◦ OFF: The RFS is not allowed to push configuration files to the nShield nShield 5c.
5. You must then choose whether to enable or disable secure authentication when
setting up the RFS. The following screen is displayed:
Remote File System
Do you want secure
authentication enabled
on the RFS?
YES
CANCEL
CONTINUE
a. Select
No
and press the right-hand navigation button to configure the RFS
without secure authentication. The authentication of the RFS will be based on
the IP address only.
b. Select
Yes
and press the right-hand navigation button to configure the RFS with
secure authentication.
6. Skip this step if you have not selected secure authentication.
If an nToken is installed in the RFS, you will be asked to choose which authentication
key to use. Select the desired option and press the right-hand navigation button:
>0DA8-A5AE-BA0D
Software Key
BACK
SELECT
a. The ESN of the nToken installed in the RFS.
b. "Software Key" for software-based authentication.
If no nToken is installed in the RFS, then software-based authentication is
automatically selected.
7. Skip this step if you have not selected secure authentication.
The next screen will ask you to verify that the key hash displayed by the nShield
nShield 5c matches the RFS key hash:
Remote 0DA8-A5AE-BA0D
reported the key hash:
9e0020264af732933574
0cfe10446d33cea33f4a
Is this EXACTLY right?
CANCEL
CONFIRM
The RFS key hash is obtained by running the commands described below. Take a
copy of the returned key hash and compare it to the value reported on the nShield
nShield® 5c Installation Guide
46 of 77
Need help?
Do you have a question about the nShield 5c and is the answer not in the manual?