By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port.
|
|
- Maurice Hawkins
- 8 years ago
- Views:
Transcription
1 Settings Settings...1 Introduction...2 Core...2 port...2 standalone...2 pid-file...2 log-file...2 log-level...2 whitelist...3 stats-enable...3 watchdog-enable...3 Module Paths...4 action-root...4 function-root...4 hardware-root...4 operator-root...4 protocol-root...4 Webserver...5 webgui-websockets...5 webserver-authentication...5 webserver-cache...5 webserver-enable...5 webserver-http-port...5 webserver-https-port...6 webserver-root...6 webserver-user...6 Firmware...7 firmware-gpio-miso...7 firmware-gpio-mosi...7 firmware-gpio-reset...7 firmware-gpio-sck...7 SMTP...8 smtp-sender...8 smtp-user...8 smtp-password...8 smtp-host...8 smtp-port...8 Miscellaneous...9 ntp-servers...9
2 Introduction The way pilight functions can be altered by changing various settings. All pilight settings will be described in this chapter grouped by their respective category. Core port 1 "port": 5000 By default, pilight uses a random port for its socket server. Use the port setting If you want to set this to a fixed port. standalone 1 "standalone": 0 When pilight starts, it will first check if there are other instances running inside the same network. If it does, it will connect to the other pilight instance and will join or create the AdHoc network. If you want to force pilight into running as a standalone daemon, you can set the standalone setting to 1. When running pilight in standalone mode, the SSDP server will also be disabled. This means that other pilight clients will not be able to discover it using SSDP. pid-file Linux and *BSD 1 "pid-file": "/var/run/pilight.pid" The pid-file is used by pilight to save the process id number of the pilight-daemon. pilight itself uses this information as one of the ways to determine if pilight is already running or not. This setting must contain a valid path to store the pid-file log-file Linux and *BSD Windows 1 "log-file": "/var/log/pilight.log" 2 "log-file": "c:/pilight/pilight.log" The log-file is used by pilight to various information gathered while pilight is running. This information can be used to debug errors or gather information about triggered actions. This setting must contain a valid path to store the log-file. log-level 1 "log-level": 4 The log-level tells pilight what messages it should log into the log-file. The higher the log-level the more messages are logged into the log-file. The highest log-level is 6 and the lowest is 0. These log-levels correspond to the following log types: 0 = emergency, 1 = alert, 2 = critical, 3 = error, 4 = warning, 5 = notification, and 6 = information.
3 whitelist 1 "whitelist": [ "*.*.*.*" ] All software able to use socket connections can communicate to pilight. Such software can be pilightreceive, a user visiting the webgui, or external pilight plugins such a provided by FHEM. If you want to limit the computers in your network that can connect to pilight, you set up a whitelist. This setting should contain a list of valid IPv4 addresses that are allowed to connect to pilight. All other IPs will be blocked. If you want to allow IPv4 ranges, you can specify them by using wildcards. For example, if we want to allow all IP addresses ranging from to we can add the IP address * to the list. If we want to allow all IP addresses ranging from to we can add the IP address 10.0.*.* to the list. Each whitelist entry should contain a valid IPv4 address with or without using wildcards. stats-enable 1 "stats-enable": 1 pilight monitors its own CPU and RAM resource usage. This information can be shared with external clients and is shared by default with the websockets connections. If you want to disable the display of the CPU and RAM statistics and/or want to disable the communication of these statistics over the websocket connection you can set this to 0. This setting can be either 0 or 1. watchdog-enable 1 "watchdog-enable": 1 pilight monitors its own CPU and RAM resource usage. This information is used to shutdown or terminate pilight when it uses too much CPU or RAM. If want to disable this watchdog feature and therefor the automatic termination of pilight when needed, you can set this setting to 0. This setting can be either 0 or 1.
