StoneLock Gateway Installation Manual. v.1.4

Size: px
Start display at page:

Download "StoneLock Gateway Installation Manual. v.1.4"

Transcription

1 StoneLock Gateway Installation Manual v.1.4

2 TABLE OF CONTENTS SECTION 1 INSTALLATION PREREQUISITS SECTION 1.1 SYSTEM REQUIREMENTS SECTION 1.2 PACS REQUIREMENTS SECTION 1.3 MIGRATION SECTION 2 STONELOCK GATEWAY SECTION 2.1 INSTALLING THE STONELOCK GATEWAY WINDOWS VIRTUAL SYSTEM SECTION 2.2 INSTALLING THE STONELOCK GATEWAY LINUX SYSTEM SECTION 2.3 INSTALLING THE STONELOCK GATEWAY HARDWARE SYSTEM SECTION 2.4 ESTABLISHING A SECURE SSH TUNNEL FOR PACS COMMUNICATION SECTION 2.5 CLUSTERING FOR ENTERPRISE SECTION 3 PACS INTEGRATION SETUP SECTION 3.1 AMAG SYMMETRY SECTION AMAG SHIM SETUP SECTION SETTING UP DEVICES IN SYMMETRY SECTION SETTING UP SYMMETRY USERS AS STONELOCK USERS SECTION REMOVING AN SYMMETRY USER FROM A STONELOCK DEVICE SECTION 3.2 AVIGILON ACM SECTION CONFIGURING THE GATEWAY TO COMMUNICATE TO ACM SECTION SETTING UP DEVICES IN ACM SECTION SETTING UP ACM USERS AS STONELOCK USERS SECTION REMOVING AN ACM USER FROM A STONE LOCK DEVICE SECTION 3.3 GENETEC SECURITY CENTER THIS SPACE INTENTIONALLY LEFT BLANK SECTION 3.4 HIRSCH VELOCITY SECTION HIRSCH SHIM SETUP SECTION SETTING UP DEVICES IN VELOCITY 2

3 SECTION SETTING UP VELOCITY USERS AS STONELOCK USERS SECTION REMOVING A VELOCITY USER FROM A STONELOCK DEVICE SECTION 3.5 HONEYWELL PROWATCH SECTION CONFIGURING THE GATEWAY TO COMMUNICATE TO PROWATCH SECTION SETTING UP DEVICES IN PROWATCH SECTION SETTING UP PROWATCH USERS AS STONELOCK USERS SECTION REMOVING A PROWATCH USER FROM A STONELOCK DEVICE SECTION 3.6 LENEL ONGUARD SECTION LENEL SHIM SETUP SECTION SETTING UP DEVICES IN ONGUARD SECTION SETTING UP ONGUARD USERS AS STONELOCK USERS SECTION REMOVING AN ONGUARD USER FROM A STONELOCK DEVICE SECTION 3.7 S2 SECTION CONFIGURING THE GATEWAY TO COMMUNICATE TO S2 Section Setting up Devices in S2. Section Setting up S2 Users as StoneLock Users Section Removing a S2 user from a StoneLock Device SECTION 3.8 SOFTWARE HOUSE CCURE 9000 SECTION CCURE SHIM SETUP NON-ENTERPRISE SECTION CCURE SHIM SETUP ENTERPRISE SECTION SETTING UP DEVICES IN CCURE SECTION SETTING UP A STONELOCK OPERATOR IN CCURE SECTION SETTING UP CCURE USERS AS STONELOCK USERS SECTION EVENTS IN MONITORING CLIENT SECTION REMOVING A CCURE USER FROM A STONELOCK DEVICE SECTION 4 STONELOCK WEB CLIENT (WITH PACS INTEGRATION) SECTION 4.1 PREPARING A USER PROFILE FOR ENROLLMENT SECTION 4.2 ENROLLMENT SECTION 4.3 VERIFICATION TRANSACTIONS SECTION 4.4 HEALTH MONITORING SECTION 4.5 MANAGEMENT TRANSACTIONS SECTION 4.6 GATEWAY LOG 3

4 SECTION 4.7 ANALYSIS SECTION 5 STONELOCK WEB CLIENT (STANDALONE) SECTION 5.1 CREATING AN ACCESS GROUP SECTION 5.2 REMOVING AN ACCESS GROUP SECTION 5.3 CREATING A DEVICE SECTION 5.4 DELETING A DEVICE SECTION 5.5 ADDING A NEW USER SECTION 5.6 EDITING A USER SECTION 5.7 DELETING A USER SECTION 5.8 ENROLLMENT SECTION 5.9 VERIFICATION TRANSACTIONS SECTION 5.10 HEALTH MONITORING SECTION 5.11 MANAGEMENT TRANSACTIONS SECTION 5.12 GATEWAY LOG SECTION 5.13 ANALYSIS Section 1 Installation Prerequisites Section 1.1 System Requirements Native Linux based o Ubuntu 14 though 17 o Debian 8 and 9 o RHEL 6 and 7 o Fedora 17 through 26 o CentOS 6 and 7 Windows VirtualBox based o Windows 7, Windows 10, Windows Server 2012, 64Bit System. o Minimum 32 GB RAM o Minimum 15GB Hard Drive space available. o Single available NIC Hardware based o Network drop. Section 1.2 PACS Requirements 4

5 Each PACS system has its own prerequisite before the StoneLock Gateway integration will run. These prerequisites are not available from StoneLock and must be obtained through the Access Control manufacturer. AMAG Symmetry Open XML, Data Connect Avigilon ACM N/A Genetec Security Center Coming soon Hirsch Velocity Velocity SDK Honeywell ProWatch - HSDK Lenel OnGuard - DataConduIT S2 Coming soon Software House CCURE 9000 Site License, Victor Web Services license. Section 1.3 Migration These procedures can be used to migrate all user templates in the following scenarios: Upgrading from a previous non-gateway integration to the StoneLock gateway. Upgrading from the SLN (StoneLock Network Software) to the StoneLock Gateway. Moving between PACS, i.e. From CCURE to Avigilon. These steps are not required if a StoneLock integration has not been installed prior to the StoneLock Gateway, or if the previous Install was the StoneLock Gateway and the PACS is not changing. Before starting a migration, you will need to get a list of all of the users in the StoneLock devices and their StoneLock IDs. In order to merge the profiles with the new integration the StoneLock IDs will need to remain the same. Note: Before performing the Migration procedure, read through steps 1-9 carefully. Failure to follow the steps can lead to the loss of all user templates in the StoneLock devices forcing re-enrollment. Back up your current database. Users may be pulled off the device temporality as they are migrated with the new integration. To not interrupt activity, it is recommended that this migration be performed during off peak hours. 1. Stop the previous integration driver. 2. Preform the StoneLock Gateway install per Section 2 of the StoneLock Gateway Installation manual. 3. Do NOT create the StoneLock Devices in the PACS at this time. Doing so will cause the Gateway to delete the users. 4. Do NOT start the shim for the PACS. Note: If you are using the pre-gateway integration with the same PACS, the devices created with the old integration will not affect this process. This applies to the devices created per the StoneLock Gateway Installation manual. 5. Open a terminal session in the StoneLock Gateway. a. Type cd /sl_applications and hit enter. 5

6 b. Type sudo./sl_migration and hit enter. i. The password is slgateway. The migration application will run and move the users to the migration archive in the StoneLock Gateway. The application will stop itself and the command line will be redisplayed. Do NOT proceed to Step 6 until the command line is present. 6. Perform the PACS setup per Section 3 of the StoneLock Gateway Installation Manual. Note: You can now create the new devices based on the PACS setup instructions. Enter the StoneLock ID (User ID) for the users exactly as they were in the StoneLock Device. If the PACS does not have the ability to create the StoneLock ID, continue to step 7 and enter the StoneLock ID in step Start the StoneLock Gateway service. a. In a Terminal Session in the Gateway enter systemctl start slg.service and hit enter. b. The password is slgateway. 8. In the Token Management tab of the StoneLock Web Client, enter the StoneLock ID (User ID) for each user exactly as it was in the StoneLock device prior to the Migration process. 9. Restart the StoneLock Gateway service a. In a Terminal Session in the StoneLock Gateway, enter systemctl restart slg.service and hit enter. b. The password is slgateway. The users will now be pushed back to each device based on the Access associated in the PACS. Provided the same StoneLock ID (User ID) was used for each user, the templates will still be on the devices. Section 2 StoneLock Gateway The StoneLock Gateway is designed to allow multiple StoneLock devices integrate with existing PACS systems. It is a Linux based solution that can run natively in a Linux environment, in Windows via VirtualBox, or on a standalone piece of hardware. If the Gateway is to be run in a Linux environment, a separate piece of hardware, or if running the virtual system, the Windows services for Lenel OnGuard, AMAG Symmetry, and Hirsch Velocity will need to be installed on the server housing the PACS. See Section 2.4. The StoneLock Gateway handles all communication to and from the StoneLock devices. Section 2.1 Installing the StoneLock Gateway Windows Virtual System 6

7 1. Installation of the StoneLock Gateway requires the StoneLock Gateway installation kit. The installation kit consists of one file: * ** a. StoneLock_Gateway.MSI *See Section 3.8 Software House CCURE 9000 for the additional file requirements for the CCURE integration. ** See Section 3.1 AMAG Symmetry for the additional file requirements for the AMAG integration. 2. Before starting: a. Ensure that the person installing the software has a Windows login which has administrator rights to the server and is a valid user of the PACS the StoneLock Gateway is being installed with. b. Verify that every StoneLock device is on the network and can be reached, via ping, from the location the StoneLock Gateway will be installed. 3. Setting up the Computer to run the installation kit. Note it may be necessary to run the msi as an administrator. If your system is not already set up to allow an msi to run as an administrator do the following steps a-n. If your system already allows msi files to be run as an administrator, skip to step 4. a. Click on Start menu and search for Run. b. Open Run. c. Type regedit in the Open field and click OK. Fig d. Click the arrow next to HKEY_CLASSES_ROOT. 7

8 Fig e. Scroll down until you find Msi.Package. Fig f. Click the arrow to the left of Msi.Package. g. Right click on shell. h. Click on New Key and create new Key. i. Name the Key runas. Fig j. Right click on Default, click Modify and type Install as $administrator in the Value data field. Click OK. Fig k. Right click on runas, click New Key and create new Key. 8

9 l. Name the Key command. Fig m. Right click on Default, click Modify and type msiexec /i %1 Click OK. Fig n. Click on File then exit. 4. Run the StoneLock_Gateway.msi as an administrator. Note: A CMD window will pop up and stay up through the process of the install. If you see the Successfully processed line show 0 files and the Failed processing line show 1, stop the install. Uninstall the StoneLock Gateway using the Windows Uninstall Programs and Features. Once uninstalled verify Steps 1-4 were accomplished and repeat step 4. 9

10 Fig A 7-Zip setup box will appear. Click Install. Note: If you already have 7-zip installed on the system click Cancel If you get the message You must restart your system to complete the installation. Restart now? Click No. Fig When the green bar is full it will show 7-Zip (x86) is installed. Click Close. 10

11 Fig Oracle VM VirtualBox Setup will appear. Click Next. a. If you already have VirtualBox installed on the system click Cancel. Fig Click next on the Custom set up screen. Use the default install options. 11

12 Fig Click next on the feature setup box. Use the default install options. 12

13 Fig Click Install on the Ready to Install screen. 12. Uncheck the Start Oracle VM VirtualBox after installation box. Click Finish. 13

14 Fig Zip will unpack the necessary files to run the Gateway. When the install hits 100% the install application will quit, and go back to the desktop. Wait until this has fully completed before proceeding to step

15 Fig Double click on the Oracle VM VirtualBox desktop icon. 14. Click on Settings. Fig Click on Network. 16. Click on the Attached to dropdown. 17. Select the network adapter for the computer from the list. Note: Depending on the network infrastructure, the Attached to drop down may need Bridged or NAT, etc. If unsure, get with the local Network support team. 15

16 Fig Click on Advanced. 19. Click on the Promiscuous Mode dropdown. 20. Select Allow All. Click OK. Fig Click the green Start arrow to launch the VirtualBox VM. 16

