By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port.

Size: px
Start display at page:

Download "By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port."

Transcription

1 Settings Settings...1 Introduction...2 Core...2 port...2 standalone...2 pid-file...2 log-file...2 log-level...2 whitelist...3 stats-enable...3 watchdog-enable...3 Module Paths...4 action-root...4 function-root...4 hardware-root...4 operator-root...4 protocol-root...4 Webserver...5 webgui-websockets...5 webserver-authentication...5 webserver-cache...5 webserver-enable...5 webserver-http-port...5 webserver-https-port...6 webserver-root...6 webserver-user...6 Firmware...7 firmware-gpio-miso...7 firmware-gpio-mosi...7 firmware-gpio-reset...7 firmware-gpio-sck...7 SMTP...8 smtp-sender...8 smtp-user...8 smtp-password...8 smtp-host...8 smtp-port...8 Miscellaneous...9 ntp-servers...9

2 Introduction The way pilight functions can be altered by changing various settings. All pilight settings will be described in this chapter grouped by their respective category. Core port 1 "port": 5000 By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port. standalone 1 "standalone": 0 When pilight starts, it will first check if there are other instances running inside the same network. If it does, it will connect to the other pilight instance and will join or create the AdHoc network. If you want to force pilight into running as a standalone daemon, you can set the standalone setting to 1. When running pilight in standalone mode, the SSDP server will also be disabled. This means that other pilight clients will not be able to discover it using SSDP. pid-file Linux and *BSD 1 "pid-file": "/var/run/pilight.pid" The pid-file is used by pilight to save the process id number of the pilight-daemon. pilight itself uses this information as one of the ways to determine if pilight is already running or not. This setting must contain a valid path to store the pid-file log-file Linux and *BSD Windows 1 "log-file": "/var/log/pilight.log" 2 "log-file": "c:/pilight/pilight.log" The log-file is used by pilight to various information gathered while pilight is running. This information can be used to debug errors or gather information about triggered actions. This setting must contain a valid path to store the log-file. log-level 1 "log-level": 4 The log-level tells pilight what messages it should log into the log-file. The higher the log-level the more messages are logged into the log-file. The highest log-level is 6 and the lowest is 0. These log-levels correspond to the following log types: 0 = emergency, 1 = alert, 2 = critical, 3 = error, 4 = warning, 5 = notification, and 6 = information.

3 whitelist 1 "whitelist": [ "*.*.*.*" ] All software able to use socket connections can communicate to pilight. Such software can be pilightreceive, a user visiting the webgui, or external pilight plugins such a provided by FHEM. If you want to limit the computers in your network that can connect to pilight, you set up a whitelist. This setting should contain a list of valid IPv4 addresses that are allowed to connect to pilight. All other IPs will be blocked. If you want to allow IPv4 ranges, you can specify them by using wildcards. For example, if we want to allow all IP addresses ranging from to we can add the IP address * to the list. If we want to allow all IP addresses ranging from to we can add the IP address 10.0.*.* to the list. Each whitelist entry should contain a valid IPv4 address with or without using wildcards. stats-enable 1 "stats-enable": 1 pilight monitors its own CPU and RAM resource usage. This information can be shared with external clients and is shared by default with the websockets connections. If you want to disable the display of the CPU and RAM statistics and/or want to disable the communication of these statistics over the websocket connection you can set this to 0. This setting can be either 0 or 1. watchdog-enable 1 "watchdog-enable": 1 pilight monitors its own CPU and RAM resource usage. This information is used to shutdown or terminate pilight when it uses too much CPU or RAM. If want to disable this watchdog feature and therefor the automatic termination of pilight when needed, you can set this setting to 0. This setting can be either 0 or 1.

4 Module Paths pilight has the possibility to load various external modules to enhance its functionality. These modules are single files and should be placed in fixed folders. However, these folders locations can be changed by altering one of the following settings. There is generally no reason to load external modules. The latest pilight version always contains the latest protocols, hardware drivers, event operators, functions, and actions. action-root Linux and *BSD 1 "action-root": "/usr/local/lib/pilight/action" pilight event actions are loaded from the action-root folder. The action-root setting must contain a valid path. function-root Linux and *BSD 1 "function-root": "/usr/local/lib/pilight/function" pilight event function are loaded from the function-root folder. The function-root setting must contain a valid path. hardware-root Linux and *BSD 1 "hardware-root": "/usr/local/lib/pilight/hardware" External pilight hardware drivers are loaded from the hardware-root folder. The hardware-root setting must contain a valid path. operator-root Linux and *BSD 1 "operator-root": "/usr/local/lib/pilight/operator" pilight event operators are loaded from the operators-root folder. The operators-root setting must contain a valid path. protocol-root Linux and *BSD 1 "protocol-root": "/usr/local/lib/pilight/protocol" External pilight protocols are loaded from the protocol-root folder. The protocol-root setting must contain a valid path.

