Product Manual
Page 93
... Client policies) 3DES SHA-1 Pre-shared Key DH-Group 2(1024 bit) 24 hours 8 hours 91 Unified Services Router User Manual 2. Review the settings and click Connect to is received from a link on the local LAN. 4. Configure Remote and Local WAN address for a VPN Client or Gateway policy (these can be accessed from...
... Client policies) 3DES SHA-1 Pre-shared Key DH-Group 2(1024 bit) 24 hours 8 hours 91 Unified Services Router User Manual 2. Review the settings and click Connect to is received from a link on the local LAN. 4. Configure Remote and Local WAN address for a VPN Client or Gateway policy (these can be accessed from...
Product Manual
Page 106
..., the SSLVPN settings are multiple LDAP authentication servers, user can manage the router, use SSL VPN to access network resources, and login to observe and review configuration settings. The guest does not have SSL VPN access. Captive Portal User: These captive portal users has access through the router. Idle Timeout...
..., the SSLVPN settings are multiple LDAP authentication servers, user can manage the router, use SSL VPN to access network resources, and login to observe and review configuration settings. The guest does not have SSL VPN access. Captive Portal User: These captive portal users has access through the router. Idle Timeout...
Product Manual
Page 135
LAN to determine the type of service attacks, general attack information, login attempts, dropped packets, and similar events can be captured for later review. Accepted Packets are sent, either the Event Log viewer in the GUI (the Event Log viewer is in Syslog, E-mailed logs, or the Event Viewer. ...). E-mail logs, discussed in a subsequent section, follow the same configuration as logs configured for display in the Status > Logs page) or a remote Syslog server for review by the firewall.
LAN to determine the type of service attacks, general attack information, login attempts, dropped packets, and similar events can be captured for later review. Accepted Packets are sent, either the Event Log viewer in the GUI (the Event Log viewer is in Syslog, E-mailed logs, or the Event Viewer. ...). E-mail logs, discussed in a subsequent section, follow the same configuration as logs configured for display in the Status > Logs page) or a remote Syslog server for review by the firewall.
Product Manual
Page 151
... table will help diagnose uptime or transmit level issues with any of the most current port level data at each physical port are provided for review. The default auto-refresh for each page refresh. The statistics table has auto-refresh control which allows display of the wired ports, this page is...
... table will help diagnose uptime or transmit level issues with any of the most current port level data at each physical port are provided for review. The default auto-refresh for each page refresh. The statistics table has auto-refresh control which allows display of the wired ports, this page is...