Section 2.2 Access Control

The OmniLink control has several parameters or operations that have limited access. In regards to the auto setup module the ability to perform the actions of resetting faults or changing limits must be restricted to certain personnel. The OmniLink control provides several means to limit access to these parameters or operations. These parameters and operations are called restricted items.

The OmniLink control employs combinations of two different means to limit access to restricted items. These means are the RUN/PROG key switch on the operator terminal and a user password system. The user password system assigns names and passwords to up to sixteen users. These two means can be used alone or in combination with each other. When a user employs the proper means to gain access, he will have the ability to perform the actions and change the parameters which have been designated to his control.

There are four possible modes of operation for the restricted access system. They are the “Key Only” mode, the “Key or Password” mode, the “Password Only” mode, and the “Key and Password” mode. The control can be configured to operate in any one of these four modes.

Section 2.2.1 Key Only Mode

The “Key Only” mode is the least complex of the four modes. This mode employs the RUN/PROG key as the only means to limit access to restricted items. Any user with the RUN/PROG key can access all of the restricted items. Without the RUN/PROG key, user access to all of the restricted items is prohibited.

Although the “Key Only” mode has the advantage of being easy to use, it does have a disadvantage. This mode cannot give a particular user access to only some of the restricted items. When operating in this mode, any user with the RUN/PROG key will have access to all of the restricted items.

Section 2.2.2 Key or Password Mode

The key or password mode allows for either of two means to gain access to the restricted items. A user with RUN/PROG key can access all of the restricted items. A user with the correct password can access the restricted items that have been designated for that particular user only. The system allows for passwords to be assigned to sixteen users. Each user can be assigned access to any or all of the restricted items.

The following is an example of a “Key or Password” mode operation. The RUN/PROG key is given to the die set-up personnel. A press operator is assigned a user name and password. With the password the operator can reset auto setup faults. This is the only auto setup related item to which the operator has access. In order to load a die, the set-up personnel uses the RUN/PROG key to recall a job from job storage. The set-up personnel will also be able to make changes to auto setup limits. Once the set-up personnel sets the die and verifies its correct operation, the operator is left to run the die. If an auto setup fault occurs, the operator can enter the correct password and then reset the fault. However, the operator cannot change auto setup limits. This will allow the operator to keep running the job and reset faults that occur. However, if consistent stops occur because an auto setup limit needs changing, the set-up personnel must be called to change the limit.

April 17, 2000 Man ual Versio n 1.0

2.3

Page 10
Image 10
SMC Networks 5000 manual Access Control, Key Only Mode, Key or Password Mode

5000 specifications

SMC Networks 5000 is a robust and versatile networking solution designed to meet the demands of modern digital infrastructures. This device is a part of SMC Networks' extensive product lineup, which caters to both enterprise and small to medium-sized businesses. The SMC 5000 stands out due to its high performance, reliability, and advanced feature set.

One of the key features of the SMC Networks 5000 is its high-speed connectivity. It supports multiple Gigabit Ethernet ports, allowing for fast data transfer and seamless connectivity. This makes it ideal for environments where bandwidth is critical, such as in data centers, large office environments, and educational institutions. The device also includes advanced traffic management capabilities, ensuring efficient data flow and minimizing latency.

Another impressive characteristic of the SMC 5000 is its scalability. As organizations grow and their networking needs evolve, the SMC 5000 can adapt accordingly. It supports a modular design, allowing users to add or remove components based on their specific requirements. This flexibility enables businesses to optimize their network setup without the need for a complete overhaul.

Security is a top priority for SMC Networks, and the 5000 model incorporates advanced security features to protect sensitive data. With built-in firewalls, virtual private network (VPN) support, and robust encryption protocols, the device ensures that unauthorized access is prevented. This is particularly crucial in today’s digital landscape, where cyber threats are increasingly sophisticated.

In terms of management and monitoring, the SMC 5000 offers a user-friendly interface that simplifies network administration. Administrators can easily configure settings, monitor performance metrics, and troubleshoot issues through a centralized dashboard. This streamlines network management tasks and enhances overall efficiency.

The SMC Networks 5000 is also compatible with various networking technologies, including VLAN (Virtual Local Area Network) support, QoS (Quality of Service) features, and IPv6 readiness. These technologies contribute to a more efficient network setup and pave the way for future-proofing as networking standards evolve.

Overall, the SMC Networks 5000 is a reliable and powerful networking solution that provides the performance, security, and scalability necessary for today's demanding network environments. Its combination of advanced features and user-friendly management options makes it an excellent choice for businesses looking to enhance their networking infrastructure. With SMC Networks 5000, organizations can ensure seamless connectivity while effectively managing their growing digital demands.