Installation guide

Identifying security risks 22-46
Chapter 22: Monitoring and Maintenance
Wave Global Administrator Guide
4 Choose The Storage \ Special Directories tab.
5 Click
Move next to a component to specify a new location for that component.
6 When you are done changing special directory locations, click
OK.
Identifying security risks
You can analyze your system for potential security risks by choosing Tools > Analyze Security.
For more information on system security, see A, “Protecting Your Phone System Against Toll
Fraud.”
Capturing network troubleshooting logs
By default, Wave continually captures network traffic information and write it to logs that can
help simplify the troubleshooting of client/server or voice-over-IP communications issues.
Network capture logs capture the following protocols:
Session Initiation Protocol (SIP).
Realtime Transport Protocol (RTP). (RTP logging is turned off by default.)
Trivial File Transfer Protocol (TFTP)
Address Resolution Protocol (ARP)
Release 2.0
September 2010