EasyManua.ls Logo

Novatech Kronos 2 Series - Access Passwords (Offline); Table 28: Out-Of-Bound Limit Settings; Table 29: Access Passwords

Novatech Kronos 2 Series
72 pages
Print Icon
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
Kronos Series 3
48
Parameter
Description
[LIMITS]
Out-of-bounds limits are defined in section [LIMITS].
LOWQUALITY
When the time becomes inaccurate by more than the time specified value, the
LOWQUALITY alarm is set. The range is 0.001 to 4000ms.
Default: 0.5ms
BADTIME
When the time becomes inaccurate by more than the time specified value, the
BADTIME alarm is set. The range is 0.001 to 4000ms.
Default: 1000ms
Table 28: Out-of-bound limit settings
5.12 Access Passwords (Offline)
This section allows the user to change the passwords for configuration, logs, and firmware upgrade. The
same settings can be made in the webpage as described in Access Passwords (Online).
Enclosing passwords in double quotes is optional. If you choose to do so, please note that the double
quotes will be discarded and will not be part of the password.
Note: The default passwords are very weak. They are provided only as a convenience for initial
setup and should be changed before the clock is deployed. Choose robust passwords. Do
not use the same password for different units. It is also recommended that the firmware
upgrade password be made distinct from the configuration password.
# Passwords for configuration, status, logs and firmware upgrade, HTTPS
# enforcement
[ACCESS]
STSPWD = ""
CFGPWD = novatech
FWPWD = novatech
ENFORCE_HTTPS = ALWAYS
Parameter
Description
[ACCESS]
Access passwords and HTTPS enforcement are defined in section [ACCESS].
CFGPWD
The password that allows reading and writing the configuration file.
Default: novatech
STSPWD
The password that allows access to the main page.
Default: (nothing)
FWPWD
The password that allows upload of firmware upgrade files.
Default: novatech
ENFORCE_HTTPS
NEVER HTTPS is never enforced
CFG_ONLY HTTPS enforced only for configuration page
ALWAYS Enforce HTTPS always.
Table 29: Access passwords

Table of Contents