Replacing The Security Device On A Redundant System - Nortel Meridian 1 Replacement Manual

Hardware replacement
Table of Contents

Advertisement

Page 290 of 362

Replacing the Security Device on a redundant system

553-3001-520 Standard 16.00 April 2000
Replacing equipment
The procedure begins with the validation of the new Keycode against the
existing Security Device.
1
To access the Core during the replacement procedure, connect a terminal
to the J25 port on the I/O panel in the inactive Core Module or
Core/Network Module. To communicate with the processor, you must
use the following settings on the terminal:
9600 baud, 7 data, space parity, 1 stop bit, full duplex, XOFF
Note: If you are using only one terminal or a switch box, switch the
connection from Core to Core as needed.
2
Use LD 135 to switch to the Core which contains the non-faulty Security
Device.
LD 135
SCPU
****
3
Insert the keycode diskette into the floppy drive on the IODU/C with the
non-faulty Security Device.
4
In LD 143, print the pending keycode contents. Use "KSHO F0" if your
keycode is on the diskette in the floppy drive on Core 0, or "KSHO F1"
if your keycode is on the diskette in the floppy drive on Core 1:
LD 143
KSHO F0
or
KSHO F1
5
Perform the KDIF command. Use "KDIF F0 REC" if the keycode
diskette is inserted in the floppy drive on Core 0, or "KDIF F1 REC" if
the keycode is inserted in the floppy drive on Core 1:
KDIF F0 REC
or
KDIF F1 REC
****
to load the program
switch CPUs (if necessary)
exit LD 135
to load the program
print the contents of the candidate keycode
to print the differences between the candidate and
the current keycodes
to exit LD 143

Advertisement

Table of Contents
loading

Table of Contents