In This Document
This document comprises the following material:
■
■
Chapter 1: Getting Started provides an overview of the RPSD system, a description of this document and its intended audience, and an explanation of typographical conventions.
Chapter 2: Installation describes the recommended hardware environment and lists the RPSD system hardware and software components. Finally, the chapter describes the installation procedures for the hardware and software.
■
■
■
■
■
Chapter 3: RPSD Administration explains the features and variants of the RPSD system that must be administered, system status messages, and system administrator commands.
Chapter 4: RPSD Key User Information describes the procedure for accessing the RMATS port via a “keyed” terminal, what to do if access fails, and the RPSD Key commands.
Chapter 5: Troubleshooting lists and explains the status messages, tests for the RPSD Lock and Key, what to do in the event the RPSD Lock or Key fails, RPSD system response to a power failure, and saving the “seed” value of the authentication algorithm.
Appendix A: Cables, Connectors, and Ports Table contains a table showing the cables, connectors, and ports required for each hardware component.
Appendix B: Device LEDs explains the meaning of the LEDs on the RPSD Lock and the RPSD Key devices.
Typographical Conventions
Throughout this guide, all forms of output or responses are shown in bold, sans serif style type. For example:
Call authentication completed
Data that you enter is shown in italic, sans serif style type. For example you may be instructed as follows:
Enter the command:
Block user [ RETURN ]
Note the following characteristics of the data entry representation:
■The first line is a normal text line of the document.
■The second line is the information you are instructed to enter. The [ RETURN ] at the end of the line tells you to press the Enter or Return key to complete the command.
Getting Started |