Contents
xv
Appendix C User Group Privileges
357
Appendix D SNMP Traps
366
Appendix E CSV File Imports
368
Common CSV File Requirements .............................................................................................. 369
Audit Trail Entries for Importing ................................................................................................. 370
Troubleshoot CSV File Problems .............................................................................................. 371
Appendix F Troubleshooting
372
Appendix G Diagnostic Utilities
374
Memory Diagnostic .................................................................................................................... 374
Debug Mode .............................................................................................................................. 375
CC-SG Disk Monitoring.............................................................................................................. 376
Appendix H Two-Factor Authentication
379
Supported Environments for Two-Factor Authentication ........................................................... 379
Two-Factor Authentication Setup Requirements ....................................................................... 379
Two-Factor Authentication Known Issues ................................................................................. 379
Appendix I FAQs
380
General FAQs ............................................................................................................................ 380
Authentication FAQs .................................................................................................................. 382
Security FAQs ............................................................................................................................ 383
Accounting FAQs ....................................................................................................................... 384
Performance FAQs .................................................................................................................... 384
Grouping FAQs .......................................................................................................................... 385
Interoperability FAQs ................................................................................................................. 386
Authorization FAQs .................................................................................................................... 386
User Experience FAQs .............................................................................................................. 386
Licensing FAQs .......................................................................................................................... 387
Appendix J Keyboard Shortcuts
388
Appendix K Naming Conventions
389