Digital Content Manager (DCM) DCM Supercrypt

Size: px
Start display at page:

Download "Digital Content Manager (DCM) DCM Supercrypt"

Transcription

1 Rev D Digital Content Manager (DCM) DCM Supercrypt Configuration Guide Software Package 3.0

2

3 Safe Operations For Your Safety Explanation of Warning and Caution Icons Avoid personal injury and product damage! Do not proceed beyond any symbol until you fully understand the indicated conditions. The following warning and caution icons alert you to important information about the safe operation of this product: You may find this symbol in the document that accompanies this product. This symbol indicates important operating or maintenance instructions. You may find this symbol affixed to the product. This symbol indicates a live terminal where a dangerous voltage may be present; the tip of the flash points to the terminal device. You may find this symbol affixed to the product. This symbol indicates a protective ground terminal. You may find this symbol affixed to the product. This symbol indicates a chassis terminal (normally used for equipotential bonding). You may find this symbol affixed to the product. This symbol warns of a potentially hot surface. You may find this symbol affixed to the product and in this document. This symbol indicates an infrared laser that transmits intensity-modulated light and emits invisible laser radiation or an LED that transmits intensitymodulated light. Important Please read this entire guide. If this guide provides installation or operation instructions, give particular attention to all safety statements included in this guide Rev D iii

4

5 Safe Operations Notices Trademark Acknowledgments Cisco, Cisco Systems, and the Cisco Systems logo are registered trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. Scientific Atlanta and the Scientific Atlanta logo are registered trademarks of Scientific-Atlanta, Inc. SciCare is a trademark of Scientific-Atlanta Inc. ROSA and Copernicus are trademarks of Scientific-Atlanta Europe NV. All other trademarks shown are trademarks of their respective owners. Publication Disclaimer Copyright Scientific-Atlanta Europe NV assumes no responsibility for errors or omissions that may appear in this publication. Scientific Atlanta reserves the right to change this publication at any time without notice. This document is not to be construed as conferring by implication, estoppel, or otherwise any license or right under any copyright or patent, whether or not the use of any information in this document employs an invention claimed in any existing or later issued patent Scientific-Atlanta Europe NV. All rights reserved. Information in this publication is subject to change without notice. No part of this publication may be reproduced or transmitted in any form, by photocopy, microfilm, xerography, or any other means, or incorporated into any information retrieval system, electronic or mechanical, for any purpose, without the express permission of Scientific-Atlanta Europe NV. Comments About This Document If you have comments about your experience with this documentation, please visit the Scientific Atlanta web site and complete the user documentation satisfaction survey at the following address: Your completed survey will be forwarded to the documentation manager directly responsible for publishing this document Rev D v

6

7 Contents Safe Operations Preface ix xi Chapter 1 Introduction 1 Introducing the DCM Supercrypt... 2 General... 2 Modular Concept... 3 Principle... 4 Introducing Conditional Access System... 5 Introduction... 5 Scrambling, Control Word, and Cryptoperiod... 6 Access Criteria and Access Rights... 6 Entitlement Control Messages... 7 Event Information Scheduler... 9 Scrambling levels Simulcrypt Scrambling Timing Parameters Introducing the Web Browser User Interface About the Web Browser User Interface Using the Web Browser User Interface Web Browser User Interface Security Introduction Logging On or Off the Web Browser User Interface Configuring the Security Checking the Version Information Introduction To check the Version Information Importing and Exporting Device Settings Introduction Exporting Configuration Settings Importing Configuration Settings Restarting the System Introduction To Restart the DCM Supercrypt System Rev D iii

8 Contents Chapter 2 Configuration 31 Device Configuration Changing the Device Name Adding or Removing SNMP Trap Destinations Setting the Device Clock Card Configuration Changing the Name of an Interface Card GbE Port Configuration Configuring the Interface Parameters of a GbE Port GbE Port Backup Adding or Deleting Static ARP Table Entries Adapting the Static Route Table Checking the Routes to Destination Devices Joining or Leaving GbE Ports to IGMP Multicast Groups Checking the GbE Statistics General Configuration Changing Default Values for Settings of Incoming Transport Streams Changing Default Values for Settings of Outgoing Transport Streams Changing the Display Mode Chapter 3 Service Routing 73 Description Creating Service Routing Files Introduction Creating a Service Routing File Uploading and Downloading Service Routings Uploading a Service Routing File Downloading the Service Routings Changing Service Routing Settings Adding a Service Routing Removing Service Routings Changing the Standard of an Incoming Transport Stream Changing Settings of Outgoing Transport Streams Changing Settings of Incoming Services Changing the SID of an Outgoing Service iv Rev D

9 Contents Chapter 4 Scrambling Configuration 95 Introduction General About the SCS Configuration GUI Changing the Scrambling Properties Introduction To Change the Scrambling Properties Entitlement Control Message Generators Introduction To Assign an ECMG Interface Changing the ECMG Specific Parameters Removing an ECMG Interface Overruling the ECMG Channel Status Message Parameter Values Adding, Changing, or Removing ECMG Descriptor Rules Event Information Schedulers Introduction To Assign an EIS Interface Changing the EIS Interface Connection Parameters Removing an EIS Interface Chapter 5 Alarm Monitoring 113 Configuring the Alarms Introduction Enabling or Disabling Alarm Message Reporting for all Alarms Generating Test Messages Configuring the Settings of the Device Alarms Configuring the Settings of the Interface Alarms Checking the Alarms Introduction Alarms Related to Incoming Transport Streams Alarms Details Related to Incoming Transport Streams Alarms Related to Incoming Services Alarms Details Related to Incoming Services Alarms Related to Outgoing Services Alarms Details Related to Incoming Services To Check the Device Status Overview Table Alarm Overview Interface Card Related Alarms Device Related Alarms Rev D v

10 Contents Chapter 6 Checking Bit Rates 131 Checking the Bit Rates Overview Tables Introduction Checking the Input Bit Rates Checking the Output Bit Rates Restarting the Bit Rate Measurement Chapter 7 Software Upgrade 147 Introduction About the Upgrade Software System Requirements Installing the Upgrade-It Software Package Upgrading the DCM Software Appendix A Customer Information 157 Product Support Obtaining Support Support Telephone Numbers Return Products for Repair Introduction Obtaining an RMA Number and Shipping Address Packing and Shipping the Product Appendix B Integrating a DCM Supercrypt into ROSA NMS 163 Introduction About ROSA NMS Installing the ROSA 3.0 Drivers Introduction To Install the ROSA Drivers Making Task Instances Introduction To Make a Task Instance Mapping a DCM Supercrypt into ROSA NMS Introduction To Map a DCM into ROSA NMS Working with the Graphical User Interfaces Opening the Web Browser User Interface Opening the Graphical User Interface of a Task or Component vi Rev D

11 Contents Appendix C Configuring the Access Criteria 179 Introduction General About the AC Manager Component GUI General Settings To Change the Number Format Setting up the Transport Stream Model Introduction To Set up the TS Model by Uploading the TS Model from the DCM Supercrypt Device(s) To Set up the TS Model Manually Defining Access Criteria Configuration Dialog Conditional Access System Information Access Criteria Information Assigning Access Criteria Appendix D Scrambling Control 201 Introduction About the Scrambling Control Task Communication Setup Starting and Stopping Scrambling General Settings Starting the Task Automatic Start Stopping the Task Synchronizing the Task with the AC Manager Component To Change the Number Format Changing the ECM ID Mode Introduction To Change the ECM ID Mode Checking the DCM Devices to which a Transport Stream Belongs Starting and Stopping Scrambling Starting Scrambling Stopping Scrambling Event Logging Advanced Settings Restoring Communication Overruling the Scrambling Control Configuration Rev D vii

12 Contents Appendix E Extended Operations 219 Downloading MIBs from the DCM Introduction To Download MIB files Viewing Trace Logs Introduction Filtering the Card Trace Logs Changing the ORB Trace Level Checking the Trace Logs Downloading Trace Logs Glossary 227 Index 235 viii Rev D

13 Safe Operations Safe Operations The software described in this guide is used to monitor and / or manage Scientific Atlanta equipment. Certain safety precautions should be observed when operating equipment of this nature. For product specific safety requirements refer to the appropriate section of the documentation accompanying your product Rev D ix

