Future Systems FCX200B Secuway Card 2000 User Manual users manual

Future Systems, Inc. Secuway Card 2000 users manual

users manual

DASTEK EMC Lab,DASTEK EMC Lab,DASTEK EMC Lab,DASTEK EMC Lab, 204 Chuge-Ri Yangji-Myeon Yongin-Shi Kyunggi-Do,Korea                 Tel:82-31-335-9341 Fax: 82-31-335-9343
   !"#$%!&'#() *"+##()#")#,*(,-.%(,)./.'&012!) ) #0!'!)"-.3*0*"",!4!)*0,#5!/#&%3"%*()).&*3).-) #%0#" #"#0!'!)"*3#,#"!4(#,).&3.5!,#3#*".(*+0#&3.)#/)!.(*4*!(") *3'-%0!()#3-#3#(/#!(*3#"!,#()!*0!(")*00*)!.( !"#$%!&'#()4#(#3*)#"%"#"*(,/*(3*,!*)#3*,!.-3#$%#(/1#(#341*(,!-(.)!(")*00#,*(,%"#,!(*//.3,*(/#2!) ) #!(")3%/)!.("'*1/*%"# *3'-%0!()#3-#3#(/#).3*,!./.''%(!/*)!.(.2#5#3) #3#!"(.4%*3*()##) *)!()#3-#3#(/#2!00(.).//%3!(*&*3)!/%0*3!(")*00*)!.(-) !"#$%!&'#(),.#"/*%"# *3'-%0!()#3-#3#(/#).3*,!..3)#0#5!"!.(3#/#&)!.(2 !/ /*(+#,#)#3'!(#,+1)%3(!(4) ##$%!&'#().--*(,.() #%"#3!"#(/.%3*4#,).)31)./.33#/)) #!()#3-#3#(/#+1.(#.3'.3#.-) #-.00.2!(4'#*"%3#"6#.3!#().33#0./*)#) #3#/#!5!(4*()#((*6(/3#*"#) #"#&*3*)!.(+#)2##() ##$%!&'#()*(,3#/#!5#36.((#/)) ##$%!&'#()!().*(.%)0#).(*.!3/%!),!--#3#(/#-3.'   ) *)).2 !/ ) #3#/#!5#3!"/.((#/)#,6.("%0)) #,#*0#3.-*(#7&#3!#(/#,3*,!.8)#/ (!/!*(-.3 #0& !"%(!)2*")#")#,2!) " !#0,#,/*+0#".() #&#3!& #3*0,#5!/#" !#0,#,/*+0#"'%")+#%"#,2!) ) #%(!)).!("%3#/.'&0!*(/# #'*(%-*/)%3#3!"(.)3#"&.("!+0#-.3*(13*,!..3!()#3-#3#(/#/*%"#,+1%(*%) .3!9#,'.,!-!/*)!.(").) !"#$%!&'#()%/ '.,!-!/*)!.("/.%0,5.!,) #%"#3:"*%) .3!)1)..&#3*)#) ##$%!&'#()
   Part 1 SecuwayCard 2000 Installation
1-1 Chapter 1  SecuwayCard 2000? The SecuwayCard 2000 is a part of the SecuwaySuite 2000 package as mentioned previously on this manual. Cooperating with the SecuwayCenter 2000, SecuwayGate 2000, SecuwayClient 2000 and SecuwayCard 2000 provides the End-to-End total security solution from sender to receiver.  SecuwayCard 2000 provides Network communication security service that encrypts/decrypts the network packet using key management method based on IPSEC. SecuwayCard 2000 also gives you the hardware security token function that encrypts/decrypts the hard disk, floppy disk and booting restriction program which allows only authorized user to use the system from booting. The booting restriction program is optional part and you can install it regardless of SecuwayCard 2000.  SecuwayCard 2000 have the security policy and the key received from SecuwayCenter 2000 administrator. SecuwayCard 2000 uses the key and security policy for network communication. You can use the security function easily without any other operation because it is provided automatically only by installing the PCMCIA card on the computer with which you use the SecuwayCard 2000. SecuwayCard 2000 can be easily installed and used transparently not only on the Desktop PC but also Note PC because its hardware is provided with the type of PCMCIA card.
1-2 Chapter 1 SecuwayCard 2000? SecuwayCard 2000 Features SecuwayCard 2000 has the following features.  Obey the IPSEC SecuwayCard 2000 obeys the IPSEC(Internet Protocol Security) while doing the TCP/IP communication. And so, the user can send the encrypted data safely to the destination when using the application.  Communication data encryption SecuwayCard 2000 consists of AH(Authentication Header) and ESP (Encapsulated Security Payload). AH authenticates the sending place of IP packet and check if the packet is transformed illegally or not. ESP provides the security service by encrypting the packet data.  PCMCIA type of security token SecuwayCard 2000 provides with the transparency on the user security circumstances and is easily installed and used on the Desktop PC or Note PC that has PCMCIA card reader because its hardware is provided as PCMCIA type of security token.  File/Folder Encryption/Decryption If you log on the SecuwayCard 2000 Manager program, you can encrypt or decrypt the file or folder on the Windows Explorer without running any other program. You can select the way to encrypt or decrypt the file or folder between the “Password Method Encryption” and “Auto Encryption”. “Auto Encryption” is the way to use the key received from SecuwayCenter 2000 for encrypting or decrypting the file or folder.
1-3 Various password algorithm/authentication algorithm SecuwayCard 2000 adopts various password algorithm and authentication algorithm while doing the network communication.  System locking function using screen saver SecuwayCard 2000 provides the system locking function as running the screen saver if you leave the computer or do not input any other keys in restricted time. If the screen saver is running, you can use the system only after successful authentication using the permitted password.  Various interfaces You can set the SecuwayCard 2000 user interface in 3 ways by cooperating with the SecuwayCenter 2000. If you want to hide the setting status of the SecuwayCard 2000 from the user, you can select the item that has no user interface on the SecuwayCenter 2000 and send it online.  TamperProof hardware security If unauthorized user takes apart the SecuwayCard 2000 hardware or tries to access to the memory, the password algorithm, key for encryption/decryption and other security information saved in SecuwayCard 2000 is deleted automatically to protect from leaking information.  Log saving function The user executing circumstances of the SecuwayCard 2000 Manager program is saved on the log and so the manager can easily monitor or track the system.
2-1 Chapter 2  Before Setting Up the SecuwayCard 2000 This chapter tells you the system requirements to set up the SecuwayCard 2000 and some notices you should know before setting up the SecuwayCard 2000.  System Requirements The system requirement to setup the SecuwayCard 2000 is like the following.   !" 486 Mhz CPU or higher PC !" Windows 95, Windows 98, Windows Me (Installed in PC) !" Networking environment using Microsoft TCP/IP protocol stack !" Desktop PC or Note PC installed with PCMCIA card reader  If you use Note PC, you can install the SecuwayCard 2000 in your Note PC without installing any other application program because PCMCIA card reader is already installed in Note PC basically. If you use Desktop PC, you should install the PCMCIA card reader program before installing the SecuwayCard 2000 because PCMCIA card reader is not installed in Note PC basically.
