Entrust nShield 5c Installation Manual page 47

Hide thumbs Also See for nShield 5c:
Table of Contents

Advertisement

nShield 5c display.
With software-based authentication
Run the following command on the RFS:
enquiry -m0
This command returns the software key hash, tagged as
output, for example:
Server:
  enquiry reply flags
  enquiry reply level
  ...
  kneti hash
  ...
With nToken authentication
Run the following command on the RFS:
ntokenenroll -H
This command produces output of the form:
nToken module #1
nToken ESN:
nToken key hash: 9e0020264af732933574
 
Check that the ESN also matches the one reported on the nShield nShield 5c
display.
If the RFS key hash matches the one reported on the nShield nShield 5c display,
press the right-hand navigation button to continue the RFS configuration. Otherwise
press the left-hand navigation button to cancel the operation.
8. The nShield nShield 5c displays "Transferring files..." followed by a message reporting
that the RFS has been set up. Press the right-hand navigation button again to exit.
After you have defined the RFS, the nShield nShield 5c configuration files are exported
automatically. See the nShield nShield 5c User Guide for more about configuration files.
To modify the RFS at a later date, select System > System configuration > Remote file
system, and then select the required action.
nShield® 5c Installation Guide
none
Six
d4c3d757a67416cb9ba31f33febd6ead688629e5
0DA8-A5AE-BA0D
0cfe10446d33cea33f4a
kneti
hash, as part of its
47 of 77

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nShield 5c and is the answer not in the manual?

Questions and answers

Subscribe to Our Youtube Channel

Table of Contents