Table Of Figures
Figure 203: GPS Log.....................................................................................................................236
Figure 204: SSH Server.................................................................................................................237
Figure 205: SSH Server Authentication Menu..............................................................................238
Figure 206: SSH Server Networking.............................................................................................238
Figure 207: SSH Server Access Control........................................................................................239
Figure 208: IRIGB/1588 Main Menu.............................................................................................244
Figure 209: IRIGB/IEEE1588 General Configuration menu........................................................244
Figure 210: IRIGB Configuration menu.......................................................................................245
Figure 211: IEEE1588 Configuration Menu.................................................................................245
Figure 212: IRIGB GPS Status.....................................................................................................246
Figure 213: IEEE1588 Status........................................................................................................246
Figure 214: IRIGB GPS Status.....................................................................................................246
Figure 215: Snort Main Menu part 1..............................................................................................249
Figure 216: Snort Main Menu part 2.............................................................................................249
Figure 217: Snort Main Menu part 3..............................................................................................250
Figure 218: Snort Ruleset Edit......................................................................................................250
Figure 219: Snort Network Settings..............................................................................................251
Figure 220: Snort Preprocessors...................................................................................................251
Figure 221: Snort Alerts................................................................................................................252
Figure 222: Alert Main Menu........................................................................................................253
Figure 223: Alert Configuration Menu..........................................................................................254
Figure 224: Alert Filter Configuration Menu.................................................................................255
Figure 225: Alert Definition Configuration Menu.........................................................................255
Figure 226: Change Alert Definition Menu...................................................................................256
Figure 227: Industrial Defender Agent Configuration...................................................................258
Figure 228: Industrial Defender Configuration – IP addresses saved............................................259
Figure 229: Industrial Defender Configuration - key obtained......................................................259
Figure 230: Gauntlet Security Appliance Menu............................................................................262
Figure 231: System Backup And Restore......................................................................................263
Figure 232: Backup and Restore General Configuration...............................................................264
Figure 233: Configuration Rollback menu....................................................................................265
Figure 234: Ethernet main menu while Configuration Rollback is active.....................................265
Figure 235: Configuration Rollback menu ready to accept changes..............................................265
Figure 236: Archive History..........................................................................................................266
Figure 237: Archive Backup..........................................................................................................267
Figure 238: Archive Backup, Complete.........................................................................................267
Figure 239: Archive Restore Menu................................................................................................268
Figure 240: Start Restore...............................................................................................................268
Figure 241: Archive Differences Menu.........................................................................................269
Figure 242: Archive Differences List.............................................................................................269
Figure 243: Show Difference for selected file between two targets..............................................270
Figure 244: SNMP Main Configuration Menu..............................................................................271
Figure 245: System Configuration Menu.......................................................................................272
Figure 246: Network Addressing Configuration Menu, Client Address.......................................272
Figure 247: Network Addressing Configuration Menu, Addresses to listen on...........................272
Figure 248: Access Control Menu, SNMP V1 and V2c................................................................273
Figure 249: Access Control Menu, SNMP V3...............................................................................273
Figure 250: Trap Configuration Menu, Trap Options....................................................................274
Figure 251: Trap Destinations V1 and V2c...................................................................................274
Figure 252: Trap Destinations V3..................................................................................................275
Figure 253: RADIUS Authentication Main Menu.........................................................................278
RuggedCom 23