14

15 Preface Preface Introduction Audience This configuration guide provides the necessary information to configure and to operate the Digital Content Manager (DCM) DCM Supercrypt using the web browser user interface of the device. In this configuration guide the Digital Content Manager (DCM) Supercrypt is further indicated by DCM Supercrypt. The audience of this configuration guide includes authorized and trained personnel who are responsible for the configuration and operation of the DCM Supercrypt. Required Knowledge To use this configuration guide, the personnel should have a basic knowledge about the technology used in relation to this product. Related Publication Refer to the following Scientific Atlanta publications for more information concerning the DCM Supercrypt: Digital Content Manager (DCM) Model D System Guide, part number This guide is shipped with the DCM Supercrypt. Digital Content Manager (DCM) Model D Data Sheet, this data sheet can be found on the Scientific Atlanta web site at the following location: ROSA Network Management System - User's Guide, part number IIOP Protocol Driver - User's Guide, part number Document Version This is the fourth release of this configuration guide Rev D xi

16

17 1 Chapter 1 Introduction Introduction This chapter provides information concerning the DCM Supercrypt and gives an introduction of Conditional Access Systems. In This Chapter Introducing the DCM Supercrypt... 2 Introducing Conditional Access System... 5 Introducing the Web Browser User Interface Web Browser User Interface Security Checking the Version Information Importing and Exporting Device Settings Restarting the System Rev D 1

18 Chapter 1 Introduction Introducing the DCM Supercrypt General The Digital Content Manager (DCM) Supercrypt is a bulk-encryptor that can be used into Switched Digital Video (SDV) applications, Video on Demand (VOD) applications, etc... The DCM Supercrypt is a compact 2 RU device configurable with up to four GbE Interface Card/Co-Processor modules. The following illustration depicts a DCM Supercrypt. Scientific Atlanta Alarm PS 1 Model D9900 Digital Content Manager (DCM) PS 2 The DCM Supercrypt supports hot swappable and redundant power supplies and hot swappable cooling fans. The DCM Supercrypt is controlled via a simple and intuitive Graphical User Interface. Routing of the incoming services to the output of the DCM Supercrypt can be done using the web browser user interface or can be done in advanced using a service routing file editable by means of a standard text editor or Microsoft Excel Rev D

19 I/O GbE 10/ Modular Concept Introducing the DCM Supercrypt The DCM Supercrypt is a fully modular concept build around a 2 RU high housing. The flexible modular concept ensures easy system capability upgrades. The following illustration shows the modular concept of the DCM Supercrypt. PS 1 PS 2 The following DCM Supercrypt equipment is available: Housing V dc Power Supply Unit (PSU) V ac PSU GbE Interface Card/Co-Processor Card module PSU slot cover plate Interface card slot cover plate When the DCM Supercrypt leaves Scientific Atlanta's assembly line, the device is configured as ordered. When the device is not fully populated, meaning not populated with four GbE Interface Cards/Co-Processor Card modules, the device can always be upgraded at a later date by adding GbE Interface Card/Co-Processor Card modules Rev D 3

20 Chapter 1 Introduction Principle The DCM Supercrypt contains the following functional blocks: PSUs Main Card GbE Interface Card/Co-Processor Card module Mains Mains PSU PSU Power Distribution Card Co-Processor Card GbE 10/100/BaseT 4 GbE Interfaces GbE Interface Card Main Card I/O Contacts Co-Processor Card Front Panel Status LEDs 4 GbE Interfaces GbE Interface Card Co-Processor Card 4 GbE Interfaces GbE Interface Card Co-Processor Card Data 4 GbE Interfaces GbE Interface Card Control Power Supply Status Rev D

21 Introducing Conditional Access System Introducing Conditional Access System Introduction A Conditional Access System (CAS) is the basis in a Pay TV system to prevent unauthorized reception of services (picture, sound, or data) and to secure the charge of the subscribing remuneration. The following illustration depicts DCM Supercrypt integration into a Conditional Access System. Access Criteria Scheduler Event Information Scheduler Database ECM Generator Subscriber Management System Control Word Access Criteria ECMs SCGs Control Word Generator Control Word Simulcrypt Synchronizer (P)SI Generator DCM Supercrypt Control Word (P)SI Tables ECMs MUX TS Scrambler TS Transport Stream A CAS system combines scrambling of picture, sound, or data services with a specific Scrambling/Descrambling key management system. Scrambling is the process that uses a cryptographic algorithm to make services unintelligible for nonauthorized subscribers Rev D 5

22 Chapter 1 Introduction Scrambling, Control Word, and Cryptoperiod At the transmission site of a Condition Access System (CAS), services multiplexed into a Transport Stream can be scrambled using a particular scrambling algorithm (also called DVB Common Scrambling Algorithm) with a scrambling/descrambling key (named Control Word). At the receiver site the scrambled services can then be descrambled by an appropriate descrambling algorithm using the same Control Word (CW). Transport Stream Scrambler Transport Stream with Scrambled Services Descrambler Transport Stream CW CW To increase the security of a CA System the Control Word used to scramble and descramble services changes periodically (typically every 10 seconds). The duration of scrambling by one Control Word is named Crypto Period. Control Words, which are typically 64 bits long, are generated by a Control Word Generator (CWG) and requested by the Simulcrypt Synchronizer (SCS). Transport Stream Scrambler Transport Stream with Scrambled Services Descrambler Transport Stream CW CWG? CW SCS Control Words cannot be delivered from the transmitter to the receiver site in the clear, they need to be encrypted. The algorithm used to encrypt the Control Word is unique to each CA System and implemented in a secure device of the descrambler and uses the smart card of the customer s Conditional Access Module (CAM). Access Criteria and Access Rights When a subscriber is only interested in particular services like sport and nature, he only wants to pay for these services. Services, for which the subscriber doesn t pay, have to remain unintelligible. Therefore two parameters are defined, namely Access Criteria and Access Rights: Access Criteria is Conditional Access vendor specified information and specifies service-related criteria that are applied to a package of services or elementary streams. These subscriptions (also called theme or product) are encapsulated into Entitlement Control Messages (ECMs). More information concerning ECMs can be found in topic Entitlement Control Messages on page Rev D

23 Introducing Conditional Access System Access Rights are stored on the smart card of the descrambler and determines which services the subscriber can access. These Access Rights are periodically reconfirmed using Entitlement Management Messages (EMMs). When the Access Rights for a particular subscriber should be changed, EMMs are sent to the descrambler containing the new Access Rights. Example: AC criteria 1, subscription = Football ECM1 AC criteria 2, subscription = Tennis ECM2 AC criteria 3, subscription = Snooker ECM3 A subscriber pays to view football and snooker programs. His set top box receives all ECM packets that contain the appropriate control words. Besides that, the set top box also receives EMM packets that contain the access rights for this set top box. These rights are compared with the access criteria and the set top box is only allowed to decipher the ciphered Control Words of the ECMs for which the subscriber has Access Rights (ECM1 and ECM3). Entitlement Control Messages The Simulcrypt Synchronizer (SCS) triggered from the Event Information Scheduler (EIS) to start a Conditional Access event, will get every Crypto Period a Control Word (CW) for this event from the Control Word Generator (CWG). Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW (...,AC,...) CW/AC ECMs DCM EIS ECMG Note: For more information concerning the Event Information Scheduler, please refer to topic Event Information Scheduler on page Rev D 7

24 Chapter 1 Introduction The Simulcrypt Synchronizer extracts the Access Criteria from the information (named Scrambling Control Group) received from the Event Information Scheduler. The synchronizer sends this Access Criteria together with the Control Word for the corresponding Crypto Period to the Entitlement Control Message Generator (ECMG). The Entitlement Control Message Generator encrypts both the Access Criteria and the Control Word using a particular cryptographic algorithm with a specific Service Key. This encrypted data is encapsulated into an Entitlement Control Message (ECM) and sent to the Simulcrypt Synchronizer. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG A certain time before the first Crypto Period for this event begins, the Simulcrypt Synchronizer starts sending ECMs for this event at regular times to the multiplexer (typically every 200 msec). This start time is necessary to give the descrambler time to decrypt the encrypted Control Word and Access Criteria. The multiplexer multiplexes this stream of ECMs with the outgoing Transport Stream. When the event begins, the Simulcrypt Synchronizer sends the Control Word to the scrambler, which starts scrambling the service(s) associated with this event. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG Rev D

