DPS Telecom NetGuardian 216T User manual

USER MANUAL
NetGuardian 216T Web Browser
January 27, 2009 D-OC-UM091.27100 Firmware Version 1.0B+
Visit our website at www.dpstelecom.com for the latest PDF manual and FAQs.

© 2006 DPS Telecom
This document contains proprietary information which is protected by copyright. All rights are reserved. No part of this
document may be photocopied without prior written consent of DPS Telecom.
All software and manuals are copyrighted by DPS Telecom. Said software and manuals may not be reproduced, copied,
transmitted or used to make a derivative work, by either mechanical, electronic or any other means in whole or in part,
without prior written consent from DPS Telecom, except as required by United States copyright laws.
The material in this manual is for information purposes and is subject to change without notice. DPS Telecom shall not be
liable for errors contained herein or consequential damages in connection with the furnishing, performance, or use of this
manual.
Notice
January 27, 2009
June 26, 2006
July 19, 2006
July 25, 2006
Revision History
Added PPP and Bridge Mode information.
NetGuardian 216T User Manual (D-OC-UM066.26100) released.
Supports Firmware Version 1.0B+.
NetGuardian Edit216T UM (D-OC-UM067.19100) released.
NetGuardian Web Browser UM (D-OC-UM067.25100) released.

ContentsVisit our website at www.dpstelecom.com for the latest PDF manual and FAQs
Overview11
Introduction1.1 1
Potential Problems using Web Interface in a Secure Proxy Network1.2 1
Some NetGuardian 216T Features1.3 1
Unit Configuration23
Logging on to the NetGuardian2.1 3
Entering System Settings2.2 3
Changing the Logon Password2.3 5
Logon Profiles and Access Rights2.3.1 5
Configuring Port Parameters2.4 7
T1 WAN2.4.1 7
Network Address Translation (NAT)2.4.1.1 9
Gateway Mode2.4.1.1.1 9
Router Mode2.4.1.1.2 9
Ethernet Ports2.4.2 10
Using the Base URL Field2.4.3 11
Setting Up The SNMP2.4.4 12
Filter IPA Config and Operation2.4.5 13
Changing Craft Port Communication Settings2.4.6 14
Configuring the Data Port2.4.7 15
Data Port Types2.4.7.1 15
Direct and Indirect Proxy Connections2.4.7.2 16
Setting Up Notification Methods2.5 17
Text Paging Setup2.5.1 18
Email Notification Setup2.5.2 18
SMTP POP3 Authentication Support2.5.2.1 19
SNMP Paging Setup2.5.3 19
TCP Paging Setup2.5.4 20
Defining Point Groups2.6 21
Configuring Base Discrete Alarms2.7 21
Event Qualification Timers2.8 23
Setting System Alarm Notifications2.9 24
Configure the Accumulation Timer2.10 25
Configuring Ping Targets2.11 26
Analog Parameters2.12 26

Integrated Temperature and Battery Sensor2.12.1 28
Analog Polarity Override2.12.2 28
Analog Step Sizes2.12.3 29
Configuring the Control Relays2.13 29
Activating Relays from an Alarm Point's Change of Status2.13.1 30
Echoing alarm points to relays2.13.1.1 30
Oring echoed alarm points2.13.1.2 30
Derived Control Relays and Virtual Alarming2.13.2 30
Relay Operating Modes2.13.3 31
Echoed Mode2.13.3.1 31
ORed Mode2.13.3.2 31
Normal Mode2.13.3.3 32
Override Default Relay Momentary Time Using Event Qualification2.13.4 32
Setting System Timers2.14 33
Setting the System Date and Time2.15 35
Network Time Protocol Support2.15.1 36
Alarm Sync2.16 36
Saving Changes or Resetting Factory Defaults2.17 37
Rebooting the NetGuardian2.18 37
Web Server Monitoring338
Alarm Summary Window3.1 38
Monitoring Base Alarms3.2 39
Monitoring Ping Targets3.3 39
Monitoring Analogs3.4 40
Monitoring System Alarms3.5 41
Operating Controls3.6 42
Event Logging3.7 42
Monitoring Data Port Activity3.8 43
Appendixes445
Appendix A — Display Mapping4.1 45
System Alarms Display Map4.1.1 47
Appendix B — SNMP Manager Functions4.2 49
Appendix C — SNMP Granular Trap Packets4.3 52
Appendix D — ASCII Conversion4.4 53
Frequently Asked Questions554
General FAQs5.1 54
SNMP FAQs5.2 55