17 22. VirtualBox will open in a new window. Note: The VM will display messages along the top of the screen warning that the mouse and keyboard are not connected. Ignore these messages and click the x on the top right. The mouse and keyboard are automatically synced between the VM and the computer where the VM is installed. Note: The Lubuntu operating system, in the VM, may display a system error message. If this is displayed click cancel. This message is a nuisance message and has no bearing on the operation of the StoneLock Gateway. 23. Find the IP of the StoneLock Gateway. To obtain the IP of the VirtualBox VM, left click the icon of two monitors on the bottom right of the screen and click on Connection Information. See Fig Write this IP down. It will be needed for Section 4 StoneLock Web Client. Note: The VM defaults to DHCP. If the local network does not support DHCP, click on the Edit Connection link and change the IPv4 to a static IP address on the local network. Do not change it to the same IP address as the Windows machine that the VM is installed on. Fig Minimize the VirtualBox VM and prcoceed to Section 3 to set up the integraion with your PACS system. Note: Do not proceed with step 25 unitl you have completed the setup with the PACS. 25. Proceed to Section 2.4 to set up tunnel communication between the StoneLock Gateway and the PACS system. 26. Power the VirtualBox VM down by clicking the X in the top right of the window. 27. Select the Power Off the Machine option. Click OK. 28. In the VirtualBox VM click the black down facing arrow next to the green Start arrow. 29. Select the Headless Start option. a. This will start the StoneLock Gateway in the background. 30. Close the VirtualBox Manager. 17

18 Fig Section 2.2 Installing the StoneLock Gateway Linux System The StoneLock Gateway can be installed directly on a Linux system. The install kit for the StoneLock Gateway Linux System consists of a single file. * ** sl_gateway_build_x_x_x.tar.bz *See Section 3.8 Software House CCURE 9000 for the additional file requirements for the CCURE integration. ** See Section 3.1 AMAG Symmetry for the additional file requirements for the AMAG integration. 1. Place the sl_gateway_build_x_x_x.tar.bz file on the Linux system. It can be placed in any folder. 2. In a terminal session cd into the folder that the tar file was opened in. 18

19 3. Type sudo tar -xzvf sl_gateway_build_x_x_x.tar.bz and hit enter. Replace the (X) with the version number listed in the file name. 4. In terminal cd into the build_package directory created by Step Type sudo./builder_script.sh and hit enter. The install will begin. When the command prompt reappears, the install is complete. 6. Find the IP Address of the Linux Server/computer. a. Open a Terminal session i. Type ifconfig at the prompt and hit enter. ii. The IP Address will be listed at the top after inet addr: b. Write the IP Address down for later. 7. Type systemctl status slg.service and hit enter. 8. Ensure is shows the slg.service is running. If not type systemctl start slg.service at the command prompt and hit enter. 9. Repeat Step 5 for the following services: a. systemctl start slg_web_server.service b. systemctl start sl_cluster.service 10. At the prompt type cd /etc/stone_lock and hit enter. 11. Type gedit config.gateway.json and hit enter. 12. The configuration file will open in a new window. 13. If the PACS system adds an offset number to the cards, add that offset number in the card_number_offset field. a. This field is defaulted to 0 for no offset applied. 14. Change the Network Subnets field to include all of the subnets which have StoneLock devices. The StoneLock Gateway can communicate to devices on multiple subnets via the network router. 15. If using TLS, click the check box next to TLS Enabled. 16. Enter the password for the certificate in the TLS Encryption Password Seed box. 17. Enter the activation length of the certificate in the TLS Certificate Active Days box. 19

20 Fig At the prompt in the Terminal session type systemctl restart slg_web_server.service and hit enter. 19. Proceed to Section 3 to set up the PACS communication 20. Proceed to Section 2.4 to set up the Tunnel to communicate to the PACS. 21. If connecting multiple StoneLock Gateways together follow Section 2.5 Clustering for Enterprise. 22. At the prompt in the Terminal session type systemctl restart slg_service and hit enter. Section 2.3 Installing the StoneLock Gateway Hardware System The StoneLock Gateway comes preloaded on an Intel NUC. The NUC can be installed at any location provided it has a hardwired network connection available. 1. Connect the NUC to a keyboard, mouse, monitor, and the local network. 2. Turn on the NUC by pressing the power button on the top of the NUC. 3. Find the IP Address of the NUC using one of the following: a. Left Click on the double arrows in the top right of the display. i. Left Click on Connection Information. ii. The IP Address of the NUC is displayed in the IPv4 section. b. Left Click on the Power Icon on the top right of the display. i. Left Click on System Settings. 20

21 ii. Left Click on Network. iii. Left Click on Wired at the left. iv. The IP Address is displayed in the IPv4 Address field. c. Open a Terminal session by clicking on the Terminal Icon on the left or using Ctrl-Alt-T. i. Type ifconfig at the prompt and hit enter. ii. The IP Address will be listed at the top after inet addr: d. Write the IP Address down for later. 4. Open a Terminal session if not already open by clicking on the Terminal Icon on the left or using Ctrl-Alt-T. 5. Type systemctl status slg.service and hit enter. a. Ensure is shows the slg.service is running. If not type systemctl start slg.service and hit enter. i. The password is slgateway. 6. Repeat Step 5 for the following services: a. systemctl start slg_web_server.service b. systemctl start sl_cluster.service 7. At the prompt type cd /etc/stone_lock and hit enter. 8. Type sudo gedit config.gateway.json and hit enter. 9. The configuration file will open in a new window. 10. If the PACS system adds an offset number to the cards, add that offset number in the card_number_offset field. a. This field is defaulted to 0 for no offset applied. 11. Change the Network Subnets field to include all of the subnets which have StoneLock devices. The StoneLock Gateway can communicate to devices on multiple subnets via the network router. 12. If using TLS, click the check box next to TLS Enabled. 13. Enter the password for the certificate in the TLS Encryption Password Seed box. 14. Enter the activation length of the certificate in the TLS Certificate Active Days box. 21

22 Fig At the prompt in the Terminal session type systemctl restart slg_web_server.service and hit enter. a. The password is slgateway. 16. Proceed to Section 3 to set up the PACS communication 17. Proceed to Section 2.4 to set up the Tunnel to communicate to the PACS. 18. If connecting multiple StoneLock Gateways together follow Section 2.5 Clustering for Enterprise. 19. At the prompt in the Terminal session type systemctl restart slg.service and hit enter. a. The password is slgateway. Section 2.4 Establishing a Secure SSH Tunnel for PACS Communication The Windows services for Lenel OnGuard, AMAG Symmetry, and Hirsch Velocity are required to run on the same server as the PACS system. The SSH Tunnel allows the StoneLock Gateway to be installed on a separate Windows or Linux server, or on a separate piece of hardware like the StoneLock Gateway Hardware System. The StoneLock Gateway VirtualBox VM also uses the Tunnel to communicate with the PACS system, even if installed on the same server. 1. Open Notepad as an Administrator. 2. Select File and click Open 3. Navigate to the Program Files>StoneLock folder. 4. In the drop down at the bottom of the window select All Files (*.txt). It defaults to Text Documents (*.txt) 22

23 5. Select the config_xxxx.xml file that correlates to the correct PACS and click Open. o config_amag o config_hirsch o config_lenel 6. Enter the IP Address of the machine/server housing the StoneLock Gateway in the <external_ditrectory> field. Example: If the StoneLock Gateway is at , the external directory field will be: <external_directory>\\ \slgateway_samba</external_directory> 7. Select File and click Save. 8. Close the Notepad session. Fig The Secure SSH Tunnel is now set up. When the PACS setup is complete, the Shim will push the data via the tunnel to the Gateway. Section 2.5 Clustering for Enterprise Multiple StoneLock Gateways can be connected together to push user templates between the gateways. This capability allows the StoneLock Gateway to be Enterprise compatible. This feature also allows the ability to move a user template between different PACS systems, provided the StoneLock ID (User ID) is the same in the different systems. For a CCURE Enterprise system, the StoneLock Gateway would be installed on each SAS that a StoneLock device is installed on. For a Lenel Enterprise System, the StoneLock Gateway would be installed on each Region that a StoneLock device is installed on. 1 Ensure the Users have the same StoneLock ID (User ID) on each gateway. a. The StoneLock Gateway Cluster service uses the StoneLock ID (User ID) to match users in the archive. The users template will not be merged if the StoneLock ID (User ID) does not match. 23

24 2 Open a Terminal session in the StoneLock Gateway. 3 At the prompt type systemctl stop sl_cluster.service. and hit enter. a. The password is slgateway. 4 At the prompt type cd /etc/stone_lock and hit enter. 5 Type sudo gedit config_cluster.json and hit enter. a. The password is slgateway. 6 The configuration file will open in a separate window. Enter the IP Address of the other StoneLock Gateways. Not to include the current Gateway. a. The default number of members in the configuration file is 4. Add additional members as needed by following the same format used for the default members. Fig Click Save then the red X in the top corner. 8 At the prompt in the Terminal session type systemctl start sl_cluster.service and hit enter. a. The password is slgateway. 9 Repeat Steps 1-9 for all gateways that will be communicating to each other. 24

25 Section 3 PACS Integration Setup The following sections will show how to setup the StoneLock Gateway with the following PACS. AMAG Symmetry Avigilon ACM Genetec Security Center Hirsch Velocity Honeywell ProWatch Lenel OnGuard S2 Software House CCURE 9000 Section 3.1 AMAG Symmetry Section AMAG Shim Setup The StoneLock Gateway uses a windows service named AMAG_Shim to communicate between Symmetry and the gateway. The AMAG_Shim will be installed in one of two ways. The StoneLock_Gateway.MSI o Part of the Main VirtualBox VM install. The StoneLock_Shims.MSI o Run the MSI file. The Shim will be installed in the Program Files\StoneLock folder. The person installing the AMAG_Shim will need the valid Windows user name and password to access the AMAG Symmetry. 1. Open a CMD prompt. 2. Type ipconfig and hit enter to find the IP address of the server/computer that Symmetry is installed on. 25

26 Fig Write this IP address down for a later step. 4. Open Notepad as an Administrator. 5. Select File and click Open 6. Navigate to the Program Files>StoneLock folder. 7. In the drop down at the bottom of the window select All Files (*.txt). It defaults to Text Documents (*.txt) 8. Select the AMAG_Shim.exe.config file and click Open. 9. In the line that begins with <endpoint address= replace the IP address with the IP address recorded in step 3 above. 26

27 Fig Select File and click Save. 11. Select File and click Open. 12. Navigate to the Program Files>StoneLock folder. 13. In the drop down at the bottom of the window select All Files (*.txt). It defaults to Text Documents (*.txt) 14. Select the config_amag.xml file and click Open. 15. In the <userpwd> feild, enter the user name and password for the Symmetry log on. Note: This file defaults to the AMAG default user name and password of installer:install. If that is still active you do not need to change this field. 16. Enter the name of the server that houses the AMAG databases in the <datasource> field. 27

28 Fig Select File and click Save. 18. Open the Windows Services application. 19. Scroll down to the AMAG_Shim service. Fig Right click on the AMAG_Shim service click on Properties. 21. Click on the Log On tab. 22. Click on the circle next to This account. 28

29 23. Enter the account information that has access to Symmetry. Fig Click on the General tab. 25. Select applicable Startup type, from the Startup Type dropdown, for the location. a. Automatic is recommended in the event of a computer/server reboot. 26. Click Apply. 27. Click OK. 28. Start the AMAG_Shim service. Section Setting up Devices in Symmetry Any users in Symmetry can be set up as a StoneLock device reader. 1. Open the reader in Symmetry that the StoneLock device will be associated with. 2. At the end of the reader name in the Description field enter an underscore _ followed by the last six digits of the device MAC address. These six digits are also the serial number of the control box. 29

30 Example: Control Box Serial number 10032F will have a MAC address of a4:58:0f:10:03:2f. If that device is to be associated with Symmetry Reader Test, the reader name in Symmetry will be test_10:03:2f. See Fig Fig Click Ok to save the reader name change. This reader will now be sent to the StoneLock Gateway. If the device is online the Gateway will associate it with the reader in Symmetry and display it in the Remote Enrollment and Health Monitor tabs of the StoneLock Web Client. See Section 4 StoneLock Web Client. Note: The reader needs to be included in an active Clearance in Symmetry in order to be displayed in the Remote Enrollment tab of the StoneLock Web Client. Section Setting up Symmetry Users as StoneLock Users Any Symmetry user that has been assigned an access right that includes a Symmetry reader associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. 30

