Tosibox Central Lock Скачать руководство пользователя страница 2

The benefits of Tosibox

Take in use only in 5 minutes

High sophisticated information 

security

Flexible and scaling architecture

Operates trustworthy in all internet 

interfaces

1. Introduction

2. Setup

The purpose of this document is to illustrate the 

deployment of Tosibox Central Lock and its most 

important properties. The creation and administration 

of Keys for Central Lock and the user interface are also 

presented here.
Please note that this document concentrates only on the 

properties of Central Lock. The basics of Key and Lock 

products are explained in the Key and Lock user manual.

1.1 Central Lock in brief

The Central Lock operates on the same basic properties as 

the Lock, but has better throughput and encryption capacity. 

This allows the building of large-scale systems that provide 

simultaneous access to as many as 4000 Locks and Keys and 

the devices behind them.   
The Central Lock also has three additional features not found 

in the Lock, but are usually needed in more complex network 

systems. These are:

Concurrent usage of sites with overlapping IP addresses 

 

»

Collecting audit log data

 

»

Monitoring and alert services to detect and notify the user 

 

»

about connection problems

Basic requirements

The deployment of Central Lock has a few basic requirements 

to operate.  It needs:

A wired network

1. 

One non-firewalled public IP-address

2. 

An Internet connection with speed of at least 10/10 Mbit/s.

3. 

Physical installation

After the basic requirements of deployment are met, you can 

start the physical installation of the Central Lock. Please check 

that the following items are included in the sales package:

Ethernet cable – RJ45, 1 m

1. 

Power cord

2. 

Extension power cord

3. 

The steps of physical installation:

Proper mechanical mounting of device

1. 

Plugging in the power cord

2. 

Connecting the network cable to the WAN port of the 

3. 

Central Lock 

Serialization

Powering on the Central Lock starts the deployment. After 2 

minutes, the Key can be inserted to the Central Lock’s USB port. 

Once the LED light in the Key stops blinking, the serialization is 

completed and the Key can be removed from the Central Lock.

Configuration

Configuring the Central Lock is done from the Web user 

interface (see chapter Web User Interface). The Internet 

connections for the Central Lock are configured in the WAN 

settings of the Network tab. The protocol can be set to a 

fixed IP-address or a DHCP-client, in which case the address is 

fetched from a DHCP server. By assigning the protocol to the 

static address, the IP-address and subnet mask are written to 

the fields below. When a static address is used, it is important 

to set the address of the domain name server.

Deployment

After the serialization and configuration are done, the 

deployment of Central Lock is completed and Locks, Keys and 

network devices can be added to the system.

Содержание Central Lock

Страница 1: ...Tosibox Central Lock Instruction Manual EASY QUICK SECURE v1 4 English ...

Страница 2: ... One non firewalled public IP address 2 An Internet connection with speed of at least 10 10 Mbit s 3 Physical installation After the basic requirements of deployment are met you can start the physical installation of the Central Lock Please check that the following items are included in the sales package Ethernet cable RJ45 1 m 1 Power cord 2 Extension power cord 3 The steps of physical installati...

Страница 3: ... several Locks so that the Locks and their devices can be used simultaneously with the Central Lock or a Key Audit log data collection and connection monitoring The 2 Central Lock collects log data about the events of serialized Locks This feature logs the events of the Central Lock itself and also the events of any serialized Locks and sub Locks Log collection and monitoring can be enabled from t...

Страница 4: ... The network device list can be cleared by clicking Remove all devices The Edit Tosibox devices button located near the bottom opens a view where you can rename items prevents access to key connected devices that are connected to a Lock s network select an L2 or L3 connection type define a static IP address for the Key and select LAN s accessible by the Key 4 2 Settings view The Settings tab makes...

Страница 5: ...uctions 5 1 Checklist for different situations The Key s connection window does not show the connections The computer is not connected to the Internet The Key is not serialized to the Lock The Lock does not have an Internet connection or is not connected to the Tosibox AC adapter The Lock connection in the window remains yellow The Key has found a Lock but a VPN connection has not yet been establi...

Страница 6: ... Lock 2 Tosibox Lock 1 Internet Infoscreen 1 Infoscreen 2 Infoscreen 3 Tosibox Central Lock Tosibox Lock 3 Tosibox Lock 2 Tosibox Lock 1 Internet Car washing machine 1 Car washing machine 1 Car washing machine 1 Control room Production line Service people worldwide Remote users Tosibox Key Lock serializing and naming in production Tosibox Mobile Client Remote user customer ...

Страница 7: ...Lock 6 Tosibox Lock 4 Tosibox Lock 3 Tosibox Lock 2 Tosibox Lock 1 Internet Service co 2 Service co 3 Remote users worldwide Tosibox Central Lock Finland Multiple customer croups Internet Sub Key Sub Key Customer Group 2 Customer Group 1 Office HQ Sub Key Sub Key Master backup Key Sub Key Company X Layer 3 ...

Страница 8: ...ght 43 mm Environmental conditions Operational temperature 10 30 Humidity 20 80 non condensing Power consumption max 250 W Input voltage 90 264 V AC Input frequency 47 63 Hz DHCP Dynamic Host Configuration Protocol Gbit s Gigabits per second Hz Hertz IP Internet Protocol LAN Local Area Network LED Light Emitting Diode Mbit s Megabits per second mm Millimetre PKI Public Key Infrastructure TLS Trans...

Отзывы: