background image

48  INSTALLING NETWORK HASP 

HASP Keys 

 

 

Installation and Configuration Guide 

 

 

 

In the 

Days Before Compressing Log Files

 field, specify the number of days after which the 

log files will be zipped. You can use this option if you have specified the log file limit; otherwise, 
the log will not be zipped. 

 

In the 

Days Before Deleting Log Files

 field, specify the number of days after which the log 

files will be deleted. 

In both cases, the default value (0) disables the option. 

 

 

Figure 56: Log file compression and deletion options 

 

To save the changes you made, click 

Submit

Click 

Edit Log Parameters

 (Fig. 56.2) to edit log template. 

The 

Edit Log Parameters

 page will show up (Fig. 57). 

Содержание HASP HL Time

Страница 1: ...User Guide HARDWARE AND SOFTWARE HASP KEYS Installation and Configuration Guide...

Страница 2: ...Tests 25 4 INSTALLING NETWORK HASP 28 4 1 Installation Steps 28 4 2 Disabling UAC Notifications 30 4 3 Configuring Windows Firewall 31 4 3 1 Configuring Windows Firewall Settings 31 4 3 2 Turning off...

Страница 3: ...mal Guide body text Italic Used when a term appears in the text for the first time Also used to attract attention or to format notes Bold Used for marking out software component names as well as inter...

Страница 4: ...nical support Email support speechpro com Web portal http www speechpro com support_form When contacting Technical Support please provide clear issue description We also ask you to include the followi...

Страница 5: ...ted with a hardware HASP key the scope of supply includes the USB HASP In case the software is designed to be protected with software HASP the CD will house the txt exe v2c file with which you can ins...

Страница 6: ...two types HASP HL Hardware keys HASP SL Software keys Below see Table 1 for hardware key models and Table 2 for software key models Table 1 Hardware HASP Keys Title How It Looks Like Description HASP...

Страница 7: ...The users may also be provided with trial software HASP keys for getting familiar with an STC product Such keys are valid for a single PC and expire in 90 days after the software has been run for the...

Страница 8: ...Activation To learn how to install HASP SL Time or HASP SL Pro local software keys on a computer which has no internet connection see Offline Activation To modify the licensing conditions for the sof...

Страница 9: ...n folow the instructions on installing a trial key These instructions may be supplied by STC product lead or technical support As a rule a trial key is installed through one of the methods below 3 2 1...

Страница 10: ...Branding application Using the Sentinel Admin Control Center web app check whether the HASP key you have just installed is active Finally run the installed STC software by clicking on its shortcut on...

Страница 11: ...and alphabetic characters This file may be either included into the installation package or sent via email depending on the product you purchased Before online activation install the pre requisites a...

Страница 12: ...l start page Some STC products require creating a customer account before activation In case the Register page shows up during the activation process Fig 5 fill out the registration form and click Sav...

Страница 13: ...y get one or more Security Warnings from Java In each warning dialog click Run to allow Java to start the application s Figure 8 Security warning In case the browser does not display the Portal conten...

Страница 14: ...nd click Activate If the product has been activated successfully you will see the Activation Installed Successfuly message on your screen Fig 10 Figure 10 Successful activation Click Close to exit thi...

Страница 15: ...itself which can be activated only on the computer you have taken snapshot of c2v file Before offline activation install the pre requisites and the product using the installation CD Make sure the Sent...

Страница 16: ...3 2 3 2 Generating V2C File If you are unable to access the Customer Portal for any reason send the generated c2v file to STC Technical Support for contact details see Technical Support Our technical...

Страница 17: ...on speechpro com 8080 ems customerLogin html In the Product Key field Fig 13 enter the activation key you got from STC product lead and click Login Figure 13 Customer Portal start page Some STC produc...

Страница 18: ...Registration page If you already have an account click the click here link in the upper part of the page Fig 15 and specify your email address you used when signing up in the E mail field Figure 15 E...

Страница 19: ...nings from Java In each warning dialog click Run to allow Java to start the application s Figure 17 Security warning In case the browser does not display the Portal content add the Portal to the Java...

Страница 20: ...updated Fig 19 In the bottom part Activation Details area you will see the following details ID software activation key ID Key Type Activation Date Download V2C File a link to download the v2c file co...

Страница 21: ...ls area 3 2 3 3 Applying V2C File Run the RUS Branding utility on the computer you have taken snapshot of On the Apply License File tab click Fig 20 and select the v2c file Figure 20 Apply License Fil...

Страница 22: ...3 Send an email with the c2v file attached to Speech Technology Center Support for contact details see Technical Support Our technical support engineer will send you a v2c file containing the license...

Страница 23: ...ey dialog will pop up Fig 22 Select the key you want to snapshot and click OK Figure 22 Select Sentinel Protection Key dialog On the Collect Status Information tab Fig 21 click Collect Information and...

Страница 24: ...port 3 2 4 2 Applying V2C File To update a key you will need a v2c file which contains licenses to use the product in question You will be emailed this file by our technical support engineer To update...

Страница 25: ...g 25 Once you get search results click View local services Figure 25 Control Panel dialog The Services dialog will open Fig 26 Make sure the Sentinel License Manager service is in the list and is runn...

Страница 26: ...web application On the Sentinel Keys Available on computer_name page Fig 28 you will see a list of keys which are currently connected to network including local keys Make sure the HASP you have instal...

