I-Tech Company CMS 6R4 Series User Manual

Page 80

Advertising
background image

6-16

CMS-6R4 Series - User’s Guide

6.4. Logging Out of Command Mode

When you have finished communicating with the CMS-6R4, it is important to

always disconnect using either the "Log Out" button (Web Browser Interface)

or /X command (Text Interface), rather than simply closing your browser

window or communications program.
When you disconnect using the Log Out button or /X command, this ensures

that the CMS-6R4 has completely exited from command mode, and is not

waiting for the inactivity timeout period to elapse before allowing additional

connections.

6.5. The Automated Mode

The Automated Mode allows the CMS-6R4 to execute switching and reboot

commands, without displaying menus or generating response messages.

Automated Mode is designed to allow the CMS-6R4 to be controlled by a

device which can generate commands to control power switching functions

without human intervention.
When Automated Mode is enabled, the /ON, /OFF, /BOOT, /D and /X

commands are executed without a "Sure?" confirmation prompt and without

command response messages; the only reply to these commands is the

"CMS>" prompt, which is displayed when the command is complete.
Note that although Automated Mode can be enabled using either the Web

Browser Interface or Text Interface, Automated Mode is designed primarily for

users who wish to send ASCII commands to the CMS-6R4 without operator

intervention, and therefore does not specifically apply to the Web Browser

Interface. When Automated Mode is enabled, the Web Browser Interface can

still be used to invoke On / Off / Boot commands.

Notes:

• When the Automated Mode is enabled, the password prompts will

not be displayed at login, and you will be able to access Supervisor

Level command functions (including the configuration menus) and

control plugs and ports without entering a password.

• If you need to enable the Automated Mode, but want to restrict

network access to configuration menus, it is strongly recommended

to enable and configure the IP Security Function as described in

Section 5.5.2.1.

Advertising