101
4. Management with Web browser software
4.6 Command Control via the Network (Continued)
Automatic Connection Break
7KH7&3FRQQHFWLRQZLOOEHDXWRPDWLFDOO\GLVFRQQHFWHGDIWHUWKHUHLVQR
FRPPXQLFDWLRQIRUVHFRQGVDIWHUEHLQJHVWDEOLVKHG
7KHSURMHFWRUGRHVQRWDFFHSWFRPPDQGVZLWKRXWDXWKHQWLFDWLRQVXFFHVV
ZKHQDXWKHQWLFDWLRQLVHQDEOHG7KHSURMHFWRUXVHVDFKDOOHQJHUHVSRQVHW\SH
DXWKHQWLFDWLRQZLWKDQ0'0HVVDJH'LJHVWDOJRULWKP
:KHQWKHSURMHFWRULVXVLQJD/$1DUDQGRPE\WHVZLOOEHUHWXUQHGLI
DXWKHQWLFDWLRQLVHQDEOHG%LQGWKLVUHFHLYHGE\WHVDQGWKH$XWKHQWLFDWLRQ
3DVVZRUGDQGGLJHVWWKLVGDWDZLWKWKH0'DOJRULWKPDQGDGGWKLVLQIURQWRIWKH
FRPPDQGVWRVHQG
)ROORZLQJLVDVDPSOHLIWKH$XWKHQWLFDWLRQ3DVVZRUGLVVHWWR³SDVVZRUG´DQGWKH
UDQGRPE\WHVDUH³DIF´
Authentication
6HOHFWWKHSURMHFWRU
5HFHLYHWKHUDQGRPE\WHV³DIF´IURPWKHSURMHFWRU
%LQGWKHUDQGRPE\WHV³DIF´DQGWKH$XWKHQWLFDWLRQ3DVVZRUG
³SDVVZRUG´DQGLWEHFRPHV³DIFSDVVZRUG´
'LJHVWWKLVELQG³DIFSDVVZRUG´ZLWK0'DOJRULWKP
,WZLOOEH³HGDGIIDEFHIGEGH´
$GGWKLV³HGDGIIDEFHIGEGH´LQIURQWRIWKHFRPPDQGV
DQGVHQGWKHGDWD
6HQG³HGDGIIDEFHIGEGH´FRPPDQG
:KHQWKHVHQGLQJGDWDLVFRUUHFWWKHFRPPDQGZLOOEHSHUIRUPHGDQGWKH
UHSO\GDWDZLOOEHUHWXUQHG2WKHUZLVHDQDXWKHQWLFDWLRQHUURUZLOOEHUHWXUQHG
$VIRUWKHWUDQVPLVVLRQRIWKHVHFRQGRUVXEVHTXHQWFRPPDQGVWKH
DXWKHQWLFDWLRQGDWDFDQEHRPLWWHGZKHQWKHVDPHFRQQHFWLRQ
NOTE