2
FCC Information ..........................................................................................................................................................3
Chapter 1 - Introduction .............................................................................................................................................7
Before You Begin ..................................................................................................................................................... 8
Tampering prevention and detection ..................................................................................................................... 8
Always use qualified and authorized peripheral devices ........................................................................................ 8
Secure Installation ................................................................................................................................................... 9
Secure Operation and Administration .................................................................................................................... 9
Powering On .......................................................................................................................................................... 10
LED Display ............................................................................................................................................................ 11
Chassis Intrusion Detection ................................................................................................................................... 12
Administrator Functions ........................................................................................................................................ 12
Setup for Administrator Logon .............................................................................................................................. 12
Administrator Logon ............................................................................................................................................. 13
Log Data Audit ....................................................................................................................................................... 15
Table of content