Office of Liquor Gaming and Regulation Principles for Remotely Upgradeable Gaming Machines Version (draft)

Size: px
Start display at page:

Download "Office of Liquor Gaming and Regulation Principles for Remotely Upgradeable Gaming Machines Version 1.3.1 (draft)"

Transcription

1 Department of Employment, Economic Development and Innovation Office of Liquor Gaming and Regulation Principles for Remotely Upgradeable Gaming Machines Version (draft)

2 The State of Queensland, Department of Employment, Economic Development and Innovation, Copyright protects this publication. The State of Queensland has no objection to this material being reproduced but asserts its right to be recognised as author of its original material and the right to have its material remain unaltered. Inquiries should be addressed to The information contained herein is subject to change without notice. The copyright owner shall not be liable for technical or other errors or omissions contained herein. The reader/user accepts all risks and responsibility for losses, damages, costs and other consequences resulting directly or indirectly from using this information. Enquiries about reproduction, including downloading or printing the web version, should be directed to or telephone OLGR Technical Unit is independently certified to ISO 9001:2008 by SAI Global Ltd Principles for Remotely Upgradeable Gaming Machines Version draft 2

3 Contents 1 Introduction 4 2 Glossary / Abbreviations 4 3 Principals 5 4 Revision History 13 Principles for Remotely Upgradeable Gaming Machines Version draft 3

4 1 Introduction Purpose To propose and publish possible technical frameworks for remotely upgradeable Electronic Gaming Machines for the purpose of eliciting industry feedback and comments, with the long term objective of laying the foundation for remotely upgradeable Electronic Gaming Machines or similar devices. Scope This document may be of interest to any organisations with an interest in electronic gaming manufacturing, operation or regulation. A working technical knowledge of Electronic Gaming Machines, protocols, Public Key Encryption techniques, infrastructures and the X509 and PGP standards is required in order to fully understand all the concepts proposed in this document. 2 Glossary / Abbreviations Central Monitoring System Operator (CMS Operator) In Queensland clubs and hotels, it is the gaming venues Licensed Monitoring Operator (LMO). In Queensland Casinos., it is the casino operator. Electronic Gaming Machine (EGM) Standard industry definition applies. However, in this document the abbreviation EGM can also be taken to refer to any type of electronic jackpot or prize triggering device used for gaming. Game Content In this document, Game Content refers to any type of data that an EGM may utilise as software, graphics or sound, or any for other purpose. Game Content Provider (GCP) Game Content Provider refers to organisation(s) that will be authorised to physically download EGM upgrades or new game content into EGMs. Game Content Computer (GCC) Game Content Computer refers to any computer/server which stores EGM software locally at a gaming venue until subsequently downloaded to the EGMs. A GCC may or may not be required depending on the GCP. Principles for Remotely Upgradeable Gaming Machines Version draft 4

5 3 Principals The most important item this document tries to propose at this time is an additional new gaming venue LAN topology for supporting remotely upgradeable EGMs. The following diagram outlines a proposed new EGM network topology to facilitate the download of new game content to remotely upgradeable capable EGMs. Please refer to the above diagram when reading the remainder of this document. 3.1 The LAN To support the possible increased demand on bandwidth required by remotely upgradeable EGMs, a new LAN which will be specified by the OLGR which all Game Content Providers will share and use for the purpose of delivering new or upgraded game content to the EGMs. Refer to previous diagram. The intent on having a generic LAN is to minimise cost The LAN will be Ethernet based. The OLGR will approve all LAN content and protocols to ensure a standardised LAN can be maintained It is proposed the new LAN be physically maintained and installed by QLD Licensed Repairers and Service Contractors as this requires no change to the existing regulatory framework. Principles for Remotely Upgradeable Gaming Machines Version draft 5

6 3.1.4 There will be the requirement for remote LAN configuration, QoS control and intrusion monitoring The gaming venue must own the LAN hardware as per the existing QCOM fibre optic LAN Game Content Providers may use any TCP/IP based protocol on the LAN, however all ports utilised must be first approved by the OLGR to ensure there is no contention over port numbers since the network will most likely be shared. In addition, all the content and functionality of the protocols utilised on the LAN must be approved by the OLGR as some content and functionality must be restricted for security and integrity reasons. (For example, it would be unacceptable for a Game Content Provider to upload meters for the gaming venue, or similar statistics, or any data that is not actually the property of the Game Content Provider. Exceptions may be granted in cases where the owner of the data has granted specific permission to do so in writing.) The LAN (where not stated otherwise) must be at least 100 Mb/s (minimum) UTP Ethernet Typically, there should be no more than 24 EGMs per switch UTP cable must be category 5 or better No UTP cable is to be run through ceilings of gaming venues (Fibre optic links must be used in this case). Exemptions may be granted if the gaming venue is considered to have has adequate lightning protection Links between switches must be via fibre optic cable. For example, gigabit single mode or multi-mode fibre ring. All fibre optic cables must be run through vermin resistant conduit Encrypting communication on the LAN is recommended but is not mandatory as the mandated Digital Signatures will provide the required overall security and authentication. Refer following sections in this document for more information. It is a commercial decision for each EGM manufacturer as to whether or not to encrypt packages to be sent to their EGMs The routers and switches shown in the above diagram must be approved by the OLGR under the Machine Gaming Act. Exact requirements will be published at a later date. For example, it is expected that all routers will be remotely configurable and have at least the following built in functionality: NAT, Firewall & QoS There will be some options with regard to the LAN configuration (e.g. such as p2p or ring wiring and equipment). Options chosen will be at the discretion of the Gaming Venue who may make their own decision in this regard based on cost, performance and reliability LAN Intrusion Monitoring Requirements There will be the requirement for the active monitoring of the LAN. All MAC addresses must be authenticated by a trusted party; unauthorised MAC addresses must not be assigned an IP. Communications attempts on closed ports must be logged. All ports must be closed except for those ports approved by the OLGR to be left open. Principles for Remotely Upgradeable Gaming Machines Version draft 6

