Skip to content

Getting Started

About this Document

In this guide, we explain how to set up an AXS Guard appliance from scratch. This document is intended for technical personnel, system administrators and network administrators.

If the appliance you intend to configure will be used exclusively as an authentication server in your Local Area Network, please refer to the AXS Guard Authentication manual on this site.

Examples used in this Guide

All setups and configuration examples in this guide are executed as an advanced administrator. Some options are not available if you log in as a full administrator or a user with lower access privileges.

As software development and documentation are ongoing processes, the screenshots shown in this guide may slightly deviate from the current user interface.

Safety and Environmental Information

Electrical Safety

The mains plug is used as disconnect device and it shall remain readily operable during intended use. Powering off or disconnecting the power cord while the appliance is booting or in operation may result in system damage.

  • Use the proper power cord to connect your appliance.

  • Only use a power cord which is certified in compliance with safety regulations.

  • Only use a power cord which is compliant with the AC voltage requirements in your region.

  • Before turning on the power, plug the power cord(s) into a socket which is properly grounded.

  • Before disconnecting the power supply, turn off the system.

  • Use the exact type of network cable recommended.

  • To conform to certification restrictions, only use a network cable with maximum length of 3.0 meters.

Environmental Safety

Components containing perchlorate!

This product contains (a) battery(ies), a printed circuit board (pcb) and a LCD display that may require special handling at end-of-life.

Protect the environment

Producing the AXS Guard appliance involves the extraction and use of natural resources. The product may contain substances which are hazardous for human health and the environment.

To reduce the risk of any hazardous substances being released into the environment and to reduce the depletion of natural resources, we encourage you to use appropriate recycling systems.

Such systems reuse or recycle most end-of-life materials in a safe way. The crossed-bin symbol invites you to use such systems. Further information on collection, reuse and recycling is available from your local or regional refuse administration center.


Personal Safety

Avoid back injuries. Keep your back straight and bend your knees when lifting the appliance.

Do not lift or carry the appliance by its chassis handles. These handles should only be used to slide the AXS Guard in and out of the chassis rails.

Do not drop the appliance.

Before you Begin

Collecting the following information before you start will help to speed up your installation:

  • an unused IP address in your network

  • the Default Gateway setting in your network

  • DNS Server IP address(es) for your network

  • DNS Suffix(es) (optional)

  • the Contract ID (Maintenance Reference) provided by Able for licensing your appliance

  • the serial number provided by Able for licensing your appliance

  • an appropriate network cable, with a maximum length of 3.0 meters

Connecting AXS Guard to your Network


In this section we provide step by step instructions to connect the AXS Guard appliance to your network.

Read the safety and environmental information and check that all the package contents are present.

The contents are listed on a separate sheet supplied with the AXS Guard appliance. Ensure that you have all the information required prior to installation.

Powering on AXS Guard

Connect the interface labeled as eth0 to your network’s hub or switch. This is the default secure network interface of the appliance. Example stickers are shown below; check the stickers on your AXS Guard appliance to identify the correct network port.

Ethernet Interfaces per Model


The AG-7690 model has been discontinued and will be replaced by the AG-9198 model.

AG-9 Ethernet Interface Layout

  1. Connect the AXS Guard appliance to a power socket. The AG-7XXX models are equipped with two power supplies, needing a separate power cable each. Make sure to connect the power cables to separate power circuits, e.g. the main power circuit and a UPS unit. The second power supply provides redundancy in case the primary power circuit fails.

  2. Power up the AXS Guard by pressing the power switch once. A green LED will illuminate.

  3. A green light next to the network port where the network cable is plugged in indicates that the appliance is correctly connected to your network. If a green light is not visible, check that the network cable is in good working condition and correctly plugged into the eth0 device.


LED Description
temp System is overheating and critical if illuminated or blinking.
connection Indicates the connection status of the onboard NICs. If illuminated, the NIC(s) is/are correctly connected to your network.
temp Indicates HDD activity. If this LED remains illuminated and you are unable to log in to the AXS Guard appliance, a system error has probably occurred. Log in to the console and reboot the appliance if necessary.
temp Indicates that the appliance is powered on.