4 Module Paths pilight has the possibility to load various external modules to enhance its functionality. These modules are single files and should be placed in fixed folders. However, these folders locations can be changed by altering one of the following settings. There is generally no reason to load external modules. The latest pilight version always contains the latest protocols, hardware drivers, event operators, functions, and actions. action-root Linux and *BSD 1 "action-root": "/usr/local/lib/pilight/action" pilight event actions are loaded from the action-root folder. The action-root setting must contain a valid path. function-root Linux and *BSD 1 "function-root": "/usr/local/lib/pilight/function" pilight event function are loaded from the function-root folder. The function-root setting must contain a valid path. hardware-root Linux and *BSD 1 "hardware-root": "/usr/local/lib/pilight/hardware" External pilight hardware drivers are loaded from the hardware-root folder. The hardware-root setting must contain a valid path. operator-root Linux and *BSD 1 "operator-root": "/usr/local/lib/pilight/operator" pilight event operators are loaded from the operators-root folder. The operators-root setting must contain a valid path. protocol-root Linux and *BSD 1 "protocol-root": "/usr/local/lib/pilight/protocol" External pilight protocols are loaded from the protocol-root folder. The protocol-root setting must contain a valid path.
5 Webserver The following settings change the way the internal webserver will serve the internal pilight webgui or it can be disabled altogether. webgui-websockets 1 "webgui-websockets": 1 By default the webgui communicates to pilight by using websockets. This is a relatively new technique that allows us to receive all changes from pilight instead of having to poll pilight for changes. The problem is that some older devices and browsers do not support websockets, but they do support the polling technique. So to disable the websockets and use polling instead we set webgui-websockets setting to 0. This setting can be either 0 or 1. webserver-authentication 1 "webserver-authentication": [ "username", "password" ] By default, pilight can be controlled from the webgui by anyone that can access it. If you want to prevent this, you can secure the webgui with a username and password. The username should be in plain text, the password is SHA256 encrypted. Use pilight-sha256 to create the encrypted password hash. Regular SHA256 encryption tools will not work because pilight hashes the password several thousand times. pi@pilight ~# pilight-sha256 -p admin 4f32102debed8dabd87e88cf84c752ccb23a74b29f90b42edde05cbc7be41f80 So if we want to use a username user and password admin the values should look like this: 1 [ "user", "4f32102debed8dabd87e88cf84c752ccb23a74b29f90b42edde05cbc7be41f80" ] webserver-cache 1 "webserver-cache": 1 pilight has the ability to cache all files used for the webgui. This reduces the amount of reads done from the SD card on devices like the Raspberry Pi and Hummingboard, and makes it faster to load the webgui from devices with a slow internal storage such as routers. This setting can be either 0 or 1. webserver-enable 1 "webserver-enable": 1 The pilight webserver can be turned off as a whole. This could be useful if you do not want to use the webgui at all or if you want to use your own webserver implementation. This setting can be either 0 or 1. webserver-http-port 1 "webserver-http-port": 5001 The pilight webserver runs by default on the non-standard port This is done to prevent interference with other webservers running on the default HTTP port 80. If you do want to run the webserver on port 80 or any other port, you can change this setting. The port specified must be a valid and unused port.
6 webserver-https-port not supported by default 1 "webserver-https-port": 5002 The webserver does not allow secure connections by default. Currently the only way to get HTTPS support is by manually compiling pilight. The pilight secure webserver runs by default on the non-standard port This is done to prevent interference with other webservers running on the default HTTPS port 443. If you do want to run the secure webserver on port 443 or any other port, you can change this setting. The port specified must be a valid and unused port. webserver-root 1 "webserver-root": "/usr/local/share/pilight/" The webserver root tells pilight where it should look for all files that should be served by the webserver. This setting must contain a valid path. webserver-user Linux *BSD 1 "webserver-user": "www-root" 2 "webserver-user": "www" The webserver runs by default as a non-root user. This to prevent the execution of malicious code. If you want to force the webserver to run as the root user or any other system user, you can change this setting accordingly. This setting needs to contain a valid system user.
