DataCard UltraGrafix Select Manuel d'installation Page 9

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 322
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 8
ix
Adding a Crypto Device_________________________________________________ 186
Deleting Crypto Devices _________________________________________________ 188
Testing Crypto Devices __________________________________________________ 188
Key Card Management_____________________________________________________ 189
Adding Key Card Groups ________________________________________________ 189
Adding Key Cards_______________________________________________________ 190
Deleting Key Card Groups _______________________________________________ 191
Deleting Key Cards ______________________________________________________ 191
Modifying Key Card Groups______________________________________________ 192
Modifying Key Cards ____________________________________________________ 193
Key Reader Management ___________________________________________________ 194
Adding and Defining Key Readers________________________________________ 194
Deleting a Key Reader___________________________________________________ 196
Modifying a Key Reader _________________________________________________ 196
Resetting a Key Reader__________________________________________________ 196
Testing a Key Reader ____________________________________________________ 197
Local Master Key (LMK) Management________________________________________ 197
Adding Local Master Key Aliases _________________________________________ 197
Deleting Local Master Key Aliases ________________________________________ 198
Modifying Local Master Key Aliases_______________________________________ 198
Chapter 13: Hex Dump__________________________________________________________ 199
Using the Hex Dump Tool ____________________________________________________ 199
Find_____________________________________________________________________ 201
Go To Offset ____________________________________________________________ 202
Chapter 14: Security Configuration ______________________________________________ 203
About Security Configuration ________________________________________________ 203
Using Security Configuration _________________________________________________ 204
Chapter 15: Export Setups _______________________________________________________ 207
Overview ___________________________________________________________________ 207
Using Export Setups _________________________________________________________ 207
Chapter 16: Keyboard Entry _____________________________________________________ 211
Overview ___________________________________________________________________ 211
Using Keyboard Entry________________________________________________________ 212
Chapter 17: Back Up and Restore________________________________________________ 215
Backing Up and Restoring the System ________________________________________ 215
Dropping Unnecessary Database Tables__________________________________ 215
Create the Backup ______________________________________________________ 216
Validating the Backup Image ____________________________________________ 217
Restoring the System_____________________________________________________ 217
Appendix A: Miscellaneous Configuration _______________________________________ 219
Configuration of Services ____________________________________________________ 219
User Configuration __________________________________________________________ 220
Audit Settings _______________________________________________________________ 220
Anti-Virus ___________________________________________________________________ 221
Network Security____________________________________________________________ 221
Vue de la page 8
1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 321 322

Commentaires sur ces manuels

Pas de commentaire