Table Of Contents - Magtek DynaFlex II PED Manual

Pin entry device, pci pts poi v6.2 security policy
Hide thumbs Also See for DynaFlex II PED:
Table of Contents

Advertisement

0 - Table of Contents

Table of Contents
Table of Contents .............................................................................................................................................. 4
1
Purpose ...................................................................................................................................................... 5
2
General Description .................................................................................................................................. 6
2.1
Product Name and Appearance ..................................................................................................... 6
2.2
Product Type ..................................................................................................................................... 8
2.3
Identification ..................................................................................................................................... 8
2.3.1
Hardware Identification .......................................................................................................... 8
2.3.2
Firmware Identification ......................................................................................................... 11
2.3.3
Device Information Page ...................................................................................................... 12
3
Installation and User Guidance ............................................................................................................ 14
3.1
Initial Inspection ............................................................................................................................. 14
3.2
Installation ....................................................................................................................................... 15
3.3
Environmental Conditions ............................................................................................................. 15
3.4
Communications and Security Protocols ................................................................................... 16
3.5
Configuration Settings ................................................................................................................... 16
4
Operation and Maintenance ................................................................................................................. 17
4.1
Periodic Inspection ......................................................................................................................... 17
4.2
Self-Test ........................................................................................................................................... 18
4.3
Roles and Responsibilities ............................................................................................................ 18
4.4
Passwords and Certificates .......................................................................................................... 18
4.5
Tamper Response .......................................................................................................................... 18
4.6
Privacy Shield .................................................................................................................................. 19
4.7
Patching and Updating .................................................................................................................. 20
4.8
Decommissioning........................................................................................................................... 20
5
Security ..................................................................................................................................................... 21
5.1
Account Data Protection ............................................................................................................... 21
5.2
Algorithms Supported .................................................................................................................... 21
5.3
Communications ............................................................................................................................ 21
5.4
Key Management ........................................................................................................................... 21
5.5
Key Loading ..................................................................................................................................... 22
5.6
Key Replacement ........................................................................................................................... 22
6
Acronyms ................................................................................................................................................. 23
References .............................................................................................................................. 24
DynaFlex II PED| PIN Entry Device | PCI PTS POI v6.2 Security Policy
Page 4 of 24 (D998200520-15)

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the DynaFlex II PED and is the answer not in the manual?

Questions and answers

Table of Contents