CheckPoint Reporting System for Seismic Surveys Setting Up for Multiple Users December 2012 Mid Point Geo Limited PO Box 7437 Reading Berkshire RG27 7HQ,

Slides:



Advertisements
Similar presentations
Setting up File sharing, Personal and Network Printers Brent Murphy Matt Griffin Edwin Edwards Chris Wyatt.
Advertisements

FILEMAKER SERVER SOFTWARE & REMOTE ADMINISTRATION
Internal staff release only X-Touch V 3.63 Installation Guide for Emis LV & PCS Jayex Technology Limited March 2010.
DSL-2730B, DSL-2740B, DSL-2750B.
Module 6: Configuring Windows XP Professional to Operate in a Microsoft Network.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Unauthorized Reproduction Prohibited SkyPoint Alarm Integration Add-On Using OnGuard Alarms to create events in SkyPoint Also called ‘SkyPoint V0’ CR4400.
DVG-N5402SP.
File sharing. Connect the two win 7 systems with LAN card Open the network.
Remote Accessing Your Home Computer Using VNC and a Dynamic DNS Name.
HOW TO PULL YOUR VOICE MAILS INTO YOUR CLIENT Primary advantage: You will have a permanent.wav file on your PC and you choose when to delete it.
Ch 8-3 Working with domains and Active Directory.
Leading at Every Turn. 1)Make sure you have your Trusted Sites configured properly in Internet Explorer 2)Store your credentials on your PC so you.
Microsoft Windows 2003 Server. Client/Server Environment Many client computers connect to a server.
Microsoft Office 2007 Access 2007 Chapter 9 Administering a Database System.
Introduction to our On-Line Self Service Center at
Student Financial Assistance. Edconnet SFA to the Internet: EDconnect Software Session 16.
Installing the SAFARIODBC.EXE For use with Excel May 3, 2002.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Connecting to USF Network for Web Site SSH Secure Shell is the FTP program you will use to download your http files onto the USF server. To get the SSH.
Module 10: Configuring Windows XP Professional to Operate in Microsoft Networks.
1/28/2010 Network Plus Windows Networking Network Identification Identifies name and type of network. Installed adapters –Performed during Windows installation.
1 © 2006 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Confidential Configuring Attendant Console.
Creating a Web Site to Gather Data and Conduct Research.
Yamhill County ARES  The latest version of Airmail is available at:  Download the version.
0Gold 11 0Gold 11 LapLink Gold 11 Firewall Service How Connections are Created A Detailed Overview for the IT Manager.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send.
Credit Union National Association Installing and Uploading Project Zip Code.
Installing and Using Active Directory Written by Marc Zacharko.
EMerge Browser Managed Security Platform Module 3: Startup eMerge Certification Course  Physical connection  TCP/IP Characteristics of PC  Initial connection.
Otasuke GP-EX! Chapter 11 GP-Viewer EX
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Process Manual Using Your GL Account for Off-campus Access to the Internet By: Louisa Au May 5, 2003 English 393 Technical Writing.
CPSC 233 Run graphical Java programs remotely on Mac and Windows.
Voting with SOSA/OVRD SOSA/OVRD. Login and Information Screens After login, the SOSA Voting Information screen displays The Database drop-down allows.
Microsoft Access 2010 Chapter 10 Administering a Database System.
1 Part-1 Chap 5 Configuring Accounts Definitions.
Security Windows 2000 Richard Goldman © December 4, 2001.
ARMS Advanced Risk Management System User Documentation.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
How to use WS_FTP A Step by Step Guide to File Transfer.
IS493 INFORMATION SECURITY TUTORIAL # 1 (S ) ASHRAF YOUSSEF.
Indicator 13 Secondary Transition. Main Menu SPP13 has a navigation toolbar located at the top of each screen. If you use the toolbar to navigate to another.
NETGEAR CONFIDENTIAL FVS338 ProSafe VPN Firewall 50.
1 Terminology. 2 Requirements for Network Printing Print server Sufficient RAM to process documents Sufficient disk space on the print server.
SQL SERVER 2008 Installation Guide A Step by Step Guide Prepared by Hassan Tariq.
Integrity Check As You Well Know, It Is A Violation Of Academic Integrity To Fake The Results On Any.
Trouble-shooting Tips Georgia Bulldogs I can receive, but not send messages  If you can successfully receive messages, but can’t send messages,
IOAP Setup and Maintenance of Assessment Laptop. Introduction In order to have smooth functioning of laptops during ion assessments, a few setup activities.
If you don’t have Google Earth downloaded already, you can go to to get it.
Dept user Logs in from Home Page for tender creation Login with user name and password.
Proctor Caching Overview. 2 Proctor Caching Diagram.
Upgrade on Windows 7. DownloadSoftware Download Software from link provided in Webliography: e/
/Reimage-Repair-Tool/ /u/6/b/ /channel/UCo47kkB-idAA-IMJSp0p7tQ /alexwaston14/reimage-system-repair/
Accessing Your Documents from Your Personal Computer.
Confidential ASWM Installation Guide in Main Server ( for Windows Server 2008 R2 ) 1.
Installing RMS 3.0 Contractor Mode
Windchill WorkGroup Manager (WGM) for Inventor installation
Welcome POS Synchronize Concept 08 Sept 2015.
How to convert a Demo to Multi-user
Configuring Attendant Console
Contact QuickBooks File Doctor
Install and Run the Kronos Mobile App
Reporting System for Seismic Surveys
SEEM4570 Tutorial 07: Filezilla and PHP
Configuration Of A Pull Network.
SOP of Reset Maximum Demand
How to install and manage exchange server 2010 OP Saklani.
Installing SAP GUI (Logon) on Your PC or MAC
Presentation transcript:

CheckPoint Reporting System for Seismic Surveys Setting Up for Multiple Users December 2012 Mid Point Geo Limited PO Box 7437 Reading Berkshire RG27 7HQ, U.K.

Select the Main Computer All users should be running the same version of CheckPoint One Computer will act as the main database server. Other users (client computers) will synchronise with the server computer The server computer may also synchronise with a central shore based server. Under normal circumstances the main project database (to and from which client computers will synchronise) will reside on the seismic or lead QC PC or on a dedicated PC provided by the contractor.

Server Computer Setup (Local Sync) 1. Click on Local Server Access 2. Click on “Add” 3. Enter The user logon details Set “Type” to “Contributor” Add the Required Project to the “Allowed” list Note: The User Setup box shows the computer network name.

Client Computer Setup 1. Click on Setup 2. Click on “Verify Settings” 3. Click OK twice to return to the main CheckPoint screen

Troubleshooting Connection Issues Server Logon Failed: User [FSmith] is not valid on the remote server This indicates the Username entered in Setup does not match the setting entered on the main computer Server Logon Failed: The password for user [FSmith] is not valid This indicates the Password entered in Setup does not match the setting entered on the main computer Server Logon Failed: Other Error Message This indicates the secondary computer cannot reach the main computer Check that the “Server” name entered in Setup is correct. If you’re not sure the name of this computer, check the bottom left of the “Remote Server Access” window on the computer. Check that the Firewall on the main computer is allowing the connection. A quick way to check this is to temporarily disable the firewall to find if this is the problem. If the firewall is the problem, a rule needs to be added to enable port 8080 to the application c:\Program Files\CheckPoint\CheckPointServer.exe (32 bit Windows) or c:\Program Files (x86)\CheckPoint\CheckPointServer.exe (64 bit Windows)

Troubleshooting Adding a Rule into Windows Firewall Goto Control Panel Set Control Panel into Category View Mode and then: – Click on “System and Security” – Click on “Windows Firewall” – Click on “Advanced Settings” In the “Windows Firewall with Advanced Security” window, click on “Inbound Rules” and then “New Rule” – Select “Port” – Set TCP and Specific Port 8080, then Next – Allow the Connection – Apply to all cases. – Name as “CheckPoint”

Client Computer Download Project 1. Click on “Download Entire Project” 2. Select the Project 3. The project is downloaded. When complete, click on OK. The downloaded project will appear in the Project Navigation window

Client Computer –Upload or Download Changes 1. Click on “Sync Manager” to run the sync application 2. Set the Correct User Name

Client PC – Confirm Changes Upload Add in a new data entry, or change an existing entry.

Client PC – Confirm Changes Upload 1. Go to the Sync Manager and you will see the changed item ready to upload. Click on “Upload Changes to the Server” to upload

Confirm Changes Download - Server 1. On the Server Computer add in a new data entry or change an existing entry

Confirm Changes Download - Client 1. On the Client Computer go to the Sync Manager and click on “Download Status Data”

Confirm Changes Download - Client 1. Click on “Download Changes” to download the changed data to the computer.