Seagate ST446452W Guía de usuario Pagina 11

  • Descarga
  • Añadir a mis manuales
  • Imprimir
  • Pagina
    / 122
  • Tabla de contenidos
  • MARCADORES
  • Valorado. / 5. Basado en revisión del cliente
Vista de pagina 10
Document number: 55-16-001-002
© Stromasys, 2015
11 / 122
Sentinel HASP Installation Output
Loaded plugins: langpacks
Examining aksusbd-2.2.1-1.x86_64.rpm: aksusbd-2.2.1-1.x86_64
Marking aksusbd-2.2.1-1.x86_64.rpm to be installed
Resolving Dependencies
--> Running transaction check
---> Package aksusbd.x86_64 0:2.2.1-1 will be installed
--> Finished Dependency Resolution
Dependencies Resolved
================================================================================
Package Arch Version Repository Size
================================================================================
Installing:
aksusbd x86_64 2.2.1-1 /aksusbd-2.2.1-1.x86_64 4.5 M
Transaction Summary
================================================================================
Install 1 Package
Total size: 4.5 M
Installed size: 4.5 M
Is this ok [y/d/N]: y
Downloading packages:
Running transaction check
Running transaction test
Transaction test succeeded
Running transaction
Installing : aksusbd-2.2.1-1.x86_64 1/1
Starting aksusbd (via systemctl): [ OK ]
Verifying : aksusbd-2.2.1-1.x86_64 1/1
Installed:
aksusbd.x86_64 0:2.2.1-1
Complete!
Now that the Sentinel HASP software has been installed and it running correctly, it is possible to continue on to Installing the CHARON-SSP
.Software
Post-Installation Tasks
The following post installations task are not required. However, for improved security they are highly recommended.
Securing the Sentinel HASP Configuration Files
The configuration file used by the Sentinel HASP software is insecure and open to malicious, unprivileged access and modification unless the
following commands are executed:
Commands to Secure Sentinel HASP Configuration File
# chmod 0700 /etc/hasplm
# chmod 0600 /etc/hasplm/*
Securing the Sentinel HASP GUI
The web-based GUI interface is also open to malicious access unless secured appropriately. Use the following steps to secure the software:
Vista de pagina 10
1 2 ... 6 7 8 9 10 11 12 13 14 15 16 ... 121 122

Comentarios a estos manuales

Sin comentarios