Pager FAQs5.3 56
Technical Support657

1
Overview1
Fig. 1.1. The NetGuardian 216T monitors alarms, pings network elements, and reports via SNMP, pager, or
email
Introduction1.1
The NetGuardian's Web Browser Interface lets you manage alarms and configure the unit through the Internet or
your Intranet. You can quickly set up alarm point descriptions, view alarm status, issue controls, configure
paging information, and more. The NetGuardian supports Internet Explorer versions 4.0 and above and Netscape
Navigator versions 4.7 and above.
Fig. 1.1.1. NetGuardian 216T has the capacity to monitor IP aware devices' network presence and also
interfaces discrete alarm points and controls at your network sites
Potential Problems using Web Interface in a Secure Proxy Network1.2
Using the Web Browser Interface for the NetGuardian in a secure proxy network can cause certain problems to
occur. If you are logged on to the NetGuardian from within your network through a proxy, and another user from
within your network tries to access the same NetGuardian, the second user will not need to login to the
NetGuardian. Both users will essentially be logged in using the same IP address because of the masking done by
the proxy server.
Some NetGuardian 216T Features1.3
NetGuardian 216T includes the following features:
T1 WAN network interface:
NetGuardian 216T supports Frame Relay/T1 for connecting two Ethernet subnets

2
Integrated 10-BaseT Hub: 7 hubed Ethernet ports reduces equipment necessary for your remote site.
SNMP v2c Support and Robust Message Delivery
NetGuardian 216T supports SNMP v2c, and the SNMP INFORM command, which permits robust delivery of
alarm notification to your SNMP manager.
Alarm Point Grouping
Each NetGuardian Alarm point can be assigned to one of eight groups, which are identified with a user-defined
label. Some of the ways you can use Alarm Point Grouping include:
Alarm Severity Levels: Configure the NetGuardian to indicate assigned alarm security
levels like Critical, Major, Minor and Status in a variable
binding within the SNMP TRAP or INFORM message — so
alarms can be sorted by severity even if your SNMP manager
doesn't support severity levels.
Two Sets of Alarm Severity Levels: With 8 alarm groups to work with, you can easily create two
different sets of severity levels. For example, you could separate
power alarms (rated from Critical to Status) from environmental
alarms (also rated Critical to Status).
Custom Virtual Alarms: Create virtual alarms based on easy formulas like All security
alarms or Critical power alarms.
Flexible Custom Derived Controls: NetGuardian 216T lets you create Derived Controls formulas
based on Alarm Point Groups.
Granular Pager and Email Notification: Selectively assign alarm points to specific pager and email
notification recipients. The NetGuardian can be configured to
send pager notifications only for Critical or Major alarms — or
you can send power alarms to repair technicians and intrusion
alarms to a security guard.
Global Support for Dual SNMP Managers
NetGuardian 216T supports sending all SNMP TRAP and INFORM notifications to two global SNMP
managers. This makes it easier to configure a secondary SNMP manager and frees up your NetGuardian
configuration for additional notification devices and more flexible alarm reporting. You can easily send an alarm
to your primary SNMP manager at the NOC; to a secondary backup SNMP manager at another location; to the
pager of the on-call technician; and the email in-box of the technician's supervisor.
Filter or Reset the NetGuardian Event Log
The NetGuardian Event Log supports the following NetGuardian 216T features:
• You can filter Event Log entries by Alarm Point Group, to see only the alarms you want.
•You can reset the Event Log, to clear old alarms from the display.
•You can reset the Event Log by Alarm Point Group; for example, clear power alarms while retaining intruder
alarms.
Alarm Sync Makes Turnup and Testing Easy
NetGuardian 216T also provides a new command to re-synchronize all alarms. This command clears all alarms,
so that a new notification is sent for all standing alarms. You can easily test alarm connections during turnup
without rebooting the NetGuardian unit.

