![Beckhoff TF6120 Manual Download Page 57](http://html.mh-extra.com/html/beckhoff/tf6120/tf6120_manual_2719284057.webp)
Appendix
TF6120
57
Version: 1.1
5.2.2.2
Network configuration
5.2.2.2.1
Network configuration
Depending on the configuration of the network different identification of Users will be performed by the
operating system. Considerations regarding this issues are divided into the following topics.
•
•
5.2.2.2.2
Domain controller
For proper DCOM security settings it is essential to identify the configuration of the Client and the Server
machine. If both machines are members of the same domain there will be one central point for user
authentification. If both machines are in different domains, these domains must trust each other. The
administrative effort will decreases because new users will only be added to the domain.
•
Domain
The Client and Server Machine should be member of the same Domain. Different domains must should
be trust eachother.
•
Users Accounts
Authentification is performed on the domain machine, the User Accounts (Name and PWD) or groups
are used in the DCOM settings of the Client and the Server Machine.
•
Operation System
The Operation System on the Client and the Server Machine should be from the same family (all NT,
all 2K or all XP). When doing "mixed configuration" certain (OS specific) settings have to be taken into
account.
To keep configuration simple it is assumed that two machines have the same operating system installed, are
both in the same Domain and have different user accounts logged on. The different users are members of
one User Group. This for this User Group access is granted in the DCOM settings of the Client and the
Server Machine.
Summary of Contents for TF6120
Page 1: ...Manual EN TF6120 TwinCAT 3 OPC DA 2022 02 28 Version 1 1 ...
Page 2: ......
Page 4: ...Table of contents TF6120 4 Version 1 1 ...
Page 74: ...Appendix TF6120 74 Version 1 1 ...
Page 75: ......