25 Introducing Conditional Access System Before the end of the Crypto Period, the Simulcrypt Synchronizer requests a new Control Word from the Control Word Generator, sends this new Control Word together with the Access Criteria to the ECMG, and receives a new ECM for this event from the ECM Generator. This new generated ECM is multiplexed in the outgoing Transport Stream. When the Crypto Period is ended, the new Control Word is sent to the scrambler, which starts scrambling the service(s) using the new Control Word. This reiterates for every Crypto Period until the end of the event. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW DCM (...,AC,...) CW/AC ECMs EIS ECMG Event Information Scheduler The Event Information Scheduler (EIS) is the functional unit in the Conditional Access System that holds the schedule information, the configuration, and the Conditional Access Information required for the complete Conditional Access System. Incoming Transport Stream ECMs MUX Scrambler Outgoing Transport Stream? CWG CW SCS CW (...,AC,...) CW/AC ECMs DCM EIS ECMG Rev D 9

26 Chapter 1 Introduction To start a scrambling event the Event Information Scheduler provides the Simulcrypt Synchronizer with a Scrambling Control Group (SCG) provisioning message. A SCG provisioning message contains a list of services and/or Elementary Streams that must be scrambled at the same time with the same Control Word and a list with ECM Groups for which ECMs must be generated. An ECM Group contains the necessary information, like Super_Cas_ID 1, ECM_ID 2, and Access Criteria, to bind an ECM stream to a Conditional Access Provider. To stop a scrambling event the EIS sends a SCG provisioning message update to the Simulcrypt Synchronizer. The ECM Group for the event of which scrambling must be stopped is removed from the SCG provisioning message. The following illustration shows a SCG provisioning message. SCG Provisioning Message ECM Groups Service ID xxx.. SCG ID. Components ID xxx Activation Time Supercas ID x Access Criteria xx 2 Supercas ID x Access Criteria xx 3 Supercas ID x Access Criteria xx 4 Supercas ID x Access Criteria xx 5 Supercas ID x Access Criteria xx 6 Supercas ID x Access Criteria xx y Supercas ID x.. Access Criteria xx ECM ID 1 The Super_Cas_ID is the concatenation of the CA_system_ID and the CA_Subsystem_ID and is used to identify the ECM Generator within the Contitional Access System. 2 The ECM_ID identifies an ECM stream within the Conditional Access System Rev D

27 Introducing Conditional Access System Scrambling levels Scrambling can be done on two different levels, namely: Elementary Stream Level scrambling and Service Level scrambling. The following list describes these scrambling levels: Elementary Stream Level Scrambling: Each component of a service may be scrambled by a separate Control Word. For example, video and audio may be scrambled with a separated Control Word. This is useful in multilingual systems where a premium is charged for a second audio in a different language. In this case, each component or elementary stream is associated with its own stream of ECM messages. Input TS Output TS PMT Video PID Audio PID Transport Stream (P)SI Tables PSIG ECMs MUX Scrambler PMT Video PID CA Descriptor ES Video ES Audio CW CWG EIS (...,AC,...) SCS CW/AC ECMs CW DCM ECM PID Audio PID ES Video (scrambled) ES Audio ECM PID EMM PID ECMG When scrambling at the elementary stream level, all Elementary Streams within the service are scrambled using different Control Words. One ECM is required for each Elementary Stream. The CA descriptors are inserted after each elementary stream within the PMT. Service Level Scrambling: The alternative to elementary stream level scrambling is to scramble all components that make up a service with the same Control Word. In this case, there is only one stream of ECM messages associated with the service as a whole. Input TS Output TS PMT Video PID Transport Stream ECMs MUX Scrambler PMT CA Descriptor Audio PID ES Video ES Audio CW CWG EIS (...,AC,...) SCS CW/AC ECMs CW DCM ECM PID Video PID Audio PID ES Video (scrambled) ES Audio (scrambled) ECM PID ECMG EMM PID Rev D 11

28 Chapter 1 Introduction When scrambling at the service level, all Elementary Streams within the service are scrambled using the same Control Word. Only one ECM is required for each service. The CA descriptor is inserted near the top of the PMT. Note: Elementary Stream Level Scrambling and Service Level Scrambling can be mixed within the scrambler but not within the same service. Simulcrypt Scrambling Simulcrypt scrambling is a scrambling method whereby a single Transport Stream contains ECMs from different Conditional Access systems. This enables different CA decoder populations to receive and correctly decode the same video and audio streams. Input TS Output TS PMT Video PID Audio PID Transport Stream ECMs MUX Scrambler PMT CA Descriptor ECM 1 PID ES Video ES Audio CWG CW SCS CW ECM 2 PID ECM n PID Video PID (..., ECMgrp1(...,AC1), ECMgrp2(...,AC2),...,ECMgrpn(...,ACn),...) CW/AC1 ECM1s ECMG1 CW/AC2 ECMs ECMG2 CW/ACn ECMn ECMGn Audio PID CSA(ES Video, CW) CSA(ES Audio, CW) ECM 1 PID ECM 2 PID EIS ECM n PID Timing Parameters When the Event Information Scheduler (EIS) triggers the Simulcrypt Synchronizer the start of a new Conditional Access (CA) event using a Scrambling Control Group (SCG ID 1) provisioning message, the Simulcrypt Synchronizer request a Control Word (CW 1) from the Control Word Generator. Once the Simulcrypt Synchronizer has received the Control Word from the CW Generator, the Simulcrypt Synchronizer sends the Control Word together with the Access Criteria and ECM ID extracted from the Scrambling Control Group provisioning message to the ECM Generator. The ECM Generator encrypts the Control Word and Access Criteria and encapsulates this data into an ECM. The ECM Generator sends this ECM to the Simulcrypt Synchronizer. A certain time before (t1-t2) starting the CA event (Activation Time) the Simulcrypt Synchronizer start sending ECMs for the first Crypto Period at regular times to the Multiplexer Rev D

29 Introducing Conditional Access System Transition Start Delay 3 (t1-t2): represents the amount of time between the start of the first Crypto Period following a clear to scrambled transition, and the start of the broadcasting of the ECM attached to this period. The multiplexer multiplexes these ECMs directly into the outgoing Transport Stream. At the same time a CA descriptor containing the ECM PID is inserted into the Program Map Table (PMT) of the Transport stream. SCG ID 1 SCG ID 1 SCG Transmission ECM Transmission ECM (CW 1) t1 ECM (CW 2) t3 t4 ECM (CW 3) ECM (CW L) tl+1 Crypto Period t2 CP 1 t5 CP 2 CP L tl Service Status Clear Scrambled using CW 1 Scrambled using CW 2 Scrambled using CW L Clear Activation Time from the SCG provisioning message Activation Time from the SCG de-provisioning message The Transition Start Delay must match the time the descrambler needs to decapsulate the ECM PID from the PMT and to decrypt the Control Word and Access Criteria. At the begin (t2) of the first Crypto Period (CP 1) the set top box starts descrambling the scrambled service using CW 1. A certain time (t3-t5) before the end of the running Crypto Period (CP 1) the SCS stops transmitting ECMs attached to this CP and a certain time (t4-t5) before the next Crypto Period (CP 2) the SCS starts transmitting ECMs for CP 2. Stop Delay 4 (t3-t5): represents the amount of time between the end of a Crypto Period, and the end of the broadcasting of the ECM attached to this period. Start Delay 5 (t4-t5): represents the amount of time between the start of a Crypto Period, and the start of the broadcasting of the ECM attached to this period. 3 A positive start delay parameter means that the ECM shall be delayed with respect to the start of thecrypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time. Only a negative Transition Start Delay can be used. 4 A positive stop delay parameter means that the end of the ECM broadcast shall be delayed with respect to the end of the Crypto Period. A negative stop delay parameter means that the ECM broadcast shall be ended ahead of time. 5 A positive start delay parameter means that the ECM shall be delayed with respect to the start of the Crypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time Rev D 13

