Operation Manual
39
3UR\HFWRUFRQHFWDGRDXQSXQWRGHDFFHVRPHGLDQWHXQD/$1LQDOiPEULFD
3.4 Conexión con Código de acceso (continuación)
3. Uso del Modo en Vivo
66,'*2ZLUHOHVVHMHPSOR
(QFU\SWLRQ(QFULSWDFLyQ:(3ELW
HMHPSOR
(QFU\SWLRQNH\&ODYHGHHQFULSWDFLyQ*3
HMHPSOR
6XEQHWPDVN0iVFDUDGHVXEUHG*4
HMHPSOR
,QWURGX]FDODLQIRUPDFLyQVLJXLHQWHTXHHVWi
FRQ¿JXUDGDHQHOSUR\HFWRU*1
*13DUDHQFRQWUDUODFRQ¿JXUDFLyQGHUHGGHOSUR\HFWRUYHDOD127$40)
*2 6LXVWHGQRXVDHO66,'SUHGHWHUPLQDGRGHIiEULFDGHEHFRQ¿JXUDUVX66,'
\DVHDLQWURGXFLpQGRORPDQXDOPHQWHRVHOHFFLRQiQGRORGHODOLVWDGH66,'
detectados.
*3 6LXVDXQDHQFULSWDFLyQQHFHVLWDFRQ¿JXUDUOD3yQJDVHHQFRQWDFWRFRQ
HODGPLQLVWUDGRUGHODUHGSDUDKDOODUODFODYHGHHQFULSWDFLyQTXHHVWi
FRQ¿JXUDGDHQHOSUR\HFWRU
/DFODYHGHHQFULSWDFLyQVHPXHVWUDVLHPSUHFRPR³
´
*46LXVWHGXVDPiVFDUDGHVXEUHGTXHQRVHD&ODVH$%&GHEHFRQ¿JXUDUOD
+DJDFOLFHQ[Connect].
6HHVWDEOHFHUiODFRQH[LyQLQDOiPEULFD
3DVHDOSXQWR&RQ¿UPHODFRQH[LyQDVXGHVWLQR. (
50)










