background image

11

Table of Contents

4.  Go to the Lock’s web user interface and click “Scan for LAN 

Devices”. The Lock will automatically locate all devices that match 

the Lock’s IP range.

C) Configuring a Lock’s static IP address to match an 

existing network

Make a note of the IP address and netmask of each controlled 

1. 

network device. 
Select an unused address that falls within the IP address range 

2. 

utilized by the network devices. Go to the Lock’s settings by clicking 

Network > LAN. Set the Lock’s IP address field to “IPv4 address” 

and the netmask field to “IPv4 netmask” and leave the gateway 

broadcast fields empty.
Go to Network > DHCP and set the “Start” value so that it’s higher 

3. 

than all used static addresses. Set the limit value to a suitable value 

so that it covers the rest of the unused address in the LAN range. 

For example, the range 192.168.5.50 – 192.168.5.254 contains 205 

addresses so the value would be 205.

ConneCTinG The LoCK To an exiSTinG neTworK 

in CLienT Mode

Client mode can be used for connecting the Lock to an 

existing network (e.g. an office network). In this mode, the 

Lock joins the network like any other device (e.g. a PC) and 

provides remote users with access to other devices in the 

same network. The Lock will obtain its address from the 

DHCP, so the local network needs to have a working DHCP 

server that allocates IP addresses.

setting the Lock to client mode:

Log into the Lock’s web user interface as admin and open the LAN 

1. 

settings by clicking Network > LAN.
Change the LAN interface protocol field to “DHCP client”. Click the 

2. 

“Switch protocol” button and click “Save”.
Connect a cable from the local network to one of the Lock’s LAN 

3. 

ports (e.g. LAN3).

notice in client mode:

Do not connect the Internet to the Lock’s WAN Port or a USB 

• 

modem to the USB port. Doing so will automatically deactivate 

the client mode and revert the Lock’s LAN settings back to factory 

defaults.
Do not connect any LAN port directly to the Internet.

• 

Do not connect the controlled devices to the Lock’s LAN ports.

• 

The Lock will scan the entire LAN network for connected devices and 

• 

will grant device access to any user with a serialized Key. Please keep 

this in mind when considering network and information security.
In cases where access rights need to be restricted, switch on MAC/

• 

IP filtering (under Advanced settings) or set up the Lock in its factory 

default configuration.
In this mode, the Lock’s inbuilt firewall does not protect the devices 

• 

in the LAN network.

Summary of Contents for Lock 200

Page 1: ...1 Table of Contents Lock 200 Key 200 User Manual v1 2 ...

Page 2: ... 7 Internet connection priorities 5 8 PoE 5 9 Mounting instructions 5 10 Input powering options 6 TOSIBOX Key 19 6 1 Taking the Master Key into use 6 2 Renaming and using devices 6 3 Adding extra Keys 6 4 Remote serialization of extra keys 6 5 PUK code for the Key 7 Mobile Client 27 7 1 Mobile Client for Android Devices 7 2 Mobile Client for iPhones and iPads 9 Troubleshooting 37 10 Maintenance in...

Page 3: ...ther will discover each other over the Internet and on separate local networks regardless of how they are connected to the Internet This allows the control of network devices in the Lock s LAN network Tosibox delivers fast and easy remote access to your machines and devices anywhere you can establish a network connection Finland http help tosibox com suomeksi 358 44 744 0065 support tosibox com Op...

Page 4: ...4 Table of Contents 1 1 Lock connections LAN3 Port LAN2 Port LAN1 Port Service port WAN Port Reset Button Not used DC Power Input USB Port for serialization and USB Modem ...

Page 5: ...connected network devices The network devices that are connected to the Lock s LAN port are automatically found The Lock automatically distributes IP addresses for the Keys Sub Keys and the network devices connected to LAN port s of the Lock The Lock can also control network devices with fixed IP addresses Sub Lock A Lock that has been converted to Sub Lock mode of operation When connecting two Lo...

Page 6: ...y is used to establish a connection with the Lock Key user interface Key user interface installed from the Key device In the image on the right you ll notice TOSIBOX Lock devices that are serialized for the TOSIBOX Key and the network devices connected to them 3 TOSIBOX Key Lock User interfaces mobile clients overview ...

Page 7: ...nections from serialized Keys and provides access to connected network devices For more information please see glossary page 5 Web user interface of the Lock The Lock settings can be changed via Service port Encrypted TOSIBOX VPN connection Local network Web user interface for the Lock ...

Page 8: ...nd Keys Green Connected Red Disconnected Remotely controlled devices Green Connected Red Disconnected Details of the remotely controlled devices Login using admin user Passwords can be found on the bottom of the Lock Status bar shows general information ...

Page 9: ...ey from the Lock You can also serialize additional Locks to the same Key After the first Key is serialized to the Lock the subsequent Keys Sub Keys are serialized with a computer See section Multiple Keys p 20 Please see the accompanying image on the next page 2 3 Connect the Lock to your network according to your use case See section Deploying the Lock p 11 Remember to make sure that the Lock has...