2-2 Chapter 2 Before Setting Up the SecuwayCard 2000 Checking the contents of the package When you unpack the SecuwayCard 2000 package box, you can find out the following things in the box. If any of them is not in the box or there is anything to be changed because it is damaged, contact to the dealer.  !" SecuwayCard 2000 card (PCMCIA type) !" SecuwayCard 2000 program CD that contains the SecuwayCard 2000 manager program. !" This guide
3-1 Chapter 3  Setting Up the SecuwayCard 2000 This chapter shows you the way to install the hardware and software of the SecuwayCard 2000.  Installing the SecuwayCard 2000 in the computer Let’s see the way to install the SecuwayCard 2000 in the Note PC or Desktop PC.    Installing the SecuwayCard 2000 in the Note PC If you are to install the SecuwayCard 2000 in the Note PC, follow the steps below  This guide describes the way to install the SecuwayCard 2000 in the Note PC in which Windows Me operating system is installed as an example.  # Insert the SecuwayCard 2000 in the PCMCIA card slot of Note PC while the power of Note PC is off.    $  Turn on the power of Note PC and then the Windows Me operating system shows you the following message after finding out the SecuwayCard 2000 as the new hardware.
3-2 Chapter 3 Setting Up the SecuwayCard 2000 %  In a few seconds, the installation process for the SecuwayCard 2000 driver is started.     Select the “Automatic search for a better driver(Recommended)” and click [Next>] button.    &  After the operating system find out the driver for SecuwayCard 2000 on the CD-ROM and then the following message is displayed.     If you click [Next>] button, then the installation process of the SecuwayCard 2000 driver is started.
3-3 '  After the copying process of the SecuwayCard 2000 driver installation program is completed, the following message is displayed.       Click the [Finish] button.    (  The final step of driver installation process is started with the following message.     To click [Yes] and reboot the computer is recommended at this time. After rebooting the computer, the installation process of the SecuwayCard 2000 driver program is finished.
3-4 Chapter 3 Setting Up the SecuwayCard 2000 )  After finishing the installation process of the SecuwayCard 2000 driver program, select the menu <Start> * <Settings> * <Control Panel>.   +  Then click the icon <System> on the Control Panel. On the <System Properties> screen, select <Device Manager> tab. Then you can find out the SecuwayCard 2000 installation status under the “PCMCIA socket” item like the following.      Now the SecuwayCard 2000 hardware installation process on the Note PC is completed.
3-5 Installing the SecuwayCard 2000 in the Desk top PC Generally, most of the Desktop PC has no built in PCMCIA card reader. And so, you must install the PCMCIA card reader on the Desktop PC before installing the SecuwayCard 2000.  PCMCIA card reader is provided with ISA type, PCI type and so on. The PCMCIA card installation program is provided by the vender or operating system. If the installation program is provided by the operating system, the way to install it is very simple. If the operating system provides the PnP(Plug & Play) function, you can install it just by insert the card in the slot.  After installing the PCMCIA card reader, follow the steps of the installation process of the SecuwayCard 2000 hardware on the Note PC.
3-6 Chapter 3 Setting Up the SecuwayCard 2000 Installing the SecuwayCard 2000 software driver If you have finally installed the SecuwayCard 2000 hardware in your Note PC or Desktop PC, then you should install the software driver like the following.  This guide shows you the case of using the operating system Windwos ME as an example. If you use the Windows 95 or Windows 98, the screen displays of the SecuwayCard 2000 installation process may be slightly different from those of this guide.  #  Turn on the Note PC in which you are to install the SecuwayCard 2000 program and run the Windows Me.    When you complete the installation of the SecuwayCard 2000 program, you should reboot the computer. So, if you’re running the other programs, you’d better save and exit them safely before installing the SecuwayCard 2000 program.
3-7 $ SecuwayCard 2000 program is provided with CD. Insert the SecuwayCard 2000 driver CD in the CD-ROM drive of PC. And click “setup.exe” among the files on the CD. Then the following screen is displayed.   %  Click [Next] button and then the <Software License Agreement> is displayed. Read the text very carefully and you agree to the contents, click [Yes] button.    &  <Choose Destination Location> screen which is to select the destination folder is displayed.       Basically the folder “C:\…\Program Files\FUTURE\SecuwayCard 2000” is selected but you can change the folder as you want. If you want to select other folder, click [Browse…] button and select the folder you want. After selecting the folder, click [Next>] button.
3-8 Chapter 3 Setting Up the SecuwayCard 2000 '  “Select Program Folder” screen is displayed. The screen is to add the program folder for the SecuwayCard 2000 program. Basically, “SecuwayCard 2000” is selected but you can select one of existing folders or set the new one.     After setting the folder, click [Next>] button.    (  Then the program copying is started. While copying the program, the copying ratio screen is displayed.    After copying the files, the steps for installing the L2TP(Layer2 Tunneling Protocol) driver may be displayed. In this case, do not stop it and just wait. In the case that the steps for installing the L2TP driver is not disaplayed, you should also stop it and just wait because the driver is not necessary on your circumstances.
3-9 )  After completing the copy process, <Setup Complete> screen is displayed.      To use the SecuwayCard 2000 normally, you should reboot the computer at this time. Select <Yes, I want to restart my computer now> and then click [Finish] button. Then the computer is rebooted.      After the rebooting, <Security Register Wizard> screen is displayed.       You can log on the SecuwayCard 2000 Manager program and set the administration process only after you registering the security through the <Security Register Wizard> The way to register the security through the <Security Register Wizard> is introduced on the Chapter 4 of this guide.
4-1 Chapter 4  Online Security Registration This chapter guides you to precede the Online Security Registration after installing the SecuwayCard 2000.  Online Security Registration? You should do the Online Security Registration process in order to use the user authentication and data encryption function provided by the SecuwayCard 2000.   When you complete the online registration, you can receive the security key from the SecuwayCenter 2000 that is necessary for the user authentication and data encryption. You can communicate with other hosts using this security key after online security registration    ! The <Security Register Wizard> program which is used for online security registration is executed automatically once only after installing the SecuwayCard 2000 program and rebooting the computer. If you do not online registeration at this time, you can execute the <Security Register Wizard> program manually like this. Execute <Start>  * <Program> * <SecuwayCard 2000>  * <SecuwayCard 2000 Manager program> and then the <Security Register Wizard> program is displayed. ! If you are using the SecuwayCard 2000 Manager program want to remove and reinstall the program, you should do the online security registration again.
4-2 Chapter 4 Online Security Registration Now let’s see the steps for online security registration using the <Security Register Wizard> program.    #  After copying the installation program and rebooting the system, the SecuwayCard 2000 displays the <Security Register Wizard> screen.    Click [Next>] button after reading the “Security Token Initialize” information on the screen.    $  Then the following screen to select the Security Register Method is displayed. You should move the mouse while the following screen is displayed.      There are two kinds of ways for security registration.  !"Offline Regist (Using file for security token setup) : It is the way to regist security using the diskette received from the SecuwayCenter 2000.  !"Online Regist : It is the way to send and receive the key via network that is necessary for security communication.    Select <Online Regist> on the <Security Register Method> and click the [Next>] button.
4-3  If the SecuwayCard 2000 is not installed in your computer when you register the security or the computer can not perceive the  SecuwayCard 2000 which is installed, the following screen is displayed.           After check and reinstall the SecuwayCard 2000 normally and click [Token Query], then you can do the following steps    %  The following step is to input properties for Online Security Registration.      The meaning and available input values of each item are like the following.
