Fault Tolerance and Administration
Contact us

Fault Tolerance and Administration

Failover

Server redundancy in distributed systems

Failover quickly switches to a standby server when communication with the primary server is lost. The standby server automatically takes over all functions from the offline or malfunctioning server. Live video streaming and recording resume immediately. You can also suspend any server in the cluster with no system downtime, e.g. for maintenance.

Failover
Failover

System update

Your VMS is always up to date

Silent servers update

You can update all servers within a cluster in silent mode. To do this, select the required distribution in the .zip archive or specify a web link. This approach makes system update a breeze.

Automatic client update

When your Axxon Next client connects to the server with a newer version of the Axxon Next VMS, you will be prompted to update your client software. After confirmation, the update process is performed automatically.

System update

LDAP authentication

Integrate with existing enterprise network services

This feature makes it possible to deduplicate user administration tasks for sysadmins at large companies. Operators can log in to a surveillance system by entering their domain credentials. The sysadmin connects LDAP directory to Axxon Next and selects which users to add. He can also associate VMS access rights with corporate directory groups. When a user profile is deleted on the LDAP server, it can be automatically deleted in Axxon Next.

LDAP authentication

Security policy

Protect your VMS from unauthorized access

Configure the user security policy:

  • Set the minimum password length.
  • Store password history.
  • Set password expiry date.
  • Set required password strength.
  • Prevent multiple simultaneous sessions.
  • Block the user and specify the ban time/number of failed login attempts.

Each user event includes the user’s IP address. When accessing the server, the MAC address of the computer is registered in the system event log. The Export Start event includes the user name. You can white-list users for server access by setting a range of permissible IP addresses. Users can also access the server with administrator confirmation.

Security policy