Страница 27: ...SP Keys Installation and Configuration Guide Figure 29 Features page The Product column displays the name of the purchased product while the Feature column lists the features and components of this pr...

Страница 28: ...To configure Windows Firewall you will need to open TCP UPD ports 475 and 1947 Perform the same action for any other firewalls installed on the computer if any and check any network nodes within the...

Страница 29: ...Sentinel Admin Control Center On the network key server perform the following 1 Insert the hardware HASP key into a USB port or activate the software HASP key You can activate the network software ke...

Страница 30: ...trol Panel type user account in the search box Fig 30 Once you have got the search results click the User Accounts link Figure 30 Control Panel dialog In the User Accounts dialog Fig 31 click Change U...

Страница 31: ...on this computer For the changes you made to take effect you need to reboot your computer 4 3 Configuring Windows Firewall 4 3 1 Configuring Windows Firewall Settings To prevent Windows Firewall from...

Страница 32: ...gure 33 Control Panel dialog In the Windows Firewall dialog Fig 34 click Advanced settings Figure 34 Windows Firewall dialog The Windows Firewall with Advanced Security dialog will show up Fig 35 In t...

Страница 33: ...HASP Keys Installation and Configuration Guide Figure 35 Windows Firewall with Advanced Security dialog This will open New Inbound Rule Wizard Fig 36 Select Port as the rule type and click Next Figure...

Страница 34: ...col and Ports dialog Fig 37 leave the protocol selected by default TCP in the Specific local ports box specify 475 1947 Once you are done click Next Figure 37 Protocol and Ports dialog In the Action d...

Страница 35: ...TALLING NETWORK HASP HASP Keys Installation and Configuration Guide Figure 38 Action dialog In the Profile dialog Fig 39 check the profiles which this rule applies to and click Next Figure 39 Profile...

Страница 36: ...In the Name dialog Fig 40 enter the name and the description for this rule if required After you are done click Finish Figure 40 Name dialog In the same way create another rule but now in the Protoco...

Страница 37: ...search results click the Windows Firewall link Figure 42 Control Panel dialog The Windows Firewall dialog will show up Fig 43 This dialog will display the network type your computer is connected to On...

Страница 38: ...44 Turn Windows Firewall on or off link In the Customize Settings dialog Fig 45 select Turn off Windows Firewall not recommended under the network type for which you need to disable Windows Firewall...

Страница 39: ...is on make sure this service has been automatically added to its exception list To do so first click Start Control Panel Once in the Control Panel type firewall in the search box Fig 46 Click the All...

Страница 40: ...e address is the remote computer IP address or DNS name In this case you will also need to allow remote user access to the web app installed on this computer before accessing it To enable normal prote...

Страница 41: ...ts licensed with this key Sessions shows open session details for the key in question The Blink on off button allows to enable or disable hardware key LED indicator This option may come in handy in ca...

Страница 42: ...42 INSTALLING NETWORK HASP HASP Keys Installation and Configuration Guide Figure 50 Basic Settings tab...

Страница 43: ...ccess to Remote License Managers tab Figure 51 Configuration section By default the Allow Access to Remote Licenses and Broadcast Search for Remote Licenses checkboxes must be ticked 4 5 3 2 Configuri...

Страница 44: ...the list To enable consistent aggressive search through the network create a file named hasp_71511 ini with the following content NETWORK broadcastsearch 0 serveraddr x x x x disable_IPv6 0 Where stan...

Страница 45: ...Network Service C Documents and Settings NetworkService Local Settings Application Data SafeNet Sentinel Sentinel LDK Service Local System 1 C Documents and Settings Default User Local Settings Appli...

Страница 46: ...string The rules are processed from the top to the bottom Parameter Name Allowed Values Description restriction Restriction type allow Allow access deny Deny access item Item Computer IP address DNS...

Страница 47: ...emote computers to Sentinel License Manager into the log Include Administration Requests include access sessions from Sentinel Admin Control Center to Sentinel License Manager into the log Check the n...

Страница 48: ...fied the log file limit otherwise the log will not be zipped In the Days Before Deleting Log Files field specify the number of days after which the log files will be deleted In both cases the default...

Страница 49: ...log field contains the list of all log tags available as well as their description To edit the template do the following To add a tag from Available tags for log into the template select it in the lis...

Страница 50: ...age click Back to Configuration The log files will be located in one of the following folders C Program Files x86 Common Files Aladdin Shared HASP log if you have ticked the Write Log Files Daily chec...

Страница 51: ...rt To do so on the computer hosting the HASP key open Sentinel Admin Control Center in Internet Explorer by typing http localhost 1947 into the address bar In the web app select Diagnostics Fig 59 Fig...

Страница 52: ...all open browsers 2 Go to Start Control Panel 3 Once in the Control Panel type Java in the search box Fig 60 Once you have got the search results click the Java link Figure 60 Control Panel dialog In...

Страница 53: ...the Customer Portal again 6 2 Vendor Libraries Not Found While applying a v2c file you may get the Vendor lib cannot be found error message In this case request a new up to date HASP Driver version f...

Страница 54: ...e http localhost 1947 into the address bar Once there select Sentinel Keys Fig 64 Figure 64 Sentinel Keys page In the Location column find all keys marked as Local View the code of these keys displaye...

Отзывы: