DataCard UltraGrafix Select Instalační manuál Strana 9

  • Stažení
  • Přidat do mých příruček
  • Tisk
  • Strana
    / 322
  • Tabulka s obsahem
  • KNIHY
  • Hodnocené. / 5. Na základě hodnocení zákazníků
Zobrazit stránku 8
ix
Adding a Crypto Device_________________________________________________ 186
Deleting Crypto Devices _________________________________________________ 188
Testing Crypto Devices __________________________________________________ 188
Key Card Management_____________________________________________________ 189
Adding Key Card Groups ________________________________________________ 189
Adding Key Cards_______________________________________________________ 190
Deleting Key Card Groups _______________________________________________ 191
Deleting Key Cards ______________________________________________________ 191
Modifying Key Card Groups______________________________________________ 192
Modifying Key Cards ____________________________________________________ 193
Key Reader Management ___________________________________________________ 194
Adding and Defining Key Readers________________________________________ 194
Deleting a Key Reader___________________________________________________ 196
Modifying a Key Reader _________________________________________________ 196
Resetting a Key Reader__________________________________________________ 196
Testing a Key Reader ____________________________________________________ 197
Local Master Key (LMK) Management________________________________________ 197
Adding Local Master Key Aliases _________________________________________ 197
Deleting Local Master Key Aliases ________________________________________ 198
Modifying Local Master Key Aliases_______________________________________ 198
Chapter 13: Hex Dump__________________________________________________________ 199
Using the Hex Dump Tool ____________________________________________________ 199
Find_____________________________________________________________________ 201
Go To Offset ____________________________________________________________ 202
Chapter 14: Security Configuration ______________________________________________ 203
About Security Configuration ________________________________________________ 203
Using Security Configuration _________________________________________________ 204
Chapter 15: Export Setups _______________________________________________________ 207
Overview ___________________________________________________________________ 207
Using Export Setups _________________________________________________________ 207
Chapter 16: Keyboard Entry _____________________________________________________ 211
Overview ___________________________________________________________________ 211
Using Keyboard Entry________________________________________________________ 212
Chapter 17: Back Up and Restore________________________________________________ 215
Backing Up and Restoring the System ________________________________________ 215
Dropping Unnecessary Database Tables__________________________________ 215
Create the Backup ______________________________________________________ 216
Validating the Backup Image ____________________________________________ 217
Restoring the System_____________________________________________________ 217
Appendix A: Miscellaneous Configuration _______________________________________ 219
Configuration of Services ____________________________________________________ 219
User Configuration __________________________________________________________ 220
Audit Settings _______________________________________________________________ 220
Anti-Virus ___________________________________________________________________ 221
Network Security____________________________________________________________ 221
Zobrazit stránku 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 321 322

Komentáře k této Příručce

Žádné komentáře