31 The following changes to an Employee or Card are automatically updated on the StoneLock device. First Name Last Name Card Number Card Status. The following status messages will display on the StoneLock device based on the Card status: o Card Status of Card Lost- Illegal User (Will display as Alarm Blacklist in the Symmetry Alarm Monitoring and the StoneLock Web Client) o Card Status of Stop- Illegal User (Will display as Alarm Blacklist in the Symmetry Alarm Monitoring and the StoneLock Web Client) o Card Status of Inactive- Illegal User (Will display as Alarm Blacklist in the Symmetry Alarm Monitoring and the StoneLock Web Client) Note: Denied events for Card Status and Verification failures will be displayed in the Alarm Monitoring window of Symmetry. Successful events will be displayed in the Activity Monitoring Window along with the Successful events from the Panel. Fig The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a re-enrollment. Section Removing a Symmetry user from a StoneLock Device Symmetry users are associated to StoneLock devices based on their Access Rights in Symmetry. To delete that user from a StoneLock device, remove that Access Right from that user then click update device in the StoneLock Web Client when the user is removed from the tree. The device associated with that Access Right will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in Symmetry. See Section 4 StoneLock Web Client. 31

32 Section 3.2 Avigilon ACM Section Configuring the Gateway to communicate to ACM 1. Bring up a Terminal session. In Ubuntu use Ctrl-Alt-T on the keyboard. 2. At the command line in the Terminal window type cd /etc/stone_lock/ Hit enter. Fig Type sudo gedit config_avigilon.xml Hit enter. Type in slgateway for the password and hit enter. Fig In the <acm url> field enter the IP address for the Avigilon ACM. a. This can be found by looking at the URL used to access ACM or login to ACM click Settings>Appliance>Ports. The address is listed under Ethernet ports. 32

33 Fig Click Save. 6. On the comand line in the terminal type systemctl enable avglshim.service then hit enter. Type slgateway for the password and hit enter. It may require it to be entered twice. Fig On the comand line in the terminal type systemctl start avglshim.service then hit enter. Type slgateway for the password and hit enter. 33

34 Fig Section Setting up Devices in ACM Any door in ACM can be set up as a StoneLock device reader. 1. Click on the Physical Access tab in ACM 2. Click on Doors and Click on the +Add New Door button. 3. Enter a device name, based on the naming convention rules of ACM. 4. Under the Alt Name field assign the last six characters of the devices MAC address. The last six characters of the MAC address will always be the six characters of the control units serial number. For example, the Alt Name in Fig is 10:03:3a. The serial number listed on the sticker of the control box for that device is C-10033A. Fig

35 5. Set the Door mode to Card Only, or Card and Pin. Note: This does not affect the Verification mode on the device. This is a required setting in ACM to enable the StoneLock Device to become Active in the StoneLock Gateway. 6. Click Save. 7. Add the door to the correct Access Group. The schedules for that door, and all StoneLock users assigned to that Access Group, will automatically be pushed to that door. Section Setting up ACM Users as StoneLock Users 1. Select the ACM user from the Identity list that will become a StoneLock user. 2. Under the External System ID, enter the number that will be that users StoneLock ID. This number may be from 2-18 numbers long. See Fig Note: the StoneLock device will allow IDs from 1-18 numbers long, but the External System ID field will not accept a single digit. Users are pushed to each StoneLock device on the network based on their Access Group assigned in ACM. Fig The following changes to an Identity or Token are automatically updated on the StoneLock device: First Name Last Name Token Internal Number (This is the number that is sent to the device for the card number of the user). Token Status. The following status messages will display on the StoneLock device based on the token status. o Token Status of Expired- Expired User (Will display as Expired in the StoneLock Web Client). o Token Status of Inactive- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Token Status of Not Yet Active- Illegal User (Will display as Blacklist in the StoneLock Web Client) 35

36 The External System ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a re-enrollment. See Section 4 StoneLock Web Client for enrollment and device user type. Section Removing an ACM user from a StoneLock Device ACM users are associated to StoneLock devices based on their Access Group in ACM. To delete that user from a StoneLock device remove that Access Group from that user. The device associated with that Access Group will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in ACM. See Section 4 StoneLock Web Client. Section 3.3 Genetec Security Center This Space Intentionally Left Blank Section 3.4 Hirsch Velocity The StoneLock Gateway integration with Velocity requires a valid SDK license obtained from Hirsch directly. To install the SDK license, refer to the documentation provided by Hirsch. Section Hirsch Shim Setup The StoneLock Gateway uses a windows service named Hirsch_Shim to communicate between Velocity and the Gateway. The person installing the Hirsch_Shim will need the valid Windows user name and password to access the Velocity SDK. 1. Navigate to the Hirsch PSG folder were the Velocity SDK is installed in. 2. Open the Velocity SDK folder. 3. Copy the sdklicense.txt file. 4. Move the copy of the sdklicense.txt file to the StoneLock folder created by the StoneLock Gateway install. This defaults to C:Program Files\StoneLock. You will see the Hirsch_Shim.exe file in this same folder. They need to be located in the same folder. 5. Open Notepad as an Administrator. 6. Select File and click Open 7. Navigate to the Program Files>StoneLock folder. 8. In the drop down at the bottom of the window select All Files (*.txt). It defaults to Text Documents (*.txt) 9. Select the config_hirsch.xml file and click Open. 36

37 10. Enter the name of the server that houses the Hirsch databases in the <datasource> field. Fig Select File and click Save. 12. Open the Windows Services application. 13. Scroll down to the Hirsch_Shim service. Fig Right click on the Hirsch_Shim service click on Properties. 15. Click on the Log On tab. 16. Click in the circle next to this account. 17. Enter the account information that has access to Velocity. 37

38 Fig Select the General tab. 19. Select applicable Startup type for the location. a. Automatic is recommended should the event of a computer/server reboot be required. 20. Click Apply. 21. Click OK. 22. Start the Hirsch_Shim service. Section Setting up Devices in Velocity Any reader in Velocity can be set up as a StoneLock device reader. 1. Open the Door in Velocity that will be associated with the StoneLock reader. 2. Click on the Entry Reader tab. 3. In the Reader name field, enter the last six digits of the device MAC address. These six digits are also the serial number of the control box. Example: Control Box Serial number 10032F will have a MAC address of a4:58:0f:10:03:2f. The reader name in Velocity will be 10:03:2f. 38

39 Fig Click Ok to save the reader name change. This reader will now be sent to the StoneLock Gateway. If the device is online the Gateway will associate it with the reader in Velocity and display it in the Remote Enrollment and Health Monitor tabs of the StoneLock Web Client. See Section 4 StoneLock Web Client. Note: The Door needs to be included in an active Door Group in Velocity in order to be displayed in the Remote Enrollment tab of the StoneLock Web Client. Section Setting up Velocity Users as StoneLock Users Any Velocity user assigned a Function that includes a Velocity Door Group associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. 39

40 Prior to a user being enrolled on a StoneLock device they will need to have a StoneLock ID created and have their card number associated to their profile. See Sections 4.1 Assigning a StoneLock ID to a User and Section 4.2 Assigning a card to a User. The following changes to an Employee or Card are automatically updated on the StoneLock device. First Name Last Name Card Number Card Status. The following status messages will display on the StoneLock device based on the Card status: o Card Status of Disable- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Lost- Lost Card (Will display as lost Card in the StoneLock Web Client) o Card Status of Stolen- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Destroyed- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Expired- Expired User (Will display as Blacklist in the StoneLock Web Client) The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a reenrollment. See Section 4 StoneLock Web Client for enrollment and device user type. Section Removing a Velocity user from a StoneLock Device Velocity users are associated to StoneLock devices based on their Function in Velocity. To delete that user from a StoneLock device, remove that Function from that user. The device associated with that Door Group will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in Velocity. See Section 4 StoneLock Web Client. 40

41 Section 3.5 Honeywell ProWatch The StoneLock Gateway integration with ProWatch requires a valid HSDK license. To set up the HSDK refer to the HSDK setup manual provided by Honeywell. Section Configuring the Gateway to talk to ProWatch The StoneLock Gateway uses the URL of the HSDK Application Module to communicate to ProWatch. 1. In ProWatch click on Database Configuration. 2. Click on the Application Module link. 3. Open and connect to the Application Module created for the StoneLock integration. Enter the Username and Password for the Application Module. Fig Click on the Subscribed Objects tab. Write down the URL listed in the Start from URL: field. You will not need the 41

42 Fig Bring up a Terminal session in the StoneLock Gateway. In Ubuntu use Ctrl-Alt-T on the keyboard. 6. At the comand lind in the Terminal window type cd /etc/stone_lock/ Hit enter. Fig Type sudo gedit config_honeywell.xml Hit enter. Type in slgateway for the passwrd and hit enter. 42

43 Fig In the <acm url> field enter the URL for the ProWatch HSDK Application Module that was writen down in step 4. You will need to enter pacs after the URL. See Fig In the <userpwd> field enter the user name and password that has access to the HSDK Application Module. Enter a : between the user name and password. Example: User name- user, password- password would be entered as user:password. See Fig Fig Click Save. 11. Click the x to close the gedit session. 12. On the comand line in the terminal type systemctl enable honeywell.service then hit enter. Type slgateway for the password and hit enter. It may require it to be entered twice. 43

44 Fig On the comand line in the terminal type systemctl start honeywell.service then hit enter. Type slgateway for the password and hit enter. Fig Section Setting up Devices in ProWatch Any reader in ProWatch can be set up as a StoneLock device reader. 1. Select the reader in ProWatch which will be associated with the StoneLock device. 2. Open the reader and click on the Define Logical Device tab. 44

45 3. At the end of the reader name in the Description field enter an underscore _ followed by the last six digits of the device MAC address. These six digits are also the serial number of the control box. Example: Control Box Serial number 10032F will have a MAC address of a4:58:0f:10:03:2f. If that device is to be associated with ProWatch reader Entrance 2, the reader name in ProWatch will be Entrance 2_10:03:2f. See Fig Fig Click Ok to save the reader name change. This reader will now be sent to the StoneLock Gateway. If the device is online the Gateway will associate it with the reader in ProWatch and display it in the Remote Enrollment and Health Monitor tabs of the StoneLock Web Client. See Section 4 StoneLock Web Client. Note: The reader needs to be included in an active Clearance Code in ProWatch in order to be displayed in the Remote Enrollment tab of the StoneLock Web Client. Section Setting up ProWatch Users as StoneLock Users Any ProWatch user that has been assigned a Clearance Code that includes a ProWatch reader associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. 45

46 Before these users can be enrolled on a StoneLock device they will need to have their card number associated with their profile. See Sections 4.1 Assigning a StoneLock ID to a User and Section 4.2 Assigning a card to a User. 1. In ProWatch click on Administration. 2. Click the + next to Badge Utilities. 3. Click on Badge Fields. 4. Right Click under the Badge Fields table and select Add Badge Field. Fig Enter STONELOCK_ID in the Colum Name field. 6. Enter StoneLock ID in the Display Name field. 7. Change Data Type to varchar 8. Click OK. 9. Click on the + next to Executables. 10. Double click on Badge Builder. a. This will open a separate program. 46

47 Fig Click on the + on Badge Profiles. 12. Click on the + on General Fields. 13. Click on Badge Information. 14. Find StoneLock ID in the Description field on the left. 15. Drag and drop the StoneLock ID field from the column and place it in the Badge Information screen on the right. 47

