/
IPROTECT Access - Maintenance page

IPROTECT Access - Maintenance page

Installation Manual | IM-20250225

iProtect Access / Security | Installation |

 

Table of contents

This manual represents the knowledge at the above-mentioned time. TKH security works non-stop to improve her products. For the most recent technical information please contact your consultant or dealer.


1. Introduction

iProtect maintenance page is a page where only IPROTECT Application related issues can be set, queried or updates can be performed. Server and OS related settings are set through Cockpitpanel.

2. Maintenanace page

Within Cockpit, you must enable the iProtect Maintenance page. For security reasons, this is off by default.

Open a web browser and go to https://{ipaddress/hostname}/cockpitpanel

  1. Log in using your server administrator username and password.

  2. If administrative access is required, switch to administrator mode when prompted.

  3. Go in the menu bar to iProtect Maintenance

  4. Enable the functions by sliding the button.

  5. Login as user atlas or browse to https://{ipaddress/hostname}/maintenance/servbox.html

The maintenance page (no user action) is automatically disabled after 20 minutesAfter a successful login the below system status page will show, explanation from this page in the system menu.

3. Details of the features

3.1 IPROTECT

3.1.1 Services

You have two options. General or Configurartions.

3.1.1.1 General

When choosing the iProtect services page, automatic the process list from iProtect will be visible, for an update of the information you can press the Process list button.

The process list:

PID TTY STAT TIME COMMAND
629774 ? Sl 682:00 /home/atlas/active-version/bin/kp77ln
629781 ? Sl 1550:26 /home/atlas/active-version/bin/kp77db -s0
629926 ? Sl 960:40 /home/atlas/java-17.0.0/bin/java -Dnop -Djava.util.logging.manager=org.
630114 ? Sl 332:37 /home/atlas/active-version/bin/kp77node 16

From the above 4 processes only kp77node is optional and depending on the configuration, the 3 other processes are required for a good functioning normal iProtect system.
When a 'S' is displayed (Below STAT) the process running and waiting for an event,

  • if an 'r' is displayed, the process is running and processing events.

  • If iProtect is not running on the server, you will see 'no iProtect Processes'

If you are in doubt about the status contact the support desk.

Restart user interface

If for one reason you and other system users cannot log in to iProtect and the line with java is not shown in the process list you can press this button to restart the User interface. After a couple of seconds you can log in again.

Stop database

This commend stopts the database properly

Start database

Start the iProtect database. (Because the software of iProtect automatically starts by switching the server on this command is rarely used.)

Reindex

Re-builds the database index files (e.g. when the database is corrupt.)

Use this following command only after consulting the helpdesk or a consultant of TKH Security! Otherwise undesired effects can occur, e.g. failing of the lines!

3.1.1.2 Configuration

You can enter the maximum percentage the JAVA process may use. After changing setting press the save button.

3.1.2 Certificate

The iProtect certificate windows let you configure the security certificates of iProtect. You have two options: Configurartion or Download,

3.1.2.1 Configuration

Create: With create certificate you can create a default 'tomcat' certificate.

Install certificate: Upload a certificate

Upload CSR: The CSR validates the information the CA requires to issue a certificate

3.1.2.2 Downlaod

CA certificate: Download CA certificate (.zip)

CSR certificate request: Download CSR certificate request file. (.CSR)

3.1.3 Back-up

The iProtect backup menu let you configure the backup settings from the database.

3.1.3.1 General

Backup - Start: By pressing the button you can start the backup according to the settings in configuration.

3.1.3.2 Configuration

When selecting "local" at location the backup wil be stored on the local harddisk of the iProtect server.
This option is not very safe, when the hard disk crashes, also the backup may be lost.

When selecting "Samba client" at location the backup wil be stored on a remote samba client.

  • Name of the server for backups (including share)

  • IP address of the samba server

  • User name

  • Password

  • The workgroup or domain name

  • Possibly a subdirectory in the share

  • The maximum amount of backups. If you enter e.g. 7 here, the first backup will be overwritten on day 8.

3.1.4.3 Download

Encrypted backup: Download a full (encrypted) backup, including GDPR data.

Technical backup: Download a backup without GRPR data (Hardware setup).

Key backup: Download a Key file.

