SAP BCM CLIENT WORKSTATION SOFTWARE VERSION 6.0 SP4 DOCUMENT VERSION 3.0 (20.1.2009)
COPYRIGHT
No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. Microsoft, Windows, Outlook, and PowerPoint are registered trademarks of Microsoft Corporation. IBM, DB2, DB2 Universal Database, OS/2, Parallel Sysplex, MVS/ESA, AIX, S/390, AS/400, OS/390, OS/400, iSeries, pSeries, xSeries, zSeries, z/OS, AFP, Intelligent Miner, WebSphere, Netfinity, Tivoli, Informix, i5/OS, POWER, POWER5, OpenPower and PowerPC are trademarks or registered trademarks of IBM Corporation. Adobe, the Adobe logo, Acrobat, PostScript, and Reader are either trademarks or registered trademarks of Adobe Systems Incorporated in the United States and/or other countries. Oracle is a registered trademark of Oracle Corporation. UNIX, X/Open, OSF/1, and Motif are registered trademarks of the Open Group. Citrix, ICA, Program Neighborhood, MetaFrame, WinFrame, VideoFrame, and MultiWin are trademarks or registered trademarks of Citrix Systems, Inc. HTML, XML, XHTML and W3C are trademarks or registered trademarks of W3C, World Wide Web Consortium, Massachusetts Institute of Technology. Java is a registered trademark of Sun Microsystems, Inc. JavaScript is a registered trademark of Sun Microsystems, Inc., used under license for technology invented and implemented by Netscape. MaxDB is a trademark of MySQL AB, Sweden. SAP, R/3, mySAP, mySAP.com, xApps, xApp, SAP NetWeaver, and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and in several other countries all over the world. All other product and service names mentioned are the trademarks of their respective companies. Data contained in this document serves informational purposes only. National product specifications may vary. These materials are subject to change without notice. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty.
INSTALLATION GUIDE
TABLE OF CONTENTS
20.1.2009
TABLE OF CONTENTS
1. Introduction ....................................................................................................................................................... 1
Client Workstations 1
2. Installing Communication Desktop (CDT) on Client Workstations ............................................................ 3
2.1. Using group policies (setting up several workstations)........................................................... 3 2.1.1. Installing terminal components with group policies ................................................... 4 2.1.2. Configuring IE security settings with group policies.................................................. 5 2.1.3. Configuring auto-start with group policies ............................................................... 10 2.1.4. Speech prioritization by group policies .................................................................... 12 2.2. Setting up one workstation .................................................................................................... 12 2.2.1. Installing terminal components ................................................................................. 12 2.2.2. Configuring IE security settings on each workstation .............................................. 14 2.2.3. Re-installing older software packages ...................................................................... 19 2.2.4. Configuring auto-start on each workstation.............................................................. 20 2.2.5. Speech prioritization ................................................................................................. 22 2.3. Certificates on client workstations ........................................................................................ 25 2.4. Installing USB headset .......................................................................................................... 26 2.5. Configuring video camera ..................................................................................................... 26 2.6. Calls recorded at client workstations..................................................................................... 28
3. Installing Communication Toolbar for MS Outlook (CT Outlook) ........................................................... 29
3.1. Prerequisites .......................................................................................................................... 29 3.2. Installation ............................................................................................................................. 29 3.2.1. Installing CT Outlook with a group policy ............................................................... 29 3.2.2. Installing CT Outlook on one workstation................................................................ 29
4. Installing SVG viewer for Online Monitoring.............................................................................................. 31 5. Log files ............................................................................................................................................................ 33
5.1. CDT log ................................................................................................................................. 33 5.2. Terminal log........................................................................................................................... 35 5.3. ClientCOM log ...................................................................................................................... 35 5.4. Outbound log ......................................................................................................................... 36 5.5. Communication Toolbar for MS Outlook (CT Outlook) log ............................................... 36
20.1.2009
INSTALLATION GUIDE
TABLE OF CONTENTS
ii
INSTALLATION GUIDE
1. INTRODUCTION
20.1.2009
1. INTRODUCTION
CLIENT WORKSTATIONS
This guide describes how to set up a client workstation for the SAP Business Communication Management (BCM) software, and which files are written at the workstation during the use of the software. For the planning and installing servers and various applications, see the Installation Guide document. For the configuration and administration of the system and its users, see the System Administration Guide and User Administration Guide documents. For the basic installation and administration of your computer, its operating system and other software, refer to the documentation of the computer and corresponding software. Some of the functions described in this guide may not be implemented in your system, or you may not have permission to use some of the functions. Furthermore, your system may include separately implemented customer-specific features that this guide does not cover. Contact the supplier or administrator for more information.
