2 - Planning and Preparation
DynaFlex II| Product Family | Installation and Operation Manual
Page 16 of 78 (D998200554-10)
o
1000007406 DynaFlex, DynaProx Test Utility
installed, which advanced operators can use
to configure and test the device.
o
1000007405 DynaFlex, DynaProx Firmware Upload Utility
installed, which advanced
operators can use to update the device’s firmware.
•
Determine the final set of tools advanced operators will use to configure, test, and update the device.
This documentation uses the
1000007406 DynaFlex, DynaProx Test Utility
as an example for
configuring the device; it can be used for initial pre-deployment testing and development, and as
sample code showing how to communicate with the device, but the full solution may call for
customized, solution-specific software for configuring the device and updating firmware.
•
Determine the
charging schedule(s) and location(s)
. For example, high-traffic mission-critical
solutions may benefit from keeping multiple devices charging for fast swap-out. Charging cradles and
accessories are available directly from MagTek. Make sure there is an adequate number of USB wall
chargers and / or USB ports available for the number of devices you are charging together, and make
sure the electrical socket-outlet at a given charging location supports the total load. Solutions using
large numbers of devices may benefit from using a large-scale universal USB charger / hub. Details
about charging are provided in section
. Details about maximum power
consumption are provided in
Appendix A Technical Specifications
•
Determine how to
inspect
devices upon arrival, upon installation, and periodically during live usage
to ensure malicious individuals have not tampered with them. Details about inspection are provided in
section
•
Develop procedures for maintaining the device(s). Detailed guidance is provided in section
•
Review the device’s PCI
Security Policy
, posted to the PCI web site
under
Approved PIN Transaction Security (PTS) Devices
, for additional information about using
the device securely.
2.2
Network Planning
This content for this section is to be determined and will be included in the next revision of this
document.