RuggedRouter
®
User Guide
Figure 203: GPS Log.....................................................................................................................238
Figure 204: SSH Server.................................................................................................................239
Figure 205: SSH Server Authentication Menu..............................................................................240
Figure 206: SSH Server Networking.............................................................................................240
Figure 207: SSH Server Access Control........................................................................................241
Figure 208: IRIGB/1588 Main Menu............................................................................................246
Figure 209: IRIGB/IEEE1588 General Configuration menu........................................................246
Figure 210: IRIGB Configuration menu.......................................................................................247
Figure 211: IEEE1588 Configuration Menu.................................................................................247
Figure 212: IRIGB GPS Status.....................................................................................................248
Figure 213: IEEE1588 Status........................................................................................................248
Figure 214: IRIGB GPS Status.....................................................................................................248
Figure 215: Snort Main Menu part 1.............................................................................................251
Figure 216: Snort Main Menu part 2............................................................................................251
Figure 217: Snort Main Menu part 3.............................................................................................252
Figure 218: Snort Ruleset Edit......................................................................................................252
Figure 219: Snort Network Settings..............................................................................................253
Figure 220: Snort Preprocessors...................................................................................................253
Figure 221: Snort Alerts.................................................................................................................254
Figure 222: Alert Main Menu........................................................................................................255
Figure 223: Alert Configuration Menu..........................................................................................256
Figure 224: Alert Filter Configuration Menu................................................................................257
Figure 225: Alert Definition Configuration Menu.........................................................................257
Figure 226: Change Alert Definition Menu...................................................................................258
Figure 227: Industrial Defender Agent Configuration...................................................................260
Figure 228: Industrial Defender Configuration – IP addresses saved............................................261
Figure 229: Industrial Defender Configuration - key obtained......................................................261
Figure 230: Gauntlet Security Appliance Menu............................................................................265
Figure 231: System Backup And Restore......................................................................................266
Figure 232: Backup and Restore General Configuration...............................................................267
Figure 233: Configuration Rollback menu....................................................................................268
Figure 234: Ethernet main menu while Configuration Rollback is active.....................................268
Figure 235: Configuration Rollback menu ready to accept changes..............................................268
Figure 236: Archive History..........................................................................................................269
Figure 237: Archive Backup..........................................................................................................270
Figure 238: Archive Backup, Complete........................................................................................270
Figure 239: Archive Restore Menu................................................................................................271
Figure 240: Start Restore...............................................................................................................271
Figure 241: Archive Differences Menu.........................................................................................272
Figure 242: Archive Differences List............................................................................................272
Figure 243: Show Difference for selected file between two targets..............................................273
Figure 244: SNMP Main Configuration Menu..............................................................................274
Figure 245: System Configuration Menu.......................................................................................275
Figure 246: Network Addressing Configuration Menu, Client Address.......................................275
Figure 247: Network Addressing Configuration Menu, Addresses to listen on...........................275
Figure 248: Access Control Menu, SNMP V1 and V2c................................................................276
Figure 249: Access Control Menu, SNMP V3..............................................................................276
Figure 250: Trap Configuration Menu, Trap Options....................................................................277
Figure 251: Trap Destinations V1 and V2c...................................................................................277
Figure 252: Trap Destinations V3..................................................................................................278
Figure 253: RADIUS Authentication Main Menu.........................................................................281
22 RuggedCom