2.10 System Management

Last modified by Devin Chen on 2025/12/10 11:44

2.10 System Management

2.10.1 Message push configuration

2.10.1.1 Email setting

(1) Sender configuration

Enter SMTP settings: used to configure the sender of the email push message, you need to enter the sender's email and other settings.

Detect SMTP settings: Enter the email address to be verified, and a test email will be sent to the email address to remind "SMTP settings successful".

1744265361411-832.png

Information

Note:

①Since the validity of the test mailbox cannot be determined, please be sure to fill in the correct mailbox to ensure that the test email is received.

②If the sending mailbox has a third-party SMTP configuration enabled, please obtain the authorization code and enter it in the password box.

(2) Detect email

After configuring the sender's email address and other information, enter the test recipient's email address (which can be different from the sender's email address). If the configuration is correct, it will prompt "Email sent successfully, a test mail will be received in the test Email address". You can check the sent test email in the mailbox, as shown in the figure below.

1744265770159-894.png

Please refer to the following table for common email servers and default port numbers:

EmailEmail serverPort number
163 mailsmtp.163.com465
126 mailsmtp.126.com465
QQ mailsmtp.qq.com465
sina mailsmtp.sina.com465
sohu mailsmtp.sohu.com465
yahoo mailsmtp.mail.yahoo.com.cn465
gmailsmtp.gmail.com465
exmailsmtp.exmail.qq.com587

(3) Recipient Email

①In the email configuration interface, click [Recipient Email] in the upper right corner.

1744265893724-966.png

②Add the "recipient email" of the current account, The added recipient email cannot be the same as the existing recipient mailbox, as shown in the figure below.

Name: length limit is 32 characters, character type is unlimited.

Recipient email: limit xxx@xxx.xxx format, length limit is 64 characters.

1744265969679-781.png

You can search, edit, delete, enable, and disable the address book of the "recipient email" of the current account, as shown in the figure below.

1744266582227-114.png

2.10.1.3 Push settings

Configure the platform push message method, as shown in the figure below.

1744266973281-342.png

Merge strategy: adjust the push cycle of alarm messages (this setting is only valid for alarm message push). The instructions are as follows.

①Merge strategy means pushing data within a specified interval at one time, which is only valid for alarm type strategies.

②Delay time: After the V-Box reports the message, it will push the report again after the specified time (default 10s), which cannot be set to be greater than the notification frequency.

③Notification frequency: The maximum time a message waits after being triggered.

1744267054630-929.png

Add strategy: Add a new push strategy, configure the platform push message type and push method. The instructions are as follows.

①Push method: trigger, period

②Message type: alarm, maintenance and device status

③Push channel: email

1744267128636-856.png

(1) Add strategy - Push method

1)Push method: Trigger

①Message type: alarm

Select alarm monitoring points: supports cross-page and cross-device multi-selection, up to 10 monitoring points can be selected;

Alarm monitoring point alarm level: 1744267147810-575.pngred-particularly serious alarm, 1744267147811-888.pngorange-serious alarm, 1744267147811-274.pngtheme color (the example image is cyan)-general alarm;

1744269280379-416.png

Select monitoring points, the interface description is as follows.

1744269734859-826.png

②Message type: maintenance

1744270829956-913.png

③Message type: device status

1744270966631-463.png

2)Push method: Period

Periodic pushing: Every day - every hour, every week - Monday 08:00, every month - 1st 08:00, as shown in the figure below.

1744272465316-183.png

(1) Add strategy - Push channel

Push channel: Email

Check the [Email] selection button, add the content to be pushed by email, click the1744272532639-105.pngbutton, and select the "Email Recipients" list, as shown below. (If there is no list, please add it in [Mail Configuration])

1744272532640-904.png: Insert the "bit address" and "word address" in the email.

1744273735494-348.png

Information

Note:

Due to system and device mechanisms, for real-time tags selected in this config, data can only be guaranteed to update accurately when a device (PC client/Webpage/APP/Cloud SCADA, etc.) actively accesses them. Please use this function under this premise.

2.10.2 System log

Log management consists of: operation log + device operation log. Sensitive operations such as control, modification, setting, and login are stored, and statistics are accurate to events and people. Operation logs can also be exported, which helps decision makers better analyze.

