445
12.1
7
Ext
e
rn
al A
ccess
12.17 External Access
Function
The soft key SERVICE can be used to grant or restrict access through
the LSV-2 interface.
With an entry in the configuration file TNC.SYS you can protect a
directory and its subdirectories with a password. The password is
requested when data from this directory is accessed from the LSV-2
interface. Enter the path and password for external access in the
configuration file TNC.SYS.
Example of TNC.SYS
Permitting/Restricting external access
U
Select any machine mode of operation.
U
To select the MOD function, press the MOD key.
U
Permit a connection to the TNC: Set the EXTERNAL
ACCESS soft key to ON. The TNC will then permit
data access through the LSV-2 interface. The
password is requested when a directory that was
entered in the configuration file TNC.SYS is accessed.
U
Block connections to the TNC: Set the EXTERNAL
ACCESS soft key to OFF. The TNC will then block
access through the LSV-2 interface.
The machine tool builder can configure Teleservice
settings with the LSV-2 interface. The machine tool
manual provides further information.
The TNC.SYS file must be stored in the root directory
TNC:\.
If you only supply one entry for the password, then the
entire drive TNC:\ is protected.
You should use the updated versions of the HEIDENHAIN
software TNCremo or TNCremoNT to transfer the data.
Entries in TNC.SYS
Meaning
REMOTE.TNCPASSWORD=
Password for LSV-2 access
REMOTE.TNCPRIVATEPATH=
Path to be protected
REMOTE.TNCPASSWORD=KR1402
REMOTE.TNCPRIVATEPATH=TNC:\RK
Summary of Contents for TNC 426
Page 3: ......
Page 4: ......
Page 8: ...IV...
Page 10: ...VI...
Page 26: ......
Page 27: ...1 Introduction...
Page 41: ...2 Manual Operation and Setup...
Page 54: ......
Page 55: ...3 Positioning with Manual Data Input MDI...
Page 59: ...4 Programming Fundamentals of NC File Management Programming Aids Pallet Management...
Page 122: ......
Page 123: ...5 Programming Tools...
Page 153: ...6 Programming Programming Contours...
Page 201: ...7 Programming Miscellaneous functions...
Page 226: ......
Page 227: ...8 Programming Cycles...
Page 366: ......
Page 367: ...9 Programming Subprograms and Program Section Repeats...
Page 381: ...10 Programming Q Parameters...
Page 424: ......
Page 425: ...11 Test run and Program Run...
Page 443: ...12 MOD Functions...
Page 472: ......
Page 473: ...13 Tables and Overviews...
Page 496: ......