5 Webserver The following settings change the way the internal webserver will serve the internal pilight webgui or it can be disabled altogether. webgui-websockets 1 "webgui-websockets": 1 By default the webgui communicates to pilight by using websockets. This is a relatively new technique that allows us to receive all changes from pilight instead of having to poll pilight for changes. The problem is that some older devices and browsers do not support websockets, but they do support the polling technique. So to disable the websockets and use polling instead we set webgui-websockets setting to 0. This setting can be either 0 or 1. webserver-authentication 1 "webserver-authentication": [ "username", "password" ] By default, pilight can be controlled from the webgui by anyone that can access it. If you want to prevent this, you can secure the webgui with a username and password. The username should be in plain text, the password is SHA256 encrypted. Use pilight-sha256 to create the encrypted password hash. Regular SHA256 encryption tools will not work because pilight hashes the password several thousand times. pi@pilight ~# pilight-sha256 -p admin 4f32102debed8dabd87e88cf84c752ccb23a74b29f90b42edde05cbc7be41f80 So if we want to use a username user and password admin the values should look like this: 1 [ "user", "4f32102debed8dabd87e88cf84c752ccb23a74b29f90b42edde05cbc7be41f80" ] webserver-cache 1 "webserver-cache": 1 pilight has the ability to cache all files used for the webgui. This reduces the amount of reads done from the SD card on devices like the Raspberry Pi and Hummingboard, and makes it faster to load the webgui from devices with a slow internal storage such as routers. This setting can be either 0 or 1. webserver-enable 1 "webserver-enable": 1 The pilight webserver can be turned off as a whole. This could be useful if you do not want to use the webgui at all or if you want to use your own webserver implementation. This setting can be either 0 or 1. webserver-http-port 1 "webserver-http-port": 5001 The pilight webserver runs by default on the non-standard port This is done to prevent interference with other webservers running on the default HTTP port 80. If you do want to run the webserver on port 80 or any other port, you can change this setting. The port specified must be a valid and unused port.

6 webserver-https-port not supported by default 1 "webserver-https-port": 5002 The webserver does not allow secure connections by default. Currently the only way to get HTTPS support is by manually compiling pilight. The pilight secure webserver runs by default on the non-standard port This is done to prevent interference with other webservers running on the default HTTPS port 443. If you do want to run the secure webserver on port 443 or any other port, you can change this setting. The port specified must be a valid and unused port. webserver-root 1 "webserver-root": "/usr/local/share/pilight/" The webserver root tells pilight where it should look for all files that should be served by the webserver. This setting must contain a valid path. webserver-user Linux *BSD 1 "webserver-user": "www-root" 2 "webserver-user": "www" The webserver runs by default as a non-root user. This to prevent the execution of malicious code. If you want to force the webserver to run as the root user or any other system user, you can change this setting accordingly. This setting needs to contain a valid system user.

7 Firmware pilight provides an easy tool to flash the firmware of several microcontrollers in the form of pilight-flash. pilight flashes microcontrollers by using either bitbanging or through USB. To use bitbanging we need four GPIOs. These GPIOs are by default configured for usage on a Raspberry Pi. They can however, be changed to other GPIOs according to the device you want to use. Each GPIO is named according to the SPI requirements, but any GPIO can be used because we are not actually using SPI to communicate with our microcontrollers. In pilight the SPI identifiers MISO, MOSI, Reset and SCK are only used to separate the different GPIO. If you are unsure what valid GPIOs are on your platform, please refer to the documentation. firmware-gpio-miso Linux and *BSD 1 "firmware-gpio-miso": 13 This setting defines the GPIO pin to be used as MISO. Any valid GPIO for your platform can be used. firmware-gpio-mosi Linux and *BSD 1 "firmware-gpio-mosi": 12 This setting defines the GPIO pin to be used as MOSI. Any valid GPIO for your platform can be used. firmware-gpio-reset Linux and *BSD 1 "firmware-gpio-reset": 10 This setting defines the GPIO pin to be used as Reset. Any valid GPIO for your platform can be used. firmware-gpio-sck Linux and *BSD 1 "firmware-gpio-sck": 14 This setting defines the GPIO pin to be used as SCK. Any valid GPIO for your platform can be used.

