SDM2 Device Manager v2.0.4.0 Readme

SDM2 Device Manager Readme

Date: 14-aug-2017

Version: 2.0.4.0

 

Introduction

Welcome to the SDM2 Device Manager tool. With this tool you can detect your devices on the network, and configure the principal settings on each of these devices.

This program replaces the Siqura Device Manager tool, version 1.x. You can still download this application from our website https://www.tkhsecurity.com/support/software . This SDM2 tool is also available from this link.

 

Use the SDM2 Device Manager to

            - Detect your devices on the network

            - Change the network settings on your device

            - Inspect/Modify parameters on your device

 

Portable

The SDM2 Device Manager tool is a 32-bit portable tool. You should be able to run it on your customer's machine without installing anything on it. Many customer forbid installation of your software on their machines. This tool should run fine from a USB stick.

No settings are written to the Windows Registry. All settings are kept in the tool's settings file (SDM2.xml).

You need write access on the tool's folder.

 

Device detection

Several options are available to let you detect the devices on your network. Typically, you just start the tool and it will use UPnP device detection to auto discover the TKH Security Solutions devices. But you can also run a scan over a given IP range to find out directly which devices exist in this range.

If you are out there in the field and find yourself frequently testing out which devices are there in your customer's network, then you can benefit from the Document feature. The device list is stored in the document you save to disk, then later on when you reopen this file, the device list is immediately available again.

 

To maintain the device list, following functions are available:

            - Auto detection using UPnP

            - Manual scan over a given IP range

            - Manually add a device with a given IP address

            - Save and open your device list

 

Note on UPnP device detection: this standard protocol requires multicast for good operation. If multicast is not working correctly on your network, then the device detection will either be slow on the discovery of the devices, or not work at all. Also, your Firewall application might interfere with the UPnP discovery.

It is for this reason that the Manual scan function is also available in the tool.

 

Auto detection using UPnP

Typically, auto detection is Enabled when you start the tool, so the detected devices will drop in automatically. But when you open a previously saved device list, auto detection will be Disabled.

With Edit > Auto detect new devices, you can turn auto detection on and off.

You can check the status bar to see if auto detection is enabled or not. Also, when enabled, you will see a checkmark next to the menu option.

 

Note: UPnP detection works over all found network adapters on your machine. You do not need to select a network adapter.

 

Tip: UPnP detection is a continuous process that runs in the background of the application. If you want to be sure that the process starts by sending out a new request over the network, you can Disable and then Enable the device detection.

 

Manual scan over a given IP range

Choose Edit > Manual scan for devices from the menu bar (or hit Ctrl+M on the keyboard) to show the manual scan dialog.

 

Note: the manual scan function will take the IP range you entered as input and automatically determine the network adapter to which this IP range applies. The dialog shows you the list of networks on your machine to help you find out which IP ranges are typically accessible. But you can specify any IP range.

 

Manually add a device with a given IP address

Choose Edit > Add device from the menu bar (or hit INS on the keyboard) to show the Add device dialog.

 

Note: you need to enter the device credentials correctly, or the connection with the device will not be possible. The tool will remember the credentials per device and save these to its settings file (password is encrypted). By doing so, you can clear the list, redetect all devices, and the tool will already fill in the right credentials. This saves you a lot of work.

Of course, you can also save the device list to a file, and the credentials will also be stored in that file.

 

Device list file

You can save the currently shown device list to a file.

For each device, the tool will then write the device information to this file.

 

By default, an XML file is written. If you want to use this device information in other applications (like Excel), then make sure you save the file as a CSV file. This will write a comma separated file.

 

Note: the device's credentials are stored in the file without encryption! Make sure that the file you write is saved in a proper location, so that it will not fall into the wrong hands.

 

 

Device connection

For each device in the device list, the tool will maintain a logical connection. In the device list table you can find the Status column. This column shows you the current status for the device connection. Typically, your device will either be Online (i.e. connection is OK and you can work with it), or Forced Offline (you configured the device to be Offline in the Edit device dialog).

 

Setting the device to Forced Offline is handy if you know that the device is not there at this time.

 

 

Change network settings on your device

To change the network settings on your device, you select the Change network settings option from the device right-click menu. From the dialog you then see, you can change the network settings for each selected device, then hit Apply.

In case you are unsure whether the new IP address you want to assign to the device is currently free, click on the Test button. This will run a PING for the new IP address and let you know if the new IP address is available (i.e. can be used for the new device).

After changing the device network settings, the tool will attempt to reboot it. This normally works, but some devices do not support remote reboot. So after changing the network settings for one or more devices, do check the device Status column in the main window; the device should come back Online under the new IP addres.

 

 

Find device

With the Edit > Find devices function, you can select one or more devices in the device list, based on the search text you enter. You can select which column to search in, or just search over all columns. To speed up the find function, you can also hit Ctrl+F on the keyboard to show the Find dialog.

 

 

Options

Under Tools > Options, you can modify the tool's options. Options are:

 

- Show third party devices. This will effectively turn off the filter function for UPnP detection. By default, this option is disabled, and only devices from TKH Security Solutions are shown.

When running a manual scan on the network, you will always get a new device list entry for each detected device.

 

- Browser selection. By default, the tool will use the default browser on your machine, to open the device web page. Since some equipment still heavily relies on plugins or other older mechanisms, you can only correctly show these devices' web pages by using an older browser, like Internet Explorer. By changing the browser here, you can overcome this issue.

 

- System logging. The tool logs information to its private system log. Depending on the logging level you select here, the tool will log more or less information.

You can show the system log by selecting View > System log.

 

- Reopen last saved document. When this option is checked, then the tool will re-open the file you last saved to disk. Note that in that case, the tool starts with auto detection disabled.

 

 

Known issues

For this version (found on top of this readme), following issues are known:

- Device list sort order is not maintained at all times. When this happens, reorder manually by clicking on the column header you want to sort the list on.

- When closing the tool or closing the current document, occasionally a lot of time is needed to complete the operation. During this waiting, a message “Closing document” shows up. Eventually the document is indeed closed properly, but this needs optimization.

Was this article helpful?
0 out of 0 found this helpful
Have more questions? Submit a request

Comments