You are here: Advanced > Administration > Admin Functions > Configure Menu > Advanced Tab

Configure Menu - Advanced Tab

 

 

Thresholds

The default threshold values for all links are below. We recommend you check with the automation equipment manufacturer about what is the recommend threshold setting for their network interface. These are the most commonly used values in industrial automation environments.

Transmitted Bandwidth Threshold (30%) - Maximum percentage of available bandwidth used for transmitting.

Received Bandwidth Threshold (30%) - Maximum percent of available bandwidth used for receiving.

Ping Response Time (30 msec) - Maximum response time to a ping request from the IntraVUE™ host to the device.

Ping Failure Threshold (20%) - Minimum percentage of failed pings in a one-minute period.

See IntraVUE Diagnostics & IntraVUE Analytics to learn the more about the effects of exceeding these values.

 

Adjust Ping Thresholds

Many links might simply have long response times (e.g. Wi-Fi, RF, unintelligent or old devices, poor cabling) and this will create a lot of "Ping Response Threshold Exceeded" events even when the device at the end of the other side of the link would still be functioning normally.
IntraVUE™ allows you to automatically increase the ping response time threshold value for all links that have exceeded their ping respond threshold setting in the last 2 hours. When you click "Adjust" IntraVUE™ will set the new default ping response time threshold value to be 10 msec above their highest ping response time threshold value in the last 2 hours.

Once IntraVUE™ has automatically increased the default ping response time threshold for all affected links a "Request Successful" message will appear on this page. Additionally, you can go to the Events tab and look for a message similar to "auto-adjusted ping threshold for device x.x.x.x to 870 msec" where x.x.x.x is the IP address of the device which ping response time threshold was automatically increased.

 

Remove Ghost Nodes

This feature allows you to remove all ghost nodes at once without having to delete each ghost node individually. Simply go to the Configure menu > Advanced > Remove Ghost Nodes, and click "Remove Ghost Nodes". Once you get the confirmation message go back to "View" and you will notice that all ghost nodes were removed. See Admin Verification in IntraVUE 3 to learn more about why ghost nodes are created.

 

Active Directory

An IntraVUE™ administrator can set up Active Directory authentication as an additional security layer. By using Active Directory authentication, the default admin account for IntraVUE™ will be disabled. This will result in requiring all users having to log on to IntraVUE™ using an Active Directory account when they open IntraVUE™.

Before you enable AD for IntraVUE™ work with your IT department to get the required information below:

 

Active Directory Server Setup

  1. Enter the AD Server settings. Click "Next".
    1. Active  Directory URL: IP of the AD server
    2. Active Directory User Base: This is the folder location of the users in AD.
    3. Active Directory Group Base: This is the folder location of the groups in AD.

Active Directory URL: This can be an AD server with authentication only, or authentication + encryption (e.g. TLS)

  1. Enter the AD credentials for IntraVUE™ to authenticate to the AD server. Click "Next".
    1. Service Account Username: This would be an account used to query the AD server and make sure the connection is valid, the AD configuration for IntraVUE™ is correct, and to validate the Admin and Read-only groups in AD.
    2. IntraVUE™ Admin and Read-Only Groups: Enter the names of the groups from AD and assign to either admin or read-only role here. These groups should have existent AD users in them before adding them here.

  1. Add a post-login banner of your choice. Click "Next".

According to the National Consortium for the Study of Terrorism and Responses to Terrorism (START), a login banner decreases the chance of intrusion by twenty percent.

  1. Select an encryption type or none to simply authenticate to an AD server. Click "Apply".
    1. SSLSSL and TLS are cryptographic protocols, both provide a way to encrypt communication channel between two machines over the Internet (e.g. client computer and a server). SSL stands for Secure Sockets Layer and current version is 3.0. TLS stands for Transport Layer Security and the current version is 1.2. TLS is the successor to SSL. The terms SSL and TLS can be used interchangeably, unless you’re referring to a specific protocol version.The ordering of protocols is: SSLv2, SSLv3, TLSv1.0, TLSv1.1, TLSv1.2. . Requires you to apply a security certificate
    2. STARTTLSSTARTTLS is a protocol command, that is issued by an email client. It indicates, that the client wants to upgrade existing, insecure connection to a secure connection using SSL/TLS cryptographic protocol. STARTTLS command name is used by SMTP and IMAP protocols, whereas POP3 protocol uses STLS as the command name.Despite having TLS in the name, STARTTLS doesn’t mean TLS will be used. Both SSL and TLS are acceptable protocols for securing the communication.. Requires you to apply a security certificate

  1. You will get a login prompt screen from this point onward everytime you try to connect to IntraVUE™