Idle Timeout.............................................................................................................................................. 129
Enable Telnet or SSH Access.......................................................................................................... 132
Check the Access List...................................................................................................................... 132
Cannot Contact the MIP............................................................................................................................ 134
Check the Access List...................................................................................................................... 134
The AVG Stops Responding..................................................................................................................... 135
Console Connection......................................................................................................................... 136
A User Password is Lost........................................................................................................................... 136
Administrator User Password........................................................................................................... 136
Operator User Password.................................................................................................................. 136
Root User Password........................................................................................................................ 137
Boot User Password......................................................................................................................... 137
aaa................................................................................................................................................... 145
dns.................................................................................................................................................... 146
ike..................................................................................................................................................... 146
ipsec................................................................................................................................................. 147
ippool................................................................................................................................................ 147
ssl..................................................................................................................................................... 148
tg...................................................................................................................................................... 148
upref................................................................................................................................................. 148
smb................................................................................................................................................... 149
ftp..................................................................................................................................................... 149
netdirect............................................................................................................................................ 150
netdirect_packet............................................................................................................................... 150
System Diagnostics................................................................................................................................... 153
Network Diagnostics......................................................................................................................... 154
Error Log Files.................................................................................................................................. 156
Cipher List Formats................................................................................................................................... 158
Modifying a Cipher List.............................................................................................................................. 159
8
User Guide
131
157
April 2013