48 Fig Close the Badge Builder Application. The StoneLock ID field is now available in the Advanced Badge Manager. Note: If the Advance Badge Manager is open you will need to close it and reopen it before the added field will appear. 17. Open the Advance Badge Manager application. 18. Select the ProWatch user that will be assigned a StoneLock ID. 19. Click Edit. 20. According to internal policies, assign the user a StoneLock ID which may be from 1-18 numbers long. 21. Click Save. Users are pushed to each StoneLock device on the network based on their Clearance Code assigned in ProWatch. The following changes to an Employee or Card are automatically updated on the StoneLock device: First Name Last Name Card Number Card Status. The following status messages will display on the StoneLock device based on the Card status. o Card Status of Disabled- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Expired- Expired User (Will display as Expired in the StoneLock Web Client) o Card Status of Lost- Lost Card User (Will display as Lost Card in the StoneLock Web Client) o Card Status of Stolen- Illegal User (Will display as Blacklist in the StoneLock Web Client) 48

49 o Card Status of Terminated- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Unaccounted- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Void- Illegal User (Will display as Blacklist in the StoneLock Web Client) The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a reenrollment. See Section 4 StoneLock Web Client for enrollment and device user type. Section Removing a ProWatch user from a StoneLock Device ProWatch users are associated to StoneLock devices based on their Clearance Code in ProWatch. To remove that user from a StoneLock device remove that Clearance Code from that user. The device associated with that Access Group will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in ProWatch. See Section 4 StoneLock Web Client. Section 3.6 Lenel OnGuard The StoneLock Gateway integration with OnGuard requires a valid DataConduIT license. To set up DataConduIT refer to the DataConduIT setup manual provided by Lenel. Section Lenel Shim Setup The StoneLock Gateway uses a windows service named Lenel_Shim to communicate between DataConduIT and the gateway. The person installing the Lenel_Shim will need the OnGuard DataConduIT Directory authentication user name and password. This can be found in OnGuard > System Administration > Administration > Directories. If this is using a Domain you will need to use the fully qualified domain name with the user name. 1. Open Notepad as an Administrator. 2. Select File and click Open 3. Navigate to the Program Files>StoneLock folder. 4. In the drop down at the bottom of the window select All Files (*.txt). It defaults to Text Documents (*.txt) 5. Select the config_lenel.xml file and click Open. 49

50 6. Enter the name of the server that houses the Lenel databases in the <datasource> field. Fig Select File and click Save. 8. Open the Windows Services application. 9. Scroll down to the Lenel_Shim service. Fig Right click on the Lenel_Shim service click on Properties. 11. Click on the Log On tab. 50

51 12. Click on the circle next to This account. 13. Enter the account information that has access to OnGuard via DataConduIT. Fig Click on the General tab. 15. Select applicable Startup type, from the Startup Type dropdown, for the location. b. Automatic is recommended in the event of a computer/server reboot. 16. Click Apply. 17. Click OK. 18. Start the Lenel_Shim service. Section Setting up Devices in OnGuard Any reader in OnGuard can be set up as a StoneLock device reader. 1. Go to Access Control > Readers and Doors in OnGuard. 2. Find the reader that will be associated with the StoneLock device. 3. Select Modify to enable editing of that reader. 4. At the end of the reader name enter an underscore _ followed by the last six digits of the device MAC address. These six digits are also the serial number of the control box. 51

52 Example: Control Box Serial number 10032F will have a MAC address of a4:58:0f:10:03:2f. If that device is to be associated with OnGuard reader Front Door, the reader name in OnGuard will be Front Door_10:03:2f. See Fig Fig Click Ok to save the reader name change. Click OK on Confirm Record Modify window. This reader will now be sent to the StoneLock Gateway. If the device is online the Gateway will associate it with the reader in OnGuard and display it in the Remote Enrollment and Health Monitor tabs of the StoneLock Web Client. See Section 4 StoneLock Web Client. Note: The reader needs to be included in an active Access Level in OnGuard in order to be displayed in the Remote Enrollment tab of the StoneLock Web Client. Section Setting up OnGuard Users as StoneLock Users Any OnGuard user that has been assigned an Access Level that includes an OnGuard reader associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. Before these users can be enrolled on a StoneLock device they will need to have a StoneLock ID created and have their card number associated with their profile. See Sections 4.1 Assigning a StoneLock ID to a User and Section 4.2 Assigning a card to a User. The following changes to an Employee or Card are automatically updated on the StoneLock device. First Name Last Name Card Number Card Status. The following status messages will display on the StoneLock device based on the Card status: o Card Status of Lost- Lost Card User (Will display as Lost Card in the StoneLock Web Client) 52

53 o Card Status of Returned- Illegal User (Will display as Blacklist in the StoneLock Web Client) o User created statuses in OnGuard for a status other than Active, Lost, or Returned- Illegal User (Will display as Blacklist in the StoneLock Web Client) The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a reenrolment. See Section 4 StoneLock Web Client for enrollment and device user type. Section Removing an OnGuard User from a StoneLock Device OnGuard users are associated to StoneLock devices based on their Access Level in OnGuard. To remove that user from a StoneLock device remove that Access Level from that user. The device associated with that Access Level will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in OnGuard. See Section 4 StoneLock Web Client. Section 3.7 S2 Section Configuring the Gateway to communicate to S2 1. Bring up a Terminal session. In Ubuntu use Ctrl-Alt-T on the keyboard. 2. At the command line in the Terminal window type cd /etc/stone_lock/ Hit enter. 53

54 Fig Type sudo gedit config_s2.xml Hit enter. Type in slgateway for the password and hit enter. Fig In the <server url> field enter the IP address for the S2 Network Controller. a. This can be found by looking at the URL used to access S2. 54

55 Fig Click Save. 6. On the comand line in the terminal type systemctl enable s2.service then hit enter. Type slgateway for the password and hit enter. It may require it to be entered twice. Fig On the comand line in the terminal type systemctl start s2.service then hit enter. Type slgateway for the password and hit enter. 55

56 Fig Section Setting up Devices in S2. Any reader in S2 can be set up as a StoneLock device reader. 5. Select the reader in S2 which will be associated with the StoneLock device. 6. Open the reader and click on rename if it is an existing reader. 7. At the end of the reader name in the Name field enter an underscore _ followed by the last six digits of the device MAC address. These six digits are also the serial number of the control box. Example: Control Box Serial number 10032F will have a MAC address of a4:58:0f:10:02:b6. If that device is to be associated with S2 reader Office Door, the reader name in S2 will be Office Door_10:02:b6. See Fig

57 Fig Click Save to save the reader name change. This reader will now be sent to the StoneLock Gateway. If the device is online the Gateway will associate it with the reader in S2 and display it in Device and Health Monitor tabs of the StoneLock Web Client. See Section 4 StoneLock Web Client. Note: The reader needs to be included in an active Access Level in S2 in order to be displayed in the Remote Enrollment tab of the StoneLock Web Client. Section Setting up S2 Users as StoneLock Users Any S2 user that has been assigned an Access Level that includes a S2 reader associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. The following changes to an Employee or Card are automatically updated on the StoneLock device: First Name Last Name Card Number Card Status. The following status messages will display on the StoneLock device based on the Card status. o Card Status of Disabled- Illegal User (Will display as Blacklist in the StoneLock Web Client) 57

58 o Card Status of Expired- Illegal User (Will display as Blacklist in the StoneLock Web Client) o Card Status of Lost- Lost Card User (Will display as Lost Card in the StoneLock Web Client) The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a re-enrollment. See Section 4 StoneLock Web Client for enrollment and device user type. Section Removing a S2 user from a StoneLock Device S2 users are associated to StoneLock devices based on their Access Level in S2. To remove that user from a StoneLock device remove that Access Level from that user. The device associated with that Access Level will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in S2. See Section 4 StoneLock Web Client. Section 3.8 Software House CCURE 9000 The StoneLock Gateway integration with CCURE 9000 requires a valid CCURE site license provided by Software House. To set up the site license refer to the setup manual provided by Software House. In addition to the StoneLock_Gateway.msi file, the CCURE integration requires two more msi file. One file depends on which version of CCURE the integration is being installed with, 2.40 or The other file is to enable communication between the CCURE server and the StoneLock Gateway. The files are: NMS_SLG_Server_0240_Build_3.0.XXXXXX.0.msi NMS_SLG_Server_0250_Build_3.0.XXXXXX.0.msi StoneLock_CCure_Tunnel.MSI See Section 2.4 Establishing a Secure SSH Tunnel for PACS Communication Note: CCURE is required to be stopped and started at different times during the installation. The Configuration tool will do this automatically for you. Make sure that the install is done only during a time that the CCURE services can be stopped. 58

59 3.8.1 CCURE Shim Setup Standalone The StoneLock Gateway uses a CCURE Server Component service named NMS CCURE 9000 Stone Lock Server Component to communicate between CCURE and the Gateway. The person installing the service will need to have a log on with Admin access to CCURE. 1. Double click the NMS_SLG_Server_02X0_Build_3.0.XXXXXX.0.msi file. 2. Click Next at the Welcome to the NMS CCURE 9000 Stone Lock Integration Setup Wizard screen. Fig Check the box to accept the terms for the License Agreement. Click Next. 4. Click Complete at the Choose Setup Type Screen. Click Next. 59

60 Fig Click Install on the Ready to Install screen. 6. The installation will proceed. Click next until the Completed Install screen appears. 60

61 Fig Click Finish. 8. Navigate to the drive that the installation was installed on. 9. Go to Program Files (x86)>tyco>nms Utilities>StoneL Lock. 10. Double click on the SLGUtility application to run the Confugration tool. 11. Click the Configure Stone Lock Integration button. a. A confirmation message will pop up stating that this install will stop all CCURE services. Note: CCURE is required to be stopped and started at different times during the installation. The Configuration tool will do this automatically for you. Make sure that the install is done only during a time that the CCURE services can be stopped. b. Click Yes. 61

62 Fig Preparing the system for configuration, please wait will be displayed in the white box. Note: If the CCURE services are runing during this time, the configuration tool will stop them. This screen may display Not Responding during this. Ignore the message. When the CCURE services stop the install will continue automatically. 13. When the configuation install is finished, eight additional messages will be displayed in the white box. The last one is Tables created successfully. 14. Click the Red X in the top right corner once Tables created successfully is displayed in the white box. 15. The CCURE services will stop and restart again. 16. Open the CCURE Server Configuration and wait for the CrossFire Framework Service to start. 17. Start the CrossFire Server Component Framework Service. 18. Click on the Server Componet tab. 19. Start the NMS CCURE 9000 Stone Lock Server Component Application. 20. Click the Database tab. Fig

63 21. Verify the NMS.SLG.Objects status is Valid. If not copy the Conection String for the line above it and past it in the Connection String line for the NMS.SLG.Objects line. 22. Close the Server Configuration Application. Section CCURE Shim Setup Enterprise This Space Intentionally Left Blank Section Setting up Devices in CCURE Any reader in CCURE can be set up as a StoneLock device reader. 1. Open the CCURE Administration Station. 2. Click on the Hardware tab. Fig Click on the Stone Lock Controller folder. 4. Create a new Stone Lock Controller. 5. Enter a name in the Name field. 6. Click the Enabled box. 7. Enter the URL from Section 2.1 Step 28 in the Enrollment URL field. 63

64 Fig Click Save and Close. 9. Open the Stone Lock Controller again. 10. Enter the License Key provided by StoneLock in the License Key field and click Validate. The License Key is tied to the CCURE Host ID. To get this Key you will need to send your host ID to 11. Restart the NMS Service in the Server Configuration Application. 12. Navigate back to the StoneLock Controller in CCURE. 13. Click the Manage button. 14. All of the StoneLock devices that are on the Gateway will be displayed in the list be the last six characters of the MAC address. This is also the serial number of the control box. 15. Change the name of the device as needed. The MAC address field can not be modified. 16. Check the enabled box. 17. Double click in the istar Reader field. 18. Click the box with the three dots. This will bring up a list of avialable istar Readers in CCURE. 19. Chose the istar reader that will be associated with the StoneLock device. The istar Reader box will be populated with the selected istar Reader. 20. Click Save. 64

65 NOTE: At this time the Verification Mode, PIN Verification, and Card Verification options are not active. These will be available on future updates to the driver. You may also select these features on the StoneLock device by accessing the menu via the faceplate. 21. If you want CCURE to use the Personnel Object ID to automatically assign the unique StoneLock ID click the Use Object ID as Stone Lock ID box. Note: Clicking this button will change any existing StoneLock ID to the Object ID of that user in CCURE. This will require those users to reenroll. This option should be used only on intial setup if possible. Fig Section Setting up a StoneLock Operator in CCURE A StoneLock operator in CCURE allows the ability to choose the CCURE operators that have access to enrolling new users in a StoneLock device. 1. In the Hardware tab in CCURE, click the dropdown at the top and scroll down to Stone Lock Operator. See Fig Click New. 3. Assign a name to the Operator. 4. Add a description as needed. 65