CAUTION:
The software users (service providers and end-users) are fully responsible for ensuring that the services provided using this software do not violate or are not used in contravention of local legislation. The software users must acknowledge that the software collects identification data for enabling the services and their invoicing, security and troubleshooting, protecting the services against misuse and misappropriation, and further improvement of the software and services, and they must assume the full responsibility for the use of the collected data.
MARKING Italic
EXAMPLE Microsoft Windows Click the Update button. Select Start > Programs > Internet Explorer. By default the file is located in the following directory: C:\Documents. Replace the xyz value with the 123 value.
run if xyz = 123
Various user interface items (such Italic as buttons, menus, submenus, dialog windows, tabs, and sheets) Paths and directories Values and variables Code examples Some functions Terminology Italic Italic Courier font Bold Bold italic
You can use the Find and replace function for searching items. By default clicking refers to the left mouse button.
CAUTION:
20.1.2009
INSTALLATION GUIDE
1. INTRODUCTION
NOTE: HINT:
INSTALLATION GUIDE
2. INSTALLING COMMUNICATION DESKTOP (CDT) ON CLIENT WORKSTATIONS
20.1.2009
NOTE: Make sure that the power saving setting of the operating system does not turn the USB device off when it is inactive (see the settings MyComputer-Properties > Hardware > Device Manager > Universal Serial Bus controllers > USB Root Hub-Properties > Power Management). If the settings are available in BIOS, make sure the USB legacy settings are enabled and the USB mouse and keyboard are supported.
20.1.2009
INSTALLATION GUIDE
2.1.1. INSTALLING TERMINAL COMPONENTS WITH GROUP POLICIES
2.1.1. Installing terminal components with group policies (page 4) 2.1.2. Configuring IE security settings with group policies (page 5) 2.1.3. Configuring auto-start with group policies (page 10) 2.1.4. Speech prioritization by group policies (page 12)
NOTE:
NOTE: NOTE:
The terminal components are not installed automatically as in the previous versions. Install the terminal_Proxy.msi and terminal_Core.msi packages before installing the handset drivers.
terminal.msi => The complete package that includes all terminal_ packages listed below. This package cannot be delivered with a group policy, it must be installed on each client workstation separately, see the chapter 2.2. Setting up one workstation (page 12). terminal_Core.msi => The actual terminal component. terminal_HS_xxx.msi => A driver for the xxx handset. Requires that terminal_Proxy and terminal_Core components have been installed already. terminal_NET.msi => Terminal implementation for .NET environment with the same functions as the core terminal component but enables user interface development in the .NET environment. Does not require proxy component. terminal_Proxy.msi => The client end service that communicates with the CDT application. It works as a proxy between the terminal component and the user interface. mctabuff.msi => ClientCOM ActiveX component, required when the phone is integrated with other applications, for example with CTM and OB Desktop. Not included in the complete terminal package. wvp.msi => Video ActiveX component of the CDT application. Not included in the complete terminal package. Forcing installation at the client log on: With the following procedure you enforce that the package is installed on all workstations of the organizational unit when the client logs on: 1. 2. Select the Computer Configuration > Software Installation options. Browse the BCM software installation directory and the folder \Client Workstation Components for the MSI packages. The directory is created during installation process, make
INSTALLATION GUIDE
2.1.2. CONFIGURING IE SECURITY SETTINGS WITH GROUP POLICIES
20.1.2009
3. 4.
5. 6. 7. 8.
sure you are authenticated to access it. See the Installation Guide document, or contact the administrator. Select the MSI package from the list. You can deploy several packages at a time, but to select the right options, deploy each separately. Select the Deployment tab and check the following options: Deployment type: Assigned. Install this application at logon: Check. Installation user interface options: Basic. Click the OK button. If the package you are installing has already been installed on the workstation with a group policy, select the Upgrades tab. Select the option Uninstall the existing package, then install the upgrade package. Click the OK button.
NOTE:
The following procedure is supported at least on the Internet Explorer 6.0. To make sure, configure the IE 7.0 workstations individually, see the section 2.2.2. Configuring IE security settings on each workstation (page 14)
1. 2.