4-4 Chapter 4 Online Security Registration  You should receive and input the available values of each items from the administrator of the SecuwayCenter.  Using L2TP Tunneling L2TP (Layer 2 Tunneling Protocol) allows the remote users to communicate safely with the internal network through tunneling protocol.    !" L2TP IP : If you are to use L2TP function, you should input the SecuwayGate 2000 IP address that can assign the new IP address for tunneling on the <L2TP IP> item    SecuwayCenter This is the information of the SecuwayCenter 2000 connected with the SecuwayGate 2000.   !" IP Addr: Input the IP address of SecuwayCenter 2000 from which you can receive the security key and policy via Online Security Registration of the SecuwayCard 2000. !" Reg Port: Means the UDP port that can set, cancel, or exchange the information with the SecuwayCenter 2000 for online security registration. UDP 501 is set as the authentication port on the SecuwayCard 2000.  Only the IP address of SecuwayCenter 2000 that can respond to your request of Online Security Registration should be input on the “IP Addr” item.  Online Register Profile Info This item is for input the Profile ID, Profile Index, and Profile Password that are used by the SecuwayCard 2000 while Online Security Registration.
4-5 You should receive each value of these items from the SecuwayCenter 2000 administrator. If you input uncorrected values on these items, the Online Security Registration process is not executed.   After input the Online Security Registration information, click the [Next>] button.   &  Then the Online Security Registration information you set is displayed like the following.       After reading it carefully and click [Register Done] button if there are no uncorrected values.    '  Then the Online Security Registration is started with the following screen.
4-6 Chapter 4 Online Security Registration If the Online Security Registration is completed, [Register Done] button is changed to be selectable.   When you click [Register Done] button, the Online Security Registration process is finished. If the Online Security Registration is completed normally, the <SecuwayCard 2000 Manager> log on screen is displayed like the following.     For the detailed information of logging on and operating the <SecuwayCard 2000 Manager> program, see the Part 2 of this manual.   Do not remove the SecuwayCard 2000 hardware from the PCMCIA card reader while doing the Online Security Registration.   If you enter the uncorrect values for the Online Security Registration, an error message is displayed. At this time, click [Back] button to go back to the previous screen and change the values to the correct one and go on.
5-1 Chapter 5  Uninstalling the SecuwayCard 2000 This chapter describes the way to uninstall the SecuwayCard 2000 program because there are any problems on the program after installing it.  You may not be able to uninstall the SecuwayCard 2000 manager program completely while running it. Close the program before uninstalling it.  #  Select the <Start> * <Program> * <SecuwayCard 2000> * <Remove SecuwayCard 2000>.   $  The <Confirm File Deletion> message is displayed.       If you click [Yes], the SecuwayCard 2000 program is removed.
6-1 Chapter 6  Installing the Booting Restriction Program This chapter tells you the way to install the more powerful security restriction program from the booting procedure which allows only authorized user to use the system.  Using this program, only the user who encrypts using the MBR (Master Boot Record) and then log on the SecuwayCard 2000 can boot the system after decrypt the MBR information.    The Booting Restriction Program is optional product and you can select if installing it or not.  The Booting Restriction Program should be installed only after installing the SecuwayCard 2000. Only the system security manager should do Installing and Removing the Booting Restriction Program.
6-2 Chapter 6 Installing the Booting Restriction Program Contents of the Booting Restriction Program The Booting Restriction Program is provided with the diskette and consists of the following files.  !" install.exe : is used for installing the Booting Restriction Program. !" uninstall.exe : is used for removing the Booting Restriction Program. !" loader.img : is the Booting Restriction Program which allows to boot cooperating with the SecuwayCard 2000.  !" win.com : is provided by the Booting Restriction Program and different from the one provided by the Windows program.   !" chgwin.bat : is created when the Booting Restriction Program is removed. This batch program changes the win.com provided by the Booting Restriction Program to the one provided by the Windows program.
6-3 The Steps for installing the Booting Restriction Program  The Steps for installing the Booting Restriction Program is like the following.  #  At first, boot the system with the safe mode. For booting with the safe mode, press F8 while the system is booting the Windows operating system after power on.    $ Insert the SecuwayCard 2000 hardware in the PCMCIA slot of your computer and the Booting Restriction Program diskette in the diskette drive.  Depending on your Note PC model, you should probably set the “Plug&Play” item as “No” on the BIOS setup to allow the computer perceive the SecuwayCard. The name “Plug&Play” can be different depending on your Note PC model. For more detailed information about it, see the user guide provided with your Note PC.  %  Execute the “install loader.img” command in the diskette like the following.  Syntax  A:> install loader.img [retrialCount] [y|n] [master boot image name to be saved]    Option [retrial Count] : If you input the incorrect password repeatedly up to the times you set this option, the data on the harddisk drive is removed.
6-4 Chapter 6 Installing the Booting Restriction Program [y|n] : If you set this option as “y” and input the incorrect password repeatedly up to the times you set this option, the data on the harddisk drive is removed. If you set this option as “n” and input the incorrect password repeatedly over the times you set this option, the system is stopped running without removing the data on the harddisk drive.  Example A:> install loader.img 10 y img_0267.dat [ENTER]   The previous example shows the case that you set the option [retrialCount] as “10” and “y”. In this case, if you input the incorrect password over 10 times while booting the system, the data on the harddisk drive is removed. If you set “n” instead of “y” at this option and input the incorrect password repeatedly over 10 times, the system is stopped running without removing the data on the harddisk drive. In this case, the SecuwayCard 2000 is initialized at this time and so you should receive the SecuwayCard 2000 security key from the SecuwayCenter 2000 manager again to use it.  img_0267.dat is the name of the master boot image file. If you do not set it especially, the name is created automatically as the one related with the serial number of the SecuwayCard 2000.  After executing “install loader.img”, the MBR (Master Boot Record) is created on the floppy disk. This file should be saved safely because it is used when you execute “uninstall.exe” to remove the Boot Restriction Program.
6-5 &  If you complete to install the Boot Restriction Program, reboot the system. At this time it is recommended to reboot the system using the power button.   If the Boot Restriction Program is installed normally, the message that requests you to input the log on name and password is displayed before booting. If you input the log on name and password correctly, the system will boot like the general system. If you don’t input the log on name and password as you received from the SecuwayCenter 2000, the system will not boot.  If you install the Boot Restriction Program on your computer, the system can’t boot without the SecuwayCard 2000 hardware.
6-6 Chapter 6 Installing the Booting Restriction Program The Steps for removing the Booting Restriction Program The manager can remove the Booting Restriction Program anytime. To remove the Booting Restriction Program, you should do the process using the Master boot image file which is created when you install the program.  #  Insert the bootable disk in the diskette drive of your computer and boot the computer.    You must boot the system using the bootable diskette because the Partition table cannot be restored if you boot the system on the harddisk drive.  $  Execute the “uninstall” program like the following steps.  Syntax A:> uninstall [Master boot image file name] [ENTER]  Example A:> uninstall img_0267.dat [ENTER] Restoring Original MBR is finished.   For complete uninstall, Please reboot by this floppy diskette and run a:\chgwin.bat!  %  Boot the system using the bootable diskette. After booting the system, execute “chgwin.bat” on the diskette. This batch file is created automatically when you execute the “uninstall” command. Then the “win.com” file provided by the Booting Restriction Program is replaced with the one provided by the Windows program.
