Network Router User Manual

Contents
xv
Appendix C User Group Privileges 357
Appendix D SNMP Traps 366
Appendix E CSV File Imports 368
Common CSV File Requirements .............................................................................................. 369
Audit Trail Entries for Importing ................................................................................................. 370
Troubleshoot CSV File Problems .............................................................................................. 371
Appendix F Troubleshooting 372
Appendix G Diagnostic Utilities 374
Memory Diagnostic .................................................................................................................... 374
Debug Mode .............................................................................................................................. 375
CC-SG Disk Monitoring.............................................................................................................. 376
Appendix H Two-Factor Authentication 379
Supported Environments for Two-Factor Authentication ........................................................... 379
Two-Factor Authentication Setup Requirements ....................................................................... 379
Two-Factor Authentication Known Issues ................................................................................. 379
Appendix I FAQs 380
General FAQs ............................................................................................................................ 380
Authentication FAQs .................................................................................................................. 382
Security FAQs ............................................................................................................................ 383
Accounting FAQs ....................................................................................................................... 384
Performance FAQs .................................................................................................................... 384
Grouping FAQs .......................................................................................................................... 385
Interoperability FAQs ................................................................................................................. 386
Authorization FAQs .................................................................................................................... 386
User Experience FAQs .............................................................................................................. 386
Licensing FAQs .......................................................................................................................... 387
Appendix J Keyboard Shortcuts 388
Appendix K Naming Conventions 389