66 5. Click the box with three dots to bring up the list of CCURE operators. 6. Select the CCURE operator from the list. The operator selected will be populated in the Operator field. 7. Click Add Device. A list of all StoneLock devices in CCURE will be displayed. 8. Select the device(s) that will be assigned to that operator. a. The StoneLock Operator can have as many of the StoneLock devices as needed. The devices selected in this step will be the devices listed in the enrollment drop down of the personnel record. 9. Click OK. 10. Click Save and Close. Note: Devices can be added or removed at any time to any operator. Fig Section Setting up CCURE Users as StoneLock Users Any CCURE user that has been assigned a Clearance that includes an istar Reader associated with a StoneLock device, will be automatically pushed to the StoneLock Gateway. These users will be displayed in the Remote Enrollment tab of the StoneLock Web Client. See Section 4 StoneLock Web Client. 1. Open the CCURE users personnel file. 2. In the Current View drop down box, select the Stone Lock Personnel View. 3. Click on the User Defined Fields tab. This label can be changed in CCURE as needed. 66

67 Fig Enter a unique value form 1-18 for the StoneLock ID. If allowing CCURE to create this number via the Object ID, this box will be grayed out. The number will populate when Save is clicked. Note: The StoneLock ID should not be changed once it is pushed to the StoneLock device. If the number is changed it could cause the device to no longer recognize that user without being reenrolled. 5. Select the desired User Type. See the StoneLock Pro User Manual for User Type options. 6. Select the desired User Mode option. a. Mixed Mode defines that particular user as Face Only. See the StoneLock Pro Manual for setting the StoneLock device in Mixed Verification Mode. b. Card Only allows that user to proceed through the StoneLock device with only a card. This is typically used for visitor cards and emergency services. 7. Click the Assign Credential button. This will bring up a list of all credentials assigned to that user. 8. Select the credential that the user will use at the StoneLock devices. Note: The StoneLock device only allows one credential per user. Select the credential that will be used for that user. All other credentials will be denied for that user at that device. The assigned credential can be changed at any time using the Assign Credential button. 9. Click the Save button. a. If allowing CCURE to use the Object ID for the StoneLock ID, the StoneLock ID field will now be populated. 10. Click the Stone Lock Pro Device drop down. 67

68 11. Select the StoneLock device from the list that will be used to enroll the user. Instruct the user that they are about to be enrolled. Read the Enrollment Section of the StoneLock Pro Manual on how to position the user to be enrolled. 12. Click the Enroll button. a. The StoneLock device will enter the capture mode. See StoneLock Pro User Manual. b. The picture of the StoneLock device shows the enrollment process. The progress bar at the bottom shows the progress of the enrollment. 13. When the enrollment is completed a pop up displaying Capture Complete will appear. Click OK. 14. Ensure the user has been given the proper Clearance that is associated with that StoneLock device. 15. Click Save and Close. Users are pushed to each StoneLock device on the network based on their Clearance assigned in CCURE. The following changes to an Employee or Credential are automatically updated on the StoneLock device. First Name Last Name Credential Number Credential Status. See Section Events in Monitoring Client The User ID (StoneLock ID) should not be altered once it is pushed to the StoneLock device. If the number is altered you may cause a system error on the device, which would result in the user no longer being recognized without a reenrollment. Section Events in Monitoring Client Monitoring Client will show successful and denied events at the StoneLock devices. See Fig for examples. Each event will show the CCURE Name (if known), Card Number, the StoneLock Device name, the Time and Date of the event, and the Status. The list of events that will be displayed in Monitoring Client are: Verification Successful- A successful verification by an authorized StoneLock user. Verification Admin Successful- A successful verification by a StoneLock device admin accessing the menu system on the device. Remote Load No User- An attempt by someone not enrolled in the device to verify. This will show the card number that was used to attempt the access. If the card is associated with a user in CCURE, the user name will be displayed. The picture of the person attempting the access will be displayed in the StoneLock Web Client. See Section 4.6 Verification Transactions. Verification Failure- An unsuccessful attempt to access the StoneLock device. The picture of the person attempting the access will be displayed in the StoneLock Web Client. See Section 4.6 Verification Transactions. 68

69 Alarm Lost Card An attempt to gain access using a card that has been marked as lost in CCURE. The picture of the person attempting the access will be displayed in the StoneLock Web Client. See Section 4.6 Verification Transactions. Alarm Blacklist An attempt to gain access using a card that has been marked as Disabled or Stolen in CCURE. This will also display if the user has been marked as Disabled in CCURE. The picture of the person attempting the access will be displayed in the StoneLock Web Client. See Section 4.6 Verification Transactions. Alarm Deadline An attempt to gain access using a card that has been marked as Expired in CCURE. The picture of the person attempting the access will be displayed in the StoneLock Web Client. See Section 4.6 Verification Transactions. Fig

70 Section Removing a CCURE User from a StoneLock Device CCURE users are associated to StoneLock devices based on their Clearance in CCURE. To delete that user from a StoneLock device remove that Clearance from that user. The device associated with that Clearance will be removed from the user in the Remote Enrollment tab of the StoneLock Web Client. The user will be removed from the device(s) and no longer have access at that door until access is given again in CCURE. See Section 4 StoneLock Web Client. Section 4 StoneLock Web Client (With PACS integration) The StoneLock Web Client provides a location to change and monitor the features of the StoneLock integration that are not available in all of the PACS integrations. The StoneLock Web Client can be pulled up from any browser on the same network as the StoneLock Gateway. 1. Launch a compatible web browser. 2. In the address bar enter the IP address of the StoneLock Gateway. 3. On the login screen enter the correct login information. a. User name: admin b. Password: c. Gateway IP Address: The same IP used in Step Click on the Login button. Section 4.1 Preparing a User Profile for Enrollment Every user in a StoneLock device must have a StoneLock ID before they will be pushed to a device. For the PACS that do not have the ability to assign this number, the Web Client provides a location to create a StoneLock ID for each user. 1. Login to the StoneLock Web Client. 2. Click on the Users link at the top of the screen. 3. Use the Search box above the Users box to search for the desired Last Name of the user. a. The search box is case sensitive. Use a capital letter for the first letter of the last name and lower case letters for the remainder of the last name. 4. After the desired Last Name has been entered in the Search box, click the Refresh Tree button. a. The list of users will now only show the users matching the search criteria. 70

71 Fig Click on the symbol of the head next to the identity name. a. This will move that users name to the User Configuration Box. Fig Select the Token that will be associated for the user at the StoneLock devices by clicking the green dot next to the token number. a. The token will be displayed in the Token (Card Number) box. Note: Anytime you make a change to the User, the token must be selected with that user to unsure the change is pushed to the device. 71

72 FIG Enter the desired StoneLock ID from 1-18 numbers long in the User ID(Pin) box. 8. Check the New ID box. Fig Select the desired Credential Type. a. Card Only: Card Only enables that user to verify at the StoneLock device with only a card. Card Only examples are visitors or emergency workers b. Blacklist: Blacklist disables that user s ability to gain access at the StoneLock devices. If connected to a PACS, the users will follow the status of the credential in the PACS when available. c. Mixed Mode: Mixed Mode enables that user to gain access to the StoneLock device using only the face while other users must present their pin/card before verifying with their face. Note: This setting requires the StoneLock device to be set in Mixed Verification Mode. See the StoneLock Pro User Manual for setting the device Verification Modes. 72

73 d. None: Selecting None will turn off the previously selected Credential Type. A user is defaulted to the None setting. Fig Select the desired User Type. a. The StoneLock device has three user types available for enrolled users. See the StoneLock Pro manual for definitions. Fig The Access Groups that the User is assigned to from the PACS will be listed in red in the Access Group Box. 12. Click the Save User. A pop up status message will appear showing success. 13. Click Ok. 73

74 Fig Click the Update Devices button. A pop up status message will appear showing success. 15. Click Ok. Fig Section 4.2 Enrollment For a user to be able to use the StoneLock devices they first must create an enrollment template. This template can be enrolled at any of the StoneLock devices that were created in the PACS. 1. Login to the StoneLock Web Client. 2. Click on the Remote Enrollment link at the top of the screen. 3. Use the Search box above the Users box to search for the desired Last Name of the user. a. The search box is case sensitive. Use a capital letter for the first letter of the last name and lower case letters for the remainder of the last name. 4. After the desired Last Name has been entered in the Search box, click the Refresh Tree button. a. The list of users will now only show the users matching the search criteria. 74

75 Fig Click on the symbol of the head next to the identity name. a. This will move that users name to the blank box below the Capture button. b. If the symbol of a head is red, that user does not have a template enrolled yet. Fig

76 Fig Click on the purple circle next to the device that will be used as the enrollment device from the Devices box. Fig a. This will move the device name to the blank box below the Stop button. b. The StoneLock devices that the user has access to will show up in the Devices box. c. Instruct the user that they are about to be enrolled. Read the Enrollment Section of the StoneLock Pro Manual on how to position the user to be enrolled. 7. Once both the name and deice are listed in the bottom boxes, click the Video button to start the live video feed. a. A pop up status message will appear showing success. b. Click Ok. 76

77 Fig Once the user has been identified as the correct person and they are prepared, click the Capture button. a. Click the Select box. A pop up status message will appear showing success. b. Click Ok. Fig c. The StoneLock device will enter the capture mode. See StoneLock Pro User Manual. d. The StoneLock Web Client shows the enrollment process. The progress bar at the bottom shows the progress of the enrollment. e. When the progress bar displays 100%, click the Stop button. i. Click the Select box. A pop up status message will appear showing success. ii. Click Ok. 77

78 Fig Fig Section 4.3 Verification Transactions When available in the PACS, event transactions will be sent to the PACS native monitoring application. Not all PACS have the ability to receive the StoneLock event transactions, or all of the information that the StoneLock device sends on a transaction. The StoneLock Web Client displays the following transaction information. Time of the event StoneLock ID (User ID) User Name Device name (The StoneLock device that the event took place at.) Credential (The card number that was presented at the StoneLock device.) Status (The status of the verification event, successful, failure, etc ) Verification Picture (The picture of the person that was being verified. This will also show the picture of a person on a denied event.) Enrollment Picture (The picture taken at time of enrollment.) 1. Click on the Home link at the top of the page. 78

79 2. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. Transactions that take place while the Pause button is selected will automatically be displayed after Resume is selected. Fig Click on a Picture in either the Verification Picture or Enrollment Picture columns to enlarge the image. Fig Section 4.4 Health Monitoring The Health Monitor screen shows the online status of all StoneLock devices on the gateway. All devices that are online are displayed with a green circle next to the device name. Offline devices are displayed with a red circle next to the device name. 1. Click on the Health Monitor link at the top of the page. 2. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. 79

80 Fig Section 4.5 Management Transactions This Space Intentionally Left Blank Section 4.6 Gateway Log Like the Management Transactions between the Gateway and devices, the Gateway provides a log of the Gateway Service. This log aids in troubleshooting by showing Gateway status. 1. Click on the Log link at the top of the page. 2. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. 80

81 Fig Section 4.7 Analysis This Space Intentionally Left Blank Section 5 StoneLock Web Client (Standalone) The StoneLock Web Client provides the ability to connect multiple StoneLock devices together remotely without the need for a PACS integration. The StoneLock Web Client can be pulled up from any browser on the same network as the StoneLock Gateway. 1. Launch a compatible web browser. 2. In the address bar enter the IP address of the StoneLock Gateway. 3. On the login screen enter the correct login information. a. User name: admin b. Password: c. Gateway IP Address: The same IP used in Step Click on the Login button. 81