7 QoS Requirements, The OLGR along with port control will specify the minimum QoS parameters with respect to allowable ports. 3.2 WAN Requirements At this stage requirements in this area are still to be finalised, but it is likely the requirements will be a set of high level principles only. It is intended that more than one type of WAN connection to a gaming venue will be permitted, but for cost reasons, it makes sense to try to build a framework that only requires only WAN connection per venue. Following is a list of mandates that will be used for drafting the set of WAN principles Minimising cost. (i.e. all Game Content Providers sharing the WAN could be a possibility) Connection may be shared by a number of Game Content Providers and organisations. Security is specifically not a factor in the physical wide area delivery of new game content to EGMs, because of the proposed security requirements placed on game content upgrade data described elsewhere in this document. The Gaming Venue must own the WAN connection at the venue if any. The OLGR must have access to the WAN, if any. PSTN must also be supported as this is still the best connection option for many QLD gaming venues. Further to the above, another possible and very cheap and convenient method to facilitate the delivery of new game content to EGMs is via surface delivery. There is no reason why large scale upgrades could not also be performed by the mailing of new or upgraded game content on portable media (such as CD, DVD or flash) directly to the gaming venues. Once received, the gaming venue would simply insert the media into the GCC or EGMs and the upgrade would then occur automatically in accordance with approved arrangements with the gaming venues central monitoring system operator. Depending how frequently upgrades are performed in many cases this would still be cheaper in comparison to a dedicated WAN. Referring to the OLGR audit computers shown in the diagram, it is the intended that OLGR will have access to any WAN used in the delivery of game content to the EGMs, for the purpose of EGM software audits and integrity checks on EGMs as required. Principles for Remotely Upgradeable Gaming Machines Version draft 7

8 3.3 EGM Hardware The EGM must have at least one UTP Ethernet Port. (The port must have extra fast transient protection to at least 4.5kv). Minimum supported speed is 100 Mbit/sec The EGM manufacturer must not physically enable any Ethernet, TCP or IP protocols, on any port in the EGM or allow game or game variation downloads until they have firstly successfully implemented to the OLGR satisfaction, remote upgrades with respect to the EGM s OS/Kernel and base/shell software and that the GCPs are on-line and ready to deliver new game content to the EGMs as required The EGM must utilise electrically re-writable PSDs for all its programs and software. Note that the EGM must also contain enough free space on its PSDs to store its current software set plus a newer version during a download. The PSDs must also still be able to be easily removed from the EGM, or easily directly readable (without running code of the PSDs themselves), for isolated manual verification of the current contents when required for when a higher level of security for verification is warranted EGMs must implement the requirements contained in the OLGR document Electronic Seal Minimum Requirements (v 1.0), 2001, available for download from EGM manufacturers will also be required to securely seal their gaming machine software out of the factory. Refer section 3.5 following for more information With the security imposed on remotely upgradeable EGMs, it is also feasible that EGMs will be allowed to have removable media device interfaces such as CD/DVD/flash drives to allow upgrades to be loaded directly into the EGM for subsequent authentication and activation. The advantage of this is with regard to very small or remote gaming venues With the use of PKE, much longer hashing algorithms and new RAM clear procedures (refer section 3.5.2), it may become a requirement for EGMs to have either a touchscreen otherwise the facility to be able to plug in a keyboard or mouse in order to input data into the EGM (such as lengthy seeds, keys or passwords) in a more timely fashion. 3.4 EGM Software To ensure uninterrupted play, any downloads to the EGM must be performed in background by the EGM while it maintains all other operations, including game-play In regards to Program Hashes, a remotely upgradeable EGM must calculate its overall program hash (as required by QCOM) by calculating an individual hash for every subsystem and game in the EGM and then combining them into an overall program hash result by XOR ing each hash result together. This ensures independence with respect to the order in which the hashes are performed in the EGM which is highly desirable for remotely upgradeable EGMs. 3.5 Security and Authentication The intent of this section is to propose a framework to ensure that all software upgrades downloaded and activated by the EGMs are highly secure and auditable. The requirements which Principles for Remotely Upgradeable Gaming Machines Version draft 8

9 follow are an example of one methodology to illustrate the level of security expected in an EGM with remote upgradeability, but are by no means a mandate at this time. The security is founded upon the use of Public Key Encryption techniques and Infrastructures. It is proposed that all the security regarding new or updated game content delivered to a gaming venue s EGMs will be located in the EGMs. Each EGM will ensure via Digital Signatures that no received downloads can be either activated or permanently stored in the EGM, unless the EGM has successfully authenticated the download with at least two Digital Signatures: one from the OLGR which denotes the content has been approved and one from the EGM manufacturer which authenticates that the content has come from the EGM manufacturer i. Other authorities must be able to be added if required. The methodology used must also securely handle a change of individuals involved in the authorisation of EGM production code. X509 or PGP are examples of an authentication standard that can support this kind of arrangement. At this time, any security implementation not based on X509 or PGP standards or principals is unlikely to be approved. In addition, as the implementation of the above standards is an extremely complicated task and taking into account that there are freely and readily available implementations of X509 & PGP, any organisation not using an implementation of X509 or PGP which does not have a demonstrated track record of secure and reliable operation may not be approved. Using the above proposed methodology, the physical download mechanism to the EGM or GCCs (if present) does not need to be secure, as the EGM will simply not retain or activate any downloads that do not authenticate with the correct Digital Signatures. The LMO via the QCOM Protocol will still be used as the final control as to whether any software on an EGM is enabled or otherwise in clubs and hotels. In the case of casinos, the casino operator will be expected to have a system of control which will ensure that only approved software is enabled and operated. Refer QCOM Version for more information and requirements in this area. One possible example of a methodology for the delivery of authenticated game content for an EGM manufacturer in a secure and accountable manner is: The manufacturer must maintain a root certificate authority in a secure manner to the OLGR s satisfaction which it uses to issue certificates to its personnel. A Software Engineer or game designer working for a manufacturer completes some production code, or new game content. They sign their deliverable content package with their private key/certificate. A peer reviews the content and if ok then they also sign the code. Similarly the individual at the manufacturer s testing department does the same. Other authorities within the EGM manufacturer may also sign the production code/package as seen fit. It must be clear (by means of a signed declaration) that each individual understands what every piece of content they sign means. Once the code is approved for use the code is submitted with all signatures attached to a trusted computer or entity * that verifies the signatures. If ok, the trusted computer or i Concept first publicly published by the OLGR in the Jackpot System Min. Req. Document v1.0 released 9/2000. Principles for Remotely Upgradeable Gaming Machines Version draft 9

