GE v6 Computer Monitor User Manual


 
Secure Perfect 6.1.1 User Manual 242
Security Tab - Micro Form
Micro Form
Micro Passwords: The Micro Passwords list box has the following default password entries, enabling
four possible levels of security. Select a password; it now displays in the Password dialog box:
Select To
one-1
Re-assign a password by typing over the
default displayed in the dialog box.
two-1
Re-assign a password by typing over the
default displayed in the dialog box.
three-1
Re-assign a password by typing over the
default displayed in the dialog box.
four-1
Re-assign a password by typing over the
default displayed in the dialog box.
Click Change to save and re-assign the new password.
If you change your micro passwords, you must enter the changed passwords in FlashTool by typing
over the existing entries. As you type the password in FlashTool, the characters will be replaced by
asterisks (*) to ensure the security of the host access system.
Communication Encryption
This feature allows you to configure additional security encryption that scrambles data into an
unbreakable code for public transmission. Encryption protects the Host-to-micro exchange of information.
The Host uses the Exchange Key to send the Data Key to the micro. Once the Data Key is received, the
Host-to-micro communication is encrypted using that key.
Enable Encryption: This check box is available only for head-of-line network, network+dialup, network +
direct, and network + network micros.
This checkbox, and all selections in the Communication Encryption grouping, are not available on
downstream micros.
Exchange Key: There are two options for encrypting an Exchange Key.
System: When you choose this selection, no additional selections are available or required.
This key is set at the factory.
Custom: When you select this option, the three dialog boxes become available. At the micro,
enter the 48-character exchange key using FlashTool. This exchange key must be identical
to the key that was entered into the micro parameter block at the micro.
If the Custom exchange key entries do not match, an alarm condition indication displays
in the Reference column of the Alarm Monitor Form.
Edit: Click to re-assign or revise an existing encrypted Custom exchange key for a selected
micro. It is possible to assign a duplicate exchange key on separate micros in your Secure
Perfect system. When you click this button one time, this button label changes to Auto
Generate.
Auto Generate: Click this button to system-generate a Custom exchange key. We
recommend that you record this number. You can now enter this key into the micro
parameter block at the micro.