Security tab - micro form, Security tab – GE v6 User Manual

Page 244

Advertising
background image

Secure Perfect 6.1.1 User Manual

242

Security Tab - Micro Form

Micro Form
Micro Passwords
: The Micro Passwords list box has the following default password entries, enabling
four possible levels of security. Select a password; it now displays in the Password dialog box:

Select To

one-1

Re-assign a password by typing over the
default displayed in the dialog box.

two-1

Re-assign a password by typing over the
default displayed in the dialog box.

three-1

Re-assign a password by typing over the
default displayed in the dialog box.

four-1

Re-assign a password by typing over the
default displayed in the dialog box.

Click Change to save and re-assign the new password.

If you change your micro passwords, you must enter the changed passwords in FlashTool by typing

over the existing entries. As you type the password in FlashTool, the characters will be replaced by
asterisks (*) to ensure the security of the host access system

.

Communication Encryption
This feature allows you to configure additional security encryption that scrambles data into an
unbreakable code for public transmission. Encryption protects the Host-to-micro exchange of information.
The Host uses the Exchange Key to send the Data Key to the micro. Once the Data Key is received, the
Host-to-micro communication is encrypted using that key.
Enable Encryption: This check box is available only for head-of-line network, network+dialup, network +
direct, and network + network micros.

This checkbox, and all selections in the Communication Encryption grouping, are not available on

downstream micros

.

Exchange Key: There are two options for encrypting an

Exchange Key

.

System

: When you choose this selection, no additional selections are available or required.

This key is set at the factory.

Custom

: When you select this option, the three dialog boxes become available. At the micro,

enter the 48-character exchange key using FlashTool. This exchange key must be identical
to the key that was entered into the micro parameter block at the micro.

If the Custom exchange key entries do not match, an alarm condition indication displays

in the Reference column of the Alarm Monitor Form.

Edit: Click to re-assign or revise an existing encrypted Custom exchange key for a selected
micro. It is possible to assign a duplicate exchange key on separate micros in your Secure
Perfect system. When you click this button one time, this button label changes to Auto
Generate.

Auto Generate: Click this button to system-generate a Custom exchange key. We
recommend that you record this number. You can now enter this key into the micro
parameter block at the micro.

Advertising