First create the template, see the section Creating Trusted Site Zone template (page 5). Then adjust the actual settings, see the section Configuring IE security settings (page 8).
Creating Trusted Site Zone template 1. Select the options User Configuration > Administrative templates > Windows components > Internet Explorer > Internet Control Panel > Security Page:
20.1.2009
INSTALLATION GUIDE
2.1.2. CONFIGURING IE SECURITY SETTINGS WITH GROUP POLICIES
2.
3. 4. 5.
Select the security level to Medium Click the Enable button. Select the option Site to Zone Assignment List Properties.
INSTALLATION GUIDE
2.1.2. CONFIGURING IE SECURITY SETTINGS WITH GROUP POLICIES
20.1.2009
6.
7. 8.
Click the Show button.The dialog window appears. Click the Add button and add the web server address or the phone page name to the list. The value 2 defines that the site is a trusted site.
20.1.2009
INSTALLATION GUIDE
2.1.2. CONFIGURING IE SECURITY SETTINGS WITH GROUP POLICIES
Configuring IE security settings Configure the security settings of the Internet Explorer software to allow the application run but still acquire maximum security. Enforce the security settings by creating a Trusted Sites Zone Template for your group policy. 1. 2. 3. Select the Trusted Sites Zone option. Change the settings that with the Medium level do not give appropriate security level, see the table below. After adjusting settings, remember to Refresh policies to deploy them to the selected organizational unit.
Table 2-1: Group policy security settings for the IE 6.0 version
NOTE:
All of the following policies must be Enabled at the upper level, and then the actual setting can be adjusted, see the table and figure below.
POLICY Access data sources across domains Allow active content over restricted protocols to access my computer Allow active scripting Allow Binary and Script Behaviors Allow drag and drop or copy and paste files Allow file downloads Allow font downloads Allow installation of desktop items Allow META REFRESH Allow paste operations via script Allow script-initiated windows without size or position constraints Automatic prompting for ActiveX controls Automatic prompting for file downloads Display mixed content
SETTING VALUE Disable Disable Enable Enable Prompt Enable Prompt Disable Enable Enable Enable Disable Disable Prompt
Do not prompt for client certificate selection when no certificates or only Disable one certificate exists. Download signed ActiveX controls Download unsigned ActiveX controls Initialize and script ActiveX controls not marked as safe Java permissions Launching applications and files in an IFRAME Disable Disable Enable Disable Java Disable
INSTALLATION GUIDE
2.1.2. CONFIGURING IE SECURITY SETTINGS WITH GROUP POLICIES
20.1.2009
SETTING VALUE Automatic logon with current username and password Disable Disable Disable Enable Disable Disable High safety Enable Enable Disable Disable
Navigate sub-frames across different domains Open files based on content, not file extension Run .NET Framework-reliant components signed with Authenticode Run ActiveX controls and plugins Script ActiveX controls marked safe for scripting Scripting of Java applets Software channel permissions Submit non-encrypted form data Use Pop-up Blocker Userdata persistence Web sites in less privileged Web content zones can navigate into this zone
20.1.2009
INSTALLATION GUIDE
2.1.3. CONFIGURING AUTO-START WITH GROUP POLICIES
10
INSTALLATION GUIDE
2.1.3. CONFIGURING AUTO-START WITH GROUP POLICIES
20.1.2009
4.
5.
Click the Add... button and enter the text C:\Program Files\Internet Explorer\iexplore.exe" http://<VU_address>/cdt with the address of the virtual unit where the Web Clients package has been installed in your system.
NOTE: If the MS Windows software is not installed on the C drive, change the location of Internet Explorer executable C:\Program Files\Internet Explorer\iexplore.exe accordingly.
6. 7.
Click the OK button. Click more OK buttons until you can close the group policy object editor.
11
20.1.2009
INSTALLATION GUIDE
2.1.4. SPEECH PRIORITIZATION BY GROUP POLICIES
NOTE: QoS group policy applies only to the client workstations with Vista operating system. The XP computers must be configured locally, or the register keys set on the workstations with specific group policies.
Create the appropriate policy as explained in the corresponding section for one workstation 2.2.5. Speech prioritization (page 22) and link it to the Active Directory containers with the Group Policy Management Console. See the Microsoft web site for more information.
NOTE: NOTE:
The terminal components are not installed automatically as in the previous versions. Install the terminal_Proxy.msi and terminal_Core.msi packages before installing the handset drivers.
terminal.msi => The complete package that includes all terminal_ packages listed below. This package cannot be delivered with group policies, it must be installed on each client workstation separately. We recommend installing separate terminal components instead of
12
INSTALLATION GUIDE
2.2.1. INSTALLING TERMINAL COMPONENTS
20.1.2009
this package because they can be removed and updated separately as well. Using this package is limited to demonstration and testing purposes. terminal_Core.msi => The actual terminal component. terminal_HS_xxx.msi => A driver for the xxx handset. Requires that _Proxy and _Core terminal components are installed already. terminal_NET.msi => Terminal implementation for .NET environment with the same functions as the core terminal component but enables user interface development in the .NET environment. Does not require proxy component. terminal_Proxy.msi => The client end service that communicates with the CDT application. It works as a proxy between the terminal component and the user interface. mctabuff.msi => ClientCOM ActiveX component, required when the phone is integrated with other applications, for example with CTM and OB Desktop. wvp.msi => Video ActiveX component of the CDT application. Installing separate terminal components 1. 2. 3. 4. 5. Double-click the terminal_Proxy.msi package. Double-click the terminal_Core.msi package. Double-click the desired on of handset driver package. If the agent will use video calls, double-click the wvp.msi package to install the video component. If the agent needs that the phone is linked to the Outbound Desktop and Communication Task Manager applications, double-click the mctabuff.msi package.
Installing the complete terminal.msi package 1. 2. 3. Double-click the terminal.msi package. The setup wizard starts. Click the Next button. Select one of the options and click the Next button.: Complete => Installs all terminal components, see the list above. Does not install MCTABuff, WVP and CTOutlook packages. Typical => Installs proxy and core components. These two are mandatory for telephony applications. Custom => You can select which of the components are installed, for example, only one of the handset drivers.
13
20.1.2009
INSTALLATION GUIDE
2.2.2. CONFIGURING IE SECURITY SETTINGS ON EACH WORKSTATION
4. 5.
To start the installation, click the Install button. Install the wvp and mctabuff components from their own MSI packages, if required.
14
INSTALLATION GUIDE
2.2.2. CONFIGURING IE SECURITY SETTINGS ON EACH WORKSTATION
20.1.2009
3.
4. 5. 6. 7.
Deselect the Require server verification (https:) for all sites in this zone option before adding new sites to the list. Add the address of the web site where your phone application has been installed, and click the OK button to return to the Internet options dialog window. Reselect the Trusted sites option and click the Custom level button to set custom security settings. Reset the settings to the Medium level and then set the following individual settings as required in each software version.
15
20.1.2009
INSTALLATION GUIDE
2.2.2. CONFIGURING IE SECURITY SETTINGS ON EACH WORKSTATION
Configuring security settings in IE 7.0 version The following settings are the minimum changes required to the Medium level for the BCM system to work properly with the Internet Explorer 7.0 version: ActiveX controls and plug-ins Automatic prompting for ActiveX controls => Enable. Download signed ActiveX controls => Enable. Initialize and script ActiveX controls not marked as safe for scripting => Enable. Miscellaneous Access data sources across domains => Enable. This setting is required if the system servers and workstations are located in different domains. Use Phishing filter => Disable. Use Pop-up Blocker => Disable. Scripting Allow Programmatic clipboard access => Enable. This setting is required for the Task Manager application to work properly. User Authentication
16
INSTALLATION GUIDE
2.2.2. CONFIGURING IE SECURITY SETTINGS ON EACH WORKSTATION
20.1.2009
Logon Select the Automatic logon with current name and password option. This setting is required if the system servers and workstations are located in different domains. Configuring security settings in IE 6.0 version The following settings support the use of the Communication Desktop application. Table 2-2: An example of functioning IE 6.0 security settings for the CDT use
GROUP
ITEM Run components not signed with Authenticode Run components signed with Authenticode
CDT USER SETTING Enable Enable Enable Enable Prompt Prompt Enable Enable Enable Enable Enable Enable Enable Enable Enable Enable Prompt Prompt Enable Enable Enable
ActiveX controls and plug-ins Automatic prompting for ActiveX controls Binary and script behaviors Download signed ActiveX controls Download unsigned ActiveX controls Initialize and script controls not marked as safe Run ActiveX controls and plug-ins Script ActiveX controls marked safe for scripting Downloads Automatic prompting for file downloads File download Font download Miscellaneous Access data sources across domains Allow META REFRESH Allow scripting of Internet Explorer web browser Allow script-initiated windows without size or position constraints. Allow web pages to use restricted protocols for active content Display mixed content Don't prompt for client certificate when no certificates or only one certificate exists. Drag and drop or copy and paste files Installation of desktop items.
