Specifications
© Copyright 2007 Cisco Systems, Inc. Page 12 of 26
This document may be freely reproduced and distributed whole and intact including this Copyright Notice.
2. The tamper evidence label should be placed so that the one half of labels A, B, C,
D and E covers the enclosure and the other half covers the port adapter slot.
3. The tamper evidence label should be placed so that the one half of label F covers
the enclosure and the other half covers the rear panel.
4. The tamper evidence label should be placed so that one half of labels G and H
covers the front panel and the other half covers the enclosure.
5. The tamper evidence label I should be placed over the CF card in the slot so that
any attempt to remove the card will show sign of tampering.
6. Place tamper evident labels on the opacity shield as shown in Figure 7.
7. The labels completely cure within five minutes.
Figures 5, 6 and 7 show the additional tamper evidence label placements for the 2851.
Figure 5 – 2851 Tamper Evident Label Placement (Back View)
Figure 6 – 2851 Tamper Evident Label Placement (Front View)