3
Unit Configuration2
Logging on to the NetGuardian2.1
For Web Interface functionality, the unit must first be configured with some basic network information. If this
step has not been done, refer to the NetGuardian User Manual for initial software configuration setup.
1. To connect to the NetGuardian from your Web browser, you must know its IP address or domain name if it
has been registered with your internal DNS. Enter it in the address bar of your Web browser. It may be
helpful to bookmark the logon page to simplify access.
2. After connecting to the NetGuardian's IP address, enter your password and click Submit (see Figure 2.1.1).
Note: The factory default password is dpstelecom.
3. In the left frame there is a Monitor menu button and an Edit menu button. Most of the software
configuration will occur in the Edit menu. The following sections provide detailed information regarding
these functions.
!Hot Tip!
If the Edit menu does not appear in the left frame after logging on, it means that another station has already
logged on as the primary user. The maximum number of users allowed to simultaneously access the NetGuardian
via Web is four. The primary user is the only user with access to the editing features.
Exiting the Web interface without logging out prevents other users from accessing the Editing features, as well.
Web sessions are tracked by IP address and the session will time out after twelve minutes of inactivity, unless
configured with a longer Web timeout duration. (See section 2.14, "Setting System Timers" for more
information.)
Fig. 2.1.1. Enter your password to enter the NetGuardian Web Browser Interface
Entering System Settings2.2
From the System screen you can enter the name, location, contact, features, and SNMP community names.
Use the following steps to define your NetGuardian system information:
1. From the Edit menu choose System (see Figure 2.2).
2. Enter the designated user name for your NetGuardian.*
3. Enter the location or address of the NetGuardian.*
4. Set the contact by entering the telephone number or other contact information for the person or group
responsible for this NetGuardian.
5. The Features field is used for entering feature codes for future upgrades. Do not change this code unless
instructed by DPS Technical Support.

4
6. Click Submit to save your system information settings.
* If using email pager type refer to Section 2.5 for correct name and location field formatting.New link
Fig. 2.2.1.Configure the system information by selecting the System screen from the Edit menu
Field Description
Name Used to set the Name@Location email address.
Note: Name is the portion before the @ character.
Location Used to set the Name@Location email address.
Note: Location is the portion after the @ character, this is a host name or IP
address.
Contact Information for how to contact the person responsible for this NetGuardian.
Phone Contact's telephone number.
Features Used for entering feature codes for future upgrade features.
Unit ID User definable ID number for this NetGuardian (DCP Address).
DCP Port Enter the DCP Port for this NetGuardian. (serial or UDP/IP Port)
DCP Protocol Default DCP protocol is DCPx, but can be changed to DCPt.
Table 2.2.A. System fields

5
Changing the Logon Password2.3
The password can be configured from the Edit menu > Logon screen > Master Password section. The
minimum password length is four characters; however, DPS recommends setting the minimum password length
to at least five characters. You can also configure security logon profiles to individual access rights in the
Logon Profile screen. (See Section 2.3.1 for logon profile configuration information.)
Note: The factory default password is dpstelecom. DPS Telecom strongly recommends that the default
password be changed.
Use the following steps to change the logon password:
1. From the Edit menu select Logon.
2. Enter the minimum password length you wish to set.
3. Enter your new password in the Password and Confirm Password fields.
4. Click the Submit Data button.
Fig. 2.3.1. Configure the password parameters from the Login screen
2.3.1 Logon Profiles and Access Rights
Creating logon profiles allows you to grant personnel access to certain functions of the NetGuardian without
allowing access to sensitive or secure areas of the database.
Use the following steps to create logon profiles:
1. From the Edit menu select Logon, then click on the Available link. (See Figure 2.3.1.1.)
2. Enter the user information in the appropriate fields. See Table 2.3.1.A for field and access privileges
descriptions.
3. Click Submit Data to save the user profile.

6
Fig. 2.3.1.1. Configure access privileges for users in the Logon Profile screen
Profile Field Description
User Enter a username or a user description. (18 characters maximum)
Password Enter a unique user password. (4 characters minimum)
Note: This password will be used by the NetGuardian to determine whether any
limited access applies.
Confirm Password Re-enter the password.
Call Back Field not used by NetGuardion 216T.
Access Privileges
Admin Enables the user to add/modify logon profiles and NetGuardian password
information.
Note: Selecting security also automatically activates the DB Edit.
DB Edit Enables the user to perform database edits in the NetGuardian.
Monitor Enables the user to have Monitor access of the NetGuardian.
SDMonitor Enables the user to view serial port buffers.
Control Gives the user the ability to issue controls. This also automatically activates Monitor.
Reach-Through Enables the user to achieve reach-through (Proxy) access.
Modem Field not used by NetGuardian 216T.
Telnet Enables the user to have Telnet access to the unit.
PPP Field not used by NetGuardian 216T.
Table 2.3.1.A. Logon profile field descriptions

