![Harris CM-30 Installation & Operation Manual Download Page 115](http://html1.mh-extra.com/html/harris/cm-30/cm-30_installation-and-operation-manual_4019658115.webp)
4 – Configuration & Operation
NetXpress LX & CM-30 Installation & Operation Manual
Version 1, September 2010
Harris Corporation
4-69
Intraplex Products
Default TTL:
The default Time to Live (TTL) value put in each IP packet sent by the CM-30 system.
This defines the number of router hops that can be made before this packet is dropped.
Error Statistics
Inbound datagrams discarded:
The number of input IP datagrams that were received by CM-30 IP
protocol stack with no errors but were discarded for other reasons (for example, for lack of buffer
space).
Outbound datagrams discarded:
The number of output IP datagrams received by the IP protocol
stack with no errors but were discarded for other reasons (e.g., for lack of buffer space).
Received header errors:
The number of packets containing header errors.
Received address errors:
The number of packets received by the CM-30 system containing
addressing errors.
Unknown protocols errors:
The number of packets received by the CM-30 system containing
unknown protocols.
Unroutable datagrams:
The number of datagrams received by the CM-30 IP protocol stack that
could not be routed.
Fragmentation Statistics
Fragments received:
The number of received packets fragmented successfully.
Fragments sent:
The number of frames requiring fragmentation before sending.
Datagrams reassembled:
The number of fragmented datagrams that have been reassembled by the
CM-30 IP protocol stack.
Datagrams fragmented:
The number of fragmented datagrams received by the CM-30 IP protocol
stack.
Datagrams failing reassembly:
The number of attempted datagram reassemblies by the CM-30
system.
Datagrams failing fragmentation:
The number of datagram fragmentations that failed.
4.3.7 Set Up Security
Security
configuration in the CM-30 system includes these tables:
Accounts:
A list of existing user accounts. You can add, edit, and delete
accounts from this table.
IP Access List:
A list of IP addresses that are allowed to manage the
system via the interface. You can add or delete accounts from this table.
4.3.7.1 Accounts
Use the
Web Interface User Accounts
configuration table (Figure 4-64) to view existing user
accounts and to establish and control user access and FTP privileges through password entry. To
access the table, click
Security
|
Accounts
. You can change account passwords and user groups and
delete user accounts from this table.