6-7   To execute the “chgwin.bat” is like the following  A:> chgwin.bat [ENTER]   Then you can confirm the restoration process like the following.  Del C :\WIN98\WIN.COM   Copy C :\WIN98\WINA.COM C:\WIN98\WIN.COM   Del C :\WIN98\WINA.COM    You should follow the notices below when using the Booting Restriction Program. ! To use the program that modifies the partition program like fdisk, you should remove the Booting Restriction Program in advance.  ! You should install the ZIP driver before installing the Booting Restriction Program because it is impossible to install the ZIP driver after installing the Booting Restriction Program.   ! You must boot the system using the bootable diskette and execute the uninstall program of the Booting Restriction Program because the Partition table can not be restored if you boot the system on the harddisk drive. ! If the Booting Restriction Program is removed, only the name of the “win.com” is changed to “wina.com”. You should execute the “chgwin.bat” after uninstalling the Booting Restriction Program and booting with the bootable diskette. Or you should replace the name “wina.com” on the Windows directory with “win.com” after booting on “safe mode only”. You should delete “win.com” (the size is about 9KB) which is installed by the Booting Restriction Program.
   Part 2 SecuwayCard 2000 Administration
1-1 Chapter 1  Logging On and Off the SecuwayCard 2000 Manager Program This chapter tells you the way to log on and off the SecuwayCard 2000 Manager program.  Logging on the SecuwayCard 2000 Manager Program To log on the SecuwayCard 2000 Manager Program, follow the instructions below.  Check if the SecuwayCard 2000 Manager Program is installed normally before login on the program. See the Part 1 for the description of the way to install the program.  # Select <Start> * <Program> * <SecuwayCard 2000> * <SecuwayCard Manager>. Then the following message requests you to input the user ID and password.     Input the available ID and password received from the SecuwayCenter 2000 manager. When you click [OK] after input ID and password, you can log on the SecuwayCard 2000 program.
1-2 Chapter 1 Logging On and Off the SecuwayCard 2000 Manager Program  If you have input the incorrect password over 10 times, you can’t log on the SecuwayCard 2000 although you input correct password finally because of the locking function. In this case, you should request to the manager to log on.  $  While you’re logging on the SecuwayCard 2000 program, the following icon is placed on the bottom of the Windows.     Click the icon then the main window of the SecuwayCard 2000 manager program is displayed.
1-3 If you logging on the SecuwayCard 2000 Manager program for the first time after installing it If you logging on the SecuwayCard 2000 Manager program for the first time after installing it, the following confirm message is displayed.   Click [OK] then the <Setting System Security Default Value> screen is displayed.  See the “Chapter 2 : Setting the Security functions” for the detailed information of the features and the available options on the screen.
1-4 Chapter 1 Logging On and Off the SecuwayCard 2000 Manager Program Logging off the SecuwayCard 2000 Manager Program To log off the SecuwayCard 2000 Manager Program, follow the instructions below.  If you log off the SecuwayCard 2000 Manager Program, click the right button of the mouse while selecting the icon          . Then the following menu is displayed.      Select <Exit(X)> from the menu. Then the following message is displayed.    Click [Yes] and then the SecuwayCard 2000 manager program is closed. If the SecuwayCard 2000 is closed, the icon     on the bottom of the Windows is disappeared.
2-1 Chapter 2  Setting the Security Functions This Chapter describes how to set and use the security functions provided by SecuwayCard 2000 Manager program.    Using the security functions of SecuwayCard 2000, you can encrypt or decrypt the folder or file. Under the case that the multi users are registered on the SecuwayCard 2000 program, you can set if any users can access the file or folder and make the accessible user lists.    Execute the System Security function To set the system security functions, select the 6th command <Setting System Security Default Value> on the <System(S)> menu of SecuwayCard 2000 Manager program.   When you log on SecuwayCard 2000 Manager program for the first time after install it, the<Setting System Security Default Value> screen is displayed.  If you select <Setting System Security Default Value>, the following screen to input password is displayed again although you have already input password when log in SecuwayCard 2000 Manager program.
2-2 Chapter 2 Setting the Security Functions If you enter the password correctly, <Setting System Security Default Value> screen is displayed.  When you log on SecuwayCard 2000 Manager program for the first time after install it, the<Setting System Security Default Value> screen is displayed.  The detailed information of each items are like the following.    <Default Setting Up> tab On the <Default Setting Up> tab, you can set the basic functions of the system security. The parameters you set on these items will be the default value of file or folder encryption or decryption.   The meanings and functions of each item are described below:
2-3 <Security File and Folder Property when closing Manager> This item is to set the file and folder property when closing SecuwayCard 2000 Manager program. The features of each option are like the following.    Hide Security File and Folder If you select this option, encrypted file or folder are not displayed on the Windows Explorer after closing SecuwayCard 2000 Manager program.  This is to protect from the access of unauthorized users (who do not log on with permitted password) to the encrypted file or folder as hiding the encrypted file or folder on the Windows Explorer.    Show Security File and Folder If you select this option, encrypted file or folder are displayed on the Windows Explorer after closing SecuwayCard 2000 Manager program. But unauthorized user cannot open the encrypted file or folder because they should input the password when they open the file or folder.    Show Security File only If you select this option, encrypted files are displayed (but encrypted folders are not displayed) on the Windows Explorer after closing SecuwayCard 2000 Manager program. But unauthorized user cannot open the encrypted file because they should input the password when they open the file.
2-4 Chapter 2 Setting the Security Functions <Apply Property at System Security> This item is to select if set Security property differently each time when encrypt file or folder, or set the same Security property after setting it once.   Always Apply System Security by Next Property If you select this option, the same Security property is adopt to file or folder when encrypt file or folder after setting it once.  Each Time, Activate Property Window If you select this option, the same Security property is adopt to file or folder when encrypt file or folder after setting it once.  <Folder Encryption>/<File Encryption> There are two ways to encrypt folder or file like the following.  AutoEncryption If you select this option, you need not set the password differently each time when encrypt or decrypt file or folder. The security key allotted by SecuwayCenter 2000 when you register online security is used when encrypt or decrypt file or folder as a default.  Password Method Encryption If you select this option, you can set the password differently each time when encrypt or decrypt file or folder.    If you select “Password Method Encryption” on the <Type> of <Folder Encryption> or <File Encryption> item, <Password> changes to blank space where you can input any password.   Input any password on the <Password> you want.
2-5  If you select “Password Method Encryption”, you should remember the password. If you forget the password, you can’t open the encrypted file or folder.  About the way to encrypt or decrypt the file or folder, see the “ To encrypt or decrypt the folder” or “ To encrypt or decrypt the file” on this chapter.  <User Authority Setting Up> tab You can set the items on this tab to protect from the access of unauthorized user to the encrypted file or folder.
2-6 Chapter 2 Setting the Security Functions <Default Authority> This option is to set the access authority which is allotted to all the users commonly. For example, if you select “List Authority”, List Authority is allotted to all the users who are listed on the “Users”.   <Individual Authority> This option is to set the access authority which is allotted to the registered users individually. Select the user you want to allot the authority and then select the appropriate authority to him.    To copy the file or folder For example, if you want to copy the encrypted file/folder A to the file/folder B, allot the List and Access authority to the user who use the file/folder A and allot the List and Write authority to the user who use the file/folder B.
2-7 To encrypt or decrypt the folder This section describes the way to encrypt or decrypt the folder.  ! Encryption? : The transformation of data into a form unreadable by anyone without a secret decryption key. Its purpose is to ensure privacy by keeping the informationn hidden from anyone for whom it is not intended.   ! Decryption? : The transformation of data that is encrypted once into a form readerble one again.    To encrypt the folder The way to encrypt the folder is like the following.  #  To encrypt the folder, you should install the SecuwayCard 2000 hardware and software in advance. Please read the Part 1 of this manual about the way to install SecuwayCard 2000 and check it is normally operated on your computer.  $  Log on the SecuwayCard 2000 Manager program.