Page 10: ...estored by resolving any DHCP conflicts by removing improper LAN connections to the Lock 5 1 Deploying the Lock Connecting network devices to the Lock A Connecting network devices that use dynamic IP addresses DHCP Network devices with a DHCP client enabled will automatically connect to the Lock Simply plug them in and go B Connecting network devices with static IP addresses Assign static IP addre...

Page 11: ... a PC and provides remote users with access to other devices in the same network The Lock will obtain its address from the DHCP so the local network needs to have a working DHCP server that allocates IP addresses Setting the Lock to client mode Log into the Lock s web user interface as admin and open the LAN 1 settings by clicking Network LAN Change the LAN interface protocol field to DHCP client ...

Page 12: ... Insert a serialized Key to the USB port of the computer 1 Choose Devices from the Key user menu and Connect Locks 2 from the drop down menu Choose the Locks that you want to connect together and choose 3 Next Choose the Lock that you want to attach the Sub Locks The other 4 Locks will be changed to Sub Lock operating mode Confirm the selection Save serializing is ready 5 Note The connections will...

Page 13: ... process The update is complete when the software gives a notice Software updated successfully Automatic software updates are activated as a default setting You can select the time when the automatic update of the released software is allowed You can deactivate the automatic software update from the Lock user interface Choose Settings Software update uncheck the box Auto update enabled 5 4 USB Mod...

Page 14: ...ection is automatically shifted to preselected backup connections according to the priority setting eg WAN port USB Modem 5 8 PoE The PoE out port supports PoE output with auto detection feature This means you can connect laptops and other non PoE devices without damaging them The PoE on PoE out outputs approximately 2V below input voltage and supports up to 0 58A So e g 24V PSU will provide 22V 0...

Page 15: ...nting holes on three sides of the equipment For attachment on either of the narrow sides the screws with length of 10 mm shall be used For attachment on the bottom of the Lock the screws with length of 6mm shall be used The screws shall be placed through the bottom sticker which has the hole locations indicated Please see pictures 1 4 for the mounting options Picture 1 Picture 2 Picture 3 ...

Page 16: ... rubber feet Rubber feet included in the sales package can be installed in the bottom of the Lock for more convenient installation horizontally e g on a table Please see picture 5 and 6 for the mounting Picture 4 Picture 5 Picture 6 ...

Page 17: ...e used The polarity marking in the plug shall be observed and use of the cable saddle is recommended Please see picture 7 for the mounting Using the cable saddle To secure the input power cable from being accidentally pulled away from the power input jack a cable saddle is included in the sales package The cable saddle is locked in place by inserting it into the 4mm diameter hole in the front pane...

Page 18: ...18 Table of Contents Picture 7 Picture 8 ...

Page 19: ... been serialized to the Key Connect the Key with the wanted Lock by clicking the Lock s Connect icon The Key info dialogue shows the status of the connection between 4 the Key and Lock The Key is now ready to be used The Lock symbol displays a different colour according to the operating status of the Lock Red The Lock is connected to the Internet and the Key has a remote connection to the Lock Yel...

Page 20: ...20 Table of Contents 1 Deploying the Key 3 Key user interface 2 Setting the password ...

Page 21: ...21 Table of Contents Key user interface Picture 1 Picture 2 Picture 3 Double click to open Lock user interface ...

Page 22: ... reflected only with the Key that was used to change it Picture 3 You can open the browser user interface of the controlled device 1 in Open with browser http You can connect to network sharing in Open windows network 2 share You can open the remote desktop connection in Open Remote 3 Desktop Connection RDP if available You can check the functionality of the controlled device with PING 4 command i...

Page 23: ...nnect to chosen Locks but it has no rights to serialize new Keys Select the Lock s Sub 2 Lock s to which you want to serialize the extra Key and choose Next Confirm the selection 3 by pressing Save Serialization for the extra Key is now complete Serializations of additional keys can be removed 4 in the Lock user interface by clicking Edit Tosibox devices admin only ...

Page 24: ...ing 2 Save The Backup Key is now 3 created Press Close button to exit the feature The Backup Keys can be managed later in the Key user interface 4 under Manage Keys Important This feature creates a Backup Key with equal user rights Later when the new locations are deployed by the other Key the access rights are automatically copied to both Keys Adding BACKUP key ...

Page 25: ...25 Table of Contents Extra Key use case ...

Page 26: ...ess the Next button A list of targeted Locks is displayed Confirm serialization and click 5 Save Serialization of the extra Keys is now complete Press Finish 6 button to exit the wizard 6 5 PUK code for the Key In the event that a wrong Key password has been entered six 1 consecutive times the Key will be locked To unlock the Key a personal unlocking code PUK is needed The PUK code is delivered wi...

Page 27: ...OSIBOX Key software by plugging a serialized Key into the USB port of your computer 3 Go the software menu and select Devices Manage Keys 1 Download and install the TOSIBOX Mobile Client from the Google Play store 7 1 Mobile Client for Android Devices ...