Factory Default Network Settings

Installation requires temporarily isolating a client workstation from the network and linking it to the AXS Guard appliance.

This involves changing a client workstation IP address to an address within the factory default IP address range of the AXS Guard appliance.

During first-time configuration, you will be invited to change the default IP address to match your network configuration. The client’s previous network settings can then be restored.

Network Parameter Default Configuration
IP address/Netmask
Web-based configuration tool URL
Network Hostname axsguard
Domain Name
DHCP Server disabled

Workstation TCP/IP Settings

A workstation must be temporarily configured so you can log in to the web-based configuration tool of your AXS Guard appliance.

  1. Configure your workstation with an IP address in the same range as the factory default range of the appliance, i.e.
  2. Once the network settings are configured and applied, open a Windows command prompt or Linux terminal and run the following command: ping


If a reply is received, log in to your appliance to start the first-time configuration wizard.

If a Request Timed Out or Destination Host Unreachable response is received, please check the following:

  • Check that the workstation’s TCP/IP settings have been correctly entered.

  • Check that the network cable is in good working condition and correctly plugged into the AXS Guard eth0 device.

Once the workstation is correctly configured, the AXS Guard administrator tool can be accessed through a browser on the workstation.

Web-based Administrator Tool

Supported Browsers

Browser Version
Chrome Current versions only
Edge Current versions (Windows 8, 8.1 & 10)
Firefox Current versions only
Safari Current versions only
Opera Current versions only

Factory Default Credentials

username password
sysadmin sysadmin


Changing the factory default sysadmin password is critical for security. It should be changed ASAP to prevent non-authorized users from accessing the AXS Guard administrator tool.

First Login

  1. Start your favorite Internet browser.

  2. Enter the factory default URL for the administrator tool, i.e.

  3. Accept the self-signed certificate to continue.

  4. Enter the factory default username and password to log in.


Configuration Wizards


The configuration wizards walk you through the essential configuration steps to get your system up and running in no time. Each wizard must be completed before the next one becomes available.

Help and Documentation

Configuration options are explained in the various help pages, which are accessible by clicking on the Help button.

Starting the Wizards

  1. Log in to your AXS Guard appliance.
  2. Follow the on-screen instructions.


  • If you are logging in for the first time, the wizards will start automatically. Otherwise, click on Wizards.
  • Do not skip any wizards. Start from the top one and work your way down the list.

Creating a new System Administrator

Follow the on-screen instructions to create a new system administrator with full or advanced privileges (required to license your appliance). Fields with descriptions in bold are required, other fields are optional. Click on help for assistance.

System Administrator Account

System Domain Settings and the sysadmin Password

Follow the on-screen instructions to set up your system. Change the factory default sysadmin password to prevent unauthorized access to the appliance. Use a secure, complex password.

Basic System Configuration

Setting up your Network Devices

Follow the on-screen instructions to set up your network devices.

Network Device Configuration

License Wizard

Customer Information

Follow the on-screen instructions to enter your customer information.

Entering your Customer Information

Licensing your Appliance

Follow the on-screen instructions to license your appliance.

License Wizard

Microsoft Cloud

The Office 365 FAST Lane wizard will help you to securely connect your network with the Microsoft Office 365 cloud.

With this wizard, you can configure the optimal bandwidth settings and redundant connections for your Office 365 applications and services.

An Internet speed test will be executed to calculate the optimal bandwidth settings. Please note that users will be temporarily disconnected from the Internet for the duration of the speed test. Their connection will be restored after completion of the test.

Office 365 FAST Lane Wizard

Users and Groups

Creating Users

Follow the on-screen instructions to create new users.

Creating new Users

Creating Groups

Follow the on-screen instructions to create new groups.

Creating new Groups


Follow the on-screen instructions to import and synchronize the users and groups from your Directory Server.

Directory Server Synchronization

Manual Configuration

Changing Factory Default Credentials

Change the factory default sysadmin password to prevent unauthorized access to the appliance. Make sure to use a secure, complex password.

