Introduction; About This Guide - Entrust nShield 5c Installation Manual

Hide thumbs Also See for nShield 5c:
Table of Contents

Advertisement

1. Introduction

The Entrust nShield nShield 5c is a Hardware Security Module (HSM) that provides
secure cryptographic processing within a tamper-resistant casing. Each nShield nShield
5c is configured to communicate with one or more client computers over an Ethernet
network. A client is a computer using the nShield nShield 5c for cryptography. You can
also configure clients to use other nShield HSMs on the network, as well as locally
installed HSMs.

1.1. About this guide

This guide includes:
• Installing the Security World Software. See
• Physically installing an nShield nShield 5c. See
• Configuring an nShield nShield 5c and client. See
configuration.
• The nShield nShield 5c front panel controls. See
• The top-level menu of an nShield nShield 5c. See
• Troubleshooting information. See Troubleshooting.
• nShield nShield 5c maintenance. See
• Accessories. See
• Instructions to uninstall existing software. See
• Software components and bundles. See
software installation
See the nShield nShield 5c User Guide for more about, for example:
• Creating and managing a Security World
• Creating and using keys
• Card sets
• The advanced features of an nShield nShield 5c.
For information on integrating Entrust nShield products with third-party enterprise
applications, see https://www.entrust.com/digital-security/hsm.
1.1.1. Model numbers
Model numbering conventions are used to distinguish different nShield hardware security
devices.
nShield® 5c Installation Guide
Approved
accessories.
media.
Installing the
Installing an
Basic HSM, RFS and client
Front panel
Top-level
HSM
maintenance.
Uninstalling existing
Software packages on the Security World
software.
HSM.
controls.
menu.
software.
4 of 77

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the nShield 5c and is the answer not in the manual?

Questions and answers

Table of Contents