7 Firmware pilight provides an easy tool to flash the firmware of several microcontrollers in the form of pilight-flash. pilight flashes microcontrollers by using either bitbanging or through USB. To use bitbanging we need four GPIOs. These GPIOs are by default configured for usage on a Raspberry Pi. They can however, be changed to other GPIOs according to the device you want to use. Each GPIO is named according to the SPI requirements, but any GPIO can be used because we are not actually using SPI to communicate with our microcontrollers. In pilight the SPI identifiers MISO, MOSI, Reset and SCK are only used to separate the different GPIO. If you are unsure what valid GPIOs are on your platform, please refer to the documentation. firmware-gpio-miso Linux and *BSD 1 "firmware-gpio-miso": 13 This setting defines the GPIO pin to be used as MISO. Any valid GPIO for your platform can be used. firmware-gpio-mosi Linux and *BSD 1 "firmware-gpio-mosi": 12 This setting defines the GPIO pin to be used as MOSI. Any valid GPIO for your platform can be used. firmware-gpio-reset Linux and *BSD 1 "firmware-gpio-reset": 10 This setting defines the GPIO pin to be used as Reset. Any valid GPIO for your platform can be used. firmware-gpio-sck Linux and *BSD 1 "firmware-gpio-sck": 14 This setting defines the GPIO pin to be used as SCK. Any valid GPIO for your platform can be used.
8 SMTP pilight has the capability to communicate with several types of mail servers. This offers pilight the possibility to use for example mail actions inside our event rules, so messages can be sent in case of a certain event. Most users will have an account from their internet hosting provider or free mail solutions can be used like gmail. In case of a (non-existing) gmail account named: pilight@gmail.com with password: foobar, the SMTP settings should be configured like this: 1 "smtp-sender": "pilight@gmail.com", 2 "smtp-host": "smtp.gmail.com", 3 "smtp-port": 465, 4 "smtp-user": "pilight@gmail.com", 5 "smtp-password": "foobar" smtp-sender 1 "smtp-sender": "...@...com" The smtp-sender requires a valid address. As soon as a mail is sent by pilight, this address will be used as the address from with the mail was sent. smtp-user 1 "smtp-user": "...@...com" The smtp-user requires a valid address. This address is used to validate the account details at the provider. smtp-password 1 "smtp-password": "..." The smtp-password is used to validate the account details at the provider together with the smtpuser setting. The password should therefore be a valid password for this account. smtp-host 1 "smtp-host": "smtp.foo.com" The smtp-host setting should contain a valid mail server host name. Normally, the host name is similar to name of the internet hosting provider. smtp-port 1 "smtp-host": "smtp.foo.com" The smtp-port should contain a valid smtp server port. This can currently be either 25, 465, or 587. pilight will communicate over a secure connection when using port 465, when using port 25 or 587 it will depend on the server how pilight will set-up the connection.
9 Miscellaneous ntp-servers 1 "ntp-servers": [ "eu.pool.ntp.org", "uk.pool.ntp.org" ] One important feature of any automation setup is the ability to trigger time based actions. However, these events greatly rely on a correct date and time. Problems occur when the system time is not set to the correct time (for our specific timezone). This can happen on systems like the Raspberry Pi which does not have a RTC that allows it to keep track of time when turned off. To overcome this problem pilight has the ability to retrieve the correct time by synchronizing with NTP servers. You can pick any server from Any number of servers can be added to the ntp-servers list. pilight will first try to synchronize with the first server. If this fails it will try the second server etc. It will continue this process until an actual response was received.
CYAN SECURE WEB APPLIANCE. User interface manual
CYAN SECURE WEB APPLIANCE User interface manual Jun. 13, 2008 Applies to: CYAN Secure Web 1.4 and above Contents 1 Log in...3 2 Status...3 2.1 Status / System...3 2.2 Status / Network...4 Status / Network
More informationGigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
More informationDevice Log Export ENGLISH
Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,
More informationSysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
More informationGigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
More informationSNMP-1 Configuration Guide
SNMP-1 Configuration Guide You must configure the Net Logic Card before it can operate properly. You have two methods to configure the Net Logic Card: Using telnet or terminal. Using Telnet 1. Make sure
More informationSyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
More informationThis section will focus on basic operation of the interface including pan/tilt, video, audio, etc.
Catalogue Basic Operation... 2 For Internet Explorer... 2 For Other Non-IE Web Browsers... 5 Camera Settings... 6 System... 6 About... 6 PT Setting... 7 Backup and Restore Setup... 8 NTP Setting... 8 System
More informationDell OpenManage Mobile Version 1.4 User s Guide (Android)
Dell OpenManage Mobile Version 1.4 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION
More informationUpdating the BIOS and BMC on the FreeNAS Mini
Updating the BIOS and BMC on the FreeNAS Mini Oct 15, 2014 ixsystems, Inc. These instructions are for updating the BMC (IPMI controller) and the BIOS for the FreeNAS Mini. You will also need the following
More informationPrerequisites and Configuration Guide
Prerequisites and Configuration Guide Informatica Support Console (Version 2.0) Table of Contents Chapter 1: Overview.................................................... 2 Chapter 2: Minimum System Requirements.................................
More information- 1 - SmartStor Cloud Web Admin Manual
- 1 - SmartStor Cloud Web Admin Manual Administrator Full language manuals are available in product disc or website. The SmartStor Cloud Administrator web site is used to control, setup, monitor, and manage
More informationHow To Use 1Bay 1Bay From Awn.Net On A Pc Or Mac Or Ipad (For Pc Or Ipa) With A Network Box (For Mac) With An Ipad Or Ipod (For Ipad) With The
1-bay NAS User Guide INDEX Index... 1 Log in... 2 Basic - Quick Setup... 3 Wizard... 3 Add User... 6 Add Group... 7 Add Share... 9 Control Panel... 11 Control Panel - User and groups... 12 Group Management...
More informationConfiguration Manual
Configuration Manual Page 1 of 20 Table of Contents Chronicall Setup...3 Standard Installation...3 Non-standard Installation (Recording Library on Separate machine)...8 Configuring Call Recording through
More informationtechnical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
More informationTDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module
Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually
More informationHow To Synchronize the easystore to the AD
Index Firmware update/check 2 Re-initialization of the easystore 3 Checking Active Directory server 5 AD authentication mode 6 1 of 7 Firmware update/check It is very important to check the firmware of
More informationPreinstallation Requirements Guide
Preinstallation Requirements Guide Synergy 3.4.9 June 2015 Synergy 2015 TOC 1: Introduction 4 Synergy platform modules 4 Synergy install procedure - your responsibilities 4 Further information about Synergy
More informationwww.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationPharos Control User Guide
Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter
More informationEmbedded Based Web Server for CMS and Automation System
Embedded Based Web Server for CMS and Automation System ISSN: 2278 909X All Rights Reserved 2014 IJARECE 1073 ABSTRACT This research deals with designing a Embedded Based Web Server for CMS and Automation
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationChapter 9 Monitoring System Performance
Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under
More informationManual. IP Sensor and Watchdog IPSW2210. I P S W 2 2 1 0 M a n u a l P a g e 1. Relay Output. Power input. 12VDC adapter LED Indicators. 2 Dry.
IP Sensor and Watchdog IPSW2210 Manual Relay Output Power input 12VDC adapter LED Indicators 1 wire 2 Dry Output Green : Power Yellow: Link temperature & humidity contact inputs LED indicator sensor input
More informationLinux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
More informationNetwork/Floating License Installation Instructions
Network/Floating License Installation Instructions Installation steps: On the Windows PC that will act as License Manager (SERVER): 1. Install HASP Run-time environment, SERVER 2. Plug in the red USB hardware
More informationArchitecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
More informationSmart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationDell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide
Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.
More informationDual Bay Home Media Store. User Manual
Dual Bay Home Media Store User Manual CH3HNAS2 V1.0 CONTENTS Chapter 1: Home Page... 3 Setup Wizard... 3 Settings... 3 User Management... 3 Download Station... 3 Online User Manual... 3 Support... 3 Chapter
More informationDMH remote access. Table of Contents. Project : remote_access_dmh Date: 29/05/12 pg. 1
pg. 1 DMH remote access Table of Contents 1 Remote access description... 2 1.1 Single module remote access... 3 1.2 Multiple modules remote access... 6 1.3 REMARKS/PITFALLS... 10 2 Dynamic DNS... 9 pg.
