background image

 

Implementation steps 

The installation and configuration of the PSE2 is part of the setup of the overall 
network operating mode. 

The following is a summary (with references to the location of detail) of the steps to 
setup a cryptographic service provider, using the network operating mode and a PSE2: 

1.  Install the PSE2 

See "Installation" on page 7

.

 

2.  Test the PSE2 

To confirm the correct operation of the unit, test the PSe. See "Testing and 
configuration" on page 9 for details. 

3.  Configure the PSE2 network settings 

See "Testing and configuration" on page 9 for details. 

4.  Install and configure the Network HSM Access Provider software 

Network HSM Access Provider software must be installed on the network client 
and configured to support operation in network mode. Full details are in the 

Hardware Security Module Access Provider Install & Configuration Guide 

supplied with the software. 

5.  Install the high level cryptographic API 

Install the high level cryptographic API to be used on the network client. Please 
refer to the relevant installation guide supplied with the product for further 
details. 

6.  Configure the high-level cryptographic API 

Generally, further operating mode related configuration of the cryptographic API 
might be needed to finalize installation. Tasks might include: 

 

 establishing a trusted channel (secure messaging system (SMS)) between the 
API and the Protect Server External 2. 

 

establishing network communication between the network client and the 
Protect Server External 2. 

For further information refer to the high-level cryptographic API documentation, such 
as the 

ProtectToolkit C Administration Guide. 

 

Summary of Contents for ProtectServer External 2

Page 1: ...i ProtectServer External 2 PSE2 Installation Guide...

Page 2: ...FCC compliance only devices also known to comply should be connected to the adapter s serial ports If such devices do not feature their own cables shielded cables must be used Disclaimer SafeNet make...

Page 3: ...United States 800 545 6608 Web www safenet inc com Support and Down loads www safenet inc com support Provides access to the SafeNet Knowledge Base and quick downloads for various products Technical...

Page 4: ...allation procedure 7 To install the hardware 7 Smart Card Reader Installation 7 Chapter 5 Testing and configuration 9 Equipment requirements 9 Procedure overview 9 System testing 11 The PSE_status com...

Page 5: ......

Page 6: ......

Page 7: ...ps are given References to further documentation are cited where needed Chapter 4 describes the installation procedure Chapter 5 deals with testing and network setting configuration A troubleshooting...

Page 8: ...services include encryption decryption signature generation and verification and key management with a tamper resistant and battery backed key storage To implement a cryptographic service provider use...

Page 9: ...liance using the included USB to serial cable HSM serial port pin configuration The serial port on the USB to serial cable uses a standard RS232 male DB9 pinout as illustrated in Figure 2 Figure 2 HSM...

Page 10: ...o destroy any keys currently stored on the HSM When the key is in the horizontal Active position the HSM is in normal operating mode When the key is in the vertical Tamper position the HSM is in the t...

Page 11: ...ted using a standalone SafeNet Protect Server External 2 PSE2 HSM the cryptographic service provider will operate in network mode In network mode Network HSM Access Provider software is installed on t...

Page 12: ...nd configured to support operation in network mode Full details are in the Hardware Security Module Access Provider Install Configuration Guide supplied with the software 5 Install the high level cryp...

Page 13: ...ic API software is installed Connect the PSE2 to the network by inserting standard Ethernet cables into the LAN connectors located on the front of the PSE2 The LAN connectors are autosensing 10 100 10...

Page 14: ...r crypto server for security reasons then connect a PS 2 to USB adapter cable between the card reader and a standalone powered USB hub Again the USB connection is for power only No data transfer occur...

Page 15: ...he RJ45 console port to a terminal emulation device such as a laptop or terminal server Note If you want to access the PSE2 console remotely using the console port you will need a cable If your termin...

Page 16: ...as admin only The default passwords for the root and admin users are as follows User name Default password root password admin password At this time we strongly recommend that you use the passwd comm...

Page 17: ...y displays the current status of the Protect Server External 2 PSE2 It provides the following information the status of the HSM installed in the PSE2 If the unit is functioning correctly a message tha...

Page 18: ...ces to operate as their own name servers If name resolution is required it needs to be provided by a DNS server on the network In order for the PSE2 to use the DNS server you must add an entry for the...

Page 19: ...bles stop etc init d iptables start SSH network access After you have completed the network configuration you can access the PSE2 over the network using the SSH protocol To access the PSE2 using SSH y...

Page 20: ...tories listed above usbflash cdrecorder are just examples The name can vary depending on the device capability and how it is detected Troubleshooting Each Protect Server External 2 is tested during ma...

Page 21: ...isk DOM 10 100 1000 Mbps autosensing Network Interface with RJ45 LAN connector Pre installed Software Linux operating system SafeNet PCI HSM Access Provider software SafeNet HSM Net Server software Po...

Page 22: ...END OF DOCUMENT...

Reviews: