
Contents (continued)
xvi
V.3600
Chapter 8. Security
Autocallback Security ................................................................ 8-1
Low Security Operation ............................................................. 8-2
Operating without Low Security ........................................... 8-2
Operating with Low Security ................................................ 8-2
Remote Operation ................................................................. 8-2
Local Operation .................................................................... 8-3
Passwords .............................................................................. 8-3
LCD Indication of Security ................................................... 8-3
Restrictions in Security Operation ........................................ 8-3
Low Security Commands .......................................................... 8-3
Set Password $S=x ................................................................ 8-4
Changing a Password $C=x, y ............................................ 8-4
Deleting a Password $C=x, - .............................................. 8-4
Security Reset $DR ............................................................. 8-4
Disabling Security $D=x ...................................................... 8-4
Security Status $D?, $E? ...................................................... 8-4
Enabling Security $E=x ........................................................ 8-4
High Security ............................................................................. 8-4
Compatibility ........................................................................ 8-4
Capacity ................................................................................ 8-4
Operating without High Security .......................................... 8-5
Operating with High Security ............................................... 8-5
Security Levels .......................................................................... 8-5
Level 1: Password Only ........................................................ 8-5
Level 2: Password with Callback .......................................... 8-5
Level 3: Password with Callback and Password Re-Entry.... 8-5
Superuser ................................................................................... 8-6
Passwords .............................................................................. 8-6
Default Passwords ................................................................. 8-7
High Security Commands........................................................... 8-7
Enabling High Security $EH=pw ......................................... 8-7
Disabling High Security $D .................................................. 8-7
Setting Passwords $Pn=pw$pw .......................................... 8-8
Set Security Levels $Ln=m ................................................... 8-8
Set User Callback Number $Cn=m .................................... 8-8
Extended Features $W ........................................................ 8-9
Display Extended Feature Status $W? ................................ 8-9
Display / Reset Illegal Access Attempt Counters $M, $Mn, $M* 8-9
Factory Reset $F=pw$pw ..................................................... 8-10
Removing a User $Rn ........................................................... 8-10
Security Status $E? ............................................................... 8-10
Display User Status $S? ...................................................... 8-10
Comentarios a estos manuales