User manual
Table Of Contents
- NMS300 Network Management System Application
- Contents
- 1 Introduction
- 2 Get Started
- 3 Discover and Manage Resources
- Discovery concepts
- Use quick discovery to discover devices on your network
- Use a discovery profile to discover devices on your network
- View and manage the wired and wireless devices on your network
- View device information
- View wireless device information only
- Modify the name, location information, and contact information
- Remove device information
- Synchronize a network device
- Log in to a device
- Ping, perform a traceroute, or reboot a device
- Use the SNMP MIB browser
- View and export the Inventory table and Interface List table
- Manage device groups
- Search for the switch to which a host is connected
- 4 Monitor Devices and the Network
- Monitor the network
- Monitor the top 10 widgets for all devices
- Customize the top 10 page
- View the wireless summary and monitor the top 10 widgets for wireless devices
- View device details and interface details
- Monitor wireless clients and view client details
- Manage the configuration monitors
- Customize the optional network dashboard
- View and export audit logs
- View firmware version information
- View the NMS300 server information
- View application notifications
- 5 Manage Configurations and Firmware
- 6 Manage Alarms and Logs
- 7 Manage Maps and Topologies
- 8 Manage sFlow
- 9 Generate and View Reports
- 10 Manage Jobs
- 11 Manage Users and Security Profiles
- 12 Manage Global Settings and Backups
- 13 Manage Licenses
- 14 Register Devices
- A Technical Specifications
- B Device Details
- 1 Index
NMS300 Network Management System Application
Manage Users and Security Profiles User Manual268
The default administrator user name is admin and the default administrator password is
also admin.
3. Click the Sign In button.
The Network Summary page displays.
4. Select USERS > ONLINE USERS.
5. To add columns to or remove them from the Online User table, right-click the table heading
anywhere, and specify the columns by selecting the corresponding check boxes.
You can choose from the following columns: Status, User Name, Security Profile, E-mail,
Telephone, Login
Time, Login IP, First Name, and Last Name.
6. Select one or more users.
To select all users, select the check box at the left in the table heading.
7. Click the Abort button.
A confirmation pop-up window opens.
8. Click the Ye
s button.
The users are logged of
f.