8 SMTP pilight has the capability to communicate with several types of mail servers. This offers pilight the possibility to use for example mail actions inside our event rules, so messages can be sent in case of a certain event. Most users will have an account from their internet hosting provider or free mail solutions can be used like gmail. In case of a (non-existing) gmail account named: pilight@gmail.com with password: foobar, the SMTP settings should be configured like this: 1 "smtp-sender": "pilight@gmail.com", 2 "smtp-host": "smtp.gmail.com", 3 "smtp-port": 465, 4 "smtp-user": "pilight@gmail.com", 5 "smtp-password": "foobar" smtp-sender 1 "smtp-sender": "...@...com" The smtp-sender requires a valid address. As soon as a mail is sent by pilight, this address will be used as the address from with the mail was sent. smtp-user 1 "smtp-user": "...@...com" The smtp-user requires a valid address. This address is used to validate the account details at the provider. smtp-password 1 "smtp-password": "..." The smtp-password is used to validate the account details at the provider together with the smtpuser setting. The password should therefore be a valid password for this account. smtp-host 1 "smtp-host": "smtp.foo.com" The smtp-host setting should contain a valid mail server host name. Normally, the host name is similar to name of the internet hosting provider. smtp-port 1 "smtp-host": "smtp.foo.com" The smtp-port should contain a valid smtp server port. This can currently be either 25, 465, or 587. pilight will communicate over a secure connection when using port 465, when using port 25 or 587 it will depend on the server how pilight will set-up the connection.

9 Miscellaneous ntp-servers 1 "ntp-servers": [ "eu.pool.ntp.org", "uk.pool.ntp.org" ] One important feature of any automation setup is the ability to trigger time based actions. However, these events greatly rely on a correct date and time. Problems occur when the system time is not set to the correct time (for our specific timezone). This can happen on systems like the Raspberry Pi which does not have a RTC that allows it to keep track of time when turned off. To overcome this problem pilight has the ability to retrieve the correct time by synchronizing with NTP servers. You can pick any server from Any number of servers can be added to the ntp-servers list. pilight will first try to synchronize with the first server. If this fails it will try the second server etc. It will continue this process until an actual response was received.

CYAN SECURE WEB APPLIANCE. User interface manual

CYAN SECURE WEB APPLIANCE. User interface manual CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

SNMP-1 Configuration Guide

SNMP-1 Configuration Guide SNMP-1 Configuration Guide You must configure the Net Logic Card before it can operate properly. You have two methods to configure the Net Logic Card: Using telnet or terminal. Using Telnet 1. Make sure

More information

SyncThru TM Web Admin Service Administrator Manual

SyncThru TM Web Admin Service Administrator Manual SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included

More information

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc.

This section will focus on basic operation of the interface including pan/tilt, video, audio, etc. Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System

More information

Dell OpenManage Mobile Version 1.4 User s Guide (Android)

Dell OpenManage Mobile Version 1.4 User s Guide (Android) Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION

More information

Updating the BIOS and BMC on the FreeNAS Mini

Updating the BIOS and BMC on the FreeNAS Mini Updating the BIOS and BMC on the FreeNAS Mini Oct 15, 2014 ixsystems, Inc. These instructions are for updating the BMC (IPMI controller) and the BIOS for the FreeNAS Mini. You will also need the following

More information

Prerequisites and Configuration Guide

Prerequisites and Configuration Guide Prerequisites and Configuration Guide Informatica Support Console (Version 2.0) Table of Contents Chapter 1: Overview.................................................... 2 Chapter 2: Minimum System Requirements.................................

More information

- 1 - SmartStor Cloud Web Admin Manual

- 1 - SmartStor Cloud Web Admin Manual - 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage

More information

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The

How To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The 1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...

