User guide

Chapter 3: Operations 59
2. Type enable persistent mode and press Enter to store the UID and connection type of a
target
device.
- or -
Type disable persistent mode and press Enter to disable the persistent mode setting.
To view the persistent mode:
1. Press the default Command Line hotkey sequence to display the Command Line.
2. Type show persistent mode and press Enter to display the current persistent mode setting. If
the persistent mode is enabled, the current stored UID and connection type settings are
also
displayed.
Forcing a Connection to a Target Device
From the user station, you can force any user station in the switching system to connect to a target
device. The host user station sends force connect and disconnect commands. When using Serial
Force mode, the host user station must be connected to the serial device. The target user station
receives the command and force connects to or disconnect from a target device. Any user station in
the switching system, including the host, may act as the target user station.
You can force a connection using any of the following methods:
Forcing a connection using the Command Line
Forcing a connection using Serial Force mode
Forcing a connection using SNMP
Guidelines
NOTE: The following guidelines do not apply when forcing a connection using SNMP.
All forced connections are done in Shared mode. For optimum operation of the force connection
feature, observe the following guidelines:
Both the user entering the command and the user at the target user station must have rights to
the target
device.
All user stations and IQ modules must have unique names.
If the host and target user stations are connected to different AMX switches, the AMX
switching system must be synchronized using the AMWorks software.
(Serial Force mode only) To prevent the host user station from automatically logging out, the
Inactivity Timer Disconnect function must be disabled. See
User station inactivity settings on
page 51 for more information.
(Serial Force mode only) If Force User Login is enabled, a user must be logged in. See
Administering security settings on page 39 for more information.