10 entity then issues the code package with a final Digital Signature for the EGM manufacturer. *The trusted computer or entity that the EGM manufacturer uses to produce signed production code packages would have to be approved and sealed by the OLGR. This entity must also have the facility (in conjunction the OLGR s authorisation and authorised EGM personnel), to securely and revoke or add new authorised users. This trusted computer or entity could also lie with a trusted 3rd party or regulator. There are many options here. Another issue to be addressed by the EGM manufacturer is the process of securely installing an EGM s initial OS, or kernel, or bootstrap, or base production code onto a new production EGM and sealed by the EGM manufacturer with no opportunity for compromise on the production line or anywhere else in the process. There are a number of possible solutions to this issue and each manufacturer must come up with a secure, solution to the OLGR s satisfaction. In the solution there must be no single individual with the ability to substitute or alter approved production code that is installed onto the EGMs. The solution must be scalable in that any number of arbitrary individuals can sign off on the installation and sealing as required and it must take into account that individual persons in the process will change. The solution must be auditable. The process must have accountability in that all signatories must not be anonymous. The OLGR will be setting up its own X509 root certificate authority or equivalent in PGP which it will use to issue to issue the appropriate certificates for the purpose of signing approved content for download to EGMs. In some high risk cases, the OLGR will also wish to authenticate and issue certificates for particular individual gaming devices such as EGMs and Jackpot Triggering Devices. It will be a requirement that the Game Content Provider will securely issuing individual certificates for each EGM out of the factory Physical Security of EGM Production Code. The EGM manufacturer s approved systems controls will also have to be enhanced. Physical code security must be maintained right up until commissioning and a Licensed Repairer places their seal on the EGM. The EGM manufacturer must provide updated controls to the OLGR s satisfaction that ensures any potential harm to the EGM s approved production code, as a result of an attack from any source, has no possibility of success without detection or collusion on the part of multiple parties. In control systems where there is a human element in the delivery of production code, it is expected that no-less than two individuals must collude in order to compromise code delivered in EGMs software. (More may be required depending of the overall risk ($) associated with the EGM s application code) Under no circumstances, at any time may a single individual be in a position to compromise the code delivered in or to an EGM in the field (and assuming that all individuals have full technical capability in order to produce unauthorised code for the EGMs). Another case that will have to be covered in EGM manufacturer s internal controls will be the replacement of a non-serviceable sealed processor board of existing EGM in the field. Same requirements as commissioning will apply. To facilitate all this, EGM manufacturer will have to start sealing processor boards out of the factory with a manufacturer s seal. Existing requirements may have to change in order to allow a processor board to be removed from an EGM without breaking the seal, as the intent behind the old requirement of sealing processor boards into the overall EGMs becomes obsolete in a system Principles for Remotely Upgradeable Gaming Machines Version draft 10

11 utilising PKE technology for software authentication and where mechanical meters are not being utilised EGM RAM Clears In EGMs capable of remote upgrades, physical seal breaks will only be performed on EGM as a result of either a total software or hardware failure inside the sealed cabinet area. Accordingly RAM clears in these EGMs will be instigated via minor addition to the QCOM protocol and require secure authentication via Digital Signatures before the EGM will accept a RAM clear command. One example of a proposed RAM clear process could be:- -> Monitoring System sends a RAM clear request to an EGM. <- The EGM will respond with a randomly chosen RAM clear authority code (this prevents re-use of RAM clear command following). -> Monitoring System makes RAM occur by sending a signed message containing the EGM s MID & serial number plus the EGM generated random authority code. The EGM will then clear its RAM provided the message s digital signature successfully authenticates. It will be possible to securely RAM clear an EGM via the new Ethernet LAN, via the QCOM protocol, or via audit mode on the EGM (using a similar RAM clear password entered into the EGM directly). 3.6 Game Content Computers The following requirements are only applicable to Game Content Providers whose remotely upgradeable EGMs require a Game Content Computer The GCC must utilise the LAN as specified in this document for the transfer of game content and other software upgrades to the EGMs in order to minimise cost The GCC must be an industrial type computer with a high maximum ambient operating temperature with adequate cooling and thermal protection, preferably located in one of the manufacturers EGMs or EGM consoles. Adequate ventilation and cooling must be provided for the GCC wherever it is located. In some cases ventilation fans will be added to consoles where required. It is preferred if GCCs are passively cooled devices in order to reduce maintenance costs. The reason for the preferred location of GCCs inside the EGM consoles is because space is a serious issue at many gaming venues. For example in a multi-game Content Provider environment where the GCCs were all desktop PCs, then a gaming venue could theoretically have to provide a location and suitable operating environment for numerous computer servers, possibly one for each Game Content Provider. Many gaming venues simply do not have the space to locate numerous servers. In some cases finding a suitable location for the existing EGM Site Controller used for EGM monitoring is difficult enough. Principles for Remotely Upgradeable Gaming Machines Version draft 11

