EAW DX1208 Help File page 52

12x8 digital mixer and signal processor
Hide thumbs Also See for DX1208:
Table of Contents

Advertisement

access to the hardware through the Device Window. User Permission grants the user the
ability only to load Presets, view the Event Log, and view the Input/Output Channel Strip
through a highly abridged version of the Settings tab. Permissions do not prevent individuals
from controlling units from Logic Inputs and Remotes; Permissions only restrict control from
the Device Window and RS-232 port. Design Windows are not access-restricted because
they do not directly control hardware.
When Permissions are active, a Password is required to login to the Device Window. Double-
clicking a hardware unit's Device Icon in the Found Devices tab of the main DX Navigator
window opens the DX1208 Password dialog, as shown here:
To login, select a Permission Level and enter the appropriate password for that Level. As
shipped from the factory, the DX1208 Admin and User Passwords are both blank. If the
Password for either Permission Level is blank, then simply clicking the Login button gives the
user de facto permission for the selected Permission Level. Once a Password is set the
change takes effect immediately; the next time you login you must enter a Password to gain
access to that Permission Level. Setting a blank Password removes the Permission for that
Level, once again allowing de facto access to that Level.
Administrative Permission is required to create or change Permissions. Make sure that you
don't leave the Admin Password blank after setting the User Password, otherwise users will
still have unrestricted access to the hardware.
Passwords are stored within each unit in non-volatile memory, and each unit may have its own
unique User and Admin Password. Therefore for any given hardware unit, the same Admin
and User Passwords are required to login from any instance of DX Navigator, regardless of
where the computer is located. System administrators can use this feature to segment larger
topologies into subsystems by login Permissions.
52

Advertisement

Table of Contents
loading

Table of Contents