User`s guide
xxvii
Tables
Table P-1: Document Organization ............................................ xliv
Table P-2: Typographic Conventions ......................................... xlvi
Table P-3: Other Terms and Conventions..................................xlvii
Table 1-1: OnSite Connectors and Intended Uses.......................... 3
Table 1-2: Security Features and Where Documented................... 6
Table 1-3: Supported Authentication Types................................... 9
Table 1-4: Tasks for Configuring Authentication Using the Web
Manager....................................................................... 15
Table 1-5: Tasks for Configuring Authentication Methods.......... 17
Table 1-6: User Types, Responsibilities, and Default Password.. 19
Table 1-7: User Configuration Settings........................................ 20
Table 1-8: Tasks for Configuring Users ....................................... 22
Table 1-9: Services and Other Functions Defined in Security
Profiles ........................................................................ 23
Table 1-10: Moderate Security Profile Services/Features.............. 24
Table 1-11: Open Security Profile Services/Features..................... 25
Table 1-12: Secured Security Profile Services/Features ............... 26
Table 1-13: Tasks for Configuring Logging, Alarms, Data
Buffering ..................................................................... 31
Table 1-14: Types of Encryption .................................................... 31
Table 1-15: Default Port Access Permissions ................................ 32
Table 1-16: Tools for Setting KVM Port Permissions.................... 33
Table 1-17: OnSite Access Methods .............................................. 40
Table 1-18: Tasks for Modem Installation and Configuration ....... 42
Table 1-19: Tasks for Configuring Direct Access to and
Authentication for KVM Ports.................................... 47