30 Chapter 1 Introduction When the Simulcrypt Synchronizer receives a SCG provisioning message update from the Event Information Scheduler indicating the end of the running CA event, the synchronizer extend the last Crypto Period until the end of the period match the end of the activation time extract from the SCG provisioning message update. Once the activation time (tl) is reached the set top box stops descrambling the service. The Simulcrypt Synchronizer stops transmitting ECMs attached to this last Crypto Period at time (tl+1). Transition Stop Delay (tl-tl+1): this parameter represents the amount of time between the end of last Crypto Period preceding a scrambled to clear transition, and the end of the broadcasting of the ECM attached to this period. When the Simulcrypt Synchronizer receives a SCG provisioning message containing another Access Criteria for the service(s), the synchronizer stops sending ECMs containing the previous Access Criteria at time t6 in the last Crypto Period and starts sending ECMs with the new Access Criteria at time (t7). SCG ID 2 SCG Transmission ECM Transmission ECM (CW L) ECM (CW L+1) t6 t7 ECM (CW L+2) ECM (CW L+3) Crypto Period CP L-1 CP L CP L+1 CP L+2 t8 Service Status Scrambled using CW L-1 Scrambled using CW L Scrambled using CW L+1 Scrambled using CW L+2 Activation Time SCG ID 2 AC Start Delay 6 (t7-t8): represents the amount of time between the start of the first Crypto Period following a change in the Access Criteria and the start of the broadcasting of the ECM attached to this period. AC Stop Delay 7 (t6-t8): represents the amount of time between the end of the lastcrypto Period preceding a change in Access Criteria, and the end of the broadcasting of the ECM attached to this period. 6 A positive start delay parameter means that the ECM shall be delayed with respect to the start of the Crypto Period. A negative delay parameter it means that the ECM shall be broadcast ahead of this time. 7 A positive stop delay parameter means that the end of the ECM broadcast shall be delayed with respect to the end of the Crypto Period. A negative stop delay parameter means that the ECM broadcast shall be ended ahead of time Rev D

31 Introducing Conditional Access System During the connection setup between the Simulcrypt Synchronizer and the Entitlement Control Message Generator, the Simulcrypt Synchronizer receives a Channel Status Message containing particular timing parameters. When timing parameters are missing or inaccurate, ROSA s SCS Configurator allows overruling these parameters. When a subscriber tunes into a scrambled service in a particular Crypto Period, the scrambler is not able to scramble the service during the rest of this Crypto period because he has only the Control Word for the next period. To solve this problem, an Entitlement Control Message (ECM) can be provided with more than one Control Word. The most Conditional Access Systems allow 1 or 2 Control Words in an ECM, viz. the Control Word of the current Crypto Period and the Control Word of the next period. SCG Transmission ECM Transmission SCG ID 1 ECM (CW 1-2) ECM (CW 2-3) ECM (CW 3-4) Crypto Period CP 1 CP 2 CP 3 Service Status Clear Scrambled using CW 1 Scrambled using CW 2 Scrambled using CW 3 Activation Time Rev D 15

32 Chapter 1 Introduction Introducing the Web Browser User Interface About the Web Browser User Interface The web browser user interface of the DCM Supercrypt is a pure HTML based Graphical User Interface (GUI) that can be opened using Microsoft Internet Explorer 6.0 or higher. By entering the IP Address of the DCM Supercrypt in the address box of Internet Explorer web browser, the web browser user interface of the device will be opened. The following illustration shows the opening page of the DCM Supercrypt GUI. Note: The procedure to log on the web browser user interface can be found in topic Web Browser User Interface Security on page Rev D

33 Introducing the Web Browser User Interface Using the Web Browser User Interface Browsing through a Tree The incoming and outgoing services of the DCM Supercrypt as well as the DCM Supercrypt configuration are represented using trees. You can browse through a tree by collapsing or expanding branches. A branch that can be expanded is indicated by a + sign and an expanded leave is indicated by a - sign. To expand a branch, point to the + sign in front of the branch. To collapse a branch, point to the - sign in front of the branch. Using the Apply and Reload Command Button Particular pages and sub pages of the web browser user interface of the DCM Supercrypt can be provided with a Reload command button and an Apply command button. When changes are made to settings on a certain page or sub page, clicking on the Apply command button will send these new settings to the DCM Supercrypt. Note: When settings are changed on multiple pages or sub pages, only the settings on the page or sub page for which the Apply command button is pressed, are sent to the DCM Supercrypt. When settings are accidentally changed on a certain page or sub page, clicking on the Reload command button restores these settings to the previous settings as long as the Apply command button on this page or sub page is not pressed. The Reload command button can also be used to update readouts on the page or sub page the command button belongs to Rev D 17

34 Chapter 1 Introduction Image Legend A description of the icons used by the web browser user interface of the DCM Supercrypt can be found on the help - Legend sub page. The following procedure explains how to display the help - Legend sub page. 1 On the web browser user interface of the DCM Supercrypt, point to the Legend link that appears after clicking on the Help link. Result: The help - Legend sub page is displayed Rev D

35 Introducing the Web Browser User Interface Using Popup Windows Particular information is given by the DCM Supercrypt using popup windows. When popup blocking software is active on your PC, these popup windows might be blocked. In this case a message box is displayed. Deactivate this popup blocking software if you use the web browser user interface of the DCM Supercrypt. About Web Browser Toolbars Some toolbars for web browsers (e.g. Google Toolbar) offer an automated form fill in option. This option tries to fill in some fields in forms on web pages that were already visited once in the past (e.g. to automatically fill in name and address if possible). Because the embedded user interface of the DCM Supercrypt consists of pages with large forms this feature can slow down your page considerably. Therefore it is recommended to disable this option when you work with the DCM Supercrypt GUI. Checking the Version of the Web Browser User Interface The software version of the embedded web browser user interface of the DCM Supercrypt can be found on the help - About sub page of the user interface. The following procedure explains how to check the version of the embedded web browser user interface. 1 On the web browser user interface of the DCM Supercrypt, point to the About link that appears after clicking on the Help link. Result: The help - About sub page containing the version information of the web browser user interface is displayed Rev D 19

36 Chapter 1 Introduction Web Browser User Interface Security Introduction To prevent people from gaining access to the DCM Supercrypt, the web browser user interface of the DCM Supercrypt is provided with a security feature. This security feature confirms the identity of the users who are attempting to access the device, protects the device configuration from inappropriate access by users, and provides a simple and efficient way to set up and maintain the security of the DCM Supercrypt. To configure the DCM Supercrypt security, Security Accounts should be defined. A Security Account consists of a unique user name with password. By adding Security Accounts to Security Groups, particular access permissions and rights can be given to users. Three Security Groups are defined each having a different access level, viz.: Guests: read-only access Users: read-write access (without security configuration) Administrators: full control (with security configuration) The security of the DCM Supercrypt is provided with three pre-defined User Accounts. The table below shows these pre-defined accounts. User Name Password Security Groups Guest Guest Guests (read-only access) User User Users (read-write access, without security configuration) Administrator Administrator Administrators (full control) Notes: Both the User Name and Password are case-sensitive. Similar user names cannot be used, even when uppercase and lowercase characters are combined, e.g. user and User. For security reason each action done to the DCM Supercrypt using the web browser user interface will be logged into the Security Log or Action Log. More information concerning these logs can be found in topic Viewing Trace Logs on page Rev D

37 Web Browser User Interface Security Logging On or Off the Web Browser User Interface To Log On Perform the following steps to log on the DCM Supercrypt web browser user interface. Note: When the web browser user interface of the DCM Supercrypt is uploaded from the device after entering the IP address in the Address box of the web browser, the Login page of the web browser user interface is displayed. 1 On the Login page of the DCM Supercrypt web browser user interface, enter the user name in the User Name box and the password in the Password box. Note: Both parameters are case sensitive. 2 Press the Login command button to confirm. Result: You are logged on to the web browser user interface and the Service page is displayed. The user name of the security account that is logged on appears in the Login link. Note: After 30 minutes user interface inactivity, the web browser user interface of the DCM Supercrypt will automatically be logged out. To Log Off The following step explains how to log off the DCM Supercrypt web browser user interface. 1 On the web browser user interface of the DCM Supercrypt, point to the Logout link. Result: The web browser user interface is logged off and the Login page is displayed Rev D 21

38 Chapter 1 Introduction Configuring the Security Adding Security Accounts Perform the following steps to add Security Accounts. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Tip: The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by pointing to the parameter header. 3 In the User Name box of the Add New User table, enter a name for the new account. 4 In the Security Group drop down box, select the Security Group to which the new account has to belong. 5 In the Password and Re-enter Password box, enter the password for the new account. 6 Press the Add command button. Result: The new Security Account is added to the Security Accounts table Rev D

39 Web Browser User Interface Security Changing Security Account Settings Perform the following steps to change the settings of a Security Account. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Note: When a user is logged on using a Security Account that belongs to the Users or Guests Security Group, the Security link is not applicable. 3 In the Security Accounts table, adapt the following parameters of the Security Account for which settings should be changed: When the name of the Security Account should be changed, enter the new name in the corresponding User Name box. When the Security Account has to belong to another Security Group, select the desired group in the Security Group drop down box. When the password should be changed, tick the corresponding check box and enter the new password in both password boxes. 4 Press the Apply command button to confirm or the Reload command button to abort the operation. Tip: The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by pointing the parameter header. Deleting Security Accounts The following procedure explains how to delete security accounts. 1 Log on to the DCM Supercrypt using a Security Account belonging to the Administrators Security Group. 2 Point to the Security link. Result: The Security page is displayed. Note: When a user is logged on using a Security Account that belongs to the Users or Guests Security Group, the Security page is not applicable. 3 In the Security Accounts table, tick the check box(es) in front of the row(s) of the Security Account that must be removed. Tips: To set the check boxes of consecutive rows in the Security Accounts table, tick the check box of the first row, press and hold down the [SHIFT] key, and tick the check box of the last row. The rows in the Security Accounts table can be re-ordered using a particular parameter by pointing to the table header of this parameter. You can toggle between ascending and descending order by clicking on the parameter header Rev D 23

40 Chapter 1 Introduction 4 Press the Remove Checked Items command button to confirm or the Reload command button to abort the operation. Result: After pressing the Remove Checked Items command button, the selected Security Accounts are removed from the Security Accounts table. Notes: At least one Security Account belonging to the Administrators Security Group must be present in the Security Accounts table. When a Security Account is deleted from a Security Group while a user is logged on to the DCM Supercrypt using this Security Account, the user has access to the DCM Supercrypt as long as he is logged on Rev D

41 Checking the Version Information Checking the Version Information Introduction The Configuration - Version Info sub page of the web browser user interface of the DCM Supercrypt represents the version numbers of the software, hardware, and firmware of the different DCM Supercrypt components. The following picture shows the Configuration - Version Info sub page of a DCM Supercrypt populated with two GbE Interface Card / Co-Processor modules. Note: By pointing to the parameter header in a version table, an ascending or descending order of the rows can be chosen. To check the Version Information Perform the following steps to check the version information of the DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Version Info link that appears after clicking on the Configuration link. Result: The Configuration - Version Info sub page is displayed Rev D 25

42 Chapter 1 Introduction Importing and Exporting Device Settings Introduction The web browser user interface of the DCM Supercrypt allows exporting and importing of the configuration setting files. This feature is useful for backup or (re- )configuration purposes. Exporting Configuration Settings The following procedure explains how to export the configuration setting files of the DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Backup link that appears after clicking on the Configuration link. Result: The Configuration - Backup sub page is displayed. 2 Press the Export command button. Result: The File Download dialog is displayed. 3 Click on the Save command button. Result: The Save As dialog is displayed. Note: If the file should be saved in a different folder, locate and open the folder. 4 In the File Name box, enter a name for the file. 5 Click the Save command button to confirm or the Cancel command button to abort the operation Rev D

43 Importing Configuration Settings Importing and Exporting Device Settings The procedure below describes how to import the configuration setting files. 1 On the web browser user interface of the DCM Supercrypt, point to the Backup link that appears after clicking on the Configuration link. Result: The Configuration - Backup sub page is displayed. 2 Point to the Browse command button. Result: The Choose file dialog is displayed. 3 Browse to the configuration file and select this file. 4 Click on the Open command button. Result: The Choose file dialog is closed and the path and the file name appear in the Import Device Settings from File box. 5 Click on the Import command button. Result: A confirmation popup window is displayed. 6 Press the OK command button to confirm or the Cancel command button to abort the operation. Result: After pressing the OK command button, the DCM will be rebooted. WARNING: During booting the DCM, the outgoing services will be interrupted. Note: Booting the DCM can take some time depending on the configuration and the features of the device Rev D 27

44 Chapter 1 Introduction Restarting the System Introduction The DCM Supercrypt can be restarted from a remote location using its web browser user interface. A device restart can be performed with its previous settings (called Warm Restart) or with factory setting (called Cold Restart). When a cold restart is performed, all previous configuration settings will be lost except the IP settings of the 10/100 and 10/100/1000Base-T port of the device. After restarting the device remains accessible by the embedded graphical user interface. Note: Performing a cold restart can only be done when you are logged on to the DCM Supercrypt with a security account belonging to the Administrators security group. To Restart the DCM Supercrypt System The following steps explain how to restart a DCM Supercrypt. 1 On the web browser user interface of the DCM Supercrypt, point to the Maintenance link that appears after clicking on the Help link. Result: The Help - Maintenance sub page is displayed. 2 Click on the Warm or Cold selection button. WARNING: After restarting the DCM Supercrypt using a Cold Restart, all configuration settings will be lost. After restarting the DCM Supercrypt using a Warm Restart, the outgoing services will be interrupted. 3 Press the Reboot command button. Result: A confirmation popup window is displayed. - Warm Restart confirmation popup window Rev D

45 Restarting the System - Cold Restart confirmation popup window 4 Press the OK command button to confirm or the Cancel command button to abort the operation. Notes: Booting the DCM Supercrypt can take some time depending on the configuration and the features of the device. After changing settings using the web browser user interface, it takes at most 5 minutes before these settings are stored in non-volatile memory. When the DCM Supercrypt is powered down during this time, these settings will be lost. To deal with this, wait 5 minutes before power down the DCM Supercrypt or trigger a Warm Restart and wait 20 seconds before powering down the DCM Supercrypt by unplugging he power cord Rev D 29

46

47 2 Chapter 2 Configuration Introduction This chapter covers the configuration of the DCM Supercrypt. This chapter provides the device configuration procedures, card configuration procedures as well as port configuration procedures. In This Chapter Device Configuration Card Configuration GbE Port Configuration General Configuration Rev D 31

48 Chapter 2 Configuration Device Configuration Changing the Device Name Introduction To facilitate the identification of the DCM Supercrypt in an application, a name with maximum 40 characters can be given to the device. Note: The name of the DCM Supercrypt appears in the title bar of the web browser. Tips: The hardware configuration of the DCM Supercrypt is depicted in the Hardware configuration box. Clicking on an interface card in the hardware configuration picture opens the Configuration - Interface configuration sub page of the corresponding interface card Rev D

49 Device Configuration To Change the Device Name The following procedure explains how to change the device name. 1 On the web browser user interface of the DCM Supercrypt, point to the Configuration link. Result: The Configuration page with System sub page is displayed. 2 In the System Settings table, enter a name in the Name box. 3 Click on the Apply command button to confirm or the Reload command button to reload the previous setting. Note: The System Settings table also contains the DCM Supercrypt model to which the web browser user interface belongs Rev D 33

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev.

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version 1.0.0. 613-001339 Rev. Management Software AT-S106 Web Browser User s Guide For the AT-GS950/48 Gigabit Ethernet Smart Switch Version 1.0.0 613-001339 Rev. A Copyright 2010 Allied Telesis, Inc. All rights reserved. No part of

More information

4029541 Rev B. Cisco RF Gateway 1 Remote Management Utility (RMU) User Guide

4029541 Rev B. Cisco RF Gateway 1 Remote Management Utility (RMU) User Guide 4029541 Rev B Cisco RF Gateway 1 Remote Management Utility (RMU) User Guide For Your Safety Explanation of Warning and Caution Icons Avoid personal injury and product damage! Do not proceed beyond any

More information

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide

NEC Express5800 Series NEC ESMPRO AlertManager User's Guide NEC Express5800 Series NEC ESMPRO AlertManager User's Guide 7-2006 ONL-4152aN-COMMON-128-99-0606 PROPRIETARY NOTICE AND LIABILITY DISCLAIMER The information disclosed in this document, including all designs

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your Wireless-G Router Model WGR614v9. You can access these features by selecting the items under

More information

Ross Video Limited. DashBoard Server and User Rights Management User Manual

Ross Video Limited. DashBoard Server and User Rights Management User Manual Ross Video Limited DashBoard Server and User Rights Management User Manual DashBoard Server and User Rights Management User Manual Ross Part Number: 8351DR-004A-01 Release Date: March 22, 2011. Printed

More information

Prisma II Software Upgrade Program (SOUP) Installation Guide

Prisma II Software Upgrade Program (SOUP) Installation Guide Prisma II Software Upgrade Program (SOUP) Installation Guide Overview The Prisma II Software Upgrade Program (SOUP) is a user-friendly utility that allows users to perform firmware upgrades on Prisma II

More information

Using RAID Admin and Disk Utility

Using RAID Admin and Disk Utility Using RAID Admin and Disk Utility Xserve RAID Includes instructions for creating RAID arrays and monitoring Xserve RAID systems K Apple Computer, Inc. 2003 Apple Computer, Inc. All rights reserved. Under

More information

Personal Call Manager User Guide. BCM Business Communications Manager

Personal Call Manager User Guide. BCM Business Communications Manager Personal Call Manager User Guide BCM Business Communications Manager Document Status: Standard Document Version: 04.01 Document Number: NN40010-104 Date: August 2008 Copyright Nortel Networks 2005 2008

More information

Cisco RF Gateway 1 Software Release Notes, Release 1.03.17

Cisco RF Gateway 1 Software Release Notes, Release 1.03.17 Cisco RF Gateway 1 Software Release Notes, Release 1.03.17 Overview Introduction Software Release 1.03.17 is an SDV capable release for the RF Gateway 1 which supports Motorola DigiCipher streams (C0/C1

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

Chapter 6 Using Network Monitoring Tools

Chapter 6 Using Network Monitoring Tools Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Wireless-N Gigabit Router WNR3500. You can access these features by selecting the items

More information

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)

Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...

More information

Compuprint 4247 Serial Matrix Printers

Compuprint 4247 Serial Matrix Printers Compuprint 4247 Serial Matrix Printers Remote Printer Management Utility for Serial Matrix Printers MAN10300-00.00 First edition (October 2011) This edition applies to the Compuprint 4247 printers and

More information

Configuration Backup Restore

Configuration Backup Restore Configuration Backup Restore June 2010 2010 Avaya Inc. All Rights Reserved. States and other countries. Adobe and Flash are either trademarks or registered trademarks in the United States and/or other

More information

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007

SonicOS Enhanced 3.8.0.6 Release Notes TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 SonicOS Enhanced 3.8.0.6 TZ 180 Series and TZ 190 Series SonicWALL, Inc. Firmware Release: August 28, 2007 CONTENTS PLATFORM COMPATIBILITY SONICWALL RECOMMENDATIONS KNOWN ISSUES RESOLVED KNOWN ISSUES UPGRADING

More information

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers

InfoPrint 4247 Serial Matrix Printers. Remote Printer Management Utility For InfoPrint Serial Matrix Printers InfoPrint 4247 Serial Matrix Printers Remote Printer Management Utility For InfoPrint Serial Matrix Printers Note: Before using this information and the product it supports, read the information in Notices

More information

Digital Video Broadcasting Conditional Access Architecture

Digital Video Broadcasting Conditional Access Architecture Digital Video Broadcasting Conditional Access Architecture Introduction Digital Video Broadcasting (DVB) is a standard defining a one-to-many unidirectional data network for sending digital TV programs

More information

How To Check If Your Router Is Working Properly

How To Check If Your Router Is Working Properly Chapter 6 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax Dual Band Wireless-N Router WNDR3300. You can access these features by selecting the

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

Intel Active Management Technology with System Defense Feature Quick Start Guide

Intel Active Management Technology with System Defense Feature Quick Start Guide Intel Active Management Technology with System Defense Feature Quick Start Guide Introduction...3 Basic Functions... 3 System Requirements... 3 Configuring the Client System...4 Intel Management Engine

More information

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business

Quick Start Guide. WRV210 Wireless-G VPN Router with RangeBooster. Cisco Small Business Quick Start Guide Cisco Small Business WRV210 Wireless-G VPN Router with RangeBooster Package Contents WRV210 Router Ethernet Cable Power Adapter Product CD-ROM Quick Start Guide Welcome Thank you for

More information

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module

TDP43ME NetPS. Network Printer Server. Control Center. for Ethernet Module Panduit Corp. 2010 TDP43ME NetPS PA26306A01 Rev. 01 11-2010 Network Printer Server Control Center for Ethernet Module NOTE: In the interest of higher quality and value, Panduit products are continually

More information

Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA

Quick Start Guide. Cisco SPA232D Mobility Enhanced ATA Quick Start Guide Cisco SPA232D Mobility Enhanced ATA Package Contents Analog Telephone Adapter Ethernet Cable Phone Cable Power Adapter Quick Start Guide Product CD-ROM Welcome Thank you for choosing

More information

Monitoring Conditional Access Systems

Monitoring Conditional Access Systems Monitoring Conditional Access Systems Introduction A Conditional Access system is a key component for most digital TV operations. They secure the operators investments by encrypting the signals and ensures

More information

AT-GS950/8. AT-GS950/8 Web Users Guide AT-S107 [1.00.043] Gigabit Ethernet Smart Switch. 613-001484 Rev A

AT-GS950/8. AT-GS950/8 Web Users Guide AT-S107 [1.00.043] Gigabit Ethernet Smart Switch. 613-001484 Rev A AT-GS950/8 Gigabit Ethernet Smart Switch AT-GS950/8 Web Users Guide AT-S107 [1.00.043] 613-001484 Rev A Copyright 2011 Allied Telesis, Inc. All rights reserved. No part of this publication may be reproduced

More information

Chapter 4 Management. Viewing the Activity Log

Chapter 4 Management. Viewing the Activity Log Chapter 4 Management This chapter describes how to use the management features of your NETGEAR WG102 ProSafe 802.11g Wireless Access Point. To get to these features, connect to the WG102 as described in

More information

MULTIFUNCTIONAL DIGITAL SYSTEMS. TopAccess Guide

MULTIFUNCTIONAL DIGITAL SYSTEMS. TopAccess Guide MULTIFUNCTIONAL DIGITAL SYSTEMS TopAccess Guide 0 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without prior written permission of

More information

MultiScreen 4. Hardware and software system for real time monitoring of multiple sources of video and audio signals. User s Manual

MultiScreen 4. Hardware and software system for real time monitoring of multiple sources of video and audio signals. User s Manual MultiScreen 4 Hardware and software system for real time monitoring of multiple sources of video and audio signals. User s Manual Contents Chapter 1. Components and installation for the system..................................3

More information

Chapter 3 Management. Remote Management

Chapter 3 Management. Remote Management Chapter 3 Management This chapter describes how to use the management features of your ProSafe 802.11a/g Dual Band Wireless Access Point WAG102. To access these features, connect to the WAG102 as described

More information

Access to remote DVR from IE USER S MANUAL CONTENT

Access to remote DVR from IE USER S MANUAL CONTENT Access to remote DVR from IE CONTENT... 2 Preface... 2 1. Introduction... 2 2. System requirement and executing environment... 2 2.1. Supported operating System:... 2 2.2. Hardware requirement (recommend):...

More information

138 Configuration Wizards

138 Configuration Wizards 9 Configuration Wizards 9.1 Introduction to Wizards ACP ThinManager uses wizards for configuration. Wizards take two forms. List Wizards associate Terminal Servers and ThinManager Servers with their IP

More information

Avaya Network Configuration Manager User Guide

Avaya Network Configuration Manager User Guide Avaya Network Configuration Manager User Guide May 2004 Avaya Network Configuration Manager User Guide Copyright Avaya Inc. 2004 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting

Features Reference. About Unified Communication System. Before Using This Machine. Starting a Meeting. What You Can Do During the Meeting Features Reference About Unified Communication System Before Using This Machine Starting a Meeting What You Can Do During the Meeting Leaving a Meeting Managing Address Book Changing Network Configuration

More information

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1

Pro-Watch Software Suite Installation Guide. 2013 Honeywell Release 4.1 Pro-Watch Software Suite Release 4.1 Installation Guide Document 7-901073V2 Pro-Watch Software Suite Installation Guide 2013 Honeywell Release 4.1 Copyright 2013 Honeywell. All rights reserved. Pro-Watch

More information

HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE

HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE HOW TO TRANSFER FILES BETWEEN EEN IDL7000 PVR AND USB2 DEVICE CONTENTS CONTENTS...2 FOREWORD...3 TRANSFERRING FILES BETWEEN IDL7000M PVR AND USB2 DEVICE...4 CONNECTING AN EXTERNAL USB2 DEVICE...4 COPYING

More information

HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE

HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE You can read the recommendations in the user guide, the technical guide or the installation guide for HP EMAIL ARCHIVING SOFTWARE FOR EXCHANGE. You'll find the answers to all your questions on the HP EMAIL

More information

ProSAFE 8-Port and 16-Port Gigabit Click Switch

ProSAFE 8-Port and 16-Port Gigabit Click Switch ProSAFE 8-Port and 16-Port Gigabit Click Switch Model GSS108E and GSS116E User Manual March 2015 202-11520-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products.

