1
SECT 1
Contents
IMPORTANT: Before using this product .....................................2
Welcome
Introduction .................................................................................3
Model features ............................................................................4
AdderView Secure - front and rear layout .................................5
Devices used with the AdderView Secure ..................................6
Keyboard devices ....................................................................6
Mouse devices .........................................................................6
Smartcard devices (supported only on enhanced models) ...7
Keyboards with integrated smartcard readers
(supported only on enhanced models) .................................8
Standard items .............................................................................9
Additional items ..........................................................................9
Installation
Locations ....................................................................................10
Cabling recommendations ........................................................10
Tamper-evident seals.................................................................10
Links overview ...........................................................................10
Mounting ...................................................................................11
Making connections ..................................................................12
Connections to computer systems .......................................12
Connections to user console peripherals .............................12
Video display (EDID) information ........................................14
Connection to power supply ................................................15
Operation
Important security features ......................................................16
Tamper-evident seals ............................................................16
The security indicators ..........................................................16
Anti-subversion monitoring (enhanced models only) ........16
Authentication checking (enhanced models only) .............17
Selecting computers ..................................................................18
Smart card reader ......................................................................18
Further information
Troubleshooting ........................................................................19
Summary of threats and solutions ............................................19
Getting assistance ......................................................................21
Warranty ....................................................................................22
Safety information ....................................................................22
Radio Frequency Energy............................................................23