Adder View Secure Käyttöohje
Lue alta 📖 käyttöohje suomeksi merkille Adder View Secure (25 sivua) kategoriassa Kytkin. Tämä opas oli hyödyllinen 18 henkilölle ja sai 4.7 tähden keskimäärin 9.5 käyttäjältä
Sivu 1/25

1
SECT 1
Contents
IMPORTANT: Before using this product .....................................2
Welcome
Introduction .................................................................................3
Model features ............................................................................4
AdderView Secure - front and rear layout .................................5
Devices used with the AdderView Secure .................................. 6
Keyboard devices ....................................................................6
Mouse devices .........................................................................6
Smartcard devices (supported only on enhanced models) ...7
Keyboards with integrated smartcard readers
(supported only on enhanced models) .................................8
Standard items .............................................................................9
Additional items ..........................................................................9
Installation
Locations ....................................................................................10
Cabling recommendations ........................................................10
Tamper-evident seals.................................................................10
Links overview ...........................................................................10
Mounting ...................................................................................11
Making connections ..................................................................12
Connections to computer systems .......................................12
Connections to user console peripherals .............................12
Video display (EDID) information ........................................14
Connection to power supply ................................................ 15
Operation
Important security features ......................................................16
Tamper-evident seals ............................................................ 16
The security indicators .......................................................... 16
Anti-subversion monitoring (enhanced models only) ........16
Authentication checking (enhanced models only) .............17
Selecting computers ..................................................................18
Smart card reader ......................................................................18
Further information
Troubleshooting ........................................................................19
Summary of threats and solutions ............................................19
Getting assistance ......................................................................21
Warranty ....................................................................................22
Safety information ....................................................................22
Lithium battery ..........................................................................22
Radio Frequency Energy............................................................23

2
IMPORTANT: Before using this product
Prior to use, a prospective user of the product should ensure that individuals
with the appropriate authority implement the following objectives in the
environment where the product is to be used:
• Theoperationalenvironmentproceduresmustensurethatallusersareduly
authorized and possess the necessary privileges to access the information
transferred via the product. This should be implemented physically and in
terms of supporting IT infrastructure.
• Operationalproceduresmust(e.g.restaffvettingandtraining)ensure
that, as far as is reasonably possible, the product is received, installed and
managed in accordance with the manufacturer’s directions. This should also
ensure that users are not malicious or hostile.
• Theproductshouldbeinstalledinanenvironmentthatisphysicallysecure.
Additionally, the security office in the organisation purchasing the product
should be aware the product is not responsible for security vulnerabilities in
computers, IT components or peripherals outside its physical boundary. The
security of other system components connected to the product will require
separate management to ensure IT security best practice.
Tuotetiedot
Merkki: | Adder |
Kategoria: | Kytkin |
Malli: | View Secure |
Tarvitsetko apua?
Jos tarvitset apua merkille Adder View Secure esitä kysymys alla ja muut käyttäjät vastaavat sinulle
Kytkin Adder Käyttöohjeet
1 Helmikuuta 2025
14 Tammikuuta 2025
14 Tammikuuta 2025
26 Joulukuuta 2024
26 Joulukuuta 2024
24 Joulukuuta 2024
24 Joulukuuta 2024
24 Joulukuuta 2024
24 Joulukuuta 2024
24 Joulukuuta 2024
Kytkin Käyttöohjeet
- Kytkin Hamlet
- Kytkin ZyXEL
- Kytkin Digitus
- Kytkin Schneider
- Kytkin Hager
- Kytkin Vimar
- Kytkin Sonance
- Kytkin Theben
- Kytkin Elektrobock
- Kytkin Suevia
- Kytkin Cudy
- Kytkin IOGEAR
- Kytkin Mikrotik
- Kytkin Nedis
- Kytkin Intermatic
Viimeisimmät Kytkin Käyttöohjeet
9 Huhtikuuta 2025
5 Huhtikuuta 2025
4 Huhtikuuta 2025
4 Huhtikuuta 2025
4 Huhtikuuta 2025
3 Huhtikuuta 2025
3 Huhtikuuta 2025
2 Huhtikuuta 2025
1 Huhtikuuta 2025
1 Huhtikuuta 2025