background image

 

 

User Guide 

 

HARDWARE AND SOFTWARE 

HASP KEYS 

 
 
 
 
 
 

 

 
 
 
 
 
 
 
 
 
 
 

Installation and Configuration Guide

 

 

 
 
 
 
 
 
 
 
 
 
 

Summary of Contents for HASP HL Time

Page 1: ...User Guide HARDWARE AND SOFTWARE HASP KEYS Installation and Configuration Guide...

Page 2: ...Tests 25 4 INSTALLING NETWORK HASP 28 4 1 Installation Steps 28 4 2 Disabling UAC Notifications 30 4 3 Configuring Windows Firewall 31 4 3 1 Configuring Windows Firewall Settings 31 4 3 2 Turning off...

Page 3: ...mal Guide body text Italic Used when a term appears in the text for the first time Also used to attract attention or to format notes Bold Used for marking out software component names as well as inter...

Page 4: ...nical support Email support speechpro com Web portal http www speechpro com support_form When contacting Technical Support please provide clear issue description We also ask you to include the followi...

Page 5: ...ted with a hardware HASP key the scope of supply includes the USB HASP In case the software is designed to be protected with software HASP the CD will house the txt exe v2c file with which you can ins...

Page 6: ...two types HASP HL Hardware keys HASP SL Software keys Below see Table 1 for hardware key models and Table 2 for software key models Table 1 Hardware HASP Keys Title How It Looks Like Description HASP...

Page 7: ...The users may also be provided with trial software HASP keys for getting familiar with an STC product Such keys are valid for a single PC and expire in 90 days after the software has been run for the...

Page 8: ...Activation To learn how to install HASP SL Time or HASP SL Pro local software keys on a computer which has no internet connection see Offline Activation To modify the licensing conditions for the sof...

Page 9: ...n folow the instructions on installing a trial key These instructions may be supplied by STC product lead or technical support As a rule a trial key is installed through one of the methods below 3 2 1...

Page 10: ...Branding application Using the Sentinel Admin Control Center web app check whether the HASP key you have just installed is active Finally run the installed STC software by clicking on its shortcut on...

Page 11: ...and alphabetic characters This file may be either included into the installation package or sent via email depending on the product you purchased Before online activation install the pre requisites a...

Page 12: ...l start page Some STC products require creating a customer account before activation In case the Register page shows up during the activation process Fig 5 fill out the registration form and click Sav...

Page 13: ...y get one or more Security Warnings from Java In each warning dialog click Run to allow Java to start the application s Figure 8 Security warning In case the browser does not display the Portal conten...

Page 14: ...nd click Activate If the product has been activated successfully you will see the Activation Installed Successfuly message on your screen Fig 10 Figure 10 Successful activation Click Close to exit thi...

Page 15: ...itself which can be activated only on the computer you have taken snapshot of c2v file Before offline activation install the pre requisites and the product using the installation CD Make sure the Sent...

Page 16: ...3 2 3 2 Generating V2C File If you are unable to access the Customer Portal for any reason send the generated c2v file to STC Technical Support for contact details see Technical Support Our technical...

Page 17: ...on speechpro com 8080 ems customerLogin html In the Product Key field Fig 13 enter the activation key you got from STC product lead and click Login Figure 13 Customer Portal start page Some STC produc...

Page 18: ...Registration page If you already have an account click the click here link in the upper part of the page Fig 15 and specify your email address you used when signing up in the E mail field Figure 15 E...

Page 19: ...nings from Java In each warning dialog click Run to allow Java to start the application s Figure 17 Security warning In case the browser does not display the Portal content add the Portal to the Java...

Page 20: ...updated Fig 19 In the bottom part Activation Details area you will see the following details ID software activation key ID Key Type Activation Date Download V2C File a link to download the v2c file co...

Page 21: ...ls area 3 2 3 3 Applying V2C File Run the RUS Branding utility on the computer you have taken snapshot of On the Apply License File tab click Fig 20 and select the v2c file Figure 20 Apply License Fil...

Page 22: ...3 Send an email with the c2v file attached to Speech Technology Center Support for contact details see Technical Support Our technical support engineer will send you a v2c file containing the license...

Page 23: ...ey dialog will pop up Fig 22 Select the key you want to snapshot and click OK Figure 22 Select Sentinel Protection Key dialog On the Collect Status Information tab Fig 21 click Collect Information and...

Page 24: ...port 3 2 4 2 Applying V2C File To update a key you will need a v2c file which contains licenses to use the product in question You will be emailed this file by our technical support engineer To update...

Page 25: ...g 25 Once you get search results click View local services Figure 25 Control Panel dialog The Services dialog will open Fig 26 Make sure the Sentinel License Manager service is in the list and is runn...

Page 26: ...web application On the Sentinel Keys Available on computer_name page Fig 28 you will see a list of keys which are currently connected to network including local keys Make sure the HASP you have instal...

Page 27: ...SP Keys Installation and Configuration Guide Figure 29 Features page The Product column displays the name of the purchased product while the Feature column lists the features and components of this pr...