2-8 Chapter 2 Setting the Security Functions %  Run the Windows Explorer. Select the folder you want to encrypt on the Windows Explorer and then click the right button of the mouse. The submenu is displayed like the following.   &  Select <Folder Encryption>. The following message is displayed.      Click [Yes].
2-9 '  Then the following screen to set the folder encryption is displayed.      If you click [Encrypt] button after setting each items, the folder is encrypted. The feature and meaning of each item is like the following.  <Folder Encryption> There are two ways to encrypt folder like the following.  AutoEncryption If you select this option, you need not set the password differently each time when encrypt or decrypt the folder. The security key allotted by SecuwayCenter 2000 when you register online security is used when encrypt or decrypt the folder as a default. Select the encryption type.  This option is to set the access authority which is allotted to all the users commonly. This option is to set the access authority which is allotted to the registered users individually
2-10 Chapter 2 Setting the Security Functions Password Method Encryption If you select this option, you can set the password differently each time when encrypt or decrypt the folder. If you select “Password Method Encryption” on the <Type> of <Folder Encryption> item, <Password> changes to blank space where you can input any password.   If you select “Password Method Encryption”, you should remember the password. If you forget the password, you can’t open the encrypted folder.  <Default Authority> This option is to set the access authority which is allotted to all the users commonly. For example, if you select “List Authority”, List Authority is allotted to all the users who are listed on the “Users”.  <Individual Authority> This option is to set the access authority which is allotted to the registered users individually. Select the user you want to allot the authority and then select the appropriate authority to him.  To copy the folder For example, if you want to copy the encrypted folder A to the folder B, allot the List and Access authority to the user who use the folder A and allot the List and Write authority to the user who use the folder B.
2-11  ! If you encrypt the folder, the folder icon is changed to        . ! If you encrypt the folder, the files in the encrypted folder are encrypted automatically. Unauthorized user who does not log on the SecuwayCard 2000 Manager program with permitted password can’t read the files on the encrypted folder. But the extension of the file name and its icon is not changed. ! If there is any encrypted files on the folder, you can’t encrypt the folder.
2-12 Chapter 2 Setting the Security Functions To decrypt the folder Folder decryption is to return the encrypted folder to the original one. The way to decrypt the folder is like the following.  To decrypt the folder is nearly the same with the way to encrypt the folder.    #  Run the Windows Explorer while you are login on the SecuwayCard 2000 Manager program.  $  Select the folder you want to decrypt on the Windows Explorer and then click the right button of the mouse. The submenu is displayed like the following.
2-13 %  Select <Folder Decryption>. Then the following message is displayed.    Click [Yes].  &  Then the folder is decrypted and the folder icon is changed to        .  If you select “Auto Encryption” on the <Folder Encryption> item of the <Setting of Folder Encryption> screen, you need not enter any password to decrypt the folder.   But you select “Password Method Encryption”, you should enter the password correctly on the following message to decrypt the folder.       If you decrypt the folder, the files in the folder are decrypted automatically.
2-14 Chapter 2 Setting the Security Functions To encrypt or decrypt the file This section describes the way to encrypt or decrypt the file.    ! Encryption? : The transformation of data into a form unreadable by anyone without a secret decryption key. Its purpose is to ensure privacy by keeping the informationn hidden from anyone for whom it is not intended.   ! Decryption? : The transformation of data that is encrypted once into a form readerble one again.    To encrypt the file The way to encrypt the file is like the following.  #  To encrypt the file, you should install the SecuwayCard 2000 hardware and software in advance. Please read the Part 1 of this manual about the way to install SecuwayCard 2000 and check it is normally operated on your computer.  $  Log on the SecuwayCard 2000 Manager program.
2-15 %  Run the Windows Explorer. Select the file you want to encrypt on the Windows Explorer and then click the right button of the mouse. The submenu is displayed like the following.   &  Select <File Encryption>. Then the following message is displayed.    Click [Yes].
2-16 Chapter 2 Setting the Security Functions '  Then the following message to encrypt the file is displayed.    If you click [Encrypt] button after setting each items, the file is encrypted. The feature and meaning of each item is like the following.  <File Encryption> There are two ways to encrypt file like the following.  AutoEncryption If you select this option, you need not set the password differently each time when encrypt or decrypt the file. The security key allotted by SecuwayCenter 2000 when you register online security is used when encrypt or decrypt file as a default.  Select the encryption type. This option is to set the access authority which is allotted to all the users commonly. This option is to set the access authority which is allotted to the registered users individually.
2-17 Password Method Encryption If you select this option, you can set the password differently each time when encrypt or decrypt the file. If you select “Password Method Encryption” on the <Type> of <File Encryption> item, <Password> changes to blank space where you can input any password.   If you select “Password Method Encryption”, you should remember the password. If you forget the password, you can’t open the encrypted file.  <Default Authority> This option is to set the access authority which is allotted to all the users commonly. For example, if you select “List Authority”, List Authority is allotted to all the users who are listed on the “Users”.  <Individual Authority> This option is to set the access authority which is allotted to the registered users individually. Select the user you want to allot the authority and then select the appropriate authority to him.
2-18 Chapter 2 Setting the Security Functions  ! If you encrypt the file, the file icon is changed to    and the extension “.fes” is attached to the file name. For example, if the original file name is “BECK.ASF”, the encrypted file name is “BECK.ASF.fes”. ! If the file is encrypted, only the authorized user who log on the SecuwayCard 2000 Manager program with the permitted password can read the file. ! If the folder in which you want to encrypt the file is already encrypted, re-encryption process for the file can not be executed.
2-19 To decrypt the file File decryption is to return the encrypted file to the original one. The way to decrypt the file is like the following.  To decrypt the file is nearly the same with the way to encrypt the file.  #  Run the Windows Explorer while you are login on the SecuwayCard 2000 Manager program.  $  Select the file you want to decrypt on the Windows Explorer and then click the right button of the mouse. The submenu is displayed like the following.
2-20 Chapter 2 Setting the Security Functions %  Select <File Decryption>. Then the following message is displayed.    Click [Yes].  &  Then the file is decrypted and the file icon is return to the original one.  If you select “Auto Encryption” on the <File Encryption> item of the <Setting of File Encryption> screen, you need not enter any password to decrypt the file.   But you select “Password Method Encryption”, you should enter the password correctly on the following message to decrypt the file.       If you decrypt the folder, the files in the folder are decrypted automatically.
2-21 Confirm the access control of the unauthorized users.   If the unauthorized users who do not log on with permitted password try to decrypt the file, the following error message is displayed and protect from decrypting it.     If the unauthorized users, who do not log on with permitted password try to copy, move and delete the encrypted file or folder, the error message is displayed and protect from doing the process.
2-22 Chapter 2 Setting the Security Functions To copy or delete the encrypted file or folder This section describes the way to copy or delete the encrypted file or folder.  To copy the encrypted file or folder You cannot copy the encrypted file or folder with the same way of general file or folder. The way to copy the encrypted file is the same with that of encrypted folder. So, this section shows you the way to copy the encrypted file as an example,  #  Select the encrypted file you want to copy and click the right button of the mouse. Then the following submenu is displayed.
2-23 $  Select <Encrypted File Copy> Then the screen to select the folder to be copied is displayed.  %  Select the folder to be copied and click [OK] button.       &  Then the encrypted file is copying and the following message is displayed after copying is completed.      If unauthorized user who do not log on the SecuwayCard 2000 Manager program with permitted password try to copy the encrypted file, the following error message is displayed and protect from copying.
