Security Device Installation PDF
Security Device Installation PDF
INTRODUCTION
A security device is required to use this Lab-Volt software. Two types of security
devices are available: a single-user hardlock key to be connected to a USB port on
the user's computer, and a multiple-user hardlock key to be installed within the
server of a computer network.
This section provides the procedures for installing each type of security devices. The
first procedure deals with the installation of a single-user hardlock key. The second
procedure describes the installation of a multiple-user hardlock key.
Before performing the hardlock key installation, apply a serial number label on the
back cover of this manual and on the hardlock key. Then, identify the type of key you
have in your possession (see Figures 2-1 and 2-2).
2-1
Security Device Installation
The single-user hardlock key installation simply consists in connecting the key to one
of the USB port connectors of the computer used to run this Lab-Volt software.
The multiple-user hardlock key installation consists of installing the key within the
computer used as the network server, installing the multiple-user hardlock key
drivers in this computer, and starting the hardlock key service using the HL Server
program.
The multiple-user hardlock key is a printed circuit board with an edge-type connector
that installs into one of the PCI expansion slots of the computer. The multiple-user
hardlock key is compatible with the TCP/IP and IPX communication protocols.
Installation of the Multiple-User Hardlock Key within the Computer used as the
Network Server
G 2. Insert the CD ROM containing the Lab-Volt software you want to install (for
example, LVSIM-EMS) in the server's CD ROM drive.
G 5. When the drivers have finished installing, connect the HASP key to one of
the USB port connectors of the computer used as the network server.
2-2
Security Device Installation
G 2. Insert the CD ROM containing the Lab-Volt software that you want to install
(for example, LVSIM-EMS) in the server's CD ROM drive.
G 4. A window may appear indicating that the software (hardlock key drivers) you
are installing has not passed the Windows Logo testing to verify its
compatibility with Windows. If so, click Continue Anyway to close this
window and resume the hardlock key driver installation.
2-3
Security Device Installation
G 5. Select No when asked "Do you want to install the device drivers" in the
HLSW32 installation.
G 6. Make sure that the Windows Firewall does not block these ports: 3047 UDP
and 3047 TCP.
You can check if the installation is successful from any computer in the
network. Use Aladdin DiagnostiX or Aladdin Monitor to do this.
HL_SEARCH=IP
Aladdin DiagnostiX
You can use Aladdin DiagnostiX to obtain relevant information about your system
and to check Hardlock modules. This information helps you to solve problems which
may occur during the use of the protected software.
G 1. Start: DIAGNOSTIX.EXE.
2-4
Security Device Installation
G 1. Activate the Check Hardlock tool by clicking the Hardlock icon in the
Diagnostic Tools pane.
G 3. Specify the module address of the Hardlock module which you want to
check.
G 4. Click the button check key. Details of the access are displayed in the Key
Access History table below the Check Hardlock display.
Aladdin Monitor
You can install Aladdin Monitor on any computer running under Windows 2003, XP,
or Vista. You need to be logged on as administrator in order to install Aladdin
Monitor.
G 3. Refer to the online help of the program, using the main menu or by
pressing F1 in order to obtain information on how to operate the program.
2-5
Security Device Installation
The single-user HASP key installation simply consists in connecting the key to one
of the USB port connectors of the computer used to run the Lab-Volt software.
G 2. Insert the CD ROM containing the Lab-Volt software you want to install (for
example, LVSIM-EMS) in the CD ROM drive of the server.
G 5. When the drivers have finished installing, connect the HASP key to one of
the USB port connectors of the computer used as the network server.
2-6