Page 28: ...To configure Windows Firewall you will need to open TCP UPD ports 475 and 1947 Perform the same action for any other firewalls installed on the computer if any and check any network nodes within the...

Page 29: ...Sentinel Admin Control Center On the network key server perform the following 1 Insert the hardware HASP key into a USB port or activate the software HASP key You can activate the network software ke...

Page 30: ...trol Panel type user account in the search box Fig 30 Once you have got the search results click the User Accounts link Figure 30 Control Panel dialog In the User Accounts dialog Fig 31 click Change U...

Page 31: ...on this computer For the changes you made to take effect you need to reboot your computer 4 3 Configuring Windows Firewall 4 3 1 Configuring Windows Firewall Settings To prevent Windows Firewall from...

Page 32: ...gure 33 Control Panel dialog In the Windows Firewall dialog Fig 34 click Advanced settings Figure 34 Windows Firewall dialog The Windows Firewall with Advanced Security dialog will show up Fig 35 In t...

Page 33: ...HASP Keys Installation and Configuration Guide Figure 35 Windows Firewall with Advanced Security dialog This will open New Inbound Rule Wizard Fig 36 Select Port as the rule type and click Next Figure...

Page 34: ...col and Ports dialog Fig 37 leave the protocol selected by default TCP in the Specific local ports box specify 475 1947 Once you are done click Next Figure 37 Protocol and Ports dialog In the Action d...

Page 35: ...TALLING NETWORK HASP HASP Keys Installation and Configuration Guide Figure 38 Action dialog In the Profile dialog Fig 39 check the profiles which this rule applies to and click Next Figure 39 Profile...

Page 36: ...In the Name dialog Fig 40 enter the name and the description for this rule if required After you are done click Finish Figure 40 Name dialog In the same way create another rule but now in the Protoco...

Page 37: ...search results click the Windows Firewall link Figure 42 Control Panel dialog The Windows Firewall dialog will show up Fig 43 This dialog will display the network type your computer is connected to On...

Page 38: ...44 Turn Windows Firewall on or off link In the Customize Settings dialog Fig 45 select Turn off Windows Firewall not recommended under the network type for which you need to disable Windows Firewall...

Page 39: ...is on make sure this service has been automatically added to its exception list To do so first click Start Control Panel Once in the Control Panel type firewall in the search box Fig 46 Click the All...

Page 40: ...e address is the remote computer IP address or DNS name In this case you will also need to allow remote user access to the web app installed on this computer before accessing it To enable normal prote...

Page 41: ...ts licensed with this key Sessions shows open session details for the key in question The Blink on off button allows to enable or disable hardware key LED indicator This option may come in handy in ca...

Page 42: ...42 INSTALLING NETWORK HASP HASP Keys Installation and Configuration Guide Figure 50 Basic Settings tab...

Page 43: ...ccess to Remote License Managers tab Figure 51 Configuration section By default the Allow Access to Remote Licenses and Broadcast Search for Remote Licenses checkboxes must be ticked 4 5 3 2 Configuri...

Page 44: ...the list To enable consistent aggressive search through the network create a file named hasp_71511 ini with the following content NETWORK broadcastsearch 0 serveraddr x x x x disable_IPv6 0 Where stan...

Page 45: ...Network Service C Documents and Settings NetworkService Local Settings Application Data SafeNet Sentinel Sentinel LDK Service Local System 1 C Documents and Settings Default User Local Settings Appli...

Page 46: ...string The rules are processed from the top to the bottom Parameter Name Allowed Values Description restriction Restriction type allow Allow access deny Deny access item Item Computer IP address DNS...

Page 47: ...emote computers to Sentinel License Manager into the log Include Administration Requests include access sessions from Sentinel Admin Control Center to Sentinel License Manager into the log Check the n...

Page 48: ...fied the log file limit otherwise the log will not be zipped In the Days Before Deleting Log Files field specify the number of days after which the log files will be deleted In both cases the default...

Page 49: ...log field contains the list of all log tags available as well as their description To edit the template do the following To add a tag from Available tags for log into the template select it in the lis...

Page 50: ...age click Back to Configuration The log files will be located in one of the following folders C Program Files x86 Common Files Aladdin Shared HASP log if you have ticked the Write Log Files Daily chec...

Page 51: ...rt To do so on the computer hosting the HASP key open Sentinel Admin Control Center in Internet Explorer by typing http localhost 1947 into the address bar In the web app select Diagnostics Fig 59 Fig...

Page 52: ...all open browsers 2 Go to Start Control Panel 3 Once in the Control Panel type Java in the search box Fig 60 Once you have got the search results click the Java link Figure 60 Control Panel dialog In...

Page 53: ...the Customer Portal again 6 2 Vendor Libraries Not Found While applying a v2c file you may get the Vendor lib cannot be found error message In this case request a new up to date HASP Driver version f...

Page 54: ...e http localhost 1947 into the address bar Once there select Sentinel Keys Fig 64 Figure 64 Sentinel Keys page In the Location column find all keys marked as Local View the code of these keys displaye...

Reviews: