csmstr - Omega Engineering
csmstr - Omega Engineering
csmstr - Omega Engineering
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
TABLE OF CONTENTS<br />
CRIMSON USER MANUAL - MODULAR CONTROLLER<br />
NOTES FOR EDICT USERS ................................................................................ 243<br />
CONFIGURING THE WEB SERVER .................................................................... 245<br />
WEB SERVER PROPERTIES ............................................................................... 245<br />
ADDING WEB PAGES ...................................................................................... 247<br />
USING A CUSTOM WEB SITE ............................................................................ 247<br />
CREATING THE SITE...................................................................................................................... 248<br />
EMBEDDING DATA ........................................................................................................................ 248<br />
DEPLOYING THE SITE .................................................................................................................... 248<br />
COMPACTFLASH ACCESS.................................................................................. 248<br />
ACCESSING THE WEB SERVER........................................................................... 248<br />
USING ETHERNET ......................................................................................................................... 249<br />
USING MODEMS........................................................................................................................... 249<br />
WEB SERVER SAMPLES ................................................................................... 250<br />
USING THE SECURITY SYSTEM........................................................................ 255<br />
SECURITY BASICS.......................................................................................... 255<br />
OBJECT-BASED SECURITY............................................................................................................... 255<br />
NAMED USERS ............................................................................................................................. 255<br />
USER RIGHTS .............................................................................................................................. 255<br />
ACCESS CONTROL......................................................................................................................... 256<br />
WRITE LOGGING .......................................................................................................................... 256<br />
DEFAULT ACCESS ......................................................................................................................... 256<br />
ON-DEMAND LOGON ..................................................................................................................... 257<br />
MAINTENANCE ACCESS .................................................................................................................. 257<br />
SECURITY SETTINGS ...................................................................................... 257<br />
CREATING USERS .......................................................................................... 258<br />
SPECIFYING TAG SECURITY.............................................................................. 259<br />
SPECIFYING PAGE SECURITY ............................................................................ 259<br />
THE SECURITY MANAGER PRIMITIVE .................................................................. 259<br />
SECURITY RELATED FUNCTIONS ........................................................................ 259<br />
WRITING EXPRESSIONS................................................................................ 260<br />
DATA VALUES............................................................................................... 260<br />
CONSTANTS ................................................................................................................................ 260<br />
TAG VALUES................................................................................................................................ 261<br />
COMMUNICATIONS REFERENCES....................................................................................................... 262<br />
SIMPLE MATH............................................................................................... 262<br />
OPERATOR PRIORITY...................................................................................... 262<br />
TYPE CONVERSION ........................................................................................ 262<br />
COMPARING VALUES ...................................................................................... 263<br />
TESTING BITS .............................................................................................. 263<br />
MULTIPLE CONDITIONS................................................................................... 264<br />
CHOOSING VALUES ........................................................................................ 264<br />
MANIPULATING BITS ...................................................................................... 265<br />
AND, OR AND XOR ...................................................................................................................... 265<br />
SHIFT OPERATORS........................................................................................................................ 265<br />
BITWISE NOT ............................................................................................................................. 265<br />
PAGE VIII<br />
http://www.redlion.net/controller