Configuring LISCAD Start-up With the ‘Security.ini’ File
Some pen plotters may not recognise the colours set in LISCAD CAD as expected. Many pen plotters support line width's by simply matching base colours...
Article ID: K0039
The information in this article applies to:
- LISCAD SEE version 6.x and later
- LISCAD CAD version 6.x and later
- LISCAD Resource Editor version 6.x and later
- LISCAD Lite version 6.x and later
This article provides general information on the LISCAD security systems as well as specific information on how to configure the "Security.ini" file.
LISCAD is protected by several security systems, including software and hardware key-based systems. The way in which LISCAD uses the security systems is controlled by the ‘Security.ini’ file. Generally, this file will not need to be edited and will work best in its default state. However, on some occasions it may be necessary to edit this file to make LISCAD start-up more efficiently or to cater for a specific network configuration. The sections below contain details on each of the sections in the "Security.ini" file and how to configure them.
In LISCAD 6.0 and later, the ‘Security.ini’ file has replaced the ‘Netinel.ini’ file used by previous versions.
There is a ‘Security.ini’ file installed with LISCAD. This default file will work in most situations and should not need to be edited. If at any time you wish to return to a default state, simply delete the file and the LISCAD installer will reinstall the original file with the default values.
Important information for network installations
The ‘Security.ini’ file is now installed on each computer, rather than on the Server as was the case with the ‘Netinel.ini’ file in previous versions. This means that once your ‘Security.ini’ file has been configured on one computer it can be copied onto other computers that have LISCAD installed. The default location for the ‘Security.ini’ file is in the subfolder "LISCAD\Release" located under the "C:\ProgramData" folder.
‘SecurityOrder’ defines the start-up order of the security systems. Each system is defined by the numbers below:
- Sentinel SuperPro\SuperProNet hardware key (LISTECH)
- Sentinel SuperPro\SuperProNet hardware key (Leica)
- Microphar hardware key
- LISTECH software protection
- NetSentinel hardware key (LISTECH)
- NetSentenel hardware key (Leica)
There is no difference in appearance between the LISTECH and Leica SuperPro or NetSentinel hardware keys.
LISCAD will search for security devices in the order listed above. This order is dynamically updated so LISCAD will update this list to promote the last found security device to the start of the list on a successful start-up. Therefore, there is no point in reordering the list, the only customising that should be done is to completely remove systems that you don't use. Be aware that any system you do remove will not be searched for.
‘Options’ will most likely never appear in the file and should never be edited as it is used internally to restrict the modules available for evaluation and demonstration licences.
All of the information in this section relates to the NetSentinel network hardware key.
‘DepartmentName’ is the department name of the security server that will be searched for to find the hardware key. By default, this is set to ‘LISCAD’ and should not need to be changed unless there are multiple security servers which need to be independent on the same network. In that case you could name them LISCAD1 and LISCAD2 for example. The maximum number of characters for department name is 9.
If you need to change the department name, then most likely the NetSentinel service will need to have its registry department name changed as well. The ‘DepartmentName’ for the NetSentinel service is stored in the registry on the server hosting the hardware key in the following location:
You will need to restart the NetSentinel service by going to the Applications and Services section of the Windows Computer Management tool, right-clicking on ‘NetSentinel’ entry and selecting ‘Restart’ from the menu.
‘MaxServers’ is the number of servers to search for NetSentinel hardware keys, this can take a value from 1 to 5. The start-up time increases proportionally as more servers are added (i.e. 5 servers takes 5 times longer than 1).
‘ProtocolOrder’ is the order in which each of the network protocols is used to try to find a NetSentinel hardware key. The numbers correspond to the following network protocols:
1: IPX/SPX for Microsoft NT Servers
6: IPX/SPX for Novell Netware Servers
By default, all supported network protocols are used to search for a network hardware key. If you are experiencing slow start up times, the protocols which are being used and the order they are being used can be changed. Setting the Protocol Order to only use the protocol your network is using will decrease the start-up time. To set the order, simply change the protocol order, or remove those that are not required.
‘SubnetMask’ is used to limit the scope of the network that LISCAD will search to find a NetSentinel hardware key. The default value is 255.255.255.0. Limiting the search will speed up start-up time.
If using Microsoft Windows Terminal Server you must use a SuperProNet dongle.
‘ServerName’ is the section which defines the server where the SuperProNet hardware key is connected. The ServerName will be the only location searched for to locate the SuperProNet hardware key. The ServerName can be one of three forms:
- IP Address e.g. “188.8.131.52”
- Server Name e.g. "Server1"
- IPX Address
Example "Security.ini" files
The following is a sample for a network that is using a NetSentinel hardware key with TCP/IP network protocol.
The following is a sample for a network that is using a SuperProNet hardware key with TCP/IP network protocol.
The information provided in the LISTECH knowledge base is provided "as is" without warranty of any kind. LISTECH disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall LISTECH or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if LISTECH or its suppliers have been advised of the possibility of such damages.