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationREADYNAS INSTANT STORAGE. Quick Installation Guide
READYNAS INSTANT STORAGE Quick Installation Guide Table of Contents Step 1 Connect to FrontView Setup Wizard 3 Installing RAIDar on Windows 3 Installing RAIDar on Mac OS X 3 Installing RAIDar on Linux
More informationZebra Ethernet. Frequently Asked Questions
Zebra Ethernet Frequently Asked Questions Zebra Technologies Corporation Card Imaging Division 1001 Flynn Road Camarillo, CA 93012 USA Phone: (805) 579-1800 Fax: (805) 579-1808 www.cards.zebra.com 2004
More informationRemote PC Guide for Standalone PC Implementation
Remote PC Guide for Standalone PC Implementation Updated: 2007-01-22 The guide covers features available in NETLAB+ version 3.6.1 and later. IMPORTANT Standalone PC implementation is no longer recommended.
More informationWireless G Broadband quick install
Wireless G Broadband Router quick install guide Model 503693 INT-503693-QIG-0608-02 Thank you for purchasing the INTELLINET NETWORK SOLUTIONS Wireless G Broadband Router, Model 503693. This quick install
More information1 Functionalities of iq.suite Update Manager... 3. 2 Installation... 5. 2.1 New Installation... 5. 2.2 Update Installation... 8. 3 Configuration...
Contents 1 Functionalities of iq.suite Update Manager... 3 2 Installation... 5 2.1 New Installation... 5 2.2 Update Installation... 8 3 Configuration... 9 3.1 Configuration of iq.suite Update Manager...
More informationChapter 6 Using Network Monitoring Tools
Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items
More informationPolycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationCHAPTER 2: USING THE CAMERA WITH THE APP
TABLE OF CONTENTS OVERVIEW... 1 Front of your camera... 1 Back of your camera... 2 ACCESSORIES... 3 CHAPTER 1: Navigating the Mobile Application... 4 Device List: How to Use this Page... 4 My Messages:
More informationEmbedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
More information8.6. NET SatisFAXtion Email Gateway Installation Guide. For NET SatisFAXtion 8.6. Contents
NET SatisFAXtion Email Gateway Installation Guide For NET SatisFAXtion 8.6 Contents 1.0 - Install Microsoft Virtual SMTP Server 2 XP and 2003 2 2008 and 2008 R2 2 Windows 7 2 Upgrade Path 2 Configure Microsoft
More informationEmbedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
More informationVMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationHills Professional Series NVRs and Cameras
FAQs Hills Professional Series NVRs and Cameras (V1.1) 1. What is the default NVR resolution? By Default NVR video output resolution is 1080P. Resolution may be changed if necessary to suit the attached
More informationDeployment Guide: Transparent Mode
Deployment Guide: Transparent Mode March 15, 2007 Deployment and Task Overview Description Follow the tasks in this guide to deploy the appliance as a transparent-firewall device on your network. This
More information3.1 RS-232/422/485 Pinout:PORT1-4(RJ-45) RJ-45 RS-232 RS-422 RS-485 PIN1 TXD PIN2 RXD PIN3 GND PIN4 PIN5 T+ 485+ PIN6 T- 485- PIN7 R+ PIN8 R-
MODEL ATC-2004 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2004 is a 4 Port RS232/RS485 to TCP/IP converter integrated with a robust system and network management features
More informationSiteCount v2.0 Revised: 10/30/2009
SiteCount v2.0 Revised: 10/30/2009 Copyright 2009, Traf-SYS, Inc. Contents Introduction... 4 Requirements... 4 General... 4 Software... 4 Hardware... 4 Fulfilling Software Requirements... 5 Installation
More informationSmart Card Authentication Client. Administrator's Guide
Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use
More informationAddonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features
1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage
More informationSystem Admin Module User Guide. Schmooze Com Inc.
