动环网管2.x课件10-v2idatacenter_第1页
动环网管2.x课件10-v2idatacenter_第2页
动环网管2.x课件10-v2idatacenter_第3页
动环网管2.x课件10-v2idatacenter_第4页
动环网管2.x课件10-v2idatacenter_第5页
已阅读5页,还剩20页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Training Courseware on V2.0 Security Data Center Course Objectives Know the functions of the security data center Know the running environment of the security data center Know how to operate the security data center 2Configuring and Using the Security Data Center 1Overview of the Security Data Cente

2、r Course Outline Overview of the Security Data CenterOverviewLocated at the center of the E-guard NMS, the security console software processes and maintains the information on access control, card reader, PMU image, PMU alarm, and EISU USB image. The security data center is networked through TCP/IP

3、communication, communicates with the PMU and E-guard NMS, and receives, analyzes, and processes the card scanning information, alarm information, image information, and access control data. It provides daily settings, functions of the access controller, and functions related to the PMU image and EIS

4、U USB image. 1.1. Installation Environment Software Environment:Operating system:Windows 2003 5.X database system: Sybase Open Client 11.9.2 12.5.3 client 1.6 database system: Microsoft SQL Server 2005(sp 3)Spread 7.0 control Hardware Environment: CPU: Intel P4 3.0 or peer compatible CPU (or above)M

5、emory: 2,048 MBHard disk: 200 GB or above Display card: 128 MB independent display card or above Display: 17-inch Super VGA; support the resolution of 1024x768, 100M Ethernet card of 24-bit color depth 2. Configuring and Using the Security Data Center 2.1 Installation1. Double-click the setup progra

6、m ZXM10-AppService.exe, and select the iDataCenter module. The setup program automatically checks whether any required plug-in unit is not available. Click Next until the installation is complete. 2.2 Configuring the Configuration File Two circumstances: 1) Configure the configuration file in the v5

7、.x NMS; 2) Configure the configuration file in the v1.6 NMS. Configuration under the V5.x system Configure the dllconfig.ini file. Open the dllconfig.ini file in the installation directory by using the notebook. Configuration of the zxm10.xml file Find the following parameter in the zxm10.xml file i

8、n the installation directory, and modify the parameter settings according to actual conditions. 1: 1 indicates the 1.6 version and 0 indicates the 5.X version. The parameter indicates that whether the V5.X node machine or V1.6 node machine is connected. Configurations of database connection: The sec

9、urity client and the security data center must use the same database on the same database server. Use the configuration tool DatabaseConfig.exe saved in respective installation CD-ROM to configure the database connection. 2. Configuration under the v1.6 system Configurations of database connect:Doub

10、le-click the DatabaseConfig.exe file in the installation path (default: C:ZTE E_guardUSMSiDataCenter) to configure the database connection. Normal Settings Double-click the Configtools file in the installation directory to display the Normal settings option. Set the LSC ID, node ID, and authenticati

11、on service address, and click Authentication test. If you pass the authentication test, the system automatically completes the following communication settings and database settings. 2.4 Management of the Security Data Center 1. Enter the data center: Open the security data center. If the connection

12、 is normal, the following interface pops up. It indicates that the security data center is connected to the security client normally. In the bus view, you can see the following window: 2. System Management System management mainly provides two functions: 1) Manage the operators; 2) Exit the system.

13、Managing the operators Only a super user has the right to manage the operators. Before using the function, the super user needs to enter his/her account and password. After passing the authentication, the super user can use the function, for example, add, modify, or delete an operator. The system en

14、sures that the super user is unique, and the super user cannot be added or deleted. Site rights The system can manage the site rights of the operators. After an operator obtains the rights over a site, the operator can see the authorized site after logging in to the security client. System Managemen

15、t Exit the system: If you click the Close button at the upper right corner, you will not exit the data center, but minimize the data center to the system bar. To exit the entire data center, you must click Exit the system in the menu (select Exit from the shortcut menu of the corresponding icon in t

16、he system bar). Manage the site rights of the operators under the V1.6 SQL server2005 database In the 1.6 system, user rights are configured through the NMS configuration program. Through the NMS configuration program, you can set the site rights of the group that a user belongs to. Through the V1.6

17、 configuration console, add a user group and then set the device rights for the user group. 3. Parameter setting Set the communication parameters Local service IP address: It is equal to a data interface that a data center provides for the outside. Other external security console clients can access

18、the data center through the data interface. (for a single device, use 127.0.0.1) To connect to the Level-3 security data center, you need to start the upper-level security console to be connected and enter the IP address and port of the Level-3 security data center. 3. Parameter setting Set the basi

19、c parametersSet the entire-network time synchronization parameters: If selecting the option, you can modify the existing time synchronization parameters. Set the current PC to a Level-3 monitoring center: Decide whether to select the option according to actual conditions. 3. Parameter setting Set th

20、e maintenance parameters Enable the maintenance status: If you select the option, the channel will not generate any alarm. In addition, the configured maintenance channel serves as the mark of hiding other alarms. If the maintenance channel generates some signals, the system hides the alarms according to the specified lead time and deferral time.

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论