Raritan Computer Home Security System Home Security System User Manual


 
Contents
xiv
Appendix C User Group Privileges 321
Appendix D SNMP Traps 330
Appendix E CSV File Imports 332
Common CSV File Requirements..............................................................................................333
Audit Trail Entries for Importing .................................................................................................334
Troubleshoot CSV File Problems ..............................................................................................335
Appendix F Troubleshooting 336
Appendix G Diagnostic Utilities 338
Memory Diagnostic ....................................................................................................................338
Debug Mode ..............................................................................................................................339
CC-SG Disk Monitoring .............................................................................................................340
Appendix H Two-Factor Authentication 343
Supported Environments for Two-Factor Authentication...........................................................343
Two-Factor Authentication Setup Requirements.......................................................................343
Two-Factor Authentication Known Issues .................................................................................343
Appendix I FAQs 344
General FAQs............................................................................................................................344
Authentication FAQs..................................................................................................................346
Security FAQs............................................................................................................................347
Accounting FAQs.......................................................................................................................348
Performance FAQs ....................................................................................................................348
Grouping FAQs..........................................................................................................................349
Interoperability FAQs .................................................................................................................350
Authorization FAQs....................................................................................................................350
User Experience FAQs ..............................................................................................................350
Appendix J Keyboard Shortcuts 352
Appendix K Naming Conventions 353
User Information ........................................................................................................................353