User manual
Example of a command line for using : " //%
5.2 Login
With the help of certain access data, you can log in on your device and carry out different
actions. The extent of the actions available depend on the authorisations of the user con-
cerned.
A login prompt appears first, regardless of how you access your device. You cannot view
any information on the device or change the configuration without authentication.
5.2.1 User names and passwords in ex works state
In its ex works state, your device is provided with the following user names and passwords:
User names and passwords in ex works state
Login
name
Password Authorisations
* * Read and change system variables, save configurations; use
GUI.
2 + Read and write system variables (except passwords) (changes
are lost when you switch off your device).
+ Read system variables (except passwords).
It is only possible to change and save configurations if you log in with the user name "
*. Access information (user names and passwords) can also only be changed if you log
in with the user name *. For security reasons, passwords are normally shown on the
Setup Tool screen not in plain text, but only as asterisks. The user names, on the other
hand, are displayed as plain text.
The security concept of your device enables you to read all the other configuration settings
with the user name , but not the access information. It is therefore impossible to log in
with , read the password of the * user and subsequently log in with * and
make changes to the configuration.
Caution
All Teldat devices are delivered with the same username and password. As long as
the password remains unchanged, they are therefore not protected against unauthor-
ised use. How to change the passwords is described in on page .
Make sure you change the passwords to prevent unauthorised access to your device!
Teldat GmbH
5 Access and configuration
bintec WLAN and Industrial WLAN 65