The example above can be taken one additional step if two press operators are given different user names and different passwords. One operator can be assigned the ability to change auto setup limits in addition to the ability to reset faults, while the other operator is not assigned the ability to change the limits.

Section 2.2.3 Password Only Mode

The “Password Only” mode allows for sixteen users. Each user can be assigned access to some or all of the restricted items. This mode does not use the RUN/PROG key.

The example listed above indicated that setup personnel required access to all restricted items. In the “Key or Password” mode, the setup personnel used the RUN/PROG key to gain access to all of the restricted items. In the “Password Only” mode, the setup personnel can still have access to all of the restricted items, but the system must be configured as such. The setup personnel must be assigned a user name and password. In addition, all restricted items would be assigned access to the setup personnel.

Section 2.2.4 Key and Password Mode

The “Key and Password” mode requires the user to have the RUN/PROG key, user name, and user password. Operation is basically the same as the Password only mode, except that in addition to entering the password the user must switch the RUN/PROG key to the PROG position.

Section 2.2.5 Restricted Items

The following table lists the auto setup module restricted items name and function.

 

AUTO SETUP MODULE RESTRICTED ITEMS

NAME

FUNCTION

Auto Setup Reset

Reset Auto Setup Faults

Auto Setup Settings

Change Auto Setup Settings (Pressures, Slide Setpoints, etc.)

Section 2.2.6 Access Control Operation

To gain access control the user must use one of two means or a combination of these two means. These means are the RUN/PROG key or the user password system.

Section 2.2.6.1 RUN/PROG Key Switch Operation

The RUN/PROG key switch is located on the lower right side of the operator terminal. This is a two position switch. The key is removable in the RUN position only. If the RUN/PROG key switch is being used as a means to access the restricted items, the switch must be turned to the PROG position. When the RUN/PROG key switch is switched to the PROG position, the press will Top Stop and stroking will be prohibited until the switch is returned to the RUN position.

April 17, 2000 Man ual Versio n 1.0

2.4

Page 11
Image 11
SMC Networks 5000 manual Password Only Mode, Key and Password Mode, Restricted Items, Access Control Operation

5000 specifications

SMC Networks 5000 is a robust and versatile networking solution designed to meet the demands of modern digital infrastructures. This device is a part of SMC Networks' extensive product lineup, which caters to both enterprise and small to medium-sized businesses. The SMC 5000 stands out due to its high performance, reliability, and advanced feature set.

One of the key features of the SMC Networks 5000 is its high-speed connectivity. It supports multiple Gigabit Ethernet ports, allowing for fast data transfer and seamless connectivity. This makes it ideal for environments where bandwidth is critical, such as in data centers, large office environments, and educational institutions. The device also includes advanced traffic management capabilities, ensuring efficient data flow and minimizing latency.

Another impressive characteristic of the SMC 5000 is its scalability. As organizations grow and their networking needs evolve, the SMC 5000 can adapt accordingly. It supports a modular design, allowing users to add or remove components based on their specific requirements. This flexibility enables businesses to optimize their network setup without the need for a complete overhaul.

Security is a top priority for SMC Networks, and the 5000 model incorporates advanced security features to protect sensitive data. With built-in firewalls, virtual private network (VPN) support, and robust encryption protocols, the device ensures that unauthorized access is prevented. This is particularly crucial in today’s digital landscape, where cyber threats are increasingly sophisticated.

In terms of management and monitoring, the SMC 5000 offers a user-friendly interface that simplifies network administration. Administrators can easily configure settings, monitor performance metrics, and troubleshoot issues through a centralized dashboard. This streamlines network management tasks and enhances overall efficiency.

The SMC Networks 5000 is also compatible with various networking technologies, including VLAN (Virtual Local Area Network) support, QoS (Quality of Service) features, and IPv6 readiness. These technologies contribute to a more efficient network setup and pave the way for future-proofing as networking standards evolve.

Overall, the SMC Networks 5000 is a reliable and powerful networking solution that provides the performance, security, and scalability necessary for today's demanding network environments. Its combination of advanced features and user-friendly management options makes it an excellent choice for businesses looking to enhance their networking infrastructure. With SMC Networks 5000, organizations can ensure seamless connectivity while effectively managing their growing digital demands.