Figure 170 – RIP Configuration .................................................................................................................................................................................................. 138
Figure 171 – OSPF Configuration ............................................................................................................................................................................................... 139
Figure 172 – Create / Edit OSPF Area Rules ............................................................................................................................................................................... 139
Figure 173 – OSPF Area Configuration ....................................................................................................................................................................................... 140
Figure 174 – BGP Configuration ................................................................................................................................................................................................. 140
Figure 175 – Create / Edit BGP Network Rules .......................................................................................................................................................................... 140
Figure 176 – BGP Network Configuration .................................................................................................................................................................................. 141
Figure 177 – Create / Edit BGP Neighbor Rules ......................................................................................................................................................................... 141
Figure 178 – BGP Neighbor Configuration ................................................................................................................................................................................. 141
Figure 179 – Routing Table ........................................................................................................................................................................................................ 142
Figure 180 – Policy Routing Information .................................................................................................................................................................................... 142
Figure 181 – DNS & DDNS Configuration ................................................................................................................................................................................... 143
Figure 182 – Pre-defined Domain Name List ............................................................................................................................................................................. 144
Figure 183 – Pre-defined Domain Name Configuration ............................................................................................................................................................. 144
Figure 184 – Dynamic DNS ......................................................................................................................................................................................................... 145
Figure 185 – Dynamic DNS ......................................................................................................................................................................................................... 145
Figure 186 – QoS Rule Configuration ......................................................................................................................................................................................... 147
Figure 187 – QoS Rule Example #1 - Connection Sessions ......................................................................................................................................................... 149
Figure 188 – QoS Rule Example #2 - DifferServ Code Points ...................................................................................................................................................... 149
Figure 189 – QoS Configuration ................................................................................................................................................................................................. 150
Figure 190 – System Resource Configuration ............................................................................................................................................................................ 151
Figure 191 – QoS Rule List ......................................................................................................................................................................................................... 152
Figure 192 – QoS Rule Configuration ......................................................................................................................................................................................... 152
Figure 193 – Time Schedule list ................................................................................................................................................................................................. 155
Figure 194 – Time Schedule configuration ................................................................................................................................................................................. 156
Figure 195 – User List & Status and individual Detail User List & Status .................................................................................................................................... 158
Figure 196 – User Profile Configuration ..................................................................................................................................................................................... 160
Figure 197 – User Group List ...................................................................................................................................................................................................... 161
Figure 198 – User Group Configuration section ......................................................................................................................................................................... 163
Figure 199 – Host Group list ...................................................................................................................................................................................................... 164
Figure 200 – Host Group Configuration section ......................................................................................................................................................................... 165
Figure 201 – External Server list ................................................................................................................................................................................................ 166
Figure 202 – External Server Configuration ............................................................................................................................................................................... 168
Figure 203 – Root CA ................................................................................................................................................................................................................. 171
Figure 204 – SCEP Configuration ................................................................................................................................................................................................ 172
Figure 205 – Self-signed Certificate Usage Scenario .................................................................................................................................................................. 173
Figure 206 – Local Certificate List .............................................................................................................................................................................................. 177
Figure 207 – Local Certificate Configuration .............................................................................................................................................................................. 177
Figure 208 – Import and PEM Encoded ..................................................................................................................................................................................... 179
Figure 209 – Self-signed Certificate Usage Scenario .................................................................................................................................................................. 180
Figure 210 – Trusted CA Certificate List ..................................................................................................................................................................................... 182
Figure 211 – Trusted CA Certificate Import – From File & From a PEM ..................................................................................................................................... 182
Figure 212 – Get CA Configuration ............................................................................................................................................................................................ 183
Figure 213 – Trusted Client Certificate List ................................................................................................................................................................................ 183
Figure 214 – Trusted Client Certificate Import – From File & From a PEM ................................................................................................................................ 183
Figure 215 – Trusted Client Key List ........................................................................................................................................................................................... 184
Figure 216 – Trusted Client Key Import - From File & From a PEM ............................................................................................................................................ 184
Figure 217 – Self-signed Certificate Usage Scenario .................................................................................................................................................................. 185
Figure 218 – Certificate Signing Request (CSR) - From File & From a PEM ................................................................................................................................. 187
Figure 219 – Bus & Protocol ...................................................................................................................................................................................................... 188
Figure 220 – Edit Serial Port Definition ...................................................................................................................................................................................... 188
Figure 221 – Virtual COM Serial Port Operation Mode Selector ................................................................................................................................................ 189
Figure 222 – TCP Client Mode .................................................................................................................................................................................................... 190
Figure 223 – Operation Mode Definition for each Serial Port – TCP Client ................................................................................................................................ 190
Figure 224 – Operation Mode Definition for each Serial Port – TCP Client ................................................................................................................................ 191
Figure 225 – TCP Server Mode ................................................................................................................................................................................................... 192
Figure 226 – Trusted IP Definition - TCP Server ......................................................................................................................................................................... 193
Figure 227 – UDP Mode ............................................................................................................................................................................................................. 194
Figure 228 – Legal Host IP Definition - UDP operation mode ..................................................................................................................................................... 195