82 Section 5.1 Creating an Access Group An Access Group(s) must be created to give a user rights to a StoneLock device. 1. Login to the StoneLock Web Client. 2. Click on the Devices link at the top of the screen. 3. In the Access Group box, enter a name for the Access Group. 4. Enter an ID number for the Access Group. This is a unique number to distinguish the Access Groups from each other. 5. Click the New ID button. Fig Click the Save Access Group button. a. A pop up status message will appear showing success. b. Click OK Fig Click the Refresh Tree button. a. The Access Group will be displayed in the tree 82

83 Fig Section 5.2 Removing an Access Group. 1. Click on the green circle next to the Access group. 2. Click Remove Access Group. a. A pop up status message will appear showing success. b. Click OK Fig Click on the Refresh Tree Button. a. The Access Group will no longer be displayed. Section 5.3 Creating a Device 1. Login to the StoneLock Web Client. 2. Click on the Devices link at the top of the screen. 83

84 3. Click on the green circle next to the Access Group that the device will be associated with. 4. Enter a Name for the Device in the Name box. 5. Enter an ID for the Device. This is a unique number to distinguish the Devices from each other. 6. Click the New Device button. 7. Click on the Active button. 8. In the MAC dropdown box select the desired device serial number. a. The MAC box shows all of the StoneLock devices that the Gateway is able to discover on the network. If the network configuration does not allow for discovery, enter the IP Address of the device. 9. Chose the verification mode desired for the device. Fig Click on the + button next to the Access Group to associate it with the device. a. A pop up status message will appear showing success. b. Click OK 84

85 Fig Click Save Device a. A pop up status message will appear showing success. b. Click OK Fig Click the Refresh Tree button. a. The device will not show up under the associated Access Group. 85

86 Fig Section 5.4 Deleting a Device 1. Click on the purple circle next to the Device. 2. Click Remove Device. a. A pop up status message will appear showing success. b. Click OK Fig Click on the Refresh Tree Button. a. The Device will no longer be displayed. Section 5.5 Adding A New User 1. Login to the StoneLock Web Client. 2. Click the Users link at the top of the screen. 3. Enter the name of the new user in the Name box. a. Enter the name in the following format. i. Last name, First name. 4. Enter the desired StoneLock ID from 1-18 numbers long in the User ID(Pin) box. 5. Check the New ID box. 86

87 Fig Select the desired Credential Type. a. Card Only: Card Only enables that user to verify at the StoneLock device with only a card. Card Only examples are visitors or emergency workers b. Blacklist: Blacklist disables that user s ability to gain access at the StoneLock devices. If connected to a PACS, the users will follow the status of the credential in the PACS when available. c. Mixed Mode: Mixed Mode enables that user to gain access to the StoneLock device using only the face while other users must present their pin/card before verifying with their face. Note: This setting requires the StoneLock device to be set in Mixed Verification Mode. See the StoneLock Pro User Manual for setting the device Verification Modes. d. None: Selecting None will turn off the previously selected Credential Type. A user is defaulted to the None setting. Fig Select the desired User Type. 87

88 a. The StoneLock device has three user types available for enrolled users. See the StoneLock Pro manual for definitions. Fig Enter the Card Number in the Token (Card Number) box. If not using cards this box can be left blank. 9. Select the desired Access Group for the user from the Access Group box. 10. Click Save User. A pop up status message will appear showing success. 11. Click Ok. Fig Click the Refresh Tree button. The new user will be displayed in the box. 13. Click the Update Devices button. A pop up status message will appear showing success. 14. Click Ok. 88

89 Fig Section 5.6 Editing a User 1. Login to the StoneLock Web Client. 2. Click the Users link at the top of the screen. 3. Use the Search box above the Users box to search for the desired Last Name of the user. a. The search box is case sensitive. Use a capital letter for the first letter of the last name and lower case letters for the remainder of the last name. 4. After the desired Last Name has been entered in the Search box, click the Refresh Tree button. a. The list of users will now only show the users matching the search criteria. Fig Click on the symbol of the head next to the identity name. a. This will move that users name to the User Configuration Box. 89

90 Fig Select the Token that will be associated for the user at the StoneLock devices by clicking the green dot next to the token number. a. The token will be displayed in the Token (Card Number) box. Note: Anytime you make a change to the User, the token must be selected with that user to unsure the change is pushed to the device. FIG

91 7. Make the desired change to the user. a. Name b. Credential Type c. User Type d. New toke/change existing token number. e. Add/Remove Access Group. i. Any Access Group in red is the active Access Group. Note: Do not change the User ID after a user has been enrolled in a StoneLock device. Doing so may cause the user to be denied at the device. 8. Click Save User. A pop up status message will appear showing success. 9. Click Ok. Fig Click the Refresh Tree button. The change to the user will be displayed in the box. 11. Click the Update Devices button. A pop up status message will appear showing success. 12. Click Ok. Fig

92 Section 5.7 Deleting a User 1. Login to the StoneLock Web Client. 2. Click the Users link at the top of the screen. 3. Use the Search box above the Users box to search for the desired Last Name of the user. a. The search box is case sensitive. Use a capital letter for the first letter of the last name and lower case letters for the remainder of the last name. 4. After the desired Last Name has been entered in the Search box, click the Refresh Tree button. a. The list of users will now only show the users matching the search criteria. Fig Click on the symbol of the head next to the identity name. a. This will move that users name to the User Configuration Box. 92

93 Fig Select the Token that will be associated for the user at the StoneLock devices by clicking the green dot next to the token number. a. The token will be displayed in the Token (Card Number) box. Note: Anytime you make a change to the User, the token must be selected with that user to unsure the change is pushed to the device. FIG Click the Remove User button. A pop up status message will appear showing success. 8. Click Ok. 93

94 Fig Click the Update Devices button. A pop up status message will appear showing success. 10. Click Ok. Fig Click the Refresh Tree button. a. The User will no longer be in the list. Section 5.8 Enrollment For a user to be able to use the StoneLock devices they first must create an enrollment template. This template can be enrolled at any of the StoneLock devices that were created in the PACS. 1. Login to the StoneLock Web Client. 2. Click on the Remote Enrollment link at the top of the screen. 3. Use the Search box above the Users box to search for the desired Last Name of the user. a. The search box is case sensitive. Use a capital letter for the first letter of the last name and lower case letters for the remainder of the last name. 4. After the desired Last Name has been entered in the Search box, click the Refresh Tree button. a. The list of users will now only show the users matching the search criteria. 94

95 Fig Click on the symbol of the head next to the identity name. a. This will move that users name to the blank box below the Capture button. b. If the symbol of a head is red, that user does not have a template enrolled yet. Fig Fig

96 6. Click on the purple circle next to the device that will be used as the enrollment device from the Devices box. Fig a. This will move the device name to the blank box below the Stop button. b. The StoneLock devices that the user has access to will show up in the Devices box. c. Instruct the user that they are about to be enrolled. Read the Enrollment Section of the StoneLock Pro Manual on how to position the user to be enrolled. 7. Once both the name and deice are listed in the bottom boxes, click the Video button to start the live video feed. a. A pop up status message will appear showing success. b. Click Ok. Fig Once the user has been identified as the correct person and they are prepared, click the Capture button. a. Click the Select box. A pop up status message will appear showing success. b. Click Ok. 96

97 Fig c. The StoneLock device will enter the capture mode. See StoneLock Pro User Manual. d. The StoneLock Web Client shows the enrollment process. The progress bar at the bottom shows the progress of the enrollment. e. When the progress bar displays 100%, click the Stop button. i. Click the Select box. A pop up status message will appear showing success. ii. Click Ok. Fig

98 Fig Section 5.9 Verification Transactions When available in the PACS, event transactions will be sent to the PACS native monitoring application. Not all PACS have the ability to receive the StoneLock event transactions, or all of the information that the StoneLock device sends on a transaction. The StoneLock Web Client displays the following transaction information. Time of the event StoneLock ID (User ID) User Name Device name (The StoneLock device that the event took place at.) Credential (The card number that was presented at the StoneLock device.) 98

99 Status (The status of the verification event, successful, failure, etc ) Verification Picture (The picture of the person that was being verified. This will also show the picture of a person on a denied event.) Enrollment Picture (The picture taken at time of enrollment.) 1. Click on the Home link at the top of the page. 2. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. Transactions that take place while the Pause button is selected will automatically be displayed after Resume is selected. Fig Click on a Picture in either the Verification Picture or Enrollment Picture columns to enlarge the image. Fig Section 5.10 Health Monitoring The Health Monitor screen shows the online status of all StoneLock devices on the gateway. All devices that are online are displayed with a green circle next to the device name. Offline devices are displayed with a red circle next to the device name. 1. Click on the Health Monitor link at the top of the page. 99

100 2. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. Fig Section 5.11 Management Transactions This Space Intentionally Left Blank Section 5.12 Gateway Log Like the Management Transactions between the Gateway and devices, the Gateway provides a log of the Gateway Service. This log aids in troubleshooting by showing Gateway status. 1. Click on the Log link at the top of the page. 3. Use the scroll bar at the right to move the list up and down. The list auto updates on a time schedule. Click on the Pause button to pause the updates. Click on Resume to restart the updates. 100

101 Fig Section 5.13 Analysis This Space Intentionally Left Blank Technical Support Option 2 support@stonelock.com A StoneLock Publication 2017 All rights reserved 101

StoneLock Gateway Installation Manual. v.1.7

StoneLock Gateway Installation Manual. v.1.7 StoneLock Gateway Installation Manual v.1.7 TABLE OF CONTENTS SECTION 1 INSTALLATION PREREQUISITS SECTION 1.1 SYSTEM REQUIREMENTS SECTION 1.2 PACS REQUIREMENTS SECTION 1.3 MIGRATION SECTION 2 STONELOCK

More information

StoneLock Gateway Installation Manual. v.1.1

StoneLock Gateway Installation Manual. v.1.1 StoneLock Gateway Installation Manual v.1.1 TABLE OF CONTENTS SECTION 1 INSTALLATION PREREQUISITS SECTION 1.1 SYSTEM REQUIREMENTS SECTION 1.2 PACS REQUIREMENTS SECTION 1.3 MIGRATION SECTION 2 STONELOCK

More information

OnGuard Integration User Guide. v

OnGuard Integration User Guide. v OnGuard Integration User Guide v. 17.01.30 Table of Contents Introduction 1- StoneLock Pro Hardware Configuration 2- Installation 2.1- Installing the SLMS and Service Applications 2.2- Configuring for

More information

Symmetry Integration User Guide. v

Symmetry Integration User Guide. v Symmetry Integration User Guide v. 17.02.01 Table of Contents Introduction 1. StoneLock Pro Hardware Configuration 2. Installation 2.1 Installing the SLMS and Service Applications 2.2 Configuring for AMAG

More information

BioConnect CabinetShield

BioConnect CabinetShield BioConnect CabinetShield Software Configuration Guide Revision 3.0 1 Table of Contents 1. Support... 3 2. Requirements... 4 2.1 Software and Hardware Requirements... 4 2.2 ACM Prerequisites... 5 3. Installing

More information

Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins Menu Sequence: VM / Guest / Send Ctrl-Alt-Delete

Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins Menu Sequence: VM / Guest / Send Ctrl-Alt-Delete CIS 231 Windows 2008 Server Install Lab #1 (Virtual Machines) Keys to Remember when using the vsphere client. Send the Ctrl-Alt-Delete key sequence to the Guest OS one of two ways: Key sequence: Ctlr-Alt-Ins

More information

STONELOCK NETWORK USER MANUAL Version

STONELOCK NETWORK USER MANUAL Version STONELOCK NETWORK USER MANUAL Version 17.2.1 Table of Contents About StoneLock Pro...4 1.0 Overview 1.01...System Introduction...4 1.02...System Components...4 1.03...Installation...5-6 1.04...Uninstall...6

More information

BioConnect v3.6. Installation Guide Revision 1.5. Last Updated: December 2016 Page 1 of 49

BioConnect v3.6. Installation Guide Revision 1.5. Last Updated: December 2016 Page 1 of 49 BioConnect v3.6 Installation Guide Revision 1.5 Last Updated: December 2016 Page 1 of 49 Table of Contents 1. Introduction... 3 1.1 About this Guide... 3 2. Support... 4 3. Release Notes... 5 4. Requirements...

