INTRODUCTION
This chapter presents an overview of the configuration process, including conventions for entering
information via a directly
co~ected
or remote terminaI or teleprinter.
A
description of all
dition tables and their interrelationship follows. The section on system secu&y details
how to assure that only authorized people have access to the Tshiba VP System software.
AM included is a section on ampleting the configuration forms. Blank configuration forms for
your use are at the end of the chapter.