2-24 Chapter 2 Setting the Security Functions To delete the encrypted file or the file in the encrypted folder This section tells you the way to delete the encrypted file or the file in the encrypted folder.  To delete the encrypted file There are 3 kinds of ways to delete the encrypted files.  ! Using the [Delete] key Press the [Delete] key on the keyboard after selecting the encrypted file you want to delete. Then the <Confirm File Delete> window is displayed with the message “Are you sure you want to send … to the Recycle Bin?” If you click [Yes], the selected file is sent to the Recycle Bin. In this case, you should run “Delete” command again after selecting the file on the Recycle Bin to delete the file completely.    ! Pressing the [Delete] key while pressing [Shift] key   Press the [Delete] key while pressing [Shift] key on the keyboard after selecting the encrypted file you want to delete. Then <Confirm File Delete> window is displayed with the message “Are you sure you want to delete…?” If you click [Yes], the selected file is deleted completely.   ! Using the <Delete> command of the <File> menu on the Windows Explorer   Select <Delete> command of the <File> menu on the Windows Explorer after selecting the encrypted file you want to delete. Then the <Confirm File Delete> window is displayed with the message “Are you sure you want to send … to the Recycle Bin?” If you click [Yes], the selected file is sent to the Recycle Bin. In this case, you should run “Delete” command again after selecting the file on the Recycle Bin to delete the file completely.
2-25 To delete the encrypted folder or file in the encrypted folder To delete the encrypted folder or file in the encrypted folder, press [Delete] key while pressing [Shift] key on the keyboard after selecting the file or folder you want to delete. The encrypted folder or file in the encrypted folder cannot be deleted by [Delete] key only. The following table shows you the way to delete the encrypted file, encrypted folder, and the file in the encrypted folder.   Send to the Recycle Bin (Using the [Delete] key) Delete directly without sending it to the Recycle Bin (Using the[Shift]+ [Delete] key) Encrypted file  O  O File in the Encrypted folder  X O Encrypted folder  X  O
2-26 Chapter 2 Setting the Security Functions Attachment File Creation Attachment File Creation? <Attachment File Creation> means the transformation process from encrypted file to the one that can be sent via Email or other application program. To run the Attachment File Creation, do the following steps.    #  Select the encrypted file you want to send via Email or other Application program and click the right button of the mouse.   If you run <Attachment File Creation> while selecting “Auto Encryption” on the <File Encryption> item of the <Setting of File Encryption> screen, the following error message is displayed and you can not produce the attachment file.
2-27 $  If you select “Password Method Encryption” on the <File Encryption> item of the <Setting of File Encryption> screen, you can run the <Attachment File Creation> command. In this case the following message is displayed if you run the <Attachment File Creation>.   %  If you enter the correct password you set on the <Setting of File Encryption> screen and [OK], the attachment file is created with the following message.   If you run the “Attachment file creation “, the extension of the encrypted file name is changed from “.fes” to “.fts”   Eg.>   *
2-28 Chapter 2 Setting the Security Functions &  The user who receive the file created using “Attachment file creation” command select the file received and click the right button of the mouse and then select the “File restoration for Attachment” command.   '  If the following message is displayed, the restoration of the encrypted file for attachment is completed.
2-29 (  Click [OK] and if click the restored file to open it, the following message to enter the password is displayed.     At this time, you should enter the password you set when encrypt the file for the first time. So, the user who sends the encrypted file should give the password to the user who receives the file.
3-1 Chapter 3  SecuwayCard 2000 Manager Program Menu This chapter shows you the way to use the several menus of the SecuwayCard 2000 Manager program Menu.  Click the icon          on the bottom of the Windows after logging on the SecuwayCard 2000 Manager program and then the following message is displayed                 The functions available on the SecuwayCard 2000 Manager program are like the following.
3-2 Chapter 3 SecuwayCard 2000 Manager Program Menu Configurations You can configure the necessary circumstances while using the SecuwayCard 2000 Manager program like screen saver setting and etc using the <Configurations> command of the <System> menu.  If you want to use the <Screen Saver> command of the <System> menu, you should set to use the screen saver function on the <Configurations> menu in advance. If you do not set to use the screen saver function on the <Configurations> menu, the <Screen Saver> command of the <System> menu cannot be displayed selectable.  #  Select the <System> menu and click <Configurations> command on the SecuwayCard 2000 Manager program.  $  Then the <Configurations> screen is displayed.
3-3 <Screen Saver Setup> tab There are 3 kinds of tabs on the <Configurations>. The features and options of the first tab <Screen Saver Setup> are like the following.  <Screen Saver(S)> The screen saver provides the locking function that prevent unauthorized user from using the computer while the authorized user is leaving the computer. If the authorized user does not operations (key input or mouse action) for a limited time, the screen saver perceives that the user has left the computer and executes the locking function.  - If you select “Screen Saver not used”   If you select “Screen Saver not used” among the options of the <Screen Saver(S)> command, the Screen Saver function cannot be executed and is displayed unavailable on the <System> menu.    - If you select the other options except “Screen Saver not used” If you select the other options except “Screen Saver not used”, the Screen Saver function can be executed and is displayed available on the <System> menu. You can select the screen image you want to display while the Screen Saver function is running among the other options.    <Stand-by Time> This item is not displayed if you select “Screen Saver not used” among the options of the <Screen Saver(S)> command. This item is available to select if you select the other options except “Screen Saver not used”. If you do not any operations (key input or mouse action) in the time set at the item, the Screen Saver function is executed. The time can be input by the minute.
3-4 Chapter 3 SecuwayCard 2000 Manager Program Menu <Settings> This item is available to select if you can select the screen image you want to display while the Screen Saver is running like the “Windows Logo”.    The Screen Saver function provided by the SecuwayCard 2000 is different from the one provided by the Windows Me. And so it is executed independently of the one of Windows Me.  After completing to select the items on the <Screen Saver Setup>, click [OK] button to save the settings.
3-5 <Center IP Set> tab Let’s see the function of <Center IP Set> tab.   The features and available values of the <Center IP Set> tab are like the following.  !" Pri Center IP : The IP address you set on the “Online Security Registration” is displayed. If the IP address of the SecuwayCenter is changed, input the changed IP address on this item.   !" Sec Center IP : In case that you install the second Center to backup the system, input the IP address of the second center.  If the SecuwayCenter 2000 manager has set the Pri IP and Second IP while doing “Online Security Registration” process, you should receive the IP information from the SecuwayCenter 2000 manager.
3-6 Chapter 3 SecuwayCard 2000 Manager Program Menu <The Option> tab The items of <The Option> tab are useful for using the SecuwayCard 2000 Manager program.   The features of the items of <The Option> tab are like the following.  Starting together with Windows booting If you select this item, the SecuwayCard 2000 program is executed automatically when the Windows program is booting. If you don’t select this item, you should execute the SecuwayCard 2000 program whenever you need after the Windows program is booting.  Starting L2TP Tunnel with the Manager If you select this item, the L2TP tunnel is created automatically when the SecuwayCard 2000 Manager program is started. If your circumstances use the L2TP, you’d better select this item. But if your circumstance does not use L2TP, do not select this item.
3-7 Automatic Password input If you don’t select this item, you should input the password whenever you log on the SecuwayCard 2000. If you select this item, you don’t need input the password whenever you log on and the SecuwayCard 2000 is directly running because the password is input automatically.   Starting L2TP Network Logon If you select this item, the dialog box is displayed to log on the network when the server is created the tunnel and located to connect.  Automatic L2TP Reconnect This item allows restarting the tunnel automatically if the tunnel is disconnected due to the network error or the SecuwayGate 2000 system error.  Warning Message of Valid Password Date(s) If the SecuwayCard 2000 manager set to change the password in the designated date and select this item, the message like that you should change the password is sent to the SecuwayCard 2000 user.