12 3.6.3 GCCs must be remotely upgradeable by the Game Content Provider If a GCC or Game Content Providers host system is required to interact with gaming venue staff, then this must be via the Gaming Venue s own PC, preferably via the internet via an GUI application (typically a web browser) running on the Gaming Venues PC. Intent behind this requirement is twofold. 1. The gaming venue s PC is high risk from a security standpoint and therefore should be kept off the EGM LAN networks. 2. The space saving intent re section also applies A failure of a GCC at any time must not affect the continued operation of the EGMs. 3.7 Other Requirements To ensure critical patches can be applied in a timely manner, Game Content Providers must be capable of upgrading their entire download capable EGM s within 12 hours of an approval of a new EGM OS/Kernel and base/shell software by the OLGR Also refer to the QCOM Protocol document version regarding the section on remotely upgradeable EGMs Remote upgrades to EGM peripherals are also acceptable and encouraged. E.g. note acceptor, coin acceptor & jackpot display systems etc. This functionality could be delivered by either the Game Content Provider or the EGM manufacturer s EGM using a subset of the same principles outlines in this document EGM manufacturer s internal controls must be updated to include the following additional items and must be approved by the OLGR: EGM manufacturer X509/PGPsecurity procedures and controls The Game Content Provider s internal controls must be updated to include the following additional items and must be approved by the OLGR: GCC WAN software version and control. EGM manufacturer GCC host computer software maintenance and controls. Principles for Remotely Upgradeable Gaming Machines Version draft 12

13 4 Revision History Version Changes QIR Who Release Incept Date Date 1.0 Initial Draft RL 6/2005 N/A 1.1 Defined Game Content Provider RL DRAFT N/A 1.2 All document versions starting from v1.2 and onwards were made publicly available for industry feedback. Added proposed Network Hierarchy diagram. Minor corrections, clarifications. Added concept re Aust Post as a WAN RL 21/02/2006 N/A 1.3 Proposed the use of the X509 and PGP standards. RL 22/11/2006 N/A Updated to new DEEDI report document template QOGR->OLGR YL 20/08/2010 * Where not stated otherwise the incept date for new or changed minimum requirements in this version of the document is x months from the release date of the document in <clarify if only new submissions or everything> Todo Make generic (Separate out EGM specific requirements and make doc generic gaming equipment ) i.e. not specific to EGMs. Principles for Remotely Upgradeable Gaming Machines Version draft 13

Office of Liquor Gaming and Regulation Random Number Generators Minimum Technical Requirements Version 1.4

Office of Liquor Gaming and Regulation Random Number Generators Minimum Technical Requirements Version 1.4 Department of Employment, Economic Development and Innovation Office of Liquor Gaming and Regulation Random Number Generators Minimum Technical Requirements Version 1.4 The State of Queensland, Department

More information

Ticket-In Ticket-Out (TITO) Minimum Technical Requirements Version v1.1.4. Office of Liquor Gaming and Regulation

Ticket-In Ticket-Out (TITO) Minimum Technical Requirements Version v1.1.4. Office of Liquor Gaming and Regulation Ticket-In Ticket-Out (TITO) Minimum Technical Requirements Version v1.1.4 Office of Liquor Gaming and Regulation The State of Queensland (Department of Justice and Attorney-General) 2012. Copyright protects

More information

Office of Liquor Gaming and Regulation Casino Dice Minimum Technical Requirements Version 1.3

Office of Liquor Gaming and Regulation Casino Dice Minimum Technical Requirements Version 1.3 Department of Employment, Economic Development and Innovation Office of Liquor Gaming and Regulation Casino Dice Minimum Technical Requirements Version 1.3 The State of Queensland, Department of Employment,

More information

Crow Limited Warranty. Print Version 017

Crow Limited Warranty. Print Version 017 Crow Limited Warranty (Crow) warrants this product to be free from defects in materials and workmanship under normal use and service for a period of one year from the last day of the week and year whose

More information

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets

Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface

More information

Sweex Wireless BroadBand Router + 4 port switch + print server

Sweex Wireless BroadBand Router + 4 port switch + print server Sweex Wireless BroadBand Router + 4 port switch + print server Advantages Internet Sharing - A broadband internet connection makes it possible for several PCs to use the internet simultaneously. Wireless

More information

CPEi 800/825 Series. User Manual. * Please see the Introduction Section

CPEi 800/825 Series. User Manual. * Please see the Introduction Section CPEi 800/825 Series User Manual * Please see the Introduction Section Contents Introduction...iii Chapter 1: CPEi 800/825 User Guide Overview... 1-1 Powerful Features in a Single Unit... 1-2 Front of the

More information

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On Transport and Security Specification 15 July 2015 Version: 5.9 Contents Overview 3 Standard network requirements 3 Source and Destination Ports 3 Configuring the Connection Wizard 4 Private Bloomberg Network

More information

Internet Telephony PBX system IPX-1980

Internet Telephony PBX system IPX-1980 Internet Telephony PBX system IPX-1980 Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Hardware Installation... 4 2.1 Safety Instruction... 4 2.2 Front panel... 4 2.3 LED & Button

More information

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY

INFORMATION GOVERNANCE POLICY: NETWORK SECURITY INFORMATION GOVERNANCE POLICY: NETWORK SECURITY Original Approved by: Policy and Procedure Ratification Sub-group on 23 October 2007 Version 1.2 Approved by: Information Governance Group Approval Date:

More information

LogMeIn Hamachi. Getting Started Guide

LogMeIn Hamachi. Getting Started Guide LogMeIn Hamachi Getting Started Guide Contents What Is LogMeIn Hamachi?...3 Who Should Use LogMeIn Hamachi?...3 The LogMeIn Hamachi Client...4 About the Relationship Between the Client and Your LogMeIn

More information

ClearOS Network, Gateway, Server Quick Start Guide

ClearOS Network, Gateway, Server Quick Start Guide ClearOS Network, Gateway, Server Quick Start Guide Welcome ClearOS is computer Operating System (OS) that provides enterprise-level network security and application services to the Small/Medium-sized Business