  1. Log in to the appliance with a full or advanced administrator account.

  2. Go to System > General.

  3. Click on the change button next to the sysadmin password label.

  4. Enter and confirm the new password.

Changing the Factory Default sysadmin Password

Licensing your Appliance


Follow these 3 steps to license your AXS Guard appliance in order to get it to a fully operational, in-service status:

  1. Download the system info (systeminfo.txt) file from your AXS Guard appliance.

  2. Acquire a license (license.dat) file via the product registration website. You will need the following information:

    • system info file

    • Contract ID (for a commercial license only)

    • Serial Number (for a commercial license only)

    • Details of your organization

  3. Upload the license file (license.dat) to your AXS Guard appliance.


To download the license file from the Internet via the AXS Guard proxy, use the AXS Guard IP address and port 3128 to configure your browser's proxy settings.

Downloading a System Info file

  1. Log in to the AXS Guard appliance.

  2. Navigate to System > Status > System Info.

  3. Click on the Export button.

  4. Download and save the systeminfo.txt file. You will need this file to obtain a license file on the product registration website.

Downloading the System Info file

Acquiring a License file

To acquire a license file for your AXS Guard appliance, upload the systeminfo.txt file to the product registration website.

There are two types of licenses:

  • A commercial license, which remains valid indefinitely.

  • An evaluation license which is free and allows you to test and evaluate the appliance for a period of 30 days.

Uploading the License file to the AXS Guard Appliance

  1. Log in to the AXS Guard appliance.

  2. Navigate to System > Licence > Import.

  3. Click on "browse" to locate the license.dat file.

  4. Click on "Update" to upload the license.dat file.

Uploading the License file in the Administrator Tool


After licensing your appliance, the factory default sysadmin user will only be able to create or modify user accounts. Create a new account with full or advanced administrative privileges to further configure your appliance.

Basic System & Network Configuration


In this section, we explain how to:

  • create a system administrator with full administrative privileges

  • enter customer information

  • navigate through the web-based administrator tool

  • enter system information

  • configure the AXS Guard network devices

  • configure email settings

Creating an administrator with full administrative privileges

With the sysadmin user, you can create new user accounts, including accounts with administrative privileges. However, it won’t allow you to configure and manage your appliance.

To further configure and manage your appliance, you must create a new user with full or advanced administrative privileges. This also facilitates troubleshooting and monitoring, as all actions performed by administrators are logged by username under System > Logs > Admin Tool.

  1. Log in to the AXS Guard appliance with the sysadmin user.

  2. Navigate to Users & Groups > Users.

  3. Click on the + sign to add a new user.

  4. Enter a username.

  5. Enter the user’s full name (optional).

  6. Enter and confirm the user’s password. Make sure to use a secure, complex password.

  7. Under the AXS Guard Administration tab, select Full Administration and save your settings.

  8. Log out and log in with the newly created administrator account. Use this account to further configure your appliance.

Creating a System Administrator User

Customer Information

When users with full administrative privileges log in to a licensed appliance for the first time, they will be prompted to enter the customer information. The invitation to supply this information will reappear after each login until the information has been correctly entered and submitted.

This information is sent to Able back-up servers and automatically fed into its support database. Keeping this information up-to-date helps us to inform you about the latest product updates, features and current developments.

Customer Information

Entering Customer Information

  1. After logging on as a system administrator with full administration rights, enter the contact information as requested.

  2. To enter information about your dealer (which is preferable), you need to select dealer or both for The AXS Guard is managed by field. The Dealer contact tab is then displayed for data entry.

  3. If you prefer not to receive any mailings from Able, uncheck all options under "I want to receive information about technical updates, new features and products".

  4. Navigate to System > Customer, where the customer information screen is displayed.

  5. Enter or modify contact information and preferences as described above.

Email addresses must be entered accurately as they are needed to deliver system-critical information.

The Administrator Tool has three panes (illustrated below). The top pane is static; the left pane provides access to the configuration menus of the features that are activated on your system. Selecting a menu or submenu item will show the corresponding information in the right pane.

  • (1) Top pane: provides access to the dashboard, the configuration wizards and the documentation. Use the button on the top right to log out of the appliance.

  • (2) Left pane: provides a treelike menu structure to configure the various software features. Use the search function to jump to a specific item in the menu.