3-8 Chapter 3 SecuwayCard 2000 Manager Program Menu Screen Saver The screen saver provides the locking function that prevent unauthorized user from using the computer while the authorized user is leaving the computer. If the authorized user does not operations (key input or mouse action) for a limited time, the screen saver perceives that the user has left the computer and executes the locking function.    If you want to use the <Screen Saver> command of the <System> menu, you should set to use the screen saver function on the <Configurations> menu in advance.   If the SecuwayCard 2000 user does not enter any key or mouse action in the designated time, the screen saver is executed.  If you do not set to use the screen saver function on the <Configurations> menu, the <Screen Saver> command of the <System> menu cannot be displayed selectable. For the detailed information about the way to set the screen saver function, see the description of the command “Configurations” on this manual.
3-9 To stop the Screen Saver If you use the SecuwayCard 2000 manager program while the screen saver is running, press any key or move the mouse. Then the screen to input the user ID and password is displayed.  If you don’t input the same password with the one you use to log on the SecuwayCard 2000, you can’t stop the screen saver and use the SecuwayCard 2000 Manager program. With this way the screen saver provides the locking function that prevent unauthorized user from using the computer while the authorized user is leaving the computer.  The 4 kinds of cases for executing the screen saver The screen saver is executed for 4 kinds of the cases like the following.  !  When you log off the SecuwayCard 2000 Manager program   If the screen saver is executed when you log off the SecuwayCard 2000 Manager program, you should input the user ID and password to log on again.    !  When you execute the <Screen Saver> command on the <System> menu     If the screen saver is executed because you execute the<Screen Saver> command on the <System> menu, you should input the password to exit the screen saver function.
3-10 Chapter 3 SecuwayCard 2000 Manager Program Menu !  When you remove the SecuwayCard 2000 in the PCMCIA slot    The screen saver is executed if you remove the SecuwayCard 2000 hardware in the PCMCIA slot while using the SecuwayCard 2000 system. In this case, reinsert the SecuwayCard 2000 hardware in the slot and input the user ID and password on the dialog box of the screen and then you can use the system again.    !  When the designated time of the screen saver is passed   When the designated time set on the <Stand-by time> item of the <Screen Saver> command is passed, the screen saver is executed automatically. If you exit the screen saver mode, move the mouse and input the password on the dialog box of the screen.  If the screen saver is executed when you log off the SecuwayCard 2000 Manager program, the TCP/IP network is disconnected. In this case the program which is communicating is diconnected. But if the screen saver is executed because you execute the <Screen Saver> command on the <System> menu, the encryption process using TCP/IP is still available.
3-11 Center Check <Center Check> command is used to confirm the connection status between the SecuwayCard 2000 Manager program and the SecuwayCenter.  You can also use the <Center Check> command when you can’t connect with the host through security communication or see the security policy even though you did online security registration.  If the connection status is normal, the following message is displayed.   If the connection status is not normal, the following message is displayed.   If the connection status is not normal, you can’t do the security communication and receive the security policy normally from the SecuwayCenter 2000. In this case, check if the status of the online security registration.
3-12 Chapter 3 SecuwayCard 2000 Manager Program Menu Auto Upgrade FTP Server <Setting Auto Upgrade FTP Server> command is to set the server for sending the upgrade file automatically whenever the SecuwayCard 2000 Manager program is upgraded.   If you want to use the <Setting Auto Upgrade FTP Server>, you should set the FTP server in advance. You can download the FTP server program free from the web site. For more detailed information of setting the FTP server, see the online help or printed manual provided with the FTP server program.  Input the FTP server name on the “Server” item and press [OK] button.   Then the setting the auto upgrade server is completed.
3-13 Setting System Security Default Value <Setting System Security Default Value> command shows the same screen with the one you can see when you log on the SecuwayCard 2000 Manager program for the first time after installing it.  If you click the <Setting System Security Default Value> command, the message to request the password is displayed. If you input the password correctly, the <Setting System Security Default Value> screen is displayed.  For detailed information of the <Setting System Security Default Value> screen, see the Part 2, Chapter 2 : Setting the Security functions of this manual.   Hide If you want to hide the SecuwayCard 2000 Manger program on the screen, use the <Hide> command. Click the icon          bottom left of the Windows to show the SecuwayCard 2000 Manger program on the screen again.
4-1 Chapter 4  Features of the Icons on the SecuwayCard 2000 Manager Program This chapter introduce you the features and utilization method of the icons on the SecuwayCard 2000 Manger program.  User View The first screen when you execute the SecuwayCard 2000 Manager program shows the SecuwayCard 2000 user information. This is the executing result of the User View icon which is on the left most of the SecuwayCard 2000 Manager program icon group.   The features of each items on the <User View> screen is like the following.
4-2 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program <User Info> User This item shows the user ID who is currently logging on the SecuwayCard 2000 Manager program. Over the one user can log on the system in which the SecuwayCard 2000 is installed using their own ID. With this item, you can check the user ID who is currently logging on.  CID This item is the discrimination of the SecuwaySuite 2000 users. Each users have their own CID uniquely. So, CID is used as the discrimination mainly rather than IP because IP is more changeable than CID. Under the PPP or ADSL environment, CID is used for user authentication or security communication.  Password valid term Password valid term is set by the SecuwayCenter 2000 Manager.  Password Changed Date   The date when the password has changed recently is displayed.  <Token Info> The information that the SecuwayCenter 2000 Manager sends to the SecuwayCard 2000 user is displayed. This information is received when the SecuwayCard 2000 is installed and does the online security registration.
4-3 <System Security Information> FDD Mode This is to encrypt the data on the FDD. The mode set by the SecuwayCenter 2000 is displayed on this item.  CD-ROM Mode This is to encrypt the data on the CD-ROM. The mode set by the SecuwayCenter 2000 is displayed on this item.  All the items on the <User Info>, <Token Info>, and <System Security Information> are set by the SecuwayCenter 2000. So all the values on each items can not be changed and removed by the SecuwayCard 2000 Manager on his own authority.
4-4 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program System Security If you click the Second icon from the leftmost on the SecuwayCard 2000 Manager program icon group, the information of the encrypted folders is displayed.   For more information of the way to encrypt the folder, see the description “Chapter 2 : Setting the Security functions” on this manual.
4-5 IPSEC(IP Layer Security Protocol) View IPSEC icon shows the security information received from the SecuwayCenter 2000, key token used for communication, the password used for security of the communication information between two hosts, Authentication Algorithm, SA (Security Association) information, and etc.   IPSEC information is the security information that the SecuwayCenter 2000 Manager send to the SecuwayCard 2000 user. This information can not be changed by the SecuwayCard 2000 Manager.  <View Key token> and <View SA1> are created while communicating, displayed when selecting each of them, and removed when rebooting the system or logging off the SecuwayCard 2000 Manager program.   The SecuwayCard 2000 Manager program user can remove the <View Key token> and <View SA1> directly.