More information

SMS Database System Quick Start. [Version 1.0.3]

SMS Database System Quick Start. [Version 1.0.3] SMS Database System Quick Start [Version 1.0.3] Warning ICP DAS Inc., LTD. assumes no liability for damages consequent to the use of this product. ICP DAS Inc., LTD. reserves the right to change this manual

More information

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3 SIP Proxy Server Administrator Installation and Configuration Guide V2.31b 09SIPXM.SY2.31b.EN3 DSG, DSG logo, InterPBX, InterServer, Blaze Series, VG5000, VG7000, IP590, IP580, IP500, IP510, InterConsole,

More information

Fiery E100 Color Server. Welcome

Fiery E100 Color Server. Welcome Fiery E100 Color Server Welcome 2011 Electronics For Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45098226 27 June 2011 WELCOME 3 WELCOME This Welcome

More information

GS510TP and GS110T Gigabit Smart Switches

GS510TP and GS110T Gigabit Smart Switches GS510TP and GS110T Gigabit Smart Switches Software Administration Manual 350 East Plumeria Drive San Jose, CA 95134 USA December 2011 202-10883-01 v1.0 2011 NETGEAR, Inc. All rights reserved No part of

More information

TOSHIBA GA-1310. Printing from Windows

TOSHIBA GA-1310. Printing from Windows TOSHIBA GA-1310 Printing from Windows 2009 Electronics for Imaging, Inc. The information in this publication is covered under Legal Notices for this product. 45081979 04 February 2009 CONTENTS 3 CONTENTS

More information

SNMP Web Management. User s Manual For SNMP Web Card/Box

SNMP Web Management. User s Manual For SNMP Web Card/Box SNMP Web Management User s Manual For SNMP Web Card/Box Management Software for Off-Grid Inverter Version: 1.2 Table of Contents 1. Overview... 1 1.1 Introduction... 1 1.2 Features... 1 1.3 Overlook...

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Software Update Manager User Guide

Software Update Manager User Guide Software Update Manager User Guide October 2011 2011 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document is complete and accurate

More information

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A

Getting Started with. Ascent Capture Internet Server 5. 10300260-000 Revision A Ascent Capture Internet Server 5 Getting Started with Ascent Capture Internet Server 5 10300260-000 Revision A Copyright Copyright 2001 Kofax Image Products. All Rights Reserved. Printed in USA. The information

More information

Cisco TelePresence VCR MSE 8220

Cisco TelePresence VCR MSE 8220 Cisco TelePresence VCR MSE 8220 Getting started 61-0008-05 Contents General information... 3 About the Cisco TelePresence VCR MSE 8220... 3 Port and LED location... 3 LED behavior... 4 Installing the VCR

More information

DVCrypt Conditional Access System

DVCrypt Conditional Access System DVCrypt Conditional Access System Quick start guide 1. Introduction DVCrypt is a conditional access system for digital TV broadcasting networks (DVB). It consists of hardware modules and client/server

More information

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0

Smart Control Center. User Guide. 350 East Plumeria Drive San Jose, CA 95134 USA. November 2010 202-10685-01 v1.0 Smart Control Center User Guide 350 East Plumeria Drive San Jose, CA 95134 USA November 2010 202-10685-01 v1.0 2010 NETGEAR, Inc. All rights reserved. No part of this publication may be reproduced, transmitted,

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

i -CEN S USER S Manual 2007. 08. 13.

i -CEN S USER S Manual 2007. 08. 13. i -CEN S i -CEN'S USER S Manual 2007. 08. 13. i -CEN S Table of Contents Overview of i-cen S software... 4 1 Introduction of i-cen S... 4 2 Key Features... 5 3 Key Benefits... 5 4 System Specification...

More information

RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP

RouteFinder SOHO. Quick Start Guide. SOHO Security Appliance. EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP RouteFinder SOHO SOHO Security Appliance EDGE Models RF825-E, RF825-E-AP CDMA Models RF825-C-Nx, RF825-C-Nx-AP Quick Start Guide RouteFinder RF825 Series Quick Start Guide RouteFinder SOHO Security Appliance

More information

Accounting Manager. User Guide A31003-P1030-U114-2-7619

Accounting Manager. User Guide A31003-P1030-U114-2-7619 Accounting Manager User Guide A31003-P1030-U114-2-7619 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001 and ISO14001 standards and are certified

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA September 2010 202-10524-03 v1.0 ProSafe Plus Switch Utility User Guide 2010 NETGEAR, Inc. All rights reserved. No

More information

Network Installation Guide. Artisan 810 Series

Network Installation Guide. Artisan 810 Series Network Installation Guide Artisan 810 Series Before You Begin Make sure you installed ink cartridges and loaded paper as described on the Start Here sheet. Then follow the instructions in this guide to

More information

1 DVR 670 Series firmware version 2.1.2 (date 2014-06-17)

1 DVR 670 Series firmware version 2.1.2 (date 2014-06-17) Video Recorder 670 Series 1 DVR 670 Series firmware version 2.1.2 (date 2014-06-17) File name: 600rtseries_2.1.2_140617.bin - When a unit detects a HDD error, the DVR will automatically reboot so that

More information

Avaya Wireless AP Device Manager User Guide

Avaya Wireless AP Device Manager User Guide Avaya Wireless AP Device Manager User Guide February 2003 Avaya Wireless AP Device Manager User Guide Copyright Avaya Inc. 2003 ALL RIGHTS RESERVED The products, specifications, and other technical information

More information

IX Support Tool Setting Manual

IX Support Tool Setting Manual IX System IP network-compatible intercom IX Support Tool Setting Manual Software version 2.0.0.0 or later Before configuring and using the system, read Setting Manual and Operation Manual (PDF) carefully.

More information

Configuration Manager 1.6

Configuration Manager 1.6 Configuration Manager 1.6 en Manual Configuration Manager 1.6 Table of Contents en 1 Table of Contents 1 Introduction 3 1.1 About this manual 3 1.2 Conventions in this manual 3 1.3 System requirements

More information

NVMS - 1000 USER MANUAL. Version 2.1.0

NVMS - 1000 USER MANUAL. Version 2.1.0 NVMS - 1000 USER MANUAL Version 2.1.0 Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Operation Environment... 1 1.3 Install and Uninstall... 2 1.3.1 Install the Software... 2 1.3.2 Uninstall

More information

Server Manual. For Administrators of Cameleon Version 4

Server Manual. For Administrators of Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 Cameleon Version 4 Server Manual For Administrators of Cameleon Version 4 R4-07OCT04 Copyright 2004 360 Surveillance Inc. Camera Cameleon is a trademark

More information

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual

Vodafone PC SMS 2010. (Software version 4.7.1) User Manual Vodafone PC SMS 2010 (Software version 4.7.1) User Manual July 19, 2010 Table of contents 1. Introduction...4 1.1 System Requirements... 4 1.2 Reply-to-Inbox... 4 1.3 What s new?... 4 2. Installation...6

More information

FastTrak TX4000, FastTrak S150 TX2plus, FastTrak S150 TX4 PROMISE ARRAY MANAGEMENT ( PAM) User Manual

FastTrak TX4000, FastTrak S150 TX2plus, FastTrak S150 TX4 PROMISE ARRAY MANAGEMENT ( PAM) User Manual FastTrak TX4000, FastTrak S150 TX2plus, FastTrak S150 TX4 PROMISE ARRAY MANAGEMENT ( PAM) User Manual Version 1.1 Promise Array Management Copyright 2003 Promise Technology, Inc. Copyright by Promise Technology,

More information

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG

UFR II Driver Guide. UFR II Driver Ver. 2.20 ENG UFR II Driver Guide UFR II Driver Ver. 2.20 Please read this guide before operating this product. After you finish reading this guide, store it in a safe place for future reference. ENG 0 Ot UFR II Driver

