Deployment Manual
49
5 Applying for Encryption
Background Information
TB8000 supports two encryption methods: hardware-based encryption and software-based
encryption.
5.1 Checking Dongle
Background Information
Use Xshell to remotely log in to the server, and then you can check whether a dongle is installed. The
tool recognizes the dongle information first by default. If no dongle is recognized, then it tries to
recognize software-based encryption.
Procedure
Step 1
Log in to the server remotely through Xshell.
Step 2
Execute the
lsusb
command to check whether dongle is installed on the server.
[root@rabbitmq1 ~]#
lsusb
Bus 002 Device 002: ID 8087:8000 Intel Corp.
Bus 002 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 006 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 005 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 001 Device 002: ID 8087:8008 Intel Corp.
Bus 001 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
Bus 004 Device 001: ID 1d6b:0003 Linux Foundation 3.0 root hub
Bus 003 Device 002: ID 096e:0202
Feitian Technologies, Inc.
Bus 003 Device 001: ID 1d6b:0002 Linux Foundation 2.0 root hub
If
Feitian Technologies, Inc.
information appears, it means that the dongle was
recognized; otherwise, there is no dongle, and you need to apply for the software-based
encryption.
5.2 Software-based Encryption
Procedure
Step 1
Log in to the server remotely through Xshell.
Step 2
Execute the
cd /Tools
command to go to the Tools directory.
Step 3
Execute the
./LicenseUpdateTool.exe -server export
command to get the
connection_server.dat file.
[root@rabbitmq1 Tools]#
./LicenseUpdateTool.exe -server export
===========================
SUCCESS:
Summary of Contents for DH-IVS-IP8000-E-GU1
Page 65: ...Deployment Manual...