7
Configuring Port Parameters2.4
The Edit menu > T1 WAN screen allows you to configure the T1 WAN, Ethernet, craft port and data port
settings.
2.4.1 T1 WAN
Fig. 2.4.1. T1 WAN port configuration is accomplished from the WAN menu (Frame Relay)
Field Description
IP Address WAN address for the NetGuardian.
Subnet Mask The Subnet mask is a road sign to the NetGuardian
telling it whether your packets should stay on your local
network or be forwarded somewhere else on a wide area
network.
DS0 Start The default DS0 value is 1 (64 kbps), but the NetGuardian
supports up to 24 DS0 channels (24 DS0s=1.536 mbps).
Note: The value entered here must correspond to the DS0
end value.
DS0 End The default DS0 value is 1 (64 kbps), but the
NetGuardian supports up to 24 DS0 channels (24
DS0s=1.536 mbps).
Enable WAN and
IP Routing The Enable WAN and IP Routing box should be
checked for routing packets between T1 WAN and the
Ethernet hub.
Enable B8ZS Line
Mode The Enable B8ZS Line Mode box should be checked for
B8ZS line mode operation (normal).
Frame Mode Default frame mode is ESF, but you have the option of
switching to D4.
Clock Source Default clock is network, but you have the option of
switching to an internal clock source.
Protocol The NetGuardian's T1 protocol is Frame Relay or PPP.
(See Fig. 2.4.2)

8
DLCI DLCI (Data Link Connection Identifier) is a channel
number attached to the Frame Relay that tells the
network how to route the data. The NetGuardian
default is 16.
LMI LMI (Link Management Interface) is a signaling
standard used between routers and Frame Relay
switches. The default mode is ANSI, but can be
changed to ITU.
Table 2.4.A. T1 WAN configuration option descriptions (continued on next page)
Fig. 2.4.2. T1 WAN port configuration in PPP mode.
Field Description
Default Gateway Informs the NetGuardian which machine is the gateway out
of your local network. Set to 255.255.255.255 if not using.
Bridge Mode
Control
(In PPP mode
only)
Bridge mode enables the internet addresses on the PPP/T1
subnet to operate on the same subnet as the Ethernet. Bridge
mode disables routing between LAN and WAN pass through.
(RFC 1638)
Table 2.4.A (continued). T1 WAN configuration option descriptions
Use the following steps to configure the T1 WAN port settings:
1. Configure the NetGuardian T1 WAN port by clicking on the T1 WAN link from the Edit menu.
2. Enter the appropriate information for T1 WAN in the corresponding fields. Refer to Figure 2.4.1 and Table
2.4.A.
3. Click Submit Data to save your configuration settings.

9
2.4.1.1 Network Address Translation (NAT)
2.4.1.1.1 Gateway Mode
Gateway mode tells the NetGuardian to automatically pass all inbound Ethernet traffic not destined for an IP
address on the Ethernet subnet to the T1 WAN channel. Similarly, inbound IP packets encapsulated within
Frame Relay on the T1 WAN channel are forwarded out the Ethernet Hub*.
To enable Gateway mode of operation, all entries in the Static Network Address Translation (NAT) table must
have the "Enable" box left unchecked. Addresses are not translated in Gateway mode.
*Exception: IP packets will not forward to the Hub if the destination address is the NetGuardian's Ethernet
address.
Fig. 2.4.1.1.1. Configuration for Ethernet gateway traffic
2.4.1.1.2 Router Mode
The wide area network (WAN) connects two separate, private networks, allowing for mutual communication.
Before this can happen, the IP address of the local computer must be translated so that it will be recognized and
passed through to another network. This is where Network Address Translation (NAT) is used. NAT translates
the IP address for traffic coming into and leaving the local network.
From the Web browser T1 WAN menu, you can configure network computers for NAT translation in the Static
Network Address Translation fields. Be sure to select (check) the "Enable" column box.
Note: The submask number must be the same for the first three octets, which are followed by the computer's ID
number. If your submask number is outside the subnet range, use the gateway address to route the connection.
Figure 2.4.1.1 shows an example of NAT enabling for several network computers.

