User`s guide
BLACK BOX® CS Installation, Administration, and User’s Guide xiii
Table 8-2: Expert > Host Settings Form Fields ............................ 155
Table 8-3: Expert > Form Fields for a Modem Card.................... 164
Table 8-4: Expert > Form Fields for an ISDN Card ..................... 167
Table 8-5: Expert > Form Fields For a GSM Card....................... 170
Table 8-6: Expert > Form Fields for an Ethernet Card................. 171
Table 8-7: Expert > Form Fields for a Compact Flash/Hard Disk 173
Table 8-8: Expert > Form Fields for a Wireless LAN Card. ........ 175
Table 8-9: Expert > Form Fields for a CDMA Card..................... 176
Table 8-10: Expert > Field and Menu Options for Configuring a VPN
Connection................................................................... 181
Table 8-11: Expert > Fields and Menu Options for SNMP
Configuration............................................................... 185
Table 8-12: Expert > Tasks for Configuring SNMP....................... 188
Table 8-13: Expert > TCP Options Fields ...................................... 195
Table 8-14: Expert > UDP Options Fields...................................... 196
Table 8-15: Expert > Firewall Configuration Input and Output
Interface, and Fragments Fields Definitions. .............. 198
Table 8-16: Expert > Target LOG Options Selection Fields........... 199
Table 8-17: Expert > Reject Options Sections............................... 200
Table 8-18: Expert > Fields and Menus for Configuring Static Routes
.... ................................................................................. 207
Table 9-1: Expert > Security Menu............................................... 209
Table 9-2: Expert > Add User Dialog Field Names and Definitions...
... .................................................................................. 211
Table 9-3: Expert > Active Ports Sessions Information. .............. 215
Table 9-4: Tasks for Setting up Authentication Servers. .............. 219
Table 9-5: Expert > Enabled services to access the CS under each
security profile............................................................. 230
Table 9-6: Expert > Enabled services to access the serial ports under
each security profile. ................................................... 230
Table 9-7: Expert > Enabled protocols for each security profile
shown with a check mark. ........................................... 231
Table 9-8: Configuring CS in Expert Mode.................................. 237
Table 10-1: Expert > Ports Menu.................................................... 239