Adder View Secure Handleiding
Adder
Schakelaar
View Secure
Bekijk gratis de handleiding van Adder View Secure (25 pagina’s), behorend tot de categorie Schakelaar. Deze gids werd als nuttig beoordeeld door 37 mensen en kreeg gemiddeld 4.9 sterren uit 19 reviews. Heb je een vraag over Adder View Secure of wil je andere gebruikers van dit product iets vragen? Stel een vraag
Pagina 1/25

AVSV1002(2port)
AVSV1004(4port)
AVSC1102(2port)
AVSC1104(4port)
AdderView Secure
User Guide
www.adder.com
SECURE
ADDERVIEW
}

1
Contents
IMPORTANT: Before using this product 2 .....................................
Welcome
Introduction 3 .................................................................................
Model features 4 ............................................................................
AdderView Secure - front and rear layout 5 .................................
Devices used with the AdderView Secure 6 ..................................
Keyboard devices 6 ....................................................................
Mouse devices 6 .........................................................................
Smartcard devices (supported only on enhanced models) 7 ...
Keyboards with integrated smartcard readers
(supported only on enhanced models) 8 .................................
Standard items 9 .............................................................................
Additional items 9 ..........................................................................
Installation
Locations 10 ....................................................................................
Cabling recommendations 10 ........................................................
Tamper-evident seals.................................................................10
Links overview 10 ...........................................................................
Mounting 11 ...................................................................................
Making connections 12 ..................................................................
Connections to computer systems 12 .......................................
Connections to user console peripherals 12 .............................
Video display (EDID) information 14 ........................................
Connection to power supply 15 ................................................
Operation
Important security features 16 ......................................................
Tamper-evident seals 16 ............................................................
The security indicators 16 ..........................................................
Anti-subversion monitoring (enhanced models only) 16 ........
Authentication checking (enhanced models only) 17 .............
Selecting computers 18 ..................................................................
Smart card reader 18 ......................................................................
Further information
Troubleshooting 19 ........................................................................
Summary of threats and solutions 19 ............................................
Getting assistance 21 ......................................................................
Warranty 22 ....................................................................................
Safety information 22 ....................................................................
Lithium battery 22 ..........................................................................
Radio Frequency Energy............................................................23

2
IMPORTANT: Before using this product
Prior to use, a prospective user of the product should ensure that individuals
with the appropriate authority implement the following objectives in the
environment where the product is to be used:
• Theoperationalenvironmentproceduresmustensurethatallusersareduly
authorized and possess the necessary privileges to access the information
transferred via the product. This should be implemented physically and in
terms of supporting IT infrastructure.
• Operationalproceduresmust(e.g.restaffvettingandtraining)ensure
that, as far as is reasonably possible, the product is received, installed and
managed in accordance with the manufacturer’s directions. This should also
ensure that users are not malicious or hostile.
• Theproductshouldbeinstalledinanenvironmentthatisphysicallysecure.
Additionally, the security office in the organisation purchasing the product
should be aware the product is not responsible for security vulnerabilities in
computers, IT components or peripherals outside its physical boundary. The
security of other system components connected to the product will require
separate management to ensure IT security best practice.
Product specificaties
Merk: | Adder |
Categorie: | Schakelaar |
Model: | View Secure |
Heb je hulp nodig?
Als je hulp nodig hebt met Adder View Secure stel dan hieronder een vraag en andere gebruikers zullen je antwoorden
Handleiding Schakelaar Adder
13 Januari 2025
13 Januari 2025
26 December 2024
26 December 2024
23 December 2024
23 December 2024
23 December 2024
23 December 2024
23 December 2024
23 December 2024
Handleiding Schakelaar
- Lindy
- Renkforce
- Mercusys
- Cudy
- Cooking Performance Group
- Legrand
- Sonance
- Raritan
- Juniper
- ConnectPro
- Sygonix
- Edimax
- Swisson
- Pizzato Elettrica
- KVM-TEC
Nieuwste handleidingen voor Schakelaar
15 Juni 2025
15 Juni 2025
10 Juni 2025
9 Juni 2025
8 Juni 2025
8 Juni 2025
8 Juni 2025
8 Juni 2025
8 Juni 2025
8 Juni 2025