Schmooze Com Inc. Chapters Overview Using the Module DDNS DNS Email Setup FTP Server Intrusion Detection License Network Settings Notification Settings Port Management Power Options Storage Time Zone Updates
More informationIncreased operational efficiency by providing customers the ability to: Use staff resources more efficiently by reducing troubleshooting time.
, page 1 This chapter provides an overview of the Cisco Cisco Unified Communications Manager service and describes how to configure the Cisco Cisco Unified Communications Manager feature. The feature allows
More informationNetwork-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table
More informationIEI emerge and Dedicated Micros Digital Video Recorder. Install, Setup, and Integration Guide. Version 3.0 and above
IEI emerge and Dedicated Micros Digital Video Recorder Install, Setup, and Integration Guide Version 3.0 and above CONTENTS DVR Features Requirements List...3 Hardware...3 Software and Licenses...3 Upgrading
More informationCAC/PIV PKI Solution Installation Survey & Checklist
CAC/PIV PKI Solution Installation Survey & Checklist Konica Minolta CAC/PIV Solution Revision: 1.3 Date: 10/19/09 1 Document Overview This document must be completed and used as a checklist or questionnaire
More informationSecurity Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
More informationEmerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
More informationE-Blocks Easy Internet Bundle
Page 1 Cover Page Page 2 Flowcode Installing Flowcode Instruction for installing Flowcode can be found inside the installation booklet located inside the Flowcode DVD case. Before starting with the course
More informationNovaBACKUP. Storage Server. NovaStor / May 2011
NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationSystem Requirements - filesmart
System Requirements - filesmart The following are minimum and recommended system requirements for filesmart. Whilst the program will operate on the minimums listed, we strongly suggest you meet or exceed
More informationUSER GUIDE EDBG. Description
USER GUIDE EDBG Description The Atmel Embedded Debugger (EDBG) is an onboard debugger for integration into development kits with Atmel MCUs. In addition to programming and debugging support through Atmel
More informationUsing Debug Commands
Using Debug Commands This chapter explains how you use debug commands to diagnose and resolve internetworking problems. Specifically, it covers the following topics: Entering debug commands Using the debug?
More informationSynthetic Application Monitoring
Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application
More informationOnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationLegal Notes. Regarding Trademarks. 2013 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationLOCKSS on LINUX. CentOS6 Installation Manual 08/22/2013
LOCKSS on LINUX CentOS6 Installation Manual 08/22/2013 1 Table of Contents Overview... 3 LOCKSS Hardware... 5 Installation Checklist... 6 BIOS Settings... 9 Installation... 10 Firewall Configuration...
More informationSite Monitor. Version 5.3
Site Monitor Version 5.3 1 1 Table of contents 1 Table of contents... 2 2 Installation... 3 2.1 Components... 3 2.1.1 Monitoring Service... 3 2.1.2 Desktop User Interface... 3 2.1.3 Web User Interface...
More informationUser s Manual TCP/IP TO RS-232/422/485 CONVERTER. 1.1 Introduction. 1.2 Main features. Dynamic DNS
MODEL ATC-2000 TCP/IP TO RS-232/422/485 CONVERTER User s Manual 1.1 Introduction The ATC-2000 is a RS232/RS485 to TCP/IP converter integrated with a robust system and network management features designed
More information3.5 LAN HDD Enclosure User s Manual
3.5 LAN HDD Enclosure User s Manual NOTE: 1. USB and LAN can t be used at the same time. 2. HDD should be formatted as FAT32. Please check Disk utility section in this manual. 3. For internet FTP usage,
More informationInstalling and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationNetwork Probe User Guide
Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5
More informationKiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.