More information

Gigabit Content Security Router CS-5800

Gigabit Content Security Router CS-5800 Gigabit Content Security Router CS-5800 Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Hardware Installation... 4 2.1 Safety Instruction... 4 2.2 Front panel... 4 2.3 LED & Button

More information

SANGFOR SSL VPN. Quick Start Guide

SANGFOR SSL VPN. Quick Start Guide SANGFOR SSL VPN Quick Start Guide This document is intended to assist users to install, debug, configure and maintain SANGFOR SSL VPN device quickly and efficiently. Please read the followings carefully

More information

Smart Telephone System

Smart Telephone System IG7600 Smart Telephone System Quick Installation Guide Copyright 2013, All Rights Reserved. Ver11140311 IG7600 Smart Telephone System Quick Installation Guide Powering up 1. Plug the IG7600 in and allow

More information

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR

Intel vpro. Technology-based PCs SETUP & CONFIGURATION GUIDE FOR SETUP & CONFIGURATION GUIDE FOR Intel vpro Technology-based PCs This Setup Guide details what makes a true Intel vpro technology-based PC, and how to set up and configure Intel AMT (Active Management Technology)

More information

Release Version 4.1 The 2X Software Server Based Computing Guide

Release Version 4.1 The 2X Software Server Based Computing Guide Release Version 4.1 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Release Version 3 The 2X Software Server Based Computing Guide

Release Version 3 The 2X Software Server Based Computing Guide Release Version 3 The 2X Software Server Based Computing Guide Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4

Copyright. Disclaimer. Introduction 1. System Requirements... 3. Installing the software 4 Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software

More information

AT-S84 Version 1.3.0 (1.0.0.90) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes

AT-S84 Version 1.3.0 (1.0.0.90) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes AT-S84 Version 1.3.0 (1.0.0.90) Management Software for the AT-9000/24 Gigabit Ethernet Switch Software Release Notes Please read this document before you begin to use the management software. Supported

More information

Universal Network Access Policy

Universal Network Access Policy Universal Network Access Policy Purpose Poynton Workmens Club makes extensive use of network ed Information Technology resources to support its research and administration functions and provides a variety

More information

1 You will need the following items to get started:

1 You will need the following items to get started: QUICKSTART GUIDE 1 Getting Started You will need the following items to get started: A desktop or laptop computer Two ethernet cables (one ethernet cable is shipped with the _ Blocker, and you must provide

More information

Gigabit Content Security Router

Gigabit Content Security Router Gigabit Content Security Router As becomes essential for business, the crucial solution to prevent your connection from failure is to have more than one connection. PLANET is the Gigabit Content Security

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

FileMaker Pro 13. Using a Remote Desktop Connection with FileMaker Pro 13

FileMaker Pro 13. Using a Remote Desktop Connection with FileMaker Pro 13 FileMaker Pro 13 Using a Remote Desktop Connection with FileMaker Pro 13 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker

More information

Network Services Internet VPN

Network Services Internet VPN Contents 1. 2. Network Services Customer Responsibilities 3. Network Services General 4. Service Management Boundary 5. Defined Terms Network Services Where the Customer selects as detailed in the Order

More information

VIA CONNECT PRO Deployment Guide

VIA CONNECT PRO Deployment Guide VIA CONNECT PRO Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

FileMaker Pro 12. Using a Remote Desktop Connection with FileMaker Pro 12

FileMaker Pro 12. Using a Remote Desktop Connection with FileMaker Pro 12 FileMaker Pro 12 Using a Remote Desktop Connection with FileMaker Pro 12 2007 2012 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

Lab 8.4.2 Configuring Access Policies and DMZ Settings

Lab 8.4.2 Configuring Access Policies and DMZ Settings Lab 8.4.2 Configuring Access Policies and DMZ Settings Objectives Log in to a multi-function device and view security settings. Set up Internet access policies based on IP address and application. Set

More information

Ultra Thin Client TC-401 TC-402. Users s Guide

Ultra Thin Client TC-401 TC-402. Users s Guide Ultra Thin Client TC-401 TC-402 Users s Guide CONTENT 1. OVERVIEW... 3 1.1 HARDWARE SPECIFICATION... 3 1.2 SOFTWARE OVERVIEW... 4 1.3 HARDWARE OVERVIEW...5 1.4 NETWORK CONNECTION... 7 2. INSTALLING THE

More information

Getting Started With. Mac OS X Server. Includes installation and setup information for Mac OS X Server version 10.2

Getting Started With. Mac OS X Server. Includes installation and setup information for Mac OS X Server version 10.2 Getting Started With Mac OS X Server Includes installation and setup information for Mac OS X Server version 10.2 K Apple Computer, Inc. 2002 Apple Computer, Inc. All rights reserved. Under the copyright

More information

Internet User Guide. For the ZTE H298N routers. LAN4 LAN3 LAN2 LAN1 WAN Phone USB2 USB2 WAN WLAN WLAN WLAN

Internet User Guide. For the ZTE H298N routers. LAN4 LAN3 LAN2 LAN1 WAN Phone USB2 USB2 WAN WLAN WLAN WLAN Internet User Guide For the ZTE H298N routers LAN4 LAN3 LAN2 LAN1 WAN Phone Reset On/Off Power WLAN USB2 LAN4 LAN3 LAN2 LAN1 WAN Phone Power LAN1 Internet LAN3 LAN2 LAN4 WLAN Phone USB1 WAN Reset USB2

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com

More information

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument.

Additional Requirements for ARES-G2 / RSA-G2. One Ethernet 10 Base T/100 Base TX network card required for communication with the instrument. TA Instruments TRIOS Software Installation Instructions Installation Requirements Your TRIOS Instrument Control software includes all the components necessary to install or update the TRIOS software, as

More information

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011

Windows MultiPoint Server 2011 Deployment Guide. Document Version 1.0 March 2011 Windows MultiPoint Server 2011 Deployment Guide Document Version 1.0 March 2011 Copyright Notice This document is provided as-is. Information and views expressed in this document, including URL and other

More information

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1.

