beautypg.com

SP Controls PixiePro User Manual

Page 27

background image

Group 3 - Security

Security settings are used to enable the secure mode on the PixiePro, and to modify the security
code.

Setting 1 - Enable/Disable Security (toggle)
Select this configuration option to enable the security feature.
Default: Disabled

Setting 2 - Lock on Inactivity Shutdown (toggle)
This configuration setting is used when the Automatic Shutdown Timer is enabled and Security is
Enabled. Select Lock on Inactivity Shutdown and the PixiePro will enter security lockout after send-
ing Power off on the expiration of the Automatic Shutdown Timer.
Default: Enabled

Setting 3 - Enter or Retrieve Security Code
Select this configuration setting to enter or
retrieve the PixiePro configuration codes.

When this setting is selected, the TCM key-
pad will display the currently-configured
security code. The code sequence will illu-
minate in sequence, each key illuminating
for the duration of a single tick. At the end
of the code, the display will darken for one
tick. It will then start over.

Press Volume Up or Volume Down to trig-
ger the code learning sequence. The dis-
play will prompt you to enter a new code.
Enter the key sequence. The key sequence
must be between one and six digits in
length
. Press the center display button to
indicate the end of the code.

The power button module will now illumi-
nate and the PixiePro will begin displaying
the new code. You must press any power
button to accept the new security code
.
Pressing any other button will cause the new security sequence to be discarded.

Note: Entering a security code will not automatically enable Security Mode - it must be enabled sep-
arately. See Setting 1 - Security Enable/Disable above for more information.

For more information on using security, see Operation on page 26 below.

Default Security Code: 1, 2, 3, 4

24

Security Code
Buttons (note that
they are numbered)

Security Code Enter

Use power and
volume buttons
to configure
security settings
and/or edit
security code

Figure 18: Configuring security features