Installation manual
ix
Adding a Crypto Device_________________________________________________  186
Deleting Crypto Devices _________________________________________________  188
Testing Crypto Devices __________________________________________________  188
 Key Card Management_____________________________________________________  189
Adding Key Card Groups ________________________________________________  189
Adding Key Cards_______________________________________________________  190
Deleting Key Card Groups _______________________________________________  191
Deleting Key Cards ______________________________________________________  191
Modifying Key Card Groups______________________________________________  192
Modifying Key Cards ____________________________________________________  193
Key Reader Management ___________________________________________________  194
Adding and Defining Key Readers________________________________________  194
Deleting a Key Reader___________________________________________________  196
Modifying a Key Reader _________________________________________________  196
Resetting a Key Reader__________________________________________________  196
Testing a Key Reader ____________________________________________________  197
Local Master Key (LMK) Management________________________________________  197
Adding Local Master Key Aliases _________________________________________  197
Deleting Local Master Key Aliases ________________________________________  198
Modifying Local Master Key Aliases_______________________________________  198
Chapter 13: Hex Dump__________________________________________________________  199
Using the Hex Dump Tool ____________________________________________________  199
Find_____________________________________________________________________  201
Go To Offset ____________________________________________________________  202
Chapter 14: Security Configuration ______________________________________________  203
About Security Configuration ________________________________________________  203
Using Security Configuration _________________________________________________  204
Chapter 15: Export Setups _______________________________________________________  207
Overview ___________________________________________________________________  207
Using Export Setups _________________________________________________________  207
Chapter 16: Keyboard Entry _____________________________________________________  211
Overview ___________________________________________________________________  211
Using Keyboard Entry________________________________________________________  212
Chapter 17: Back Up and Restore________________________________________________  215
Backing Up and Restoring the System ________________________________________  215
Dropping Unnecessary Database Tables__________________________________  215
Create the Backup ______________________________________________________  216
Validating the Backup Image ____________________________________________  217
Restoring the System_____________________________________________________  217
Appendix A: Miscellaneous Configuration _______________________________________  219
Configuration of Services ____________________________________________________  219
User Configuration __________________________________________________________  220
Audit Settings _______________________________________________________________  220
Anti-Virus ___________________________________________________________________  221
Network Security____________________________________________________________  221