Purpose of log management;

  • Evidence traces. When there are multiple users operating the system, disputes are bound to arise. At this time, logs come in handy to accurately determine responsibility.
  • Troubleshooting. Bugs that occur during device operation and problems that occur during use often cannot be reproduced. In this case, R&D personnel can troubleshoot and locate the problem by retrieving device logs.
  • Analyze user behavior and optimize system design to make it more in line with user habits.

2.10.2.1 Operation log

Record user operation logs: XX user's "login/exit, new, modify, delete, import/export" operations, as well as the status display of successful and failed modifications, as shown in the figure below.

1744274132973-404.png

2.10.2.2 Device running log

Record the operation log of the device: the operation of "device status, device instruction, device configuration" of XX device, as well as the status display of successful and failed modification, as shown in the figure below.

1744274521381-774.png

2.10.4 System function

The system function is used to view the role function permissions of the current account.

1747895670714-207.png

2.10.4 System function

The system function is used to view the role function permissions of the current account.

1744274977249-728.png

2.10.5 Third party service

2.10.5.1 EZVIZ configuration

EZVIZ configuration: Configure the EZVIZ Cloud related content used in the current account, such as large screen monitoring in large screen monitoring and video components in cloud SCADA. The current functions include: operations on EZVIZ accounts and operations on EZVIZ Cloud devices. Among them, operations on EZVIZ Cloud accounts include: adding, editing, and unbinding.

(1)Add account

Click the [+Add Account] button and enter the alias, correct appKey and appSecret in the pop-up window, as shown in the figure below.

1744697380672-520.png

(2)Get the EZVIZ Cloud key

"appKey and appSecret" need to log in to the EZVIZ Cloud account, and after registration, obtain the application key in the application information. (Subject to the actual operation process of the EZVIZ Cloud platform)

1744697380675-479.png

(3)Add EZVIZ Cloud device

Click on the device list to view or add EZVIZ cloud devices.

1744697380688-507.png

Click [+Add Device] and fill in the "Serial Number and Verification Code" of the EZVIZ Cloud Camera Base, as shown in the figure below.

1744697380689-197.png

2.10.6 System configuration

System configuration-device configuration. It is more convenient to set the device history data statistics. Support various filtering conditions and one-key opening function. You can open history statistics for both V-Box and HMI.

1744697475146-382.png

2.10.7 Menu manage

The menu management page is designed to help users configure custom sidebar menus. It supports creating multiple custom menus and assigning menus to sub-accounts.

1744353289337-109.png

2.10.7.1 Add menu

①Click the "Add custom menu" button in the upper left corner, as shown in the figure below, to enter the operation of adding a new menu.

1744353708531-753.png

②A pop-up window will appear on the right, where you can define the custom menu name and menu description first.

1744353755052-131.png

②Click on a specific menu item to enter the modification of the menu item name, as shown in the figure below.

1744353992101-802.png

③Click the icon on the right side of the menu item to open the icon settings pop-up window. Click the icon in the pop-up window to modify the icon of the menu item, as shown in the figure below.

1744354282041-898.png

③Click the checkbox on the left side of the menu item to switch whether the menu item is displayed in the sidebar (check to display, uncheck to hide), as shown in the figure below.

1744354411448-979.png

④Click the switch button on the right to enter the modification state of the menu item name in another language (currently only Chinese and English are supported), as shown in the figure below.

1744354594094-986.png

④Click the "Confirm" button in the lower right corner of the new custom menu to complete, as shown in the figure below.

1744355865835-762.png

2.10.7.2 Modify menu

The custom menu will be displayed on the page in the form of a card. The first menu displays the default menu of the platform, which cannot be modified or deleted. Click the "Enter to modify" button on the menu card to modify the menu content.

1744355934585-722.png

2.10.7.3 Switch menu

Click the "Click to activate " button in the upper right corner of the menu card to switch the menu, as shown in the figure below.

1744361733623-600.png

2.10.7.4 Delete menu

Click the "Delete menu" button on the menu card to delete the menu.

1744361797045-916.png

2.10.7.5 Assign menu

In the Role management tab under the User manage page, when editing a role, you can assign the custom menu created by the current user to the sub-account, as shown in the figure below.

1744361868807-458.png