Kiwi SyslogGen A Freeware Syslog message generator for Windows by SolarWinds, Inc. Kiwi SyslogGen is a free Windows Syslog message generator which sends Unix type Syslog messages to any PC or Unix Syslog
More informationNetwork Management System (NMS) FAQ
Network Management System (NMS) FAQ Q: How does the NMS work? A: The Cooper NMS is a powerful, flexible and highly scalable wireless and fixed network management solution for thousands of network nodes
More informationServer Security. Contents. Is Rumpus Secure? 2. Use Care When Creating User Accounts 2. Managing Passwords 3. Watch Out For Aliases 4
Contents Is Rumpus Secure? 2 Use Care When Creating User Accounts 2 Managing Passwords 3 Watch Out For Aliases 4 Deploy A Firewall 5 Minimize Running Applications And Processes 5 Manage Physical Access
More informationHow to deploy console cable to connect WIAS-3200N and PC, to reset setting or check status via console
System s web management can also be accesses via WAN port as long as the administrator uses an IP address listed in Management IP Address List setting. If both WAN and LAN ports are unable to reach web
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationTable of Contents. Chapter 1: Installing Endpoint Application Control. Chapter 2: Getting Support. Index
Table of Contents Chapter 1: Installing Endpoint Application Control System Requirements... 1-2 Installation Flow... 1-2 Required Components... 1-3 Welcome... 1-4 License Agreement... 1-5 Proxy Server...
More informationConfiguring SNMP. 2012 Cisco and/or its affiliates. All rights reserved. 1
Configuring SNMP 2012 Cisco and/or its affiliates. All rights reserved. 1 The Simple Network Management Protocol (SNMP) is part of TCP/IP as defined by the IETF. It is used by network management systems
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for Android
GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android 1 Table of Contents GO!Enterprise MDM
More informationNetwork Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper
WP2 Subject: with the CRYPTO-BOX Version: Smarx OS PPK 5.90 and higher 0-15Apr014ks(WP02_Network).odt Last Update: 28 April 2014 Target Operating Systems: Windows 8/7/Vista (32 & 64 bit), XP, Linux, OS
More informationReadyNAS Setup Manual
ReadyNAS Setup Manual NETGEAR, Inc. 4500 Great America Parkway Santa Clara, CA 95054 USA October 2007 208-10163-01 v1.0 2007 by NETGEAR, Inc. All rights reserved. Trademarks NETGEAR, the NETGEAR logo,
More informationVMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationSeaSmart Firmware Update via FTP
SeaSmart.net Firmware can be updated by FTP file transfer. This App Note describes how to use built-in Windows FTP client (XP/Vista/7) to upload new firmware files to target SeaSmart.net adapters. Modification
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationQuestion How do I access the router s web-based setup page? Answer
http://linksys.custhelp.com/cgi-bin/linksys.cfg/php/enduser/std_adp.php?p_faqid=3676 Question How do I access the router s web-based setup page? Answer All Linksys routers have a built-in web-based setup
More information2. Installation and System requirements
RELEASE NOTES F-Secure Anti-Virus for Windows Servers Version 9.00 build 333 Copyright 1993-2010 F-Secure Corporation. All Rights Reserved. Portions Copyright 2004 BackWeb Technologies Inc. This product
More informationWHMCS LUXCLOUD MODULE
èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your
More informationEmailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password
Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol
More informationHalf Bridge mode }These options are all found under Misc Configuration
Securing Your NB1300 - Once connected. There are eleven areas that need your attention to secure your NB1300 from unauthorised access - these areas or features are; Physical Security Admin Password User
More informationUSB Functions for Windows 7
USB Functions for Windows 7 Getting Started Position the DSL-2750B in your desired location, and connect the power cable to the rear of the device. From the ADSL micro filter device that provides the separated
More informationStarting Guide - Poseidon 3265 First steps for remote monitoring with Poseidon & GSM
Poseidon 3265 starting guide Poseidon 3265 Starting Guide - Poseidon 3265 First steps for remote monitoring with Poseidon & GSM 1) Connecting Poseidon 3265 1.1) Check DIP switches settings. For installation
More informationPMOD Installation on Linux Systems
User's Guide PMOD Installation on Linux Systems Version 3.7 PMOD Technologies Linux Installation The installation for all types of PMOD systems starts with the software extraction from the installation
More informationGeneral Tips: Page 1 of 20. By Khaled Elshaer. www.bimcentre.com
Page 1 of 20 This article shows in details how to install Primavera P6 on SQL server 2012. The same concept should apply to any other versions. Installation is divided into 3 Sections. A. Installing SQL
More information