Fluke A20M-AF Computer Monitor User Manual


 
3. OPERATION
Page 63 © 2007 DH Instruments, a Fluke Company
3.5.5.5 <5LEVEL> (SECURITY)
PURPOSE
To set user protection levels to restrict access to certain functions and to edit the
password required for changing user levels.
PRINCIPLE
RPM4’s front panel user interface provides the means to access all RPM4 user
defined data, settings and functions including calibration data. Inadvertent,
uninformed or unauthorized altering or deleting of data, settings and functions
could require extensive reconfiguration by the user and might cause invalid
readings and behavior. For these reasons, depending upon the application in
which RPM4 is being used, it may be desirable to restrict access to some
functions. The user level function provides a means of restricting access to certain
functions. Four different levels of security are available.
Access to changing security levels can be left open, or be protected by a password.
Security Levels
The security levels are structured to support typical operating environments as follows:
None This level is intended for use only by the system manager and/or
calibration facility. It allows access and editing in all areas including
critical metrological information.
Low Low security is designed to protect the specific metrological
information and SYSTEM DIAGNOSTIC AND MAINTENANCE
functions of the system against accidental alteration. It is intended for
an advanced operator performing many different tasks. Low security
is the default user level setting.
Medium Medium security is designed to protect specific metrological
information in the system and to assure that the RPM4 is operated
using consistent operational parameters.
High High security is designed to protect all operating parameters. It is
intended to minimize operator choices, for example to perform
repeated identical calibrations under consistent conditions.
RPM4 is delivered with the security level set at low to avoid inadvertent altering
of critical internal settings but with access to changing security levels unrestricted.
It is recommended that the low security level be maintained at all times. If there is a
risk of unauthorized changing of the security level, changing authority should be
password protected (see OPERATION of this section).