Operating instructions
Chapter
9
RFID Access Management
8018582/2015-11-03
Operating instructions| SICK
97
Subject to change without notice
Fault diagnosis
9.5
System logs in RFID Access Management
All actions reported by an RFID interrogator are logged in RFID Access Management
specifying the type of message, a description of the message, and the time at which the
message was reported. The list contains both messages relating to the RFID interrogators
at the access points and messages regarding the configuration device.
The system logs for an RFID interrogator are retrieved continuously by RFID Access
Management. For this, the RFID interrogators must be connected to the configuration PC.
If a device is using the
Temporary
connection type, the information is retrieved as soon as
it is connected to the configuration PC.
Click the
System Log
icon. The list containing the messages opens.
Sorting the list
You can sort the list of system logs by column by clicking one of the column headings.
Clicking repeatedly on a column heading allows you to switch between ascending and
descending order.
Restricting the list
The two fields above the table allow the list of system logs to be restricted. The filters can
also be combined.
Use the drop-down menu on the left if you wish to restrict the list to messages from
selected access points.
Use the drop-down menu on the right if you wish to restrict the list to specific message
types.
Note