Chapter 1: Product Overview
Item
Name
Description
f
Second removable power supply
The other of two redundant power supplies.
g
Start/stop switch
Use to stop the system if the command-line shutdown is not
available; use to restart the system if it has been switched off.
h
USB ports
Unconfigured USB ports. These ports are not necessary for any
ProtectServer operations and are left unconfigured for security
purposes.
i
HSM USB port
Connects USB devices such as the USB smart card reader and
the legacy card reader to the HSM.
j
Unused port
This port is not used for the SafeNet ProtectServer Network
HSM Plus; we recommend that you do not remove the covers
that are installed at the factory.
Cryptographic architecture
A hardware-based cryptographic system consists of three general components:
>
One or more hardware security modules (HSMs) for key processing and storage.
>
High-level cryptographic API software. This software uses the HSM's cryptographic capabilities to provide
security services to applications.
>
Access provider software to allow communication between the API software and the HSMs.
Operating in network mode, a standalone SafeNet ProtectServer Network HSM Plus can provide key
processing and storage.
In network mode, access provider software is installed on the machine hosting the cryptographic API software.
The access provider allows communication between the API and the SafeNet ProtectServer Network HSM Plus
over a TCP/IP connection. The HSM can therefore be located remotely, improving the security of cryptographic
key data
The figure below depicts a cryptographic service provider using the SafeNet ProtectServer Network HSM Plus
in network mode.
Figure 4: SafeNet ProtectServer Network HSM Plus implementation
SafeNet ProtectToolkit 5.8 Installation and Configuration Guide
007-013682-006 Rev. A 08 January 2020 Copyright 2009-2020 Gemalto
13