For more information about the backup and restore procedure please consult this manual:*How to Restore an iProtect backup

3.1.4 Standby

Please consult this manual: *iProtect™ Stand-by Server

3.2 Server

3.2.1 Server

3.2.1.1 General

Host id: Displays a unique number of the server

3.2.1.2 Services

Please consult this manual: *iProtect™ Stand-by Server

3.3 Network devices

3.3.1 Upload

3.3.1.1 General

IP-address: Enter the IP address of the device

IPU-8: Manually sending the Nodemanager file and keystore file to the device

Polyx: Manually sending the Nodemanager file and keystore file to the device

Keystore: Manually sending the keystore file to the device

3.4 UPS

3.4.1 UPS

In this menu it is possible to check if iProtect sever has a good connection to an additional UPS, when a power failure occurs the server will continue running for a certain time.

3.4.1.1 General

Status: Shows the current status of the UPS demon:

UPS status example:

apcupsd.service - UPS power management daemon
Loaded: loaded (/lib/systemd/system/apcupsd.service; disabled; vendor preset: enabled)
Active: inactive (dead)
Docs: man:apcupsd(8)

APCACCESS:

apcupsd process not running or communications with UPS lost!

Start: Starts the UPS demon

Stop: Stops the UPS demon

3.5 Install

3.5.1 Upgrade

In this menu it is possible to upgrade the software of the iProtect server, in case of problems after an update you can also decide to go back to an earlier version.

Use the following commands when you want to update your iProtect system. If you are in any doubt about something contact the support desk.

3.5.1.1 Configuration

Upload iProtect (1) : To upgrade a iProtect systen to another version you can go to the upgrade configuration tab and upload* the combination packet of gui and database (1) First select the file and then press the post button, while uploading the text "uploading..." will be visible.

After a successful upload the result is:

Example iProtect, Status:

Your request was processed successfully :

File upload succeeded, starting autorun...

gpg: Signature made Mon Feb 3 22:00:29 2025 CET
gpg: using RSA key 4ABD6A406DCeA346884A34BDF5AFA6D1326DB8B0
gpg: Good signature from "Controller Key (Taz key) " [unknown]
gpg: WARNING: Using untrusted key!

Package verified iprotectdb-10.04.18.1356.Linux.taz

Installing iprotectdb1004181356
For non English, Dutch or German systems upload the new language file.
Upgrade check started. Select 'Check requirements' for the results
Select 'Check requirements' later again if you want the requirements 'rechecked'
end of autorun

After uploading it is also possible to upload the license file (step2) and an additional language file (step3).

Check requirements (3): This button will start important checks to see if it is safe to do an update.

Warning level

Description

Warning level

Description

None-critical (yellow)

Warning. Item is not ok but it will not stop the update.

Critical warning. (red)

This issue must be resolved before the update process can start.

When the following message appears, press: Start upgrade (5):

Real time logging will be displayed automatically to follow the upgrade. After a view minutes you can try to login to iProtect, while the system is still upgrading.

3.5.1.2 Previous version

Configuration

Reinstall: Select a version which needs to be reinstalled.

Remove: When diskspace is needed, this gives this option to permanently delete old, unused versions. In doing so, never delete the previous version but possibly the versions before it.

3.6 Logging

The logging page is used for logging system events in case of problems, may time the supportdesk niet information from the log files.

3.6.1 General

There are several logs possible to show and download this may be helpfull when calling the support desk.

User interface:this log show problems with the user interface and the java engine from the user interface

All log files: this log shows all logs of user interface and server

Last log file: of the server

Realtime logging: the realtime logging cannot be downloaded, if nessecery download the last log file.

If you want to refresh the log press the refresh button, if you want to download them press the download button.

3.6.1 Download

Logging: All log will be downloaded in a .taz file

Core: When a serious problem has occurred, a crash file may have been created. If it has been created by the system, it can be downloaded and shared with a help desk employee.

3.7 System

This page shows the status of the iProtect server and the iProtect processes.

3.7.1 Status

3.7.1.1 General

This screen shows technical and software information of the server and the iProtect system, this may be helpful when you are contacting the support desk. It also show when the last backup is made, the settings of the NTP server etc.

Warning level

Description

 

Warning level

Description

 

Critical (red)

Status is not ok. (For example nodes are set active but are not communicating).

Warning (yellow)

Status ok but with warnings (For example lines are not communicating because they are set inactive).

Okay (green)

Status ok

3.7.1.2 Download

Server info: Download file with all the necessary information from the server itself.

Related content

IPROTECT Access - Cockpitpanel
IPROTECT Access - Cockpitpanel
More like this
*iProtect™ - Software Downloads
*iProtect™ - Software Downloads
More like this
*iProtect™ - Installation
*iProtect™ - Installation
Read with this
*HTML pages in iProtect
*HTML pages in iProtect
More like this
*iProtect™ Access / Security
*iProtect™ Access / Security
Read with this
iProtect™ UNii
iProtect™ UNii
More like this