More information

Configuration Manual

Configuration Manual Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually

More information

How To Synchronize the easystore to the AD

How To Synchronize the easystore to the AD Index Firmware update/check 2 Re-initialization of the easystore 3 Checking Active Directory server 5 AD authentication mode 6 1 of 7 Firmware update/check It is very important to check the firmware of

More information

Preinstallation Requirements Guide

Preinstallation Requirements Guide Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

Embedded Based Web Server for CMS and Automation System

Embedded Based Web Server for CMS and Automation System Embedded Based Web Server for CMS and Automation System ISSN: 2278 909X All Rights Reserved 2014 IJARECE 1073 ABSTRACT This research deals with designing a Embedded Based Web Server for CMS and Automation

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.

Manual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry. IP Sensor and Watchdog IPSW2210 Manual Relay Output Power input 12VDC adapter LED Indicators 1 wire 2 Dry Output Green : Power Yellow: Link temperature & humidity contact inputs LED indicator sensor input

More information

Linux VPS with cpanel. Getting Started Guide

Linux VPS with cpanel. Getting Started Guide Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3

More information

Network/Floating License Installation Instructions

Network/Floating License Installation Instructions Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

Dual Bay Home Media Store. User Manual

Dual Bay Home Media Store. User Manual Dual Bay Home Media Store User Manual CH3HNAS2 V1.0 CONTENTS Chapter 1: Home Page... 3 Setup Wizard... 3 Settings... 3 User Management... 3 Download Station... 3 Online User Manual... 3 Support... 3 Chapter

More information

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1

DMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1 pg. 1 DMH remote access Table of Contents 1 Remote access description... 2 1.1 Single module remote access... 3 1.2 Multiple modules remote access... 6 1.3 REMARKS/PITFALLS... 10 2 Dynamic DNS... 9 pg.

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information

READYNAS INSTANT STORAGE. Quick Installation Guide

READYNAS INSTANT STORAGE. Quick Installation Guide READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux

More information

Zebra Ethernet. Frequently Asked Questions

Zebra Ethernet. Frequently Asked Questions Zebra Ethernet Frequently Asked Questions Zebra Technologies Corporation Card Imaging Division 1001 Flynn Road Camarillo, CA 93012 USA Phone: (805) 579-1800 Fax: (805) 579-1808 www.cards.zebra.com 2004

More information

Remote PC Guide for Standalone PC Implementation

Remote PC Guide for Standalone PC Implementation Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.

More information

Wireless G Broadband quick install

Wireless G Broadband quick install Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install

More information

1 Functionalities of iq.suite Update Manager... 3. 2 Installation... 5. 2.1 New Installation... 5. 2.2 Update Installation... 8. 3 Configuration...

1 Functionalities of iq.suite Update Manager... 3. 2 Installation... 5. 2.1 New Installation... 5. 2.2 Update Installation... 8. 3 Configuration... Contents 1 Functionalities of iq.suite Update Manager... 3 2 Installation... 5 2.1 New Installation... 5 2.2 Update Installation... 8 3 Configuration... 9 3.1 Configuration of iq.suite Update Manager...

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Polycom RealPresence Resource Manager System Getting Started Guide

Polycom RealPresence Resource Manager System Getting Started Guide [Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

CHAPTER 2: USING THE CAMERA WITH THE APP

CHAPTER 2: USING THE CAMERA WITH THE APP TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:

More information

Embedded Web Server Security

Embedded Web Server Security Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,

More information

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents

8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.6 Contents 1.0 - Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft

More information

Embedded Web Server Security

Embedded Web Server Security Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,

More information

VMware vcenter Log Insight Security Guide

VMware vcenter Log Insight Security Guide VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Hills Professional Series NVRs and Cameras

Hills Professional Series NVRs and Cameras FAQs Hills Professional Series NVRs and Cameras (V1.1) 1. What is the default NVR resolution? By Default NVR video output resolution is 1080P. Resolution may be changed if necessary to suit the attached

More information

Deployment Guide: Transparent Mode

Deployment Guide: Transparent Mode Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This

More information

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-

3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R- MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features

More information

SiteCount v2.0 Revised: 10/30/2009

SiteCount v2.0 Revised: 10/30/2009 SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation

More information

Smart Card Authentication Client. Administrator's Guide

Smart Card Authentication Client. Administrator's Guide Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

System Admin Module User Guide. Schmooze Com Inc.

System Admin Module User Guide. Schmooze Com Inc. Schmooze Com Inc. Chapters Overview Using the Module DDNS DNS Email Setup FTP Server Intrusion Detection License Network Settings Notification Settings Port Management Power Options Storage Time Zone Updates

More information

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.

