xii List of Tables
TABLE 11-1 AH AND ESP...................................................................................................................................11-2
TABLE 11-2 VPN AND NAT ...............................................................................................................................11-3
TABLE 11-3 LOCAL ID TYPE AND CONTENT FIELDS ...........................................................................................11-4
TABLE 11-4 PEER ID TYPE AND CONTENT FIELDS..............................................................................................11-5
TABLE 11-5 CONFIGURATION > VPN..................................................................................................................11-7
TABLE 11-6 CONFIGURATION > VPN > TUNNEL IPSEC DETAIL.........................................................................11-8
TABLE 11-7 CONFIGURATION > VPN > TUNNEL IPSEC DETAIL – EDIT ...........................................................11-13
TABLE 11-8 CONFIGURATION > VPN > NETBIOS............................................................................................11-15
TABLE 12-1 COMMON IP PORTS .........................................................................................................................12-2
TABLE 12-2 ICMP COMMANDS THAT TRIGGER ALERTS ....................................................................................12-3
TABLE 12-3 LEGAL NETBIOS COMMANDS ........................................................................................................12-4
TABLE 12-4 LEGAL SMTP COMMANDS ..............................................................................................................12-4
TABLE 12-5 SERVICES AND PORT NUMBERS .......................................................................................................12-9
TABLE 12-6 CONFIGURATION >FIREWALL ........................................................................................................12-10
TABLE 12-7 CONFIGURATION > FIREWALL > DOS SETTINGS ...........................................................................12-11
TABLE 12-8 CONFIGURATION >FIREWALL > EDIT ............................................................................................12-13
TABLE 12-9 CONFIGURATION >FIREWALL > IP ADDRESS ................................................................................12-14
TABLE 12-10 FIREWALL CUSTOM PORT............................................................................................................12-15
TABLE 13-1 CONFIGURATION > DEVICE LOG > DEVICE .....................................................................................13-1
TABLE 13-2 CONFIGURATION > DEVICE LOGS > LOG SETTINGS ........................................................................13-2
TABLE 13-3 PURGE DEVICE LOGS.......................................................................................................................13-4
TABLE 14-1 ADSL STANDARDS .....................................................................................................................14-1
TABLE 14-2 CONFIGURATION > ADSL MONITOR...............................................................................................14-2
TABLE 15-1 ALARM SEVERITY............................................................................................................................15-1
TABLE 15-2 ALARM STATES ...............................................................................................................................15-1
TABLE 15-3 CONFIGURATION > DEVICE ALARMS >CURRENT ............................................................................15-2
TABLE 15-4 CONFIGURATION > DEVICE ALARMS > HISTORICAL .......................................................................15-3
TABLE 16-1 BUILDING BLOCK > DEVICE BB......................................................................................................16-1
TABLE 16-2 BUILDING BLOCK > DEVICE BB > EDIT ..........................................................................................16-2
TABLE 16-3 BUILDING BLOCK > DEVICE BB > ADD ..........................................................................................16-3
TABLE 16-4 BUILDING BLOCK > CONFIGURATION..............................................................................................16-4
TABLE 16-5 BUILDING BLOCK > CONFIGURATION BB > EDIT............................................................................16-4
TABLE 16-6 BUILDING BLOCK > CONFIGURATION BB > ADD............................................................................16-5
TABLE 16-7 BUILDING BLOCK > COMPONENT BB..............................................................................................16-6
TABLE 16-8 BUILDING BLOCK > COMPONENT BB > EDIT ..................................................................................16-7
TABLE 16-9 BUILDING BLOCK > COMPONENT > ADD ........................................................................................16-7
TABLE 16-10 IP BUILDING BLOCK > COMPONENT BB > ADD > IP ADDRESS ....................................................16-8
TABLE 16-11 BUILDING BLOCK > COMPONENT BB > ADD > E-MAIL ADDRESS................................................16-8
TABLE 17-1 SYSTEM > VIEW ADMINISTRATOR LIST...........................................................................................17-2
TABLE 17-2 VERSION A.B.CD.EF.GH................................................................................................................17-5
TABLE 17-3 SYSTEM > ADMINISTRATOR DETAILS ..............................................................................................17-6
TABLE 17-4 SYSTEM > ADMINISTRATOR PERMISSIONS ......................................................................................17-7
TABLE 18-1 SYSTEM > VANTAGE STATUS ..........................................................................................................18-1
TABLE 18-2 SYSTEM > LICENSE > LICENSE MANAGEMENT................................................................................18-2
TABLE 18-3 SYSTEM > LICENSE > LICENSE MANAGEMENT > UPGRADE ...........................................................18-3
TABLE 18-4 SYSTEM > PREFERENCES > SERVER ................................................................................................18-5
TABLE 18-5 SYSTEM > PREFERENCES > USER ACCESS .......................................................................................18-6
TABLE 18-6 SYSTEM > PREFERENCES > GENERAL SYSTEM................................................................................18-7
TABLE 18-7 SYSTEM > PREFERENCES > NOTIFICATIONS ....................................................................................18-8
TABLE 18-8 SYSTEM > PREFERENCES > PERMISSIONS ........................................................................................18-9
TABLE 18-9 SYSTEM > PREFERENCES > PERMISSIONS > ADD ..........................................................................18-10
TABLE 18-10 SYSTEM > MAINTENANCE > MANAGEMENT................................................................................18-11
TABLE 18-11 SYSTEM > MAINTENANCE > BACKUP..........................................................................................18-11
TABLE 18-12 SYSTEM > MAINTENANCE > RESTORE.........................................................................................18-12