When configuring Entrust nShield for high availability, add a nethsm_imports section like the following. 

[nethsm_imports]
# Start of the nethsm_imports section
# The HSMs that the hardserver should import. Note that the limits listed here
# must be at least as strict as the HSM's own configuration, or the HSM will
# reject attempts to connect with ServerAccessDenied.
# Each entry has the following fields:
#
# New module number to assign to the imported nethsm, or 0 to use the next
# unassigned module number. (default=0)
#  local_module=INT
local_module=0
 
# Network address of the HSM
#  remote_ip=ADDR
remote_ip=10.11.55.16
 
#
# Port to connect to on the HSM
#  remote_port=PORT
remote_port=9004
 
# ESN of the HSM to import
#  remote_esn=ESN
remote_esn=6548-7CA3-C155
 
# The hash of the key that the HSM should authenticate themselves with. If set
# to forty zeroes, key authentication is not performed (NOT RECOMMENDED).
#  keyhash=KEYHASH
keyhash=e40c676c515da4dff1a29a9504b7d7747cfde2a3
 
# Whether to make a privileged connection to the HSM (default=0)
#  privileged=INT
privileged=0
 
# Whether to use high-numbered ports for privileged connections (default=0)
#  privileged_use_high_port=INT
privileged_use_high_port=0
 
# ESN of this client's nToken
#  ntoken_esn=ESN
ntoken_esn=