Step A: Select the restricted item. In the example shown in Figure 2.2 the restricted item is Slide Adjust #1 setpoint. Once the parameter is selected then Softkey # 1, the upper vertical softkey (Softkey # 1 is highlighted in Figure 2.2) , will display the legend “SELECT”.

Step B: A list of users that have access to this restricted item will appear. In the example shown in Figure 2.2 only User Number One, User Number Two, and User Number Five have access to this restricted parameter. The system may have several more users, but the three users listed on the screen are the only users that have access to change an Auto Setup Setting . The user must use the arrow keys to position the cursor on his user name. After placing the cursor on the correct name, the user must press the SELECT softkey. The SELECT softkey must be pressed even if there is only one user name displayed.

Step C: The display will show the selected user name and request the user password. The user must enter the correct password and then press the ENT key.

Step D: Upon entry of the correct password, the user will be allowed access to the restricted item. In the example shown in Figure 2.2, the user will have access to change the Slide Adjust #1 setpoint.

After performing the steps listed above, the user will be logged in to the password system. The user will have access to all restricted items that have been designated for his access. This access will remain until the user performs a log out or until the user is automatically logged out.

The user can log out by using the ACC key. This key will directly switch the display to the Quick Access screen. The “LOGOUT” soft key legend will appear along the bottom of the screen. If the operator presses this key, he will log out. He will no longer have access to the restricted items, unless he repeats steps A through D.

In addition to the manual log out, the system contains an automatic logout. The intent of automatic log out is to reduce the possibility of users other than the intended user having access to restricted items. If there were no provisions for automatic log out and a user forgot to manually log out, all restricted items to which the user had been designated for access would be available from the log in time until power was removed from the OmniLink control. This presents the possibility of users other than the intended user having access to restricted items. Automatic log out is based upon both time and press strokes. During system configuration automatic Access Timeout parameters are entered. An automatic access timeout time and automatic access timeout strokes are entered. The time entered is the amount of time after the last key stroke that will be allowed before the system will automatically log out the user. For example, if the automatic access timeout is set to 60 seconds, the user will be logged out 60 seconds after the last key stroke. If the user presses a key before the 60 seconds have elapsed, a new 60 second cycle will be started. The number of strokes that are entered is the number of press strokes after the last key stroke that will be allowed before the system automatically logs out the user. For example, if the automatic timeout is set to 10 strokes, the user will be logged out when the press completes ten strokes after the last key stroke. If the user presses a key before 10 strokes have been completed, a new 10 stroke cycle will be started.

April 17, 2000 Man ual Versio n 1.0

2.6

Page 13
Image 13
SMC Networks 5000 manual April 17, 2000 Man ual Versio n

5000 specifications

SMC Networks 5000 is a robust and versatile networking solution designed to meet the demands of modern digital infrastructures. This device is a part of SMC Networks' extensive product lineup, which caters to both enterprise and small to medium-sized businesses. The SMC 5000 stands out due to its high performance, reliability, and advanced feature set.

One of the key features of the SMC Networks 5000 is its high-speed connectivity. It supports multiple Gigabit Ethernet ports, allowing for fast data transfer and seamless connectivity. This makes it ideal for environments where bandwidth is critical, such as in data centers, large office environments, and educational institutions. The device also includes advanced traffic management capabilities, ensuring efficient data flow and minimizing latency.

Another impressive characteristic of the SMC 5000 is its scalability. As organizations grow and their networking needs evolve, the SMC 5000 can adapt accordingly. It supports a modular design, allowing users to add or remove components based on their specific requirements. This flexibility enables businesses to optimize their network setup without the need for a complete overhaul.

Security is a top priority for SMC Networks, and the 5000 model incorporates advanced security features to protect sensitive data. With built-in firewalls, virtual private network (VPN) support, and robust encryption protocols, the device ensures that unauthorized access is prevented. This is particularly crucial in today’s digital landscape, where cyber threats are increasingly sophisticated.

In terms of management and monitoring, the SMC 5000 offers a user-friendly interface that simplifies network administration. Administrators can easily configure settings, monitor performance metrics, and troubleshoot issues through a centralized dashboard. This streamlines network management tasks and enhances overall efficiency.

The SMC Networks 5000 is also compatible with various networking technologies, including VLAN (Virtual Local Area Network) support, QoS (Quality of Service) features, and IPv6 readiness. These technologies contribute to a more efficient network setup and pave the way for future-proofing as networking standards evolve.

Overall, the SMC Networks 5000 is a reliable and powerful networking solution that provides the performance, security, and scalability necessary for today's demanding network environments. Its combination of advanced features and user-friendly management options makes it an excellent choice for businesses looking to enhance their networking infrastructure. With SMC Networks 5000, organizations can ensure seamless connectivity while effectively managing their growing digital demands.