Entrust nShield 5c Installation Manual page 55

Hide thumbs Also See for nShield 5c:
Table of Contents

Advertisement

The next screen will ask you to verify that the key hash displayed by the nShield
nShield 5c matches the client key hash:
Remote 3138-147F-2D64
reported the key hash:
 691be427bb125f387686
 38a18bfd2eab75623320
Is this EXACTLY right?
CANCEL
CONFIRM
The client key hash is obtained by running the commands described below. Take a
copy of the returned key hash and compare it to the value reported on the nShield
nShield 5c display.
With software-based authentication
Run the following command on the client:
enquiry -m0
This command returns the software key hash, tagged as
output, for example:
Server:
  enquiry reply flags
  enquiry reply level
  ...
  kneti hash
  ...
With nToken authentication
Run the following command on the client:
ntokenenroll -H
This command produces output of the form:
nToken module #1
nToken ESN:
nToken key hash: 691be427bb125f387686
 
Check that the ESN also matches the one reported on the nShield nShield 5c
display.
If the client key hash matches the one reported on the nShield nShield 5c display,
press the right-hand navigation button to continue the RFS configuration. Otherwise
press the left-hand navigation button to cancel the operation.
nShield® 5c Installation Guide
none
Six
f8222fc007be38b78ebf442697e244dabded38a8
3138-147F-2D64
38a18bfd2eab75623320
kneti
hash, as part of its
55 of 77

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nShield 5c and is the answer not in the manual?

Table of Contents