17
20.1.2009
INSTALLATION GUIDE
2.2.2. CONFIGURING IE SECURITY SETTINGS ON EACH WORKSTATION
GROUP
ITEM Launching programs and files in an IFRAME Navigate sub-frames across different domains Open files based on content, not file extension Software channel permissions Submit non encrypted form data Use pop-up blocker Userdata persistence Web sites in less privileged web content zone can navigate into this zone.
CDT USER SETTING Enable Enable Enable Low safety Enable Disable Enable Prompt
Scripting Active scripting Allow paste operations via script Scripting of Java applets User authentication Logon Automatic logon with current username and password Enable Enable Enable
Useful tip: Do not reuse phone window Deselect the Reuse windows for launching shortcuts option in the Advanced tab of the Internet Options dialog window. This prevents the software from trying to open the links included in e-mails in the same browser window you have your phone application running in.
18
INSTALLATION GUIDE
2.2.3. RE-INSTALLING OLDER SOFTWARE PACKAGES
20.1.2009
If you are using IE7 and tabbed browsing, select the Tabbed Browsing Settings > Open links in other programs in: > A new window options.
19
20.1.2009
INSTALLATION GUIDE
2.2.4. CONFIGURING AUTO-START ON EACH WORKSTATION
NOTE: The terminal components have different names in different versions, the components with different names can be installed simultaneously on the same workstation. 2.2.4. CONFIGURING AUTO-START ON EACH WORKSTATION
You can configure the application to start automatically when you log in the workstation by one of the following methods Defining a local computer policy (page 20) or Adding CDT to Startup folder (page 22). Defining a local computer policy 1. Create a local computer policy: Select Start > Run options. Enter the text gpedit.msc. Click the OK button. Navigate to the User Configuration / Administrative Templates / System / Logon options. Open the setting Run these programs at user logon.
2. 3.
4.
20
INSTALLATION GUIDE
2.2.4. CONFIGURING AUTO-START ON EACH WORKSTATION
20.1.2009
5.
Click the Add... button and enter the text C:\Program Files\Internet Explorer\iexplore.exe" http://<web_server_address>/cdt with the web address of your system:
6. 7.
Click the OK button. Click more OK buttons until you can close the group policy object editor.
NOTE: If there are workstations where the MS Windows software is not installed on the C drive, enter the location of the IE executable C:\Program Files\Internet Explorer\iexplore.exe accordingly.
21
20.1.2009
INSTALLATION GUIDE
2.2.5. SPEECH PRIORITIZATION
Adding CDT to Startup folder 1. 2. Right-click the Start option of the MS Windows operating system and select the Open menu item. Select the File - New - Shortcut options:
3.
Enter the web server address to the form and click the Next button.
4. 5.
Give the shortcut a name, for example CDT, and click the Finish button. Close the Startup folder.
22
INSTALLATION GUIDE
2.2.5. SPEECH PRIORITIZATION
20.1.2009
2.
3. 4.
Select the Computer Configuration\Windows Settings (the policy applies to computers, regardless of the user that is currently logged on) or User Configuration\Windows Settings (the policy applies to the specified user on this computer). Right-click the QOS Policies node and select the Create a new policy option. Configure the policy with following options, leave other options to the default values. Click the OK button on each tab after configuration. In the Policy Profile tab: Name => for example ATLPolicy. Check the Specify DSCP Value option and enter the value 44. NOTE: 44 is the default DSCP value used in the BCM system. Administrator may have changed the value with the parameter RTP_DSCP. Make sure you use the specified one.
23
20.1.2009
INSTALLATION GUIDE
2.2.5. SPEECH PRIORITIZATION
Select the option Only applications with this executable name and enter the name BCMPhoneATLProxy.exe.
In the Protocol and Ports tab: Select the UDP protocol to be the one this QoS policy applies to.
24
INSTALLATION GUIDE
2.3. CERTIFICATES ON CLIENT WORKSTATIONS
20.1.2009
XP environment In XP environment the corresponding function is achieved by setting the register value: 1. 2. 3. 4. 5. Start the register editor. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\TcpIp\Parameters. Select Edit > New > DWORD value options and enter text DisableUserTOSSetting. Close the editor. Restart the workstation.
25
20.1.2009
INSTALLATION GUIDE
2.4. INSTALLING USB HEADSET
3. 4. 5.
Select the traditional sound card as the sound playback device in Sound and Audio Devices Properties dialog window. Open the CDT application and its Settings > Phone > Audio dialog window. Select the USB device for the Audio and Ringing tone options from the drop-down menu.
NOTE:
Using video camera requires that the wvp.msi package is installed on the workstation.
CAUTION:
Only the supported camera model is supported. Change the registry settings for using other camera models at your own risk.
26
INSTALLATION GUIDE
2.5. CONFIGURING VIDEO CAMERA
20.1.2009
video dev Defines the video device the video component connects to. The first device with a name starting with this string is selected. The value * (asterisk) selects the first available device. The default value is Logi. linerate low Defines the slow line rate. The default value is 128. linerate med Defines the medium line rate. The default value is 280. linerate high Defines the high line rate. The default value is 500. Framerate low Defines the slow frame rate. The default value is 10. Framerate med Defines the medium frame rate. The default value is 15. Framerate hi Defines the high frame rate. The default value is 30. max RTP packet Defines the maximum byte length of the RTP packet. The default value is 900. intra interval Defines the time in milliseconds between the frames used to erase possible coding errors. The default value is 4000. Lower value increases line bandwidth. RxWindowTitle Defines the title of the received video window TxWindowTitle Defines the title of the sent video window.
27
20.1.2009
INSTALLATION GUIDE
2.6. CALLS RECORDED AT CLIENT WORKSTATIONS
28
INSTALLATION GUIDE
3. INSTALLING COMMUNICATION TOOLBAR FOR MS OUTLOOK (CT OUTLOOK)
20.1.2009
3.1. PREREQUISITES
Installing this application requires that the following software is installed on the workstation: MS Outlook. The software is compatible with MS Outlook versions 2003 SP2, or later, and 2007. SAP BCM terminal component of the software version 6.0. Install the terminal component from the MSI package either individually on each workstation, or with a group policy, see the chapters 2.1. Using group policies (setting up several workstations) (page 3) and 2.2. Setting up one workstation (page 12).
3.2. INSTALLATION
Install the CT Outlook extension from the CT Outlook.msi package on an individual workstation or with a group policy. Before installation remove any older version of the software. 3.2.1. Installing CT Outlook with a group policy (page 29) 3.2.2. Installing CT Outlook on one workstation (page 29)
29
20.1.2009
INSTALLATION GUIDE
3.2.2. INSTALLING CT OUTLOOK ON ONE WORKSTATION
4. 5.
Follow the instructions and click the Next button when required. Start the MS Outlook application. If you are installing the application for the first time, the dialog window prompts for the host address. Enter the address of the virtual unit where the Web Clients package has been installed, and the port used:
When the server connection is found, the CT Outlook Login window appears: Username => Enter the same username as configured for your user account, see the User Administration Guide document. Password => Enter the same password as configured for your user account. Click the Login button.
6.
30
INSTALLATION GUIDE
4. INSTALLING SVG VIEWER FOR ONLINE MONITORING
20.1.2009
31
20.1.2009
INSTALLATION GUIDE
4. INSTALLING SVG VIEWER FOR ONLINE MONITORING
32
INSTALLATION GUIDE
5. LOG FILES
20.1.2009
5. LOG FILES
Following log files are saved on the client workstation in the current temporary %temp% path and registered in the UTC time. In case of an error situation, you can view the files with a text editor.
5.1. CDT log (page 33) 5.2. Terminal log (page 35) 5.3. ClientCOM log (page 35) 5.4. Outbound log (page 36)
33
20.1.2009
INSTALLATION GUIDE
5.1. CDT LOG
Terminal events received from CEM and sent to user interface. Terminal events reached user interface. The log level can be selected with an application parameter set by the system administrator, see the System Administration Guide document, or at the each client workstation in the following way: 1. 2. 3. Select Tools > Settings Double-clicking the lower left corner of the dialog window. Select the level from the drop-down menu on the left. The log level is set active immediately after changing.
34
INSTALLATION GUIDE
5.2. TERMINAL LOG
20.1.2009
35
20.1.2009
INSTALLATION GUIDE
5.4. OUTBOUND LOG
36