System Settings Page

Use this page to view and set system settings, such as a host name and comments, on a remote device. You can restrict who has access to view the settings on this page using the GetSystemConfiguration permission on the Security Configuration page.

Notes
  • Targets running LabVIEW Real-Time 2010 or later use a user name/password method of protecting system configuration. By default, each remote device includes a single user with the following name and password:

    User nameadmin
    Password<blank>
  • You must install Microsoft Silverlight to use NI Web-Based Monitoring and Configuration. If you have not installed Microsoft Silverlight, NI Web-Based Monitoring and Configuration prompts you to do so.

Configuring General Settings

  1. Enter a host name in the Name text box. Choose a name that makes your system easy to identify.
    Note Note  Your system may already have a name assigned to it. You can keep this name or enter another name.
  2. Enter any comments in the Comments box.
  3. Use the Locale setting to change the locale of strings returned from the remote target. Locale selections include only those locales supported on the target. Not all software supports this setting.
  4. Enable Halt on IP Failure to stop the LabVIEW Real-Time Module if the network connection fails when you boot the remote system. If the system is configured to use DHCP but fails to receive a DHCP address, the system will reboot instead of using a link local address. If you clear the Halt on IP Failure checkbox, the LabVIEW Real-Time Module starts and runs startup applications you created, even if TCP/IP fails when you boot the system.
  5. Check Protect Restarts if you want to require users to enter a password before restarting the remote system. This setting is available only on DDP targets.
  6. Click Save to apply your changes or Revert to revert to the previous settings.

You can view, but not edit the following items:

Viewing Module Information

Module Information displays a list of devices in a networked chassis, such as a cDAQ chassis, and includes the slot number, model, and serial number of each device. Check Show empty slots to display any slots that do not contain a device. This table is not editable.

Logging In

Web-based monitoring and configuration uses a permission-based security model. By default, each remote device includes a single user with the following name and password:

After you access the Web-based monitoring and configuration page for a remote device, complete the following steps to log in for the first time.

  1. Click the Login button in the top-right corner of the page.
  2. Enter admin in the User name field.
  3. Leave the Password field blank.
  4. Click the OK button.
Caution  To secure your remote device, you must change the default administrator password. You also must remove all permissions from the everyone group.

Securing a Remote Device

Complete the following steps to secure a remote device.

  1. Change the administrator password.
    1. Click the Security Configuration button to display the Security Configuration page.
    2. Double-click admin in the list of users under the Users tab.
    3. Enter a secure password in the New Password field.
    4. Re-enter your password in the Re-type New Password field.
    5. Click the Save button.
  2. Remove all permissions from the everyone group.
    1. Click the Groups tab.
    2. Double-click the everyone group.
    3. Remove the checks from all the checkboxes in the Has Permission? column.
    4. Click the Save button.
    5. Click the Upload Changes button to save the changes on the system.

Creating a New User Account

Complete the following steps to create a new user account.

  1. Click the Security Configuration button to display the Security Configuration page.
  2. Click the New User button to create a new user account.
  3. Replace the default user name with your own user name in the Username field.
  4. Enter a secure password in the New Password field.
  5. Re-enter your password in the Re-type New Password field.
  6. (Optional) Enter a description of the new user account in the Comments field.
  7. Place checkmarks in the checkboxes corresponding to each group you want the new user account to belong to in the Group(s) field.
  8. Place checkmarks in the checkboxes corresponding to each permission you want the new user account to have in the Permission(s) field.
  9. Click the Save button.
  10. Click the Upload Changes button to save the changes on the system.
Tip To create a safe account for a non-administrator user, enable only the minimum set of permissions required to perform that user's tasks. For a description of each permission, click the Help button at the top-right corner of the Security Configuration page.