Contents
vii
8AL90208USAD ed01
November 20, 2008
............................................................................................................................................................................................................................................................
............................................................................................................................................................................................................................................................
F Cookie Domains
Cookie basics ...............................................................................................................................................F-1
Cookie administration for ACS ..................................................................................................................F-2
Cookie mis-configuration ...........................................................................................................................F-3
G IM Archiving
IM archiving features and operating parameters .......................................................................................G-1
The SMTP message structure ....................................................................................................................G-2
Field definitions .......................................................................................................................................... G-4
H SNMP Traps
SNMP traps ................................................................................................................................................H-1
SNMP v2 ....................................................................................................................................................H-1
SNMP v3 ....................................................................................................................................................H-2
MIB ............................................................................................................................................................H-3
I Application Sharing Proxy Issues
Proxy traversal solutions ..............................................................................................................................I-2
Authentication .............................................................................................................................................I-2
Logging .........................................................................................................................................................I-2
Uninstall .......................................................................................................................................................I-3
IN Index