Increased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time. , page 1 This chapter provides an overview of the Cisco Cisco Unified Communications Manager service and describes how to configure the Cisco Cisco Unified Communications Manager feature. The feature allows

More information

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2

Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2 Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

IEI emerge and Dedicated Micros Digital Video Recorder. Install, Setup, and Integration Guide. Version 3.0 and above

IEI emerge and Dedicated Micros Digital Video Recorder. Install, Setup, and Integration Guide. Version 3.0 and above IEI emerge and Dedicated Micros Digital Video Recorder Install, Setup, and Integration Guide Version 3.0 and above CONTENTS DVR Features Requirements List...3 Hardware...3 Software and Licenses...3 Upgrading

More information

CAC/PIV PKI Solution Installation Survey & Checklist

CAC/PIV PKI Solution Installation Survey & Checklist CAC/PIV PKI Solution Installation Survey & Checklist Konica Minolta CAC/PIV Solution Revision: 1.3 Date: 10/19/09 1 Document Overview This document must be completed and used as a checklist or questionnaire

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.

Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc. Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4

More information

E-Blocks Easy Internet Bundle

E-Blocks Easy Internet Bundle Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

System Requirements - filesmart

System Requirements - filesmart System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed

More information

USER GUIDE EDBG. Description

USER GUIDE EDBG. Description USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel

More information

Using Debug Commands

Using Debug Commands Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?

More information

Synthetic Application Monitoring

Synthetic Application Monitoring Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013

LOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013 LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...

More information

Site Monitor. Version 5.3

Site Monitor. Version 5.3 Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...

More information

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS

User s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed

More information

3.5 LAN HDD Enclosure User s Manual

3.5 LAN HDD Enclosure User s Manual 3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc. Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog

More information

Network Management System (NMS) FAQ

Network Management System (NMS) FAQ Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes

More information

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4

Server Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4 Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access

More information

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console

How to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console System s web management can also be accesses via WAN port as long as the administrator uses an IP address listed in Management IP Address List setting. If both WAN and LAN ports are unable to reach web

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index

Table of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...

More information

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1

Configuring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1 Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM

More information

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS

More information

ReadyNAS Setup Manual

ReadyNAS Setup Manual ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

SeaSmart Firmware Update via FTP

SeaSmart Firmware Update via FTP SeaSmart.net Firmware can be updated by FTP file transfer. This App Note describes how to use built-in Windows FTP client (XP/Vista/7) to upload new firmware files to target SeaSmart.net adapters. Modification

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

Question How do I access the router s web-based setup page? Answer

Question How do I access the router s web-based setup page? Answer http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup

More information

2. Installation and System requirements

2. Installation and System requirements RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product

More information

WHMCS LUXCLOUD MODULE

WHMCS LUXCLOUD MODULE èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

Half Bridge mode }These options are all found under Misc Configuration

Half Bridge mode }These options are all found under Misc Configuration Securing Your NB1300 - Once connected. There are eleven areas that need your attention to secure your NB1300 from unauthorised access - these areas or features are; Physical Security Admin Password User

More information

USB Functions for Windows 7

USB Functions for Windows 7 USB Functions for Windows 7 Getting Started Position the DSL-2750B in your desired location, and connect the power cable to the rear of the device. From the ADSL micro filter device that provides the separated

More information

Starting Guide - Poseidon 3265 First steps for remote monitoring with Poseidon & GSM

Starting Guide - Poseidon 3265 First steps for remote monitoring with Poseidon & GSM Poseidon 3265 starting guide Poseidon 3265 Starting Guide - Poseidon 3265 First steps for remote monitoring with Poseidon & GSM 1) Connecting Poseidon 3265 1.1) Check DIP switches settings. For installation

More information

PMOD Installation on Linux Systems

PMOD Installation on Linux Systems User's Guide PMOD Installation on Linux Systems Version 3.7 PMOD Technologies Linux Installation The installation for all types of PMOD systems starts with the software extraction from the installation

More information

General Tips: Page 1 of 20. By Khaled Elshaer. www.bimcentre.com

General Tips: Page 1 of 20. By Khaled Elshaer. www.bimcentre.com Page 1 of 20 This article shows in details how to install Primavera P6 on SQL server 2012. The same concept should apply to any other versions. Installation is divided into 3 Sections. A. Installing SQL

More information