4-6 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program  If you click the IPSEC Information icon, the Host Properties, Master key Information, the SecuwayCenter 2000 information, and the Message Protection information are displayed.  All the information displayed by the IPSEC is the security information that the SecuwayCenter 2000 Manager send to the  SecuwayCard 2000 user. This information can not be changed by the SecuwayCard 2000 Manager.    The features of each item are like the following.  Host Properties   This item shows the available range of the IP address. Within the range of the IP address, the IP currently used by the SecuwayCard 2000 user is existed.    Masterkey Information This item is the Master key information created and sent by the SecuwayCenter 2000 and necessary for encryption and authentication. After the available period, the system tries to communicate with the SecuwayCenter 2000, received the new master key information, and operates normally.
4-7 SecuwayCenter Center ID and IP address are received from the SecuwayCenter 2000 while the online security registration. The Management Ports are for communication with the SecuwayCenter 2000 and displayed as the UDP(User Diagram Protocol) number.  Message Protection This item shows the Authentication Algorithm and Encryption Algorithm to secure the message used for communicating between the SecuwayCenter 2000 and the SecuwayCard 2000. The SecuwayCenter 2000 Manager also sets this information and so the SecuwayCard 2000 Manager can’t change on his own authority.     Keytoken is used commonly for the user authentication and security communication. Keytoken is created automatically after received from the SecuwayCenter 2000 when the users try to communicate.  To communicate normally, you should do the user authentication using the Keytoken information before starting to communicate If the user does not received authentication normally from the SecuwayCenter 2000, the keytoken can not be created and the communication can not be done normally.
4-8 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program The Keytoken can be deleted by the user and be recreated if the user tries to communicate. Although the Keytoken is deleted while communicating, it can be created if you try to communicate again and so you can do the user authentication and security communication without giving any interruption to the communication status.  Q: If the keytoken is not created when the user try to do the security communication or authentication although the user is authenticated normally on the SecuwayCenter2000, it means the status is not available to communicate normally.   A: In this case, check the connection status with the SecuwayCenter 2000 and ask the system manager if the SecuwayCenter 2000 is set to prohibit the service to the SecuwayCard 2000 user.   SA (Security Association) means the password, authentication mechanism key shared for security of the hosts communicated with each other. This information is displayed while sending and receiving the information to/from the connected host after receiving the Keytoken from the SecuwayCenter 2000.  SA Information is displayed only when the Keytoken is received.  SA information is not the item set by the SecuwayCard 2000 Manager program user separately but created automatically when connecting with the opposite side who can communicate with. The SA information can be recreated although SA has been removed while using it. The communication with the opposite is proceed with 2 steps, SA1 and SA2, and displayed with these steps.
4-9 If the communication status is normal, the Keytoken, SA1 and SA2 are created. If the “Send” and “Receive” on the <View SA> item are created like the following, the security communication is completed.
4-10 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program SPD View This icon shows the security profile that set with which password algorithm and authentication algorithm for the security policy related with the way to manage the IP packet sent and received and the packet defined by the security policy.  The security policy is used for doing the user authentication and packet filtering and sent by the SecuwayCenter 2000 manager to the SecuwayCard 2000 Manger program via online after setting fitted for the network environment.  Security Policy? The security policy is a kind of database that saves the policy related with the way to manage the IP packet sent and received. The security policy consists of the several kinds of rules that have the priority. The security policy checks the rules from the 1st priority by the order and concludes how manage the packets.   In other words, security policy is a set of filtering rules that govern packet exchange. All packets are filtered according to these rules. Packets, which don’t meet a rule’s conditions, are not forwarded to the destination and are discarded.
4-11 Because of the hierarchical structure, the rule No. 1 is applied first to examine a packet. If the rule No. 1 is not relevant to the examined packet, the following rules are applied, and so on until a relevant rule is found. If a relevant rule is not found, the examined packet is dropped.  SecuwayCard2000 automatically receives security policies from the SecuwayCenter 2000 upon logging. In the case there are changes to the security policy, the SecuwayCenter 2000 also sends to the SecuwayCard 2000 necessary updates.  SecuwayCard 2000 applies the security policy received from the SecuwayCenter 2000. Therefore, if SecuwayCenter 2000 administrator restricts SecuwayCard 2000 users the access to a certain server or network, you will not be able to access the prohibited resource.  If you cannot access to a server or a network, check security policy and contact SecuwayCenter 2000 administrator, if necessary.  Security Policy Object SecuwayCard 2000 administrator cannot modify or delete a security policy. You can view the security policy objects in the Security Policy window. Double-click on the object to see details.   If you cannot connect to a server or network, view the security policy object and find out relevant rules, as shown in the right screen.
4-12 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program Security Profiles To process packets, security profiles specify encryption and authentication algorithms according to the security policy settings.    Security profiles as well as security policy are managed SecuwayCenter 2000 administrator.   Therefore,  SecuwayCard 2000 users are not allowed to modify security profiles. But they can view profile details.  If security policy governs packet transmission, security profiles become unnecessary. Security profiles are applied when IPSec is enabled. In other words, security profiles are not activated when filtering rules are in force, and IPSec is not used.   Each security rule can accommodate up to 5 profiles priorities from 1 to 5.   A security profile incorporates sub-rules, which are assigned sequence numbers starting from 1. If no security profiles are relevant to the communicating hosts, the connection to the hosts is disabled. On the other hand, if there is a relevant security profile, you can communicate to such host.
4-13 L2TP View L2TP provides a tunnel for authenticated dial-up, ADSL and cable modem users (with dynamic IP address). The tunnel allows remote users a safe access to the intranet servers.  L2TP(Layer 2 Tunneling Protocol)? L2TP is a two-way tunneling protocol that encapsulates the PPP frame with a header and transmits them over Internet, X.25, Frame Relay or ATM in IP networks through UDP port 1701. IPSec is used for data encryption and VPN (Virtual Private Network) functions for users authentication.  If you click the L2TP icon, the following information is displayed.     The current screen is the status that the L2TP communication is started. If the L2TP communication is started, several kinds of the tunnel information are displayed on the right of the screen. If you want to exit the L2TP communication, select “xxxx Gate” on the right of the screen and then click the right button of the mouse.
4-14 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program Then the submenu which contains the <LT2P Start> and <L2TP Exit> command is displayed.     Select < L2TP Start> to display the L2TP box where you can supply the necessary information for tunneling. To disable tunneling, select <L2TP Exit>. Then the tunneling information will be deleted and L2TP disable.   Once you create a tunnel, it remains active until you quit the program. There is no need to create a tunnel or disable tunneling while the program is running.   If the SecuwayGate 2000 is restarted when SecuwayCard 2000 is running, tunneling becomes disabled. To restore tunneling, you have to create a tunnel again.  In order to configure L2TP at SecuwayCard 2000, SecuwayGate 2000 must be prepared for working with L2TP.
4-15 Log View The Logs window enables you to view log records so you can inspect them and trace users’ activity. This can help you detect security breaches and locate errors, as well as estimate overall system operation.     The Logs window provides such information as the logging period, user ID, user activity data and error causes.    The figure below shows an example of Logs window.   Log save You can save logs into a file. When you save logs, logs taken out by the log tab menu of the token are deleted, instead they are saved as files named after the date they are created.   Log view  To view the saved logs select View Backup Log tab and click this icon. If you click the icon, the following message is displayed.
4-16 Chapter 4 Features of the Icons on the SecuwayCard 2000Manager Program   Select the log file you want to open and [Open] button and then the log file is displayed on the <View Backup Log> screen.     Log Print This icon is used to print the log file displayed on the current screen. Before printing it, check if the printer is connect to the computer you are using.   Log Management This icon is to set the log backup cycle. If you click this icon, the following message to set the log backup cycle is displayed.   Select the log backup cycle you want and click [OK].

Navigation menu