02.01.2015 Views

Installation & Setup User Guide - Best Access Systems

Installation & Setup User Guide - Best Access Systems

Installation & Setup User Guide - Best Access Systems

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Installation</strong> & <strong>Setup</strong> <strong>User</strong> <strong>Guide</strong><br />

The following diagram illustrates how ID information is sent from the panel to<br />

the server when encryption is being used with B.A.S.I.S.:<br />

The numbers below correlate to the numbers in the diagram above, which<br />

describes the path taken when a card is swiped.<br />

1. ID information from the card swiped at the panel goes to the LANtronix<br />

box, where it is encrypted using key A.<br />

2. Encrypted ID information is sent from the LANtronix box to the Secure<br />

Port on the IRE SafeNet/Speed box.<br />

3. Encrypted ID information is sent from the Unsecure port on the IRE<br />

SafeNet/Speed box to the network, without communicating to an enddecryption<br />

device.<br />

4. Encrypted ID information is sent from the network to the workstation that<br />

is in the secured area.<br />

5. At the workstation, the ID information that was encrypted using key A is<br />

decrypted, then encrypted using key B and sent to the network.<br />

6. Encrypted ID information is sent from the network to the server, where it is<br />

decrypted using key B and stored in the database.<br />

revision 143 — 301

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!