More information

The Ip address / Name value should be: srvvcenter-cis

The Ip address / Name value should be: srvvcenter-cis CIS133 Installation Lab #1 - DESKTOP CLIENT OpenSUSE Install. Before beginning the installation, create a virtual machine in which you will install the operating system. 1) Open the VMware vsphere Client.

More information

BioConnect ID Enterprise v4.0

BioConnect ID Enterprise v4.0 BioConnect ID Enterprise v4.0 Installation Guide Revision 1.0 Last Updated: March 2017 Page 1 of 59 Table of Contents 1. Introduction... 3 1.1 About this Guide... 3 2. Support... 4 3. Release Notes...

More information

The Python Mini-Degree Development Environment Guide

The Python Mini-Degree Development Environment Guide The Python Mini-Degree Development Environment Guide By Zenva Welcome! We are happy to welcome you to the premiere Python development program available on the web The Python Mini-Degree by Zenva. This

More information

Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming

Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming Dell Flexible Computing Solutions: Deploying On-Demand Desktop Streaming Product Group November 2007 Dell White Paper November 2007 Contents Introduction... 3 Overview... 4 Planning the Deployment... 5

More information

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc.

WA2592 Applied Data Science and Big Data Analytics. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. WA2592 Applied Data Science and Big Data Analytics Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

1. Download the latest version of the Kali Linux 64 bit ISO image:

1. Download the latest version of the Kali Linux 64 bit ISO image: Ronny Bull Pen Testing Talk Pre-Lab: Virtual Machine Setup Lab Objectives: Configure VirtualBox to support Kali Linux LiveCD and Metasploitable 2 Configure Virtualbox networking to support both NAT Network

More information

FICAM Configuration Guide

FICAM Configuration Guide UTC Fire & Security Americas Corporation, Inc. 1212 Pittsford-Victor Road Pittsford, New York 14534 USA Tel 866.788.5095 Fax 585.248.9185 www.lenel.com Overview FICAM Configuration Guide The instructions

More information

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown

NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM Device Application User Guide Installation and Configuration for ios with TouchDown NotifyMDM for ios Devices, Version 3.x NotifyMDM for ios with TouchDown 1 Table of Contents NotifyMDM for ios

More information

CCNA 1 Chapter 2 v5.0 Exam Answers 2013

CCNA 1 Chapter 2 v5.0 Exam Answers 2013 CCNA 1 Chapter 2 v5.0 Exam Answers 2013 1. Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same

More information

Configuring WPA2 for Windows XP

Configuring WPA2 for Windows XP Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP Your wireless card must support 802.1x, AES, and WPA2. Your computer must have Windows XP service pack 2 installed and

More information

Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box

Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box Building a 64-bit CentOS 7 Workstation using Oracle Virtual Box jthomas Enterprises, 2016 Building a CentOS 7 Workstation using Oracle VirtualBox 1 Section 1 Before You Begin This section details the environment

More information

WA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2393 Data Science for Solution Architects. Classroom Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2393 Data Science for Solution Architects Classroom Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Class Setup...3 Part 2 - Minimum Software Requirements

More information

Cisco Modeling Labs OVA Installation

Cisco Modeling Labs OVA Installation Prepare for an OVA File Installation, page 1 Download the Cisco Modeling Labs OVA File, page 2 Configure Security and Network Settings, page 2 Deploy the Cisco Modeling Labs OVA, page 12 Edit the Virtual

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

Redhat OpenStack 5.0 and PLUMgrid OpenStack Networking Suite 2.0 Installation Hands-on lab guide

Redhat OpenStack 5.0 and PLUMgrid OpenStack Networking Suite 2.0 Installation Hands-on lab guide Redhat OpenStack 5.0 and PLUMgrid OpenStack Networking Suite 2.0 Installation Hands-on lab guide Oded Nahum Principal Systems Engineer PLUMgrid EMEA November 2014 Page 1 Page 2 Table of Contents Table

More information

BioConnect ID Enterprise v4.2

BioConnect ID Enterprise v4.2 BioConnect ID Enterprise v4.2 Installation Guide Revision 1.0 Last Updated: October 2017 Page 1 of 62 Table of Contents 1. Introduction... 3 1.1 About this Guide... 3 2. Support... 4 3. Release Notes...

More information

IQSweb Installation Instructions Version 5.0

IQSweb Installation Instructions Version 5.0 IQSweb Installation Instructions Version 5.0 Contents Additional References... 3 IQSweb ROSS Connection... 3 IQSweb V5.0 Install/Upgrade Scenarios... 4 IQSweb Configuration Options... 5 A. Single Computer/Server

More information

TEEAL. TEEAL Configuration and Setup. Configuration & network setup for new TEEAL machines. Written By: The TEEAL Team

TEEAL. TEEAL Configuration and Setup. Configuration & network setup for new TEEAL machines. Written By: The TEEAL Team TEEAL TEEAL Configuration and Setup Configuration & network setup for new TEEAL machines Written By: The TEEAL Team INTRODUCTION This guide will walk you through the steps to configure TEEAL. Before proceeding

More information

CSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup

CSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup CSE 101 Introduction to Computers Development / Tutorial / Lab Environment Setup Purpose: The purpose of this lab is to setup software that you will be using throughout the term for learning about Python

More information

Orchid Fusion VMS Installation Guide

Orchid Fusion VMS Installation Guide Orchid Fusion VMS Installation Guide Version 2.4.0 Orchid Fusion VMS Installation Guide v2.4.0 1 C O N T E N T S About the Orchid Fusion VMS Installation Guide 2 Installation 3 Working in Windows 3 Working

More information

Orchid Core VMS Installation Guide

Orchid Core VMS Installation Guide Orchid Core VMS Installation Guide Version 2.2.2 Orchid Core VMS Installation Guide v2.2.2 1 C O N T E N T S About the Orchid Core VMS Installation Guide 2 Installation 3 Working in Windows 3 Working in

More information

Table of Contents HOL-1757-MBL-6

Table of Contents HOL-1757-MBL-6 Table of Contents Lab Overview - - VMware AirWatch: Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with AirWatch (30 min)... 8 Getting Started... 9 F5 BigIP Configuration...

More information

Touch Dynamic Quest II 7 - Tablet Staging Setup

Touch Dynamic Quest II 7 - Tablet Staging Setup Touch Dynamic Quest II 7 - Tablet Staging Setup Overview This page was written to assist with setting up and staging of tablets. Touch Dynamic Quest II 7 - Initializing and Turning on the Tablet 1. When

More information

Deploying HP SIM 6.x on MSCS clusters on Windows 2008 with SQL Server 2008 SP1 White Paper

Deploying HP SIM 6.x on MSCS clusters on Windows 2008 with SQL Server 2008 SP1 White Paper Deploying HP SIM 6.x on MSCS clusters on Windows 2008 with SQL Server 2008 SP1 White Paper Table of Contents Abstract... 2 Introduction... 2 System infrastructure... 3 Storage configuration... 3 IP addresses...

More information

DCP585CW Windows Network Connection Repair Instructions

DCP585CW Windows Network Connection Repair Instructions Difficulty printing from your PC can occur for various reasons. The most common reason a networked Brother machine may stop printing, is because the connection between the computer and the Brother machine

More information

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1

WA2342 NoSQL Systems Comparison. Lab Server VM Setup Guide. Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 WA2342 NoSQL Systems Comparison Lab Server VM Setup Guide Web Age Solutions Inc. Copyright Web Age Solutions Inc. 1 Table of Contents Part 1 - Minimum Hardware Requirements...3 Part 2 - Minimum Software

More information

GIGABYTE Remote Management Console User s Guide. Version: 1.0

GIGABYTE Remote Management Console User s Guide. Version: 1.0 GIGABYTE Remote Management Console User s Guide Version: 1.0 Table of Contents Using Your GIGABYTE Remote Management Console...2 Software Install...3 Prerequisites on remote management PC...3 Install Java

More information

SNMP Manager User s Manual

SNMP Manager User s Manual SNMP Manager User s Manual Table of Contents 1. Introduction...1 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...3

More information

CIS 76 VLab Pod Setup

CIS 76 VLab Pod Setup CIS 76 VLab Pod Setup Last updated 9/4/2017 Status on setup instructions: 1. pfsense (2.3.1, 64 bit) pfsense-ce-2.3.4-release-amd64 - DONE for Fa17 2. Kali (2017.1, 64 bit) kali-linux-2017.1-amd64.iso

More information

Click on the VM IMAGES drop-down menu and select VirtualBox Images

Click on the VM IMAGES drop-down menu and select VirtualBox Images How to install Ubuntu Linux in VirtualBox Revised: 12-August-2016, David Walling In our previous How To, we stepped through how to download and install Oracle VirtualBox on a Windows 10 host. This How

More information

User Manual WatchPower

User Manual WatchPower User Manual WatchPower Management Software for SP Efecto / SP Brilliant (Plus) / SP Initial Table of Contents 1. WatchPower Overview...1 1.1. Introduction... 1 1.2. Features... 1 2. WatchPower Install

More information

SWP-0036 AFHCAN Telehealth Cart Imaging and Software Configuration. Revision: 1. Effective Date: 1/4/2011

SWP-0036 AFHCAN Telehealth Cart Imaging and Software Configuration. Revision: 1. Effective Date: 1/4/2011 Software Procedure SWP-0036 AFHCAN Telehealth Cart Imaging and Software Configuration Revision: 1 Effective Date: 1/4/2011 Alaska Native Tribal Health Consortium Division of Health Information & Technology

More information

Table of Contents. VMware AirWatch: Technology Partner Integration

Table of Contents. VMware AirWatch: Technology Partner Integration Table of Contents Lab Overview - HOL-1857-08-UEM - Workspace ONE UEM - Technology Partner Integration... 2 Lab Guidance... 3 Module 1 - F5 Integration with Workspace ONE UEM (30 min)... 9 Introduction...

More information

A Connect the Broadband Router

A Connect the Broadband Router A CheckPoint FTS Broadband Linksys WRT54G Router Setup V2 A Connect the Broadband Router PRINT THIS DOCUMENT FOR REFERENCE IMPORTANT: Before you begin, disconnect any computers that are connected to your

More information

Installation Guide: VirtualBox, Windows 10, and Microsoft Visio (Mac OS)

Installation Guide: VirtualBox, Windows 10, and Microsoft Visio (Mac OS) (434) 924-7988, RRH 219 helpdesk@comm.virginia.edu Installation Guide: VirtualBox, Windows 10, and Microsoft Visio (Mac OS) Prerequisites: Verify that your installation of OS X and Safari have the most

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 Area Access Manager User Guide, product version 6.5 This guide is part 2 of a 2-document suite, item number DOC-800, revision 2.003,

More information

System 44 Installation Guide

System 44 Installation Guide System 44 Installation Guide For use with System 44 v1.0 Suite and SAM v1.8.1 or higher Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. SCHOLASTIC, SYSTEM 44, SCHOLASTIC

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Secure Single Sign On with FingerTec OFIS

Secure Single Sign On with FingerTec OFIS Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway

More information

USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com

USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD. bxterra.com USER MANUAL SNMP-RC210 SNMP WEB MANAGEMENT CARD bxterra.com TABLE OF CONTENTS INTRODUCTION... INSTALLATION... SNMP MANAGER GUI... SNMP MANAGER FUNCTIONS MENU... SETTINGS... ONLINE UPGRADE... SYSTEM MANAGER...