Page 28: ...e of Contents 4 Select the mobile clients tab and click Add new 5 Enter the name of your mobile device and click Next 6 Select the Locks that you would like to access through your mobile device and click Next ...

Page 29: ...e of Contents 9 Scan the QR code displayed on your computer or enter the serialization code where prompted on your device 7 Open the TOSIBOX Mobile Client on your device 8 Tap the screen to start serialization ...

Page 30: ...30 Table of Contents 11 Create a password for the mobile client 10 Click Finish once the the serialization is complete 12 Connect to a Lock by selecting its on off icon ...

Page 31: ... Note If your network device does not have a web interface HTTP HTTPS you can use a third party application to make the connection You can find third party applications from the Google Play store or App Store You can copy the network device IP address to the device s clipboard by clicking the IP button Doing so will allow you to paste the IP address to a third party application Table of Contents 3...

Page 32: ...X Key software by plugging a serialized Key into the USB port of your computer 3 Go the software menu and select Devices Manage Keys 1 Download and install the TOSIBOX Mobile Client from the App Store 7 2 Mobile Client for iPhones and iPads ...

Page 33: ...e of Contents 4 Select the Mobile Clients tab and click Add new 5 Enter the name of your mobile device and click Next 6 Select the Locks that you would like to access through your mobile device and click Next ...

Page 34: ... Contents 9 Scan the QR code displayed on your computer or enter the serialization code where prompted on your device 7 Open the TOSIBOX Mobile Client on your device 8 Tap the screen to start serialization iOS iOS ...

Page 35: ...35 Table of Contents 11 Create a password for the mobile client 10 Click Finish once the the serialization is complete 12 Connect to a Lock by selecting its on off icon ...

Page 36: ...ve a web interface HTTP HTTPS you can use a third party application to make the connection You can find third party applications from the Google Play store or App Store You can copy the network device IP address to the device s clipboard by clicking the IP button Doing so will allow you to paste the IP address to a third party application Table of Contents 36 13 On the first time when connecting t...

Page 37: ...s inside the devices If the devices malfunction or need servicing contact an authorized service facility After the service life of the devices is over do not throw them into domestic waste Instead take them to an authorized waste electronics collection facility 9 Troubleshooting The Key software cannot be installed Check whether your computer has an operating system supported by TOSIBOX Windows XP...

Page 38: ...nternet connections operator independent Firewall friendly Works with dynamic static and private IP addresses Built in firewall NAT Up to 50 concurrent VPN connections VPN throughput up to 15 Mb s Mobile connection features Supported 3G 4G USB modems Huawei E3372 E3276 E392 E372 E3531 E3131 E353 E367 E160 E169 E173 E176 E180 E1552 Tosibox 3G modem Automatic network recovery that recovers from most...

Page 39: ... interface type A Standard CSP PKCS 11 Supported operating systems Windows 10 Windows 8 8 1 32 64 bit Windows 7 32 64 bit Windows Vista 32 64 bit Windows XP SP3 Windows Server 2003 Mac OS X Leopard 10 5 or more recent Intel Physical properties 83 mm L x 22 mm W x 10 mm H Weight 29 g Casing aluminium plastic Operating temperature 0 C 70 C Storage temperature 20 C 85 C ...

Page 40: ... PARTICULAR PURPOSE SHALL BE LIMITED AS SET FORTH HEREIN AND TO THE DURATION OF THE LIMITED WARRANTY OTHERWISE THE REPAIR OR REPLACEMENT AS PROVIDED UNDER THIS EXPRESS LIMITED WARRANTY IS THE EXCLUSIVE REMEDY OF THE CONSUMER AND IS PROVIDED IN LIEU OF ALL OTHER WARRANTIES EXPRESS OR IMPLIED IN NO EVENT SHALL TOSIBOX OY BE LIABLE WHETHER IN CONTRACT OR TORT INCLUDING BUT NOT LIMITED TO NEGLIGENCE G...

Page 41: ...may also have other rights which vary from state to state Note The above warranty applies only to merchandise purchased in the United States of America or any of the territories or possessions thereof or from a U S Military exchange For Product Purchased in Canada Performance of any obligation under this warranty may be obtained by returning the warranted product along with proof of purchase to yo...

Page 42: ...x products contain technology that is based on open source software When requested by the customer Tosibox will deliver more detailed information from the parts that the licenses require Source code requests can be submitted to sourcecode request tosibox com or by mail Tosibox Oy Elektroniikkatie 10 90590 OULU FINLAND 13 PATENTS TOSIBOX technology is internationally patented Patents AU2012260775 A...

Page 43: ...x Oy Tero Lepistö CEO 15 Declarations 15 2 Federal Communication Commission Interference Statement This device complies with FCC part 15 of the FCC rules Operation is subject to the following two conditions 1 This device may not cause harmful interference and 2 this device must accept any interference received including interference that may cause undesired operation FCC Caution Any changes or mod...

Page 44: ...44 Table of Contents Elektroniikkatie 10 FIN 90590 Oulu www tosibox com Copyright Tosibox Oy 2015 ...

Reviews: