Sanyo PLC-XU300 Instruction Manual, PLC-XU300 PJ Net Manager Windows - Page 2

Contents, Introducing, Set up, Basic Operation - warning

Page 2 highlights

Contents Chapter 1 Introducing 3 Introducing...3 SNMP...3 Trademarks...3 Operating Environment...4 Chapter 2 Set up 5 PJ Network Manager installation...6 PJ Network Manager un-installation 6 Chapter 3 Basic Operation 7 Launching and quitting PJ Network Manager 8 Name of status window...8 Quitting PJ Network Manager...9 Menu tree...9 What's Target...9 Name of the button on the tool bar 10 Icon display for the target...10 Addition of the target...11 Editing the target...11 Deletion of the target...11 Setting up the warning value...12 Starting target monitoring...12 When happens the alert on the target 13 When happens the trap event on the target 13 What's Trap...13 Stopping monitoring the target...14 Displaying all the status information of the target 14 Setting the target group...14 Setting up the password of Telnet 15 Setting commands batch processing for multiple targets 15 Setting timer for targets...16 Setting up default setting...17 Customizing the status list...19 Viewing the alert information...22 Viewing the event log...23 Description of Event, Type, Warning column, Warning value 24 About event treatment...26 Viewing the command history...27 Storing the management file...28 Information saved to the registry 28 Registering the target information from the defined file at once 29 Format of the defined file...30 Example of the defined file...30 Login to the target equipment...31 

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32

±
Chapter 1 Introducing
..........................................................
3
Introducing
......................................................................................................................................................
3
SNMP
...................................................................................................................................................................
3
Trademarks
.......................................................................................................................................................
3
Operating Environment
...........................................................................................................................
4
Chapter 2 Set up
....................................................................
5
PJ Network Manager installation
........................................................................................................
6
PJ Network Manager un-installation
................................................................................................
6
Chapter 3 Basic Operation
...................................................
7
Launching and quitting PJ Network Manager
...........................................................................
8
Name of status window
...........................................................................................................................
8
Quitting PJ Network Manager
..............................................................................................................
9
Menu tree
.........................................................................................................................................................
9
What's Target
..................................................................................................................................................
9
Name of the button on the tool bar
.............................................................................................
10
Icon display for the target
....................................................................................................................
10
Addition of the target
............................................................................................................................
11
Editing the target
......................................................................................................................................
11
Deletion of the target
.............................................................................................................................
11
Setting up the warning value
...........................................................................................................
12
Starting target monitoring
..................................................................................................................
12
When happens the alert on the target
.......................................................................................
13
When happens the trap event on the target
..........................................................................
13
What's Trap
....................................................................................................................................................
13
Stopping monitoring the target
......................................................................................................
14
Displaying all the status information of the target
..............................................................
14
Setting the target group
......................................................................................................................
14
Setting up the password of Telnet
.................................................................................................
15
Setting commands batch processing for multiple targets
.............................................
15
Setting timer for targets
........................................................................................................................
16
Setting up default setting
....................................................................................................................
17
Customizing the status list
..................................................................................................................
19
Viewing the alert information
...........................................................................................................
22
Viewing the event log
............................................................................................................................
23
Description of Event, Type, Warning column, Warning value
......................................
24
About event treatment
.........................................................................................................................
26
Viewing the command history
.........................................................................................................
27
Storing the management file
............................................................................................................
28
Information saved to the registry
..................................................................................................
28
Registering the target information from the defined file at once
..............................
29
Format of the defined file
....................................................................................................................
30
Example of the defined file
.................................................................................................................
30
Login to the target equipment
........................................................................................................
31
Contents