Password Protection and File Protection
There is no protection or security built into the HP 16500C. If you attempt to
connect to the logic analysis system via FTP, and you are prompted for a
password, leave the password field blank.
The operating system files, which are stored in the
\system
directory, are
also not protected against accidental deletion. If these files are deleted, the
HP 16500C will not operate the next time it is rebooted. If you do delete any
of these files, copy them from the flexible disks labeled "16500 Operating
System" back onto the hard disk, into the
\system
directory.
Permission Levels: Control and Data
The HP 16500C system can be mounted on your network with two different
levels of access, "control" or "data." When you mount the HP 16500 system,
you specify the type of access. The general syntax for mounting is:
UNIX
mount [host or IP address]:/[control|data] /[drive name]
DOS
net use [drive name] [host or IP address]:/[control|data]
net use [drive name] \\[host or IP address]\[control|data]
There are two differences between control and data permissions. First, the
control level provides read and write access to all files. The data level
provides write access only for the disk drives, and read access for all other
files. Second, control allows you to send programming commands to the
HP 16500C system, and data level does not.
You must be connected as the control user to program the HP 16500C.
The HP 16500C will accommodate one data and one control user at a time.
There can be only one control user at any time through any of the connection
methods – NFS mount, ftp, telnet, or using a socket. For example, if you ftp
to the HP 16500C as control, no one else can program it through any of the
other methods.
Programming Over LAN
Password Protection and File Protection
4–4
Summary of Contents for 16501A LOGIC
Page 2: ...ii ...
Page 12: ...Contents 8 ...
Page 14: ......
Page 15: ...1 Introduction to Programming ...
Page 38: ...1 24 ...
Page 39: ...2 Programming Over HP IB ...
Page 45: ...3 Programming Over RS 232 C ...
Page 55: ...4 Programming Over LAN ...
Page 68: ...4 14 ...
Page 69: ...5 Programming and Documentation Conventions ...
Page 81: ...6 Message Communication and System Functions ...
Page 91: ...7 Status Reporting ...
Page 93: ...Figure 7 1 Status Byte Structures and Concepts Status Reporting 7 3 ...
Page 97: ...Figure 7 2 Service Request Enabling Status Reporting Key Features 7 7 ...
Page 100: ...Figure 7 3 Parallel Poll Data Structure Status Reporting Parallel Poll 7 10 ...
Page 105: ...8 Error Messages ...
Page 110: ...8 6 ...
Page 112: ......
Page 113: ...9 Common Commands ...
Page 116: ...Figure 9 1 Common Commands Syntax Diagram Common Commands 9 4 ...
Page 122: ...Figure 9 2 IST Data Structure Common Commands IST Individual Status 9 10 ...
Page 132: ...9 20 ...
Page 133: ...10 Mainframe Commands ...
Page 135: ...Figure 10 1 Mainframe Commands Syntax Diagram Mainframe Commands 10 3 ...
Page 136: ...Figure 10 1 continued Mainframe Commands Syntax Diagram continued Mainframe Commands 10 4 ...
Page 159: ...11 SYSTem Subsystem ...
Page 161: ...Figure 11 1 System Subsystem Commands Syntax Diagram SYSTem Subsystem 11 3 ...
Page 172: ...11 14 ...
Page 173: ...12 MMEMory Subsystem ...
Page 175: ...Figure 12 1 MMEMory Subsystem Commands Syntax Diagram MMEMory Subsystem 12 3 ...
Page 198: ...12 26 ...
Page 199: ...13 INTermodule Subsystem ...
Page 201: ...Figure 13 1 Intermodule Subsystem Commands Syntax Diagram INTermodule Subsystem 13 3 ...
Page 216: ...13 18 ...
Page 217: ...14 TGTctrl Subsystem ...
Page 219: ...Figure 14 1 Targetcontrol Subsystem Commands Syntax Diagram TGTctrl Subsystem 14 3 ...
Page 220: ...Figure 14 1 continued Targetcontrol Subsystem Commands Syntax Diagram TGTctrl Subsystem 14 4 ...
Page 233: ...Part 3 15 Programming Examples 15 1 Programming Examples ...
Page 234: ......
Page 235: ...15 Programming Examples ...