1. Using a third-party utility such as PuTTY, open an SSH
connection to the Primary Appliance.
2. Login using the account emcsrv and key in the password
when prompted.
3. Change to root and key in the password when prompted:
-bash-3.00$
sudo su –
4. Plug the USB drive into one of the USB ports behind
the Appliance.
5. Key in the below command to check that the USB drive
is listed:
[root@kandti ~]# lsusbBus 002 Device 004: ID 0a16:9005 Trek Technology (S) PTE. Ltd
Bus 002 Device 003: ID 0424:2514 Standard Microsystems Corp.
Bus 002 Device 002: ID 8087:0020
Bus 002 Device 001: ID 1d6b:0002
Bus 001 Device 002: ID 8087:0020
Bus 001 Device 001: ID 1d6b:0002
The above
information shows that the Appliance recognises one USB drive named “Trek
Technology (S) PTE. Ltd”.
6. Next, find out the device which is attached to the USB
drive:
[root@kandti
~]# dmesg | grep –i disksd 0:0:0:0: [sda] Attached SCSI disk
sd 4:0:0:0: [sdb] Attached SCSI removable disk
sd 5:0:0:0: [sdb] Attached SCSI removable disk
From the
output, the device is sdb.
7. Navigate to the directory where the USB drive is to be
mounted and mount it:
[root@kandti
~]# cd /usr/tmp[root@kandti tmp]# mount –t vfat /dev/sdb tmp
8. To confirm that the USB drive is mounted, key in the
below command to display the files in the directory tmp:
[root@kandti tmp]# ls –l
9. Copy the required token seed files from the USB
drive’s mount point to the desktop of the Windows terminal via WINSCP, a
third-party utility.
10. Unmount the USB drive by issuing the below command:
[root@kandti
var]# umount /dev/sdb
11. Proceed to import the token seeds via Security
Console.