10
Fig. 2.4.1.1. NAT translation fields for local network computers
2.4.2 Ethernet Ports
Use the following steps to configure the Ethernet port settings:
1. Configure the NetGuardian ethernet port by clicking on the Ethernet link from the Edit menu.
2. Enter the appropriate information for your ethernet port in the corresponding fields. Refer to Figure 2.4.2.1
and Table 2.4.2.B.
3. Click Submit Data to save your configuration settings.
Fig. 2.4.2.1. All port configuration is accomplished from the Edit menu > Ports screen

11
Field Description
Unit Address IP address of the NetGuardian
Subnet Mask The Subnet mask is a road sign to the NetGuardian telling it whether your packets
should stay on your local network or be forwarded somewhere else on a wide area
network.
Default Gateway An important parameter if you are on a network that is connected to a wide area
network. It tell the NetGuardian which machine is the gateway out of your local
network. Set to 255.255.255.255 if not using .
MAC Address Hardware address of the NetGuardian (not editable, for reference only).
DNS Address IP address of the domain name server. Set to 255.255.255.255 if not using.
Proxy Base Defines the NetGuardian TCP ports used by the data (serial) port. Data port 1
receives the port number entered here.
DHCP Toggles the Dynamic Host Connection Protocol On or Off
Base URL The Base URL is the destination website address o the alarm point descriptions
hyperlinks. See Section 2.4.3, "Using the Base URL Field."
Table 2.4.2.B. Fields in the Edit > Ports > Ethernet Port settings
2.4.3 Using the Base URL Field
The NetGuardian allows users to turn each alarm point description into a hyperlink. When utilized, the alarm
description for each alarm point that appears in the monitor mode (for base alarms, ping targets, or system
alarms) becomes a link that directs technicians/managers to specific Web pages or to other files viewable by a
Web browser. This allows users to create easily accessible informational databases on how to handle specific
alarm conditions or other instructions. The hyperlinked page or file will be displayed in the main window frame
of the NetGuardian Web browser. Follow the directions below to create hyperlinks for alarm point descriptions.
1. From the Edit Menu select Ports. Scroll down to the Base URL field (see Figure 2.4.2.1).
2. Enter your base URL (e.g. http://www.dpstelecom.com). The NetGuardian creates the links from the
alarm point descriptions based on the URL. Once the base URL is entered, the NetGuardian automatically
attaches a unique suffix to each alarm point. For example, if the base URL is
http://www.dpstelecom.com the link for the base alarm at point 1 would be
http://www.dpstele.com/base1.html, Base Alarm Point 2 would be
http://www.dpstele.com/base2.html, and so on.
3. To add a suffix other than html to the hyperlinks, insert the text &pntID;into the base URL. This
allows the user to specify the extension. For example, if the base URL is
http://www.dpstele.com/&pntID;.pdf, the link for the base alarm at point 1 would be
http://www.dpstele.com/base1.pdf/
!Hot Tip!
Any file type that is viewable in your Web browser (e.g. word document, PDF, txt, etc.) is a linkable file.
4. The same link structure applies to the Ping Alarms, System Alarms, and Analog Alarms fields. See Table
2.4.3.C for specific URL extension link information.

12
Alarm Page Base URL web page link*
Base Alarms Base1.html - Base32.html
Ping Alarms Ping1.html - Ping32.html
System Alarms System1.html - System64.html
Analog Alarms Analog1.html - Analog8.html
Table 2.4.3.C. Specific link extensions
* Using the &pntID;code in the base URL enables you to link to any file type viewable in your Web browser.
2.4.4 Setting Up The SNMP
Use the following steps to define your NetGuardian system information:
1. From the Edit menu choose SNMP (see Figure 2.4.4.1).
2. Enter the community name for SNMP GET requests.
3. Enter the community name for SNMP SET requests.
4. Enter the community name for SNMP TRAPs.
5. Define the IP address of your trap manager. Set to 255.255.255.255 if not using.
6. Define the UDP port set by the SNMP manager to receive traps; usually 162.
7. Select the Format in which you want your traps to be sent to your manager in.
8. Click Submit to save your system information settings.
Fig. 2.4.4.1. SNMP Menu
Communities
G)et Community name for SNMP requests.
S)et Community name for SNMP SET requests.
T)rap Community name for SNMP TRAP requests.
Field Description
IPA Defines the SNMP trap manager's IP address. Set to 255.255.255.255 if not using.
Port The SNMP port is the UDP port set by the SNMP manager to receive traps, usually set to
162.
Format Select between SNMPv1 TRAP, SNMP v2c TRAP, and SNMP v2c INFORM.
Table 2.4.4.D. Fields in the Edit > SNMP settings