Walton Centre. Asset Management. Information Security Management System: SS 03: Asset Management Page 1. Version: 1. Page 1 Walton Centre Asset Management Document History Date Version Author Changes 01/10/2004 1.0 A Cobain L Wyatt 06/01/2004 1.1 L Wyatt Addition of storage media 16/03/2005 1.2 Liam Wyatt Update storage

More information

VIA COLLAGE Deployment Guide

VIA COLLAGE Deployment Guide VIA COLLAGE Deployment Guide www.true-collaboration.com Infinite Ways to Collaborate CONTENTS Introduction... 3 User Experience... 3 Pre-Deployment Planning... 3 Connectivity... 3 Network Addressing...

More information

Broadband Router ESG-103. User s Guide

Broadband Router ESG-103. User s Guide Broadband Router ESG-103 User s Guide FCC Warning This equipment has been tested and found to comply with the limits for Class A & Class B digital device, pursuant to Part 15 of the FCC rules. These limits

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT. April 2009 EXAMINERS' REPORT. Network Information Systems THE BCS PROFESSIONAL EXAMINATIONS BCS Level 6 Professional Graduate Diploma in IT April 2009 EXAMINERS' REPORT Network Information Systems General Comments Last year examiners report a good pass rate with

More information

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability

Hands-On Microsoft Windows Server 2008. Chapter 12 Managing System Reliability and Availability Hands-On Microsoft Windows Server 2008 Chapter 12 Managing System Reliability and Availability Objectives Understand general problem-solving strategies Resolve boot problems Use and configure Event Viewer

More information

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption...

Purpose... 3. Computer Hardware Configurations... 6 Single Computer Configuration... 6 Multiple Server Configurations... 7. Data Encryption... Contents Purpose... 3 Background on Keyscan Software... 3 Client... 4 Communication Service... 4 SQL Server 2012 Express... 4 Aurora Optional Software Modules... 5 Computer Hardware Configurations... 6

More information

Information Security Policy September 2009 Newman University IT Services. Information Security Policy

Information Security Policy September 2009 Newman University IT Services. Information Security Policy Contents 1. Statement 1.1 Introduction 1.2 Objectives 1.3 Scope and Policy Structure 1.4 Risk Assessment and Management 1.5 Responsibilities for Information Security 2. Compliance 3. HR Security 3.1 Terms

More information

Where do you Install Cyber Predator on your Network so you can collect all the data packets?

Where do you Install Cyber Predator on your Network so you can collect all the data packets? Where do you Install Cyber Predator on your Network so you can collect all the data packets? The purpose of this document is to demonstrate to a new or existing Cyber Predator user where in a network the

More information

HMRC Secure Electronic Transfer (SET)

HMRC Secure Electronic Transfer (SET) HM Revenue & Customs HMRC Secure Electronic Transfer (SET) Installation and key renewal overview Version 3.0 Contents Welcome to HMRC SET 1 What will you need to use HMRC SET? 2 HMRC SET high level diagram

More information

DRO-210i LOAD BALANCING ROUTER. Review Package Contents

DRO-210i LOAD BALANCING ROUTER. Review Package Contents DRO-210i LOAD BALANCING ROUTER Review Package Contents Make sure that the package contains the following items. DRO-210i Load Balancing Router 2 Straight Ethernet Cables 1 Cross Over Ethernet Cable 1 Power

More information

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU2. 1.0 Key Features 1.0 Key Features Addonics T E C H N O L O G I E S NAS Adapter Model: NASU2 User Manual Convert any USB 2.0 / 1.1 mass storage device into a Network Attached Storage device Great for adding Addonics Storage

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

USER MANUAL NETWORK DRIVE XS EXTERNAL NETWORK HARD DRIVE / 3.5" / GIGABIT LAN / USB 2.0. Rev. 945

USER MANUAL NETWORK DRIVE XS EXTERNAL NETWORK HARD DRIVE / 3.5 / GIGABIT LAN / USB 2.0. Rev. 945 USER MANUAL NETWORK DRIVE XS EXTERNAL NETWORK HARD DRIVE / 3.5" / GIGABIT LAN / USB 2.0 Rev. 945 Freecom Network Drive XS Dear user, Thank you for selecting the Freecom Network Drive XS. The Freecom Network

More information

Domain 3.0 Networking... 1

Domain 3.0 Networking... 1 Table of Contents Domain 3.0 Networking... 1 DOMAIN 3.0 NETWORKING 1. You are installing a cable modem in a client s home. How should you select where to put the cable modem? A. Placing the modem right

More information

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

Technical Notes TN 1 - ETG 3000. FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection? FactoryCast Gateway TSX ETG 3021 / 3022 modules How to Setup a GPRS Connection? 1 2 Table of Contents 1- GPRS Overview... 4 Introduction... 4 GPRS overview... 4 GPRS communications... 4 GPRS connections...

