Справочник Пользователя для Siemens SM2 monitoring system

Скачать
Страница из 500
U3585-J-Z125-8-76
31
SM2 monitoring program
SM2 in computer networks
Users in a computer network
SM2 distinguishes between privileged users (“primary” and “secondary” administrators and
other privileged users) and nonprivileged users. This also applies in a computer network.
It does not distinguish between the rights of local and remote users.
Users can have different rights on different hosts, depending on their privileges and the
rights they have already been assigned. In particular, the primary administrator of a host
can come from a different host. These primary administrators can be identified on the
MEASUREMENT STATUS screen by the additional output of the host name.
The set of administration statements available may be restricted according to the rights of
the user. As a result, the set of permitted statements may vary from one host to the next.
Prohibited statements are rejected by the relevant hosts. If several hosts are selected, the
statements of the first specified host are displayed in the user dialog.
Screen output
The screens containing the local data of a particular host are output in succession. These
are followed by the screens of the next host, and so on. The system name in the top left-
hand corner of the screen indicates which host to which the screen belongs.
Before the local screens of the individual hosts, screens showing combined data from the
whole network can be output (GLOBAL, NSM and SHARED-PVS reports):
The GLOBAL report provides an overview of the utilization of all hosts in the network.
The NSM report outputs data of the NSM subsystem for all hosts in the network.
The SHARED-PVS report shows the access to shared disk devices.
These reports only cover the hosts which have been previously selected by means of the
SELECT-HOSTS statement.
Standard SM2 output file
The standard SM2 output file is created on every host on the home pubset. To enable the
SM2 output files of the various hosts to be distinguished later on, the file name also includes
the system name.