next until the installation is complete. 2.2 Configuring the Configuration File Two circumstances: 1) Configure the configuration file in the v5

7、.x NMS; 2) Configure the configuration file in the v1.6 NMS. Configuration under the V5.x system Configure the dllconfig.ini file. Open the dllconfig.ini file in the installation directory by using the notebook. Configuration of the zxm10.xml file Find the following parameter in the zxm10.xml file i

8、n the installation directory, and modify the parameter settings according to actual conditions. 1: 1 indicates the 1.6 version and 0 indicates the 5.X version. The parameter indicates that whether the V5.X node machine or V1.6 node machine is connected. Configurations of database connection: The sec

9、urity client and the security data center must use the same database on the same database server. Use the configuration tool DatabaseConfig.exe saved in respective installation CD-ROM to configure the database connection. 2. Configuration under the v1.6 system Configurations of database connect:Doub

10、le-click the DatabaseConfig.exe file in the installation path (default: C:ZTE E_guardUSMSiDataCenter) to configure the database connection. Normal Settings Double-click the Configtools file in the installation directory to display the Normal settings option. Set the LSC ID, node ID, and authenticati

11、on service address, and click Authentication test. If you pass the authentication test, the system automatically completes the following communication settings and database settings. 2.4 Management of the Security Data Center 1. Enter the data center: Open the security data center. If the connection

12、 is normal, the following interface pops up. It indicates that the security data center is connected to the security client normally. In the bus view, you can see the following window: 2. System Management System management mainly provides two functions: 1) Manage the operators; 2) Exit the system.

13、Managing the operators Only a super user has the right to manage the operators. Before using the function, the super user needs to enter his/her account and password. After passing the authentication, the super user can use the function, for example, add, modify, or delete an operator. The system en

14、sures that the super user is unique, and the super user cannot be added or deleted. Site rights The system can manage the site rights of the operators. After an operator obtains the rights over a site, the operator can see the authorized site after logging in to the security client. System Managemen

15、t Exit the system: If you click the Close button at the upper right corner, you will not exit the data center, but minimize the data center to the system bar. To exit the entire data center, you must click Exit the system in the menu (select Exit from the shortcut menu of the corresponding icon in t

16、he system bar). Manage the site rights of the operators under the V1.6 SQL server2005 database In the 1.6 system, user rights are configured through the NMS configuration program. Through the NMS configuration program, you can set the site rights of the group that a user belongs to. Through the V1.6

17、 configuration console, add a user group and then set the device rights for the user group. 3. Parameter setting Set the communication parameters Local service IP address: It is equal to a data interface that a data center provides for the outside. Other external security console clients can access

18、the data center through the data interface. (for a single device, use 127.0.0.1) To connect to the Level-3 security data center, you need to start the upper-level security console to be connected and enter the IP address and port of the Level-3 security data center. 3. Parameter setting Set the basi

19、c parametersSet the entire-network time synchronization parameters: If selecting the option, you can modify the existing time synchronization parameters. Set the current PC to a Level-3 monitoring center: Decide whether to select the option according to actual conditions. 3. Parameter setting Set th

20、e maintenance parameters Enable the maintenance status: If you select the option, the channel will not generate any alarm. In addition, the configured maintenance channel serves as the mark of hiding other alarms. If the maintenance channel generates some signals, the system hides the alarms according to the specified lead time and deferral time.

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論