Axis D3110 User Manual page 31

Connectivity hub
Hide thumbs Also See for D3110:
Table of Contents

Advertisement

AXIS D3110 Connectivity Hub
The device interface
Current state: Shows the current state of the port. The input or output is activated when the current state is different from the
normal state. An input on the device has an open circuit when it's disconnected or when there is a voltage above 1 V DC.
Note
During restart the output circuit is open. When the restart is complete, the circuit goes back to the normal position. If you
change any settings on this page, the output circuits go back to their normal positions regardless of any active triggers.
Supervised
: Turn on to make it possible to detect and trigger actions if someone tampers with the connection to digital
I/O devices. In addition to detecting if an input is open or closed, you can also detect if someone has tampered with it (that is, cut
or shorted). To supervise the connection requires additional hardware (end-of-line resistors) in the external I/O loop.
Logs
Reports and logs
Reports
• View the device server report: Click to show information about the product status in a pop-up window. The Access
Log is automatically included in the Server Report.
• Download the device server report: Click to download the server report. It creates a .zip file that contains a complete
server report text file in UTF–8 format, as well as a snapshot of the current live view image. Always include the server
report .zip file when you contact support.
• Download the crash report: Click to download an archive with detailed information about the server's status. The
crash report contains information that is in the server report as well as detailed debug information. This report might
contain sensitive information such as network traces. It can take several minutes to generate the report.
Logs
• View the system log: Click to show information about system events such as device startup, warnings and critical
messages.
• View the access log: Click to show all failed attempts to access the device, for example when a wrong login
password is used.
Network trace
Important
A network trace file might contain sensitive information, for example certificates or passwords.
A network trace file can help you troubleshoot problems by recording activity on the network. Select the duration of the trace in
seconds or minutes, and click Download.
Remote system log
Syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores
them, and the software that reports and analyzes them. Each message is labeled with a facility code, which indicates the software
type generating the message, and assigned a severity level.
Server: Click to add a new server.
Host: Enter the hostname or IP address of the server.
Format: Select which syslog message format to use.
• RFC 3164
• RFC 5424
Protocol: Select the protocol and port to use:
31

Advertisement

Table of Contents
loading

Table of Contents