RAM International
5225 Avenida Encinas Suite E
Carlsbad, CA 92008
Telephone: (760) 431-3610
Toll Free: (800) 726-7789
Fax: (760) 431-5214
Table of Contents
1
ii
1.1
1.2
RAM Security
1.3
Monitor (WINMON)
1.4
12
1.5
NetMedic
15
1.1
When running the Security Server, the following command line options can be used to
specify options for the server application. When and where you should use them is
described under the sections for each operating system.
/N:<string>
/BI:<num>
/W:<string>
/AT:<nnn>
/ST
1.1.2
Sets the name displayed by the Monitor program for this server.
Overrides TCP/IP default broadcast mask (255.255.255.255).
Specifies password for the Delete User License feature.
Sets the timing delay in Milliseconds between each instruction sent to the
NetSentinel key. Default is auto-detection(/AT:0), but for Novell file
servers running on a fast system, /AT:50 or /AT:100 is recommended.
Uses the strict time-out feature, which revokes a network license if the
license has not queried the server for more than 15 minutes.
Security NLM Server supports IPX/SPX only. You can run the program from
AUTOEXEC.NCF or from the system console.
To load the Security Server from the system console:
Add a line to load the server program, including any desired options, to the file
servers AUTOEXEC.NCF file.
2.
At the command prompt, type unload followed by the server programs name. The
Security Server will tell you if there are any licenses in use, and will ask for
confirmation before unloading.
1.1.3
The Hardware Lock Installation Program puts a link to the Win32 Security Server
program in the startup group so that it will start up automatically when the computer
boots up. If it does not start up on reboot, follow these steps to add it to your startup
group.
To place the Security Server in the Startup Directory:
This version of the Security Server (NSSRVICE) runs as a service for Windows NT,
Windows 2000 and Windows XP. Like the Win32 Server, this security service supports
NetBIOS, NetBEUI, NWLink, and TCP/IP protocols.
The Network Lock Utilities Installation program automatically installs and starts the
Security Server Service when it is installed on a computer running Windows NT, 2000
or XP. The following instructions are provided in case it is necessary to manually
install or uninstall the service.
Note: You must install the Windows Network Lock Driver to run the Security
Server service.
To install the Security Server as a service:
1. Run the Nssrvice.exe executable at the command prompt with the /I option along
with any other desired command line options, i.e. NSSRVICE /I /N:Server1
/W:Password.
2. After installation, a registry entry for NetSentinel service is created under:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services
3. By default, the service is set up to run automatically the next time you reboot your
system. No user logon is required, unless desired.
To control the NetSentinel service after installation:
After the service has been properly installed, you may reboot your system to start the
NetSentinel service automatically at system boot time. You can also use either the NET
command or the Service applet in the Control Panel to manually control the service.
To use the NET command method, type the following commands at the command
prompt:
5
1. From the Control Panel, select Services (or Administrative Tools, then Services
if running Windows 2000 or XP). The Services dialog box appears.
2. Select NetSentinel Service.
3. Press the Start or Stop button to start or stop the NetSentinel NT service.
To uninstall the NetSentinel service:
1. Stop the NetSentinel service using either the NET command method or the Services
applet as described above.
2. Run the NSSRVICE.EXE executable with the /U option, i.e. NSSRVICE /U, to
uninstall the service.
3. The registry entry for NetSentinel service under
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services will be
removed after uninstall.
1.2
RAM Security
The RAM Security program allows you to view the status of your lock. While
WINMON will show you how many licenses are in use, RAM Security will show you
how many licenses of each module you actually own.
A shortcut should have been placed on your desktop during installation of the hardware
lock utilities. You can also start this program from the Start Menu by selecting Start Programs - Ram RAM Security.
To view or activate a module, run RAM Security, select the appropriate lock type from
the View menu and follow the instructions in the RAM Security online help for viewing
and activating licenses.
1.3
Monitor (WINMON)
The NetSentinel Windows Monitor program, WINMON, allows you to view the status
of all security servers on your network and their keys, products, and users. You can
view the last access time per user and release licenses from users in the event of an
accidental disconnect. Note that you may establish a password to restrict the use of
the Delete User License feature.
The Monitor program can be customized to your network through the Edit Monitor Map
feature. You may identify the servers by name and protocol, and map to individual keys
(if you have more than one network key), products, and/or users.
The WINMON program runs on a 32-bit Windows workstation. However, the program
can communicate with DOS, NLM, Windows 95/98, and Windows NT/2000 servers.
Although the installation program installs all of the hardware lock utilities on the
network lock server, WINMON can be run on any workstation on the network. To
install this program on a workstation, simply copy the entire contents of the Monitor
folder, or run the Network Lock Utilities installation program and only select the
Monitor component.