More information

Network FAX Driver. Operation Guide

Network FAX Driver. Operation Guide Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network

More information

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01

GUIDE. Web Client Application. Model: ER 4.0. Release 4.0.00 / Version No.: 1.01 8e6R Enterprise Reporter USER GUIDE Web Client Application Model: ER 4.0 Release 4.0.00 / Version No.: 1.01 ii 8E6 TECHNOLOGIES, ENTERPRISE REPORTER WEB CLIENT USER GUIDE 8E6 ENTERPRISE REPORTER WEB CLIENT

More information

Camera Management Tool User Manual

Camera Management Tool User Manual Network Camera Camera Management Tool User Manual The Operation Guide should be read before using the network camera. ENGLISH Introduction This manual describes how to configure and operate Camera Management

More information

Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business

Quick Start Guide. RV 120W Wireless-N VPN Firewall. Cisco Small Business Quick Start Guide Cisco Small Business RV 120W Wireless-N VPN Firewall Package Contents Wireless-N VPN Firewall Ethernet Cable Power Adapter Quick Start Guide Documentation and Software on CD-ROM Welcome

More information

Monitoring Network DMN

Monitoring Network DMN Monitoring Network DMN User Manual Table of contents Table of contents... 2 1. Product features and capabilities... 3 2. System requirements... 5 3. Getting started with the software... 5 3-1 Installation...

More information

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual

A6210 WiFi USB Adapter 802.11ac USB 3.0 Dual Band User Manual 802.11ac USB 3.0 Dual Band User Manual August 2014 202-11373-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting NETGEAR products. After installing your device, locate the

More information

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement

R&S AFQ100A, R&S AFQ100B I/Q Modulation Generator Supplement I/Q Modulation Generator Supplement The following description relates to the Operating Manuals, version 03 of R&S AFQ100A, and version 01 of R&S AFQ100B. It encloses the following topics: LXI features,

More information

Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0

Page 1 S5.5 Monitoring Software Manual Rev 1.2 for Software Ver 1.0 Trantec S5.5 Monitoring Software Manual Initial Setup Minimum PC Requirements 1.6 GHz CPU, 256 MB Memory, 1 available USB port, Windows XP Recommended PC >2.0 GHz CPU, 512 MB (XP) 1 GB (Vista) memory,

More information

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13

Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 Back-up Server DOC-OEMSPP-S/2014-BUS-EN-10/12/13 The information contained in this guide is not of a contractual nature and may be subject to change without prior notice. The software described in this

More information

CA XCOM Data Transport for Windows Server/Professional

CA XCOM Data Transport for Windows Server/Professional CA XCOM Data Transport for Windows Server/Professional Installation Guide Release 11.6 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials,

More information

email-lead Grabber Business 2010 User Guide

email-lead Grabber Business 2010 User Guide email-lead Grabber Business 2010 User Guide Copyright and Trademark Information in this documentation is subject to change without notice. The software described in this manual is furnished under a license

More information

Barracuda Link Balancer Administrator s Guide

Barracuda Link Balancer Administrator s Guide Barracuda Link Balancer Administrator s Guide Version 1.0 Barracuda Networks Inc. 3175 S. Winchester Blvd. Campbell, CA 95008 http://www.barracuda.com Copyright Notice Copyright 2008, Barracuda Networks

More information

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5

Deployment Guide for Maximum Security Environments Polycom HDX Systems, Version 3.0.5 Polycom HDX Systems, Version 3.0.5 A warning about operating in a maximum security environment The maximum security profile is designed to lock down communications to the most stringent requirements of

More information

genie app and genie mobile app

genie app and genie mobile app genie app and genie mobile app User Manual 350 East Plumeria Drive San Jose, CA 95134 USA June 2012 202-10933-02 v1.0 2012 NETGEAR, Inc. All rights reserved No part of this publication may be reproduced,

More information

NVMS-1200. User Manual

NVMS-1200. User Manual NVMS-1200 User Manual Contents 1 Software Introduction... 1 1.1 Summary... 1 1.2 Install and Uninstall... 1 1.2.1 Install the Software... 1 2 Login Software... 3 2.1 Login... 3 2.2 Control Panel Instruction...

More information

24 Port Gigabit Ethernet Web Smart Switch. Users Manual

24 Port Gigabit Ethernet Web Smart Switch. Users Manual 24 Port Gigabit Ethernet Web Smart Switch Users Manual Content Web Smart Switch Configure login -------------------------------- 2 Configuration System Configuration ---------------------------------------------------

More information

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos

IS SERIES. QuikStart Programming Guide. IP Network Direct System. Programming Videos 0215 IS SERIES IP Network Direct System QuikStart Programming Guide 1 4 GHI 2 ABC 5 JKL 3 DEF 6 MNO PRIVACY TRANSFER LIST SETTING 7 PQRS 8 TUV 9 WXYZ ZOOM 0 # WIDE Programming Videos ATTENTION: This is

More information

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking

How To Check If Your Router Is Working Properly On A Nr854T Router (Wnr854) On A Pc Or Mac) On Your Computer Or Ipad (Netbook) On An Ipad Or Ipa (Networking Chapter 7 Using Network Monitoring Tools This chapter describes how to use the maintenance features of your RangeMax NEXT Wireless Router WNR854T. These features can be found by clicking on the Maintenance

More information

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.

More information

Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements.

Overview of ServerView Windows Agent This chapter explains overview of ServerView Windows Agent, and system requirements. ServerView User s Guide (For Windows Agent) Areas Covered - Before Reading This Manual This section explains the notes for your safety and conventions used in this manual. Chapter 1 Overview of ServerView

More information

Network Probe User Guide

Network Probe User Guide Network Probe User Guide Network Probe User Guide Table of Contents 1. Introduction...1 2. Installation...2 Windows installation...2 Linux installation...3 Mac installation...4 License key...5 Deployment...5

More information

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide

Advantech WebAccess Device Driver Guide. BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide BwSNMP Advantech WebAccess to SNMP Agent (Simple Network Management Protocol) Device Driver Guide Version 5.0 rev 1 Advantech Corp., Ltd. Table of Contents BwSNMP Advantech WebAccess to SNMP Agent (Simple

More information

Job Streaming User Guide

Job Streaming User Guide Job Streaming User Guide By TOPS Software, LLC Clearwater, Florida Document History Version Edition Date Document Software Trademark Copyright First Edition 08 2006 TOPS JS AA 3.2.1 The names of actual

More information

NMS300 Network Management System

NMS300 Network Management System NMS300 Network Management System User Manual June 2013 202-11289-01 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for purchasing this NETGEAR product. After installing your device, locate

More information

User Manual of Web Client

User Manual of Web Client User Manual of Web Client 1 Index Chapter 1 Software Installation... 3 Chapter 2 Begin to Use... 5 2.1 Login and Exit... 5 2.2 Preview Interface Instruction... 6 2.3 Preview Image... 7 Chapter 3 Playback...

More information

SNMP Manager User s Manual

SNMP Manager User s Manual SNMP Manager User s Manual Table of Contents 1. Introduction...2 2. SNMP Manager Install, Quick Start and Uninstall...2 2.1. Software Installation...2 2.2. Software Quick Start...2 2.3. Software Uninstall...2

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005

BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 BIGPOND ONLINE STORAGE USER GUIDE Issue 1.1.0-18 August 2005 PLEASE NOTE: The contents of this publication, and any associated documentation provided to you, must not be disclosed to any third party without

More information

Changing Your Cameleon Server IP

Changing Your Cameleon Server IP 1.1 Overview Technical Note Cameleon requires that you have a static IP address defined for the server PC the Cameleon server application runs on. Even if the server PC has a static IP address, you may

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

AXIS Camera Station Quick Installation Guide

AXIS Camera Station Quick Installation Guide AXIS Camera Station Quick Installation Guide Copyright Axis Communications AB April 2005 Rev. 3.5 Part Number 23997 1 Table of Contents Regulatory Information.................................. 3 AXIS Camera

More information

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1

Cisco UCS Director Payment Gateway Integration Guide, Release 4.1 First Published: April 16, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Central Management System (CMS) USER MANUAL

Central Management System (CMS) USER MANUAL Central Management System (CMS) USER MANUAL LEGAL INFORMATION Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the prior written permission

More information