In This Document
This document comprises the following material:
■
■
■
■
Chapter 1: Getting Started provides an overview of the RPSD system, a description of this
document and its intended audience, and an explanation of typographical conventions.
Chapter 2: Installation describes the recommended hardware environment and lists the
RPSD system hardware and software components. Finally, the chapter describes the
installation procedures for the hardware and software.
Chapter 3: RPSD Administration explains the features and variants of the RPSD system
that must be administered, system status messages, and system administrator commands.
Chapter 4: RPSD Key User Information describes the procedure for accessing the
RMATS port via a “keyed” terminal, what to do if access fails, and the RPSD Key
commands.
Chapter 5: Troubleshooting lists and explains the status messages, tests for the RPSD
Lock and Key, what to do in the event the RPSD Lock or Key fails, RPSD system response
to a power failure, and saving the “seed” value of the authentication algorithm.
Appendix A: Cables, Connectors, and Ports Table contains a table showing the cables,
connectors, and ports required for each hardware component.
Appendix B: Device LEDs explains the meaning of the LEDs on the RPSD Lock and the
RPSD Key devices.
■
■
■
Typographical Conventions
Throughout this guide, all forms of output or responses are shown in bold, sans serif style type.
For example:
Call authentication completed
Data that you enter is shown in italic, sans serif style type. For example you may be instructed
as follows:
Enter the command:
Block user [
RETURN ]
Note the following characteristics of the data entry representation:
■ The first line is a normal text line of the document.
■ The second line is the information you are instructed to enter. The [ RETURN ] at the end of
the line tells you to press the Enter or Return key to complete the command.
Getting Started
1-5