Specifications
Contents
xv
Appendix C User Group Privileges 352
Appendix D SNMP Traps 361
Appendix E CSV File Imports 363
Common CSV File Requirements .............................................................................................. 364
Audit Trail Entries for Importing ................................................................................................. 365
Troubleshoot CSV File Problems .............................................................................................. 366
Appendix F Troubleshooting 367
Appendix G Diagnostic Utilities 369
Memory Diagnostic .................................................................................................................... 369
Debug Mode .............................................................................................................................. 370
CC-SG Disk Monitoring.............................................................................................................. 371
Appendix H Two-Factor Authentication 374
Supported Environments for Two-Factor Authentication ........................................................... 374
Two-Factor Authentication Setup Requirements ....................................................................... 374
Two-Factor Authentication Known Issues ................................................................................. 374
Appendix I FAQs 375
General FAQs ............................................................................................................................ 375
Authentication FAQs .................................................................................................................. 377
Security FAQs ............................................................................................................................ 378
Accounting FAQs ....................................................................................................................... 379
Performance FAQs .................................................................................................................... 379
Grouping FAQs .......................................................................................................................... 380
Interoperability FAQs ................................................................................................................. 381
Authorization FAQs .................................................................................................................... 381
User Experience FAQs .............................................................................................................. 381
Appendix J Keyboard Shortcuts 383
Appendix K Naming Conventions 384
User Information ........................................................................................................................ 384