A SERVICE OF

logo

Before You Begin
What You
Should Do
First
Before making your system secure, determine who will have
access to privileged commands once you enable the security
feature. Whoever requires privileged access to the system will
need to know the password that you enter.
If your operating system is running, use the shutdown
procedures in your operating system documentation to shut
it down (see Table 7–3 for available documentation).
Place your system in console mode by pressing the halt button
after the operating system is shut down.
Task Overview
Steps to
Making the
System Secure
Making your system secure requires software and hardware
tasks. Table 11–2 describes the steps required to secure your
system.
Table 11–2 Steps to Making the System Secure
Step Description
1 Move the secure system jumper
2 Enter a password
3 Enable security
4 Log in to the system
Each of these tasks is described in this chapter.
11–4 Using the Password Security Feature