
MDU Solutions® – UCrypt® Monitoring Server - Operation Manual iii
TABLE OF CONTENTS
GENERAL GUIDE NOTES ....................................................II
1. QUICK START ........................................................ 1-1
1.1 Chapter Contents ................................................. 1-1
1.2 Firewall Open Ports Required. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-1
1.3 Launch the GUI & Log In ........................................... 1-2
1.4 The Monitoring Server GUI .......................................... 1-3
1.5 Network Conguration ............................................. 1-3
1.6 Add and Monitor a Remote UCrypt Device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1-3
1.7 Delete a Remotely Monitored Device .................................. 1-6
1.8 Next Steps in Conguration ......................................... 1-7
2. STATUS TAB.......................................................... 2-1
2.1 Chapter Contents ................................................. 2-1
2.2 Status Page in Detail .............................................. 2-1
2.3 Device Filter Panel ................................................ 2-2
2.4 Device Identication and Events (Alerts) .............................. 2-10
2.5 Added or Monitored Remote Devices(Servers) ..........................2-11
2.6 Site Identication for Devices ....................................... 2-12
2.7 Acknowledge Alerts .............................................. 2-14
3. EVENTS TAB ......................................................... 3-1
3.1 Chapter Contents ................................................. 3-1
3.2 Events Page ..................................................... 3-1
3.3 Search by Field ................................................... 3-2
3.4 Report Generation ................................................ 3-4
4. PROFILES TAB ....................................................... 4-1
4.1 Chapter Contents ................................................. 4-1
4.2 Create or Edit a Prole .......................................... 4-1
4.3 Delete a Prole ................................................... 4-2
4.4 Congure Email Notications ........................................ 4-3
4.5 Working with Interventions .......................................... 4-6
5. SYSTEM TAB ......................................................... 5-1
5.1 Chapter Contents ................................................. 5-1
5.2 Network Conguration ............................................. 5-2
5.3 Syslog Forwarding ................................................5-11
5.4 Congure SNMP ................................................. 5-12
5.5 User Conguration ............................................... 5-13
5.6 LDAP Authentication Conguration .................................. 5-13
5.7 Congure TACACS+ Authentication .................................. 5-15
5.8 Location ....................................................... 5-16
5.9 Current Date .................................................... 5-17
5.10 Power Management .............................................. 5-17
5.11 System Status ................................................... 5-18