Tables
Table v-1: Typographic Conventions................................................ 4
Table v-2: Other Terms and Conventions......................................... 5
Table 1-1: Model Numbers and Configuration Options................... 8
Table 1-2: Enabled services to access the ACS under each security
profile. ........................................................................... 13
Table 1-3: Enabled services to access the serial ports under each
profile. ........................................................................... 13
Table 1-4: Enabled protocols for each profile shown with a check
mark............................................................................... 14
Table 1-5: ACS Supported Authentication Methods...................... 14
Table 1-6: Filter Options for Packet Filtering Rules....................... 18
Table 1-7: TCP Protocol Packet Filtering Options......................... 19
Table 1-8: UDP Protocol Packet Filtering Options ........................ 20
Table 1-9: LOG Target Action Options .......................................... 22
Table 1-10: Tasks for Configuring Access to Connected Devices ... 26
Table 1-11: Tasks for Configuring Power Management................... 27
Table 1-12: Power Management Options in the Web Manager........ 29
Table 2-1: Shipping Box Contents for ACS4 - ACS48 ................. 32
Table 2-2: Shipping Box Contents for ACS1 ................................. 35
Table 2-3: ACS Basic Installation Tasks ........................................ 39
Table 2-4: Tasks Related to Connecting AlterPath PMs................. 53
Table 3-1: Common Screen Information ........................................ 57
Table 3-2: Java Applet Buttons...................................................... 59
Table 3-3: Serial Ports Connection Protocols................................. 61