More information

Gigabit Multi-Homing VPN Security Router

Gigabit Multi-Homing VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is a ideal to help the SMBs increase the broadband

More information

Microsoft Windows Compute Cluster Server 2003 Getting Started Guide

Microsoft Windows Compute Cluster Server 2003 Getting Started Guide Microsoft Windows Compute Cluster Server 2003 Getting Started Guide Part Number 434709-003 March 2007 (Third Edition) Copyright 2006, 2007 Hewlett-Packard Development Company, L.P. The information contained

More information

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines

2015 HSC Information and Digital Technology Networking and hardware Marking Guidelines 015 HSC Information and Digital Technology Networking and hardware Marking Guidelines Section I Multiple-choice Answer Key Question Answer 1 B C 3 B 4 A 5 B 6 D 7 D 8 A 9 A 10 C 11 D 1 A 13 C 14 B 15 B

More information

BiPAC 7404V series. VoIP/(802.11g) ADSL2+ (VPN) Firewall Router. Quick Start Guide

BiPAC 7404V series. VoIP/(802.11g) ADSL2+ (VPN) Firewall Router. Quick Start Guide BiPAC 7404V series VoIP/(802.11g) ADSL2+ (VPN) Firewall Router Quick Start Guide VoIP/(802.11g) ADSL2+ (VPN) Firewall Router For more detailed instructions on configuring and using the Billion VoIP/(802.11g)

More information

Imaging Computing Server User Guide

Imaging Computing Server User Guide Imaging Computing Server User Guide PerkinElmer, Viscount Centre II, University of Warwick Science Park, Millburn Hill Road, Coventry, CV4 7HS T +44 (0) 24 7669 2229 F +44 (0) 24 7669 0091 E cellularimaging@perkinelmer.com

More information

HP Enhanced Implementation Service for SANs

HP Enhanced Implementation Service for SANs HP Enhanced Implementation Service for SANs HP Data Centre Services Service overview HP Enhanced Implementation Service for SANs provides implementation of your Storage Area Network (SAN). HP offers three

More information

Information and Digital Technology

Information and Digital Technology 2014 HIGHER SCHOOL CERTIFICATE EXAMINATION Information and Digital Technology Networking and Hardware Total marks 80 Section I Pages 2 7 General Instructions Reading time 5 minutes Working time 2 hours

More information

Multifunctional Broadband Router User Guide. Copyright Statement

Multifunctional Broadband Router User Guide. Copyright Statement Copyright Statement is the registered trademark of Shenzhen Tenda Technology Co., Ltd. Other trademark or trade name mentioned herein are the trademark or registered trademark of above company. Copyright

More information

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide

Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide English CHAPTER 1 Cisco 831 Router and Cisco SOHO 91 Router Cabling and Setup Quick Start Guide Cisco One-Year Limited Hardware Warranty Terms Easy Installation: Try These Steps First! (CRWS Users) Overview

More information

VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT

VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT CD/14/448293 VICTORIAN PRE-COMMITMENT SYSTEM REQUIREMENTS DOCUMENT February 2015 Version 1.0 Table of Contents 1 GLOSSARY...7 2 FOREWORD...14 2.1 Pre-commitment framework...14 3 INTRODUCTION...15 3.1 General

More information

IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES

IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES Your service provider, not the manufacturer of the equipment, is responsible for the provision of phone services through this equipment. Any services

More information

V310 Support Note Version 1.0 November, 2011

V310 Support Note Version 1.0 November, 2011 1 V310 Support Note Version 1.0 November, 2011 2 Index How to Register V310 to Your SIP server... 3 Register Your V310 through Auto-Provision... 4 Phone Book and Firmware Upgrade... 5 Auto Upgrade... 6

More information

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0

EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 EUCIP IT Administrator - Module 2 Operating Systems Syllabus Version 3.0 Copyright 2011 ECDL Foundation All rights reserved. No part of this publication may be reproduced in any form except as permitted

More information

CMS Operational Policy for Infrastructure Router Security

CMS Operational Policy for Infrastructure Router Security Chief Information Officer Office of Information Services Centers for Medicare & Medicaid Services CMS Operational Policy for Infrastructure Router Security September 2005 Document Number: CMS-CIO-POL-INF05-01

More information

QuickSpecs. HP IP Console Switch with Virtual Media Overview

QuickSpecs. HP IP Console Switch with Virtual Media Overview Overview HP's IP Console Switch with Virtual Media is a key component in managing the heterogeneous data center and along with the IP Viewer software allows remote access to multiple servers running various

More information

CompTIA Network+ (Exam N10-005)

CompTIA Network+ (Exam N10-005) CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca!

Quick Start Guide. Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! Quick Start Guide Cerberus FTP is distributed in Canada through C&C Software. Visit us today at www.ccsoftware.ca! How to Setup a File Server with Cerberus FTP Server FTP and SSH SFTP are application protocols

More information

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

My Ticket. User Guide

My Ticket. User Guide My Ticket User Guide Last Updated 01.08.2014 Contents Introduction... 2 Wildcat Help Desk... 2 Setup and Configuration... 2 Paper Supplier... 2 Web Orders... 2 Hardware... 3 EGM Hardware... 3 Ticket Printers

More information

801.11n Wireless Broadband Router

801.11n Wireless Broadband Router 801.11n Wireless Broadband Router WNRT-626 Quick Installation Guide Table of Contents Hardware Installation... 4 Web Configuration... 6 Further Configuration... 8 Thank you for purchasing PLANET 801.11n

More information

IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES

IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES IMPORTANT NOTICE CONCERNING EMERGENCY 911 SERVICES Your service provider, not the manufacturer of the equipment, is responsible for the provision of phone services through this equipment. Any services

More information

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers

Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Cisco RV082 Dual WAN VPN Router Cisco Small Business Routers Secure Remote Access at the Heart of the Small Business Network Highlights Dual WAN connections for load balancing and connection redundancy

More information

How To Configure L2TP VPN Connection for MAC OS X client

How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client How To Configure L2TP VPN Connection for MAC OS X client Applicable Version: 10.00 onwards Overview Layer 2 Tunnelling Protocol (L2TP) can be used

More information

Chapter 15: Advanced Networks

Chapter 15: Advanced Networks Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical

More information

Installation Guide to the Snare Server Installation Guide to the Snare Server

Installation Guide to the Snare Server Installation Guide to the Snare Server Installation Guide to the Snare Server InterSect Alliance International Pty Ltd Page 1 of 19 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not

More information

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications

PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS Version 7 Polling SPS2000 Cash Register TCP/IP Communications PC/POLL SYSTEMS supports native TCP/IP polling for the SPS2000 cash register. It is recommended users have the register updated