1.3.1
Launch the WINMON program as you would any Windows application. A shortcut has
been placed on your desktop for convenience. You can also start the program by going
to the Start Menu - Programs Ram - Locks and selecting the Monitor program. The
monitor first searches for the mapping file (MAPFILE.TXT) to verify which servers
were accessed during the previous session. Then the NetSentinel Monitor screen
should appear.
1.3.2
The NetSentinel Windows Monitor screen allows you to view the status of all
NetSentinel servers and their keys, products, and users, as defined in the following
paragraphs. We have customized the mapping file to display key and product
information specific to RAM International. For additional mapping information, please
refer to Section 1.3.9.
Server
The name assigned to a Security Server on this network. In addition, the Server
information can include the version, protocol, and node/workstation addresses.
Key
A list of all NetSentinel keys you have currently assigned to the server. If a specified key
supports individual products, the Product list box will be enabled and the keys products
will be selectable. If the key does not support any products, or if All Keys is selected,
the Product list box will be disabled.
Product
A list of products for a specific key. All users assigned to the products are displayed in
the Users list box.
Users
A list of users assigned a license for the specific product mapped to a specific server.
The Last Access Time column details the last time the user accessed the license. The
last access time is given in timer ticks. If the user no longer needs access to the license,
you can delete the license from the user by selecting the user and pressing the Delete
User License button. You only need to release the users base license associated with
their active session. All associated sublicenses will be deleted automatically. See item 3
in Section 1.3.6 for more information on base and sub licenses.
Description
Update Display
Quit
1.3.3
Displaying Servers
Displaying Keys
1.3.5
Displaying Products
1. The Monitor program does not automatically update information to the screen. To
view the list of current users, from the NetSentinel Monitor screen, select your
server form the Server list box and click Update Display. From the dialog box that
appears, select Update the current server.
2. After the information is updated, select the server, key, and/or product from their
respective list boxes to filter the users listed in the Users list box.
3. Note that each time a RAM Structural System module is opened by one of the
workstations, that user is assigned a unique base license, (indicated by B: before
the users name in the Users list box) indicating that they have access to the lock,
and a sublicense (indicated by S: before the users name in the Users list box) for
that particular module. However, if the user is running either RAM Frame, RAM
Steel, or RAM Foundation, they will receive a sublicense for both that module and
for the Modeler since the Modeler accompanies these modules. The Security Server
then decrements the total licenses available for the appropriate modules.
To delete a users license:
1. Once you have determined which users license to delete, click on their base license
and select Delete User License.
2. If the user has since obtained a new license so that they appear to have two base
licenses assigned to them, the invalid license is generally the one with the smaller
Last Access Time. The one situation when this is not the case is when the last
access time has reached the maximum number of time ticks and has started over
from zero.
Any sublicenses associated with the base license will automatically be deleted.
Note: If a users active license or sublicense is deleted by accident, they will be
forced to exit out of whichever protected module they are running. If they are
running the Modeler, they will be given the opportunity to save first.
1.3.7
You can customize the monitor to identify the specific servers, keys, products, and
users for your network. If the mapping file is not customized, the monitor will display
9
users by their workstation number, keys by their Developer ID, and products by their
sub-licenses. RAM International has already customized the mapping file to identify
the key and products by name. It is strongly recommended that you customize the
mapping file to display users by name, rather than by their workstation ID number in
order to efficiently utilize the Delete User License feature. However, if your network
is using TCP/IP and the users IP Address is showing in the Monitor program, you must
have static IP Addresses in order to map them to a users name.
The information entered in each field will filter information in the other fields. For
example, the Server field will filter information in the Key, Product, and Users fields to
reflect the status of a specific server. If All Servers is selected in the Server field, all
the keys will be displayed.
The Key field will filter information displayed in the Product and Users fields. Since the
key you will be using supports multiple products, the Product field will display the
different RAM Structural System modules supported.
To Set Up the Monitor:
1.3.8
Transport Type
The maximum of number of Security Servers to search for a specific Server Name. The
maximum number of servers is 5.
10
Key Name
The workstation used by a specific user. Depending on the protocols used on the
network, this number may be the unique hex number assigned to the workstation, or the
IP address of the workstation.
The options on the Edit Monitor Map screen are as follows:
Command
Description
Add
Delete
Previous
Next
Save Map
Done
1.3.9
You may add and delete information on the servers, keys, products, and users whenever
needed, however you should only need to edit the user information. Numerous changes
can be entered without exiting the screen. However, you must be sure to save the
changes when you exit the screen.
To save your changes and exit, click on Save Map, and then click on Done. You will
return to the NetSentinel Monitor screen. Click on Update Display to view the changes
from the Edit Monitor Map screen.
NOTE: The Edit Monitor Map screen does not update until you check the Update
Display button.
11
To Add a User:
1. After a new user has opened one of the RAM modules, select Update Display from
the bottom of the NetSentinel Monitor screen. The users Workstation ID number
will appear in the User List Box.
2. Make note of the users Workstation ID.
3. Select Edit Mapping File from the bottom of the NetSentinel Monitor screen.
4. Select the User Name list box. Click on the Next button near the Workstation ID list
box until User Name? appears.
5. Enter the name of the user in the User Name list box. Click on Add.
6. Enter the Workstation ID associated with the user.
7. Click on Save Map, then click Done.
8. From the NetSentinel Monitor screen, select Update Display. The users name
should replace their Workstation ID number in the User List Box.
9. Continue in a similar fashion for the remaining users.
To Delete a User:
1. Select the User Name list box. Click on the Next or Previous button near the
Workstation ID list box until the specific name and workstation ID appear.
2. Click on Delete.
1.4
Key ID strings are character strings that are unique for every key. If you have more
than one network lock, you must run RAM Safe separately for each lock. The Key ID
12
string generated for the key, and the Update Key string you get back for the key, will be
different.
Key ID strings also change every time you run RAM Safe. Do not write down the
string the first time you run RAM Safe and expect to use it again the next time you
upgrade you license count.
1.4.2
To launch the RAM Safe program you can either use the shortcut that was placed on the
desktop by the installation program or go to the Start menu. Select Programs - Ram
Locks - RAMSafe. The RAM Safe screen appears. Alternatively, RAM Safe can be
launched from the Network Lock Status dialog box in RAM Security.
1.4.3
You can communicate your Key ID string to a RAM International associate via
telephone, fax, or electronic mail (KeyUpdate@ramint.com).
To display the Key ID string:
1.
2.
3.
4.
Verify that your network lock is attached to your computers parallel port.
Launch RAM Safe.
Select Find Key from the buttons along the bottom of the screen.
RAM Safe finds the lock and displays the Key ID string in the Key ID field.
If the message No Sentinel Devices found! appears, make sure the key is firmly
attached to the parallel port, and then try again.
Choose one of the following:
1. Read the Key ID string to a RAM International associate over the telephone.
2. Save the Key ID string to a file. To do so, select Save Key ID. When the directory
window appears, accept the default file name (KEYID.IDN) or rename the file.
Later, you can e-mail or fax this file to RAM International.
Wait to continue the update process until you receive the Update Key string.
13
Note: If you must exit the RAM Safe program before entering the Update Key
string, a new Key ID will be displayed when you re-select the Find Key command.
However, the Update Key will still update your key correctly.
1.4.4
1. Access the Key ID file with a word processing program and print it out.
2. Be sure to include your companys name on your fax and specify whether you
would like to receive the Update Key string via telephone, fax, or e-mail.
3. You can fax your Key ID string to (760) 431-5214.
To e-mail the string to RAM International:
Someone at RAM International will read an Update Key string to you over the
telephone, or send it to you via fax or e-mail, depending on your specifications. You
will then enter this string into RAM Safe, so RAM Safe can update your network locks
memory with the new license information.
To update the network lock:
1. If you exited from RAM Safe since you displayed the Key ID string, re-launch
RAM Safe and select Find Key. In the Update Commands field of the RAM Safe
screen, carefully type the Update Key string as given by RAM International. If the
Update Key string is stored in a file, leave the Update Commands field blank.
2. Select Update Key.
3. Warning
Only one hardware lock should be attached to your parallel port
during the Update. Specifically, updating NetSentinel (network) locks that are
cascaded will result in damage to the keys. If you are updating more than one key,
you must run RAM Safe separately for each key.
4. Choose From Command Window (if you have typed the string in) or From File
depending on the location of the Update Key string.
5. Select OK. The update process requires up to a minute to complete.
6. When Update Successful appears, click OK and select Exit from the File menu.
If the update fails:
1. Select Restore to return the keys memory to its original contents. (The Restore
option will be active only if the update failed.)
14
1.5
NetMedic
The NetMedic Utility is a diagnostic program that can help assess communication
problems with the network lock. If the network lock is installed correctly and can be
accessed by one or more workstations, but a particular workstation is unable to access
the network lock, it may help to run the NetMedic from the workstation that is having
trouble and compare the results with those from a workstation that is not having trouble.
To start NetMedic, select Programs - Ram Locks - NetMedic. The NetMedic
screen appears:
4.
5.
6.
7.
16
17