13
2.4.5 Filter IPA Config and Operation
The Filter IPA table allows you to increase the NetGuardian's network security by allowing or blocking packets
from specified IP addresses. Addresses which appear in the table will be processed by the NetGuardian. Defined
IP addresses associated with network cameras or the network time server are automatically processed and will
not be filtered out by this feature. Broadcast packets of 255.255.255.255 and ARP requests for the NetGuardian
IP address are also not filtered.
1. From the Edit menu select Filter IPA.
2. A warning prompt will appear (see Figure 2.4.5.1). Click OK to continue, or Exit to cancel.
Fig. 2.4.5.1 Filter IPA warning prompt
3. Once enabled, only the IP addresses in the table will be allowed access to the NetGuardian.
4. Select the Enable IPA Table box.
5. Enter the IP address of the machine(s) you would like to give access to the NetGuardian.
6. Click Submit to save the configuration settings.
!Hot Tip!
Entering a zero in any of the octet fields will declare that part of the octet to be a wildcard.
WARNING: Does not work with networks that assign IP addresses. Use the wildcard field to open an entire
subnet.
Two Modes:
Firewall: Block specific addresses
Filter table: only allow specific addresses
!Hot Tip!
Filter IPA table is primarily used for diagnostic purposes and should not be required unless to increase security.

14
Fig. 2.4.5.2. Select Filter IPA from the Edit menu to configure your Filter IPA table
2.4.6 Changing Craft Port Communication Settings
Use the following steps to change the craft port communication settings:
1. From the Edit menu > Ports screen, scroll down to the Craft section (see Figure 2.4.6).
2. You can set the baud rate for the craft port to 300, 1200, 2400, 9600, 19200, 38400, 57600, 115200. (Default
Baud is 9600)
3. Under the Wfmt (word format) field, select the appropriate data bits, parity, and stop bits setting to match
your terminal emulation software or device connected to the NetGuardian craft port. (Default designation is
8,N,1)
4. Click Submit Data to save the craft port settings.

15
Fig. 2.4.6. Configure the front panel craft port parameters from the Ports screen
2.4.7 Configuring the Data Port
Data port settings can be configured in the Edit menu > Ports screen.
Use the following steps to define your data port settings:
1. From the Ports window, scroll down to the Data Port section (see Figure 2.4.7).
2. Under the options heading, enter in the appropriate number of NetGuardian Discrete Expansions (1-3)
installed.* Entering zero disables these options.
3. Enter a description for the port with a connected device. The communication settings for the port can be
configured for baud rate, word format and to ignore or remove CR/LF (carriage return/line feed) characters
in either the input or output data stream.
4. Advanced settings can also be configured when you select an appropriate data port type. See Section 2.4.7.1
to select the appropriate data port type setting for your application.
!Hot Tip!
NGDdx is an abbreviation for "NetGuardian Expansion." Expansion units enable you to scale from 16 base
alarms and 2 base relays to a maximum of 160 alarms and 26 relays.
Note: If you have the serial expansion board installed, you will see 5 serial ports instead of one.
Fig. 2.4.7. Configure the data port parameters from the Ports screen
2.4.7.1 Data Port Types
The NetGuardian 216T's data port can be configured with different functions:
TCP
Makes reach-through available at TCP ports (Telnet).
RTCP
Raw TCP (negates Telnet negotiation). The RTCP (Raw TCP Data Port) negates Telnet negotiation and will
allow all characters (including [FF]) to pass straight through from IP to serial or serial to IP.
PTCP
Table of contents
Popular Firewall manuals by other brands

PaloAlto Networks
PaloAlto Networks M-300 Hardware reference

SonicWALL
SonicWALL TZ 150 Wireless Getting started guide

SonicWALL
SonicWALL NSA 250M series Getting started guide

Cisco
Cisco RV120W quick start guide

H3C
H3C SecPath F5030 Configuration guide

Fortinet
Fortinet FortiGate FortiGate-300 Administration guide

TEMPERED
TEMPERED Airwall-250 Series installation instructions

Fortinet
Fortinet FortiGate FortiGate-5001 Administration guide

Vasco
Vasco Personal aXsGUARD How-to guide

Cisco
Cisco Firepower 4110 Preparative procedures & operational user guide

McAfee
McAfee Data Loss Prevention Prevent quick start guide

EBLOCKER
EBLOCKER PRO user manual