More information

Information Crib Sheet Internet Access Service Agreement

Information Crib Sheet Internet Access Service Agreement Information Crib Sheet Internet Access Service Agreement 1. Definitions and Interpretation This Service Agreement is to be read in conjunction with the Conditions for Communications Services (the Conditions

More information

Remote PC Guide Series - Volume 1

Remote PC Guide Series - Volume 1 Introduction and Planning for Remote PC Implementation with NETLAB+ Document Version: 2016-02-01 What is a remote PC and how does it work with NETLAB+? This educational guide will introduce the concepts

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Lab Testing Summary Report

Lab Testing Summary Report Lab Testing Summary Report February 2007 Report 070228 Product Category: SMB IP-PBX Vendor Tested: Cisco Systems Product Tested: Cisco Unified Communications 500 Series Key findings and conclusions: Complete

More information

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0

DATA SECURITY 1/12. Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 DATA SECURITY 1/12 Copyright Nokia Corporation 2002. All rights reserved. Ver. 1.0 Contents 1. INTRODUCTION... 3 2. REMOTE ACCESS ARCHITECTURES... 3 2.1 DIAL-UP MODEM ACCESS... 3 2.2 SECURE INTERNET ACCESS

More information

National Unit Specification: general information. UNIT Computing: Computer Networking Fundamentals (SCQF level 5) CODE F1KH 11 SUMMARY OUTCOMES

National Unit Specification: general information. UNIT Computing: Computer Networking Fundamentals (SCQF level 5) CODE F1KH 11 SUMMARY OUTCOMES National Unit Specification: general information CODE F1KH 11 SUMMARY The overall aim of this Unit is to enable candidates to set-up a small computer network. Candidates will also be required to apply

More information

Linksys E2500 Wireless-N Router Configuration Guide

Linksys E2500 Wireless-N Router Configuration Guide Linksys E2500 Wireless-N Router Configuration Guide Revision 1.0 Copyright 2012 Maretron, LLP All Rights Reserved Maretron, LLP 9014 N. 23 rd Ave #10 Phoenix, AZ 85021-7850 http://www.maretron.com Maretron

More information

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements Connecting to the Internet LAN Hardware Requirements Computer Requirements LAN Configuration Requirements Installation Performed by Time Warner Cable Technician Connecting via Ethernet Connecting via USB

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent

More information

Getting Started with Symantec Endpoint Protection

Getting Started with Symantec Endpoint Protection Getting Started with Symantec Endpoint Protection 20983668 Getting Started with Symantec Endpoint Protection The software described in this book is furnished under a license agreement and may be used only

More information

How To Secure An Rsa Authentication Agent

How To Secure An Rsa Authentication Agent RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,

More information

JKW-IP. IP Video Entry System. QuikStart Guide

JKW-IP. IP Video Entry System. QuikStart Guide 1210 JKW-IP IP Video Entry System QuikStart Guide This is an abbreviated instruction manual for installation purposes. Please see the JKW-IP Installation Manual and JKW-IP Operation Manual for complete

More information

Upon completion of this chapter, you will able to answer the following questions:

Upon completion of this chapter, you will able to answer the following questions: CHAPTER 2 Operating Systems Objectives Upon completion of this chapter, you will able to answer the following questions: What is the purpose of an OS? What role do the shell and kernel play? What is the

More information

Machine control going www - Opportunities and risks when connecting a control system to the Internet

Machine control going www - Opportunities and risks when connecting a control system to the Internet B&R Industrial Automation Corp. 1325 Northmeadow Parkway, S-130 Tel: (770) 772-0400 E-mail: office.us@br-automation.com Roswell, Georgia 30076 Fax: (770) 772-0243 Internet: www.br-automation.com Machine

More information

UNCLASSIFIED Version 1.0 May 2012

UNCLASSIFIED Version 1.0 May 2012 Secure By Default: Platforms Computing platforms contain vulnerabilities that can be exploited for malicious purposes. Often exploitation does not require a high degree of expertise, as tools and advice

More information

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6

USER GUIDE. Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 KRAMER ELECTRONICS LTD. USER GUIDE Ethernet Configuration Guide (Lantronix) P/N: 2900-300321 Rev 6 Contents 1 Connecting to the Kramer Device via the Ethernet Port 1 1.1 Connecting the Ethernet Port Directly

More information

OCR LEVEL 3 CAMBRIDGE TECHNICAL

OCR LEVEL 3 CAMBRIDGE TECHNICAL Cambridge TECHNICALS OCR LEVEL 3 CAMBRIDGE TECHNICAL CERTIFICATE/DIPLOMA IN IT COMPUTER NETWORKS R/601/7320 LEVEL 3 UNIT 7 GUIDED LEARNING HOURS: 60 UNIT CREDIT VALUE: 10 COMPUTER NETWORKS R/601/7320 LEVEL

More information

Supervisor 10 Remote Access Users Guide Last Update: 10/27/14

Supervisor 10 Remote Access Users Guide Last Update: 10/27/14 1996 Lundy Ave 95131 Tel: (408) 519 2062 Fax: (408) 519 2063 Supervisor 10 Remote Access Users Guide Last Update: 10/27/14 www.anacominc.com Remote Access describes a procedure by which a user running

More information

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client

Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Chapter 8 Lab B: Configuring a Remote Access VPN Server and Client Topology Note: ISR G2 devices have Gigabit Ethernet interfaces instead of FastEthernet Interfaces. All contents are Copyright 1992 2012

More information

Internet and Intranet Calling with Polycom PVX 8.0.1

Internet and Intranet Calling with Polycom PVX 8.0.1 Internet and Intranet Calling with Polycom PVX 8.0.1 An Application Note Polycom PVX is an advanced conferencing software application that delivers Polycom's premium quality audio, video, and content sharing

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information