More information

Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University

Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University Install & Configure Windows 10, Visual Studio, & MySQL Dr. Tom Hicks Trinity University Windows 10 Install 1] Push the Next Button. 2] Push the Install Now Button. Windows-Database-Server-Installation-1.docx

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista

8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista 8.9.2 Lab: Configure an Ethernet NIC to use DHCP in Windows Vista Introduction If Vista is not available in your classroom, you may complete this lab by viewing the figures in this document. Print and

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

Manual for Creating a Network Load-Testing System. Paul Ethridge

Manual for Creating a Network Load-Testing System. Paul Ethridge Created by: Spencer Morse Paul Ethridge 2 TABLE OF CONTENTS PAGE No. Materials Required 3 (I) Configuring the HP2910 Series Switch for SNMP Monitoring.. 4-6 (II) Installing the Ubuntu Operating System

More information

TCP/IP CONFIGURATION 3-6

TCP/IP CONFIGURATION 3-6 TCP/IP CONFIGURATION 3. Type IPCONFIG /RENEW and press the Enter key. Verify that your IP Address is now 192.168.2.xxx, your Subnet Mask is 255.255.255.0 and your Default Gateway is 192.168.2.1. These

More information

Installation Guide. ZKAccess CLASSIC 3.5. www. zkaccess.com

Installation Guide. ZKAccess CLASSIC 3.5. www. zkaccess.com Installation Guide ZKAccess CLASSIC.5 www. zkaccess.com Contents Downloading... Installation & Adding an Area...4 Adding an Area...5 Adding a Device...6 To add a standalone device:... 6 To add an Access

More information

VIRTUAL GPU LICENSE SERVER VERSION AND 5.1.0

VIRTUAL GPU LICENSE SERVER VERSION AND 5.1.0 VIRTUAL GPU LICENSE SERVER VERSION 2018.06 AND 5.1.0 DU-07754-001 _v6.0 through 6.2 July 2018 User Guide TABLE OF CONTENTS Chapter 1. Introduction to the NVIDIA vgpu Software License Server... 1 1.1. Overview

More information

Scholastic Reading Inventory. Installation Guide

Scholastic Reading Inventory. Installation Guide Scholastic Reading Inventory Installation Guide For use with SRI v1.8.1 and SAM v1.8.1 Copyright 2009 by Scholastic Inc. All rights reserved. Published by Scholastic Inc. SCHOLASTIC, SYSTEM 44, SCHOLASTIC

More information

CA Agile Central Administrator Guide. CA Agile Central On-Premises

CA Agile Central Administrator Guide. CA Agile Central On-Premises CA Agile Central Administrator Guide CA Agile Central On-Premises 2018.1 Table of Contents Overview... 3 Server Requirements...3 Browser Requirements...3 Access Help and WSAPI...4 Time Zone...5 Architectural

More information

Configuring and Using AMT on TS130. Lenovo ThinkServer

Configuring and Using AMT on TS130. Lenovo ThinkServer Lenovo ThinkServer August 31, 2011 Contents Overview... 3 Enabling and Configuring AMT on TS130... 3 Provisioning AMT on TS130 Using Manual Configuration Method... 4 AMT Configuration with Web Interface...

More information

Fiery Installation Instructions for the WorkCentre 7300 Series

Fiery Installation Instructions for the WorkCentre 7300 Series Fiery Installation Instructions for the WorkCentre 7300 Series This document describes how to install and set up the Fiery Network Controller for WorkCentre 7300 Series. IMPORTANT: The complete installation

More information

BioBridge. Software House C-CURE Quick Start Guide

BioBridge. Software House C-CURE Quick Start Guide BioBridge Software House C-CURE 9000 Quick Start Guide Table of Contents Introduction... 3 Support... 3 Setting up BioBridge... 4 Wiegand Profiles... 4 Biometric Device Profile... 5 Biometric Device(s)...

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Dell EMC OpenManage Mobile. Version User s Guide (Android)

Dell EMC OpenManage Mobile. Version User s Guide (Android) Dell EMC OpenManage Mobile Version 2.0.20 User s Guide (Android) Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION

More information

READ 180 Next Generation Installation Guide

READ 180 Next Generation Installation Guide READ 180 Next Generation Installation Guide rskills including College & Career For use with READ 180 Next Generation suite and Student Achievement Manager version 2.5 or higher Table of Contents Introduction...

More information

VMware AirWatch - Unified Endpoint Management for Windows 10

VMware AirWatch - Unified Endpoint Management for Windows 10 VMware AirWatch - Unified Endpoint Management for Windows 10 Table of Contents Lab Overview - HOL-1857-02-UEM - Workspace ONE UEM - Managment for Windows 10 2 Lab Guidance... 3 Module 1 - Windows 10 Software

More information

Lighthouse 5 User Guide. Revision

Lighthouse 5 User Guide. Revision Lighthouse 5 User Guide Revision 5.2.1 2018-06-13 2 TABLE OF CONTENTS 1. About this User Guide 6 2. Lighthouse overview 7 2.1 Lighthouse VM 5 host requirements 7 2.2 Lighthouse architecture 7 2.2.1 Lighthouse

More information

PAN 802.1x Connector Application Installation Guide

PAN 802.1x Connector Application Installation Guide PAN 802.1x Connector Application Installation Guide Version 1.2 "Copyright CodeCentrix. All rights reserved 2015. Version 1.2 Contact Information CodeCentrix www.codecentrix.co.za/contact Email: info@codecentrix.co.za

More information

Bergmans Mechatronics LLC. LabSocket. User Guide. LabSocket-Basic System. (Evaluation Version) May Copyright 2014 Bergmans Mechatronics LLC

Bergmans Mechatronics LLC. LabSocket. User Guide. LabSocket-Basic System. (Evaluation Version) May Copyright 2014 Bergmans Mechatronics LLC Bergmans Mechatronics LLC LabSocket User Guide LabSocket-Basic System (Evaluation Version) May 2014 Copyright 2014 Bergmans Mechatronics LLC BML Document Table of Contents 1. Introduction... 1 1.1 LabSocket

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Installing + Configuring

Installing + Configuring Installing + Configuring Install and Recover with TFTP Introduction This document is designed to help you install the Commotion software if the Install on a Ubiquiti Device instructions did not work, or

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

FileCruiser VM Quick Configuration Guide For Trial Version V1.0

FileCruiser VM Quick Configuration Guide For Trial Version V1.0 FileCruiser VM Quick Configuration Guide For Trial Version V1.0 Contents How to configure FileCruiser VM... 4 Setup Wizard: Time Zone page... 6 Setup Wizard: Network page... 7 Setup Wizard: Service Server

More information

Overview of Cisco UCS Manager GUI

Overview of Cisco UCS Manager GUI Overview of Cisco UCS Manager GUI This chapter includes the following sections: Overview of Cisco UCS Manager GUI, page 1 Logging in to Cisco UCS Manager GUI through HTTPS, page 6 Logging in to Cisco UCS

More information

First: Obtain a Linksys "WUSB300N for V11A" adapter kit: it contains the USB wireless

First: Obtain a Linksys WUSB300N for V11A adapter kit: it contains the USB wireless First: Obtain a Linksys "WUSB300N for V11A" adapter kit: it contains the USB wireless network adapter (with USB extension cable and Windows XP installation CD.) Before plugging in the adapter, verify that

More information

RocIT Defender User s Guide ViSoS TM Virtual System on a Stick

RocIT Defender User s Guide ViSoS TM Virtual System on a Stick RocIT Defender User s Guide ViSoS TM Virtual System on a Stick Table of Contents 1. Introduction 3 1.1. Minimum System Requirements 3 1.2. Drive Specifications 4 2. Startup Procedure 4 2.1. Configure computer

More information

1) Use either Chrome of Firefox to access the VMware vsphere web Client.

1) Use either Chrome of Firefox to access the VMware vsphere web Client. CIS133 Installation Lab #1 Web Client OpenSUSE Install. 1) Use either Chrome of Firefox to access the VMware vsphere web Client. https://vweb.bristolcc.edu CHROME FireFox At the your connection is not

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional

LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional LiNC-NXG for Windows 8 Professional, Windows 7 Professional, Vista Business Edition and XP Professional Installation Guide for LiNC-NXG 33-10067-001 REV: C PCSC 3541 Challenger Street Torrance, CA 90503

More information

GridPro v6.0 INSTALLATION GUIDE

GridPro v6.0 INSTALLATION GUIDE GridPro v6.0 INSTALLATION GUIDE TABLE OF CONTENTS 1. DOWNLOADING GridPro 1 2. CD CONTENTS 1 3. REQUIRED PACKAGES 1 4. SYSTEM REQUIREMENTS 2 5. INSTALLATION PROCEDURE 2 5.1 INSTALLATION PROCEDURE FOR WINDOWS

More information

WinSCP. Author A.Kishore/Sachin

WinSCP. Author A.Kishore/Sachin WinSCP WinSCP is a freeware windows client for the SCP (secure copy protocol), a way to transfer files across the network using the ssh (secure shell) encrypted protocol. It replaces other FTP programs

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information

LinX Software Suite v3 Getting Started

LinX Software Suite v3 Getting Started 2018-03-19 LinX Software Suite v3 Getting Started Product revision: V3.0.2 Document revision: 1.0 www.crosscontrol.com Contents Revision history...2 1. Brief Introduction...3 2. Components and Installation...3

More information

System 44 Installation Guide

System 44 Installation Guide System 44 Installation Guide For use with System 44 version 2.5 or later and Student Achievement Manager version 2.5 or later Table of Contents Introduction... 3 Getting Started... 3 Windows and Mac OS

More information

FASTT Math Next Generation Installation Guide

FASTT Math Next Generation Installation Guide FASTT Math Next Generation Installation Guide For use with FASTT Math Next Generation version 2.1 or later and Scholastic Achievement Manager version 2.1 or later Copyright 2012 by Scholastic Inc. All

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 Visitor Management Host User Guide, product version 6.4 This guide is item number DOC-802, revision 1.038, April 2010 Copyright

More information

PROCESS AUTOMATION. MANUAL VisuNet Control Center Version 4.1

PROCESS AUTOMATION. MANUAL VisuNet Control Center Version 4.1 PROCESS AUTOMATION MANUAL VisuNet Control Center Version 4.1 With regard to the supply of products, the current issue of the following document is applicable: The General Terms of Delivery for Products

More information

Installation Considerations: Included: Not Included:

Installation Considerations: Included: Not Included: Installation Considerations: See the Setup Guide for any details related to the steps in this guide; such as power requirements, rack mounting considerations, and other more in-depth instructions. The

More information

LiveNX Upgrade Guide from v5.2.0 to v5.2.1

LiveNX Upgrade Guide from v5.2.0 to v5.2.1 LIVEACTION, INC. LiveNX Upgrade Guide from v5.2.0 to v5.2.1 UPGRADE LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction

More information

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12

VMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12 26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.

More information

Remote Access System for STAM-2 Monitoring Station STAM-VIEW

Remote Access System for STAM-2 Monitoring Station STAM-VIEW Remote Access System for STAM-2 Monitoring Station STAM-VIEW Installation Manual stam-view_i_en 10/11 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu

More information

Sun VirtualBox Installation Tutorial

Sun VirtualBox Installation Tutorial Sun VirtualBox Installation Tutorial Installing Linux Mint 5 LTS Guest OS By Dennis Berry Welcome to the world of virtualization and Linux. This tutorial is intended to help users who are new to the world

More information

Operating Systems Lab 1. Class topic: Installation of the operating system. Install Ubuntu on Oracle VirtualBox

Operating Systems Lab 1. Class topic: Installation of the operating system. Install Ubuntu on Oracle VirtualBox Operating Systems Lab 1 Class topic: Installation of the operating system. Install Ubuntu on Oracle VirtualBox Oracle VirtualBox is a cross-platform virtualization application. It installs on your existing

More information

SmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey

SmartCash SmartNode SCRIPT Setup Guide v2.2. Windows 10. Date: 20/02/2018. By (Jazz) yoyomonkey SmartCash SmartNode SCRIPT Setup Guide v2.2 Date: Introduction Welcome to this step by step guide that will take you through the process of creating your own SmartCash SmartNode. This guide is aimed at

More information

System 44 Next Generation Installation Guide

System 44 Next Generation Installation Guide System 44 Next Generation Installation Guide For use with System 44 Next Generation version 2.3 or later and Scholastic Achievement Manager version 2.3 or later Copyright 2014 by Scholastic Inc. All rights

More information

Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0

Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0 . Avaya Solution & Interoperability Test Lab Application Notes for Ardence Desktop Edition with Avaya Interaction Center Issue 1.0 Abstract These Application Notes describe the configuration steps required

More information

Parallel Programming

Parallel Programming Parallel Programming Installing Ubuntu Virtual Machine within VirtualBox Author B. Wilkinson - Modification date Januray 3, 2016 These instructions assume you have already installed VirtualBox (See separate

More information

SUREedge DR Installation Guide for Windows Hyper-V

SUREedge DR Installation Guide for Windows Hyper-V SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...

More information

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013 Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate

More information