  • (3) Right pane: provides access to the corresponding configuration screen of the menu selected in the left pane.

Administrator Tool Layout

Entering the System Information

To enter system information:

  1. Navigate to System > General. The screen below is displayed.

  2. Configure the fields as explained in the table below.

  3. Click on Update to finish.

System > General Screen

  • Changing the factory default sysadmin password is critical for security.

  • The Domain Name of the appliance should not necessarily be the same as your Windows Domain Name (also see the explanation in the table below).

  • Fields with a description in bold are required (cannot be left blank).

With the Content Filtering feature operational, the AXS Guard domain must be added under E-mail > Domains, as e-mails originating from non-registered domains are rejected.

Field Description
Host name The hostname of the appliance. This name is used by the appliance’s own internal DNS server. axsguard is the system default. Do not change unless necessary. Changing the hostname requires advanced administrator access.
Domain Name The name of your primary domain, e.g. This domain is used by the appliance’s internal DNS server and is also used when it sends an e-mail notification to system administrators or the outside world.
Domain for outgoing emails Enter a domain with a valid MX record. This is only required if the domain name specified above is a local domain which is not resolvable on the Internet, e.g. example.local.
Time Zone Select the appropriate time zone from the drop-down list. A correct system time is critical for time-sensitive processes such as Kerberos and DIGIPASS authentication.
System Administrator Email address Enter the system administrator’s e-mail address. All reports generated by your appliance are sent to this e-mail address. Multiple e-mail addresses can be specified.
System Administrator Password The factory default sysadmin password. It is highly recommended to change this password as soon as you install your appliance.
Country Select the appropriate country from the drop-down list.
Send warning if load is consistently high The appliance will automatically send an e-mail to system administrators if it detects a high system load during 5 consecutive days. The e-mail is sent to the e-mail address(es) specified under System > General. A high load average may be an indication of a task monopolizing a lot of CPU time, in which case you may want to upgrade your hardware.

Network Device Settings

Setting up a LAN Device
  1. Navigate to Network > Devices > Eth.

  2. Click on eth0 (secure LAN).

  3. Configure the settings as explained in the table below and save your configuration.

Network > Devices > Eth > eth0

  • Description (optional): Enter the description of your choice for the selected device.

  • Alias Names: Enter additional names for the selected device. A DNS entry will be added in the AXS Guard DNS server database for each alias. For more information on DNS, please refer to the document, AXS Guard System Administration How To, which is available via the Documentation button in the Administrator Tool.

  • Interface Type: The following interface types are offered:

    • Not in use

    • Internet: An insecure zone with official IP addresses. This is the AXS Guard device that connects to the Internet.

    • Secure: A secure zone with non-official IP addresses. This is most often where all your company PCs are, secured from hackers by the AXS Guard Firewall .

    • DMZ: An insecure zone in your company with official or non-official IP addresses. This is where you would place any servers you wish to be accessible from the Internet.

  • Upstream / Downstream Bandwidth: These settings should only be modified when using the Bandwidth Management feature (AXS Guard only).

  • Connection Settings: Select the applicable option for your network:

    • If DHCP Client is selected, no extra configuration is required.

    • If Fixed IP Configuration is selected, additional IP settings need to be added in the IP Settings tab (see image below). The AXS Guard 's IP address (as seen by a network segment connected to the Ethernet device) needs to be entered.

Setting up an Ethernet Internet Device

If your AXS Guard appliance is used exclusively for authentication and not as a gateway, the instructions in this section are not relevant. If your AXS Guard appliance is used as a gateway, configure the Internet device as explained in this section.

  1. Navigate to Network > Devices > Eth.

  2. Click on the Internet device, eth1.

  3. Configure the settings and click on Update to finish.

PPPoE Configuration Account Settings

Fixed IP Configuration

Connection Type Action
DHCP No extra configuration is required.
PPP over Ethernet (PPPoE) Enter the adequate ISP account information under the Account Settings tab.
Fixed IP Configuration additional IP settings need to be added under the IP Settings tab. This data is available from your Internet Service Provider.
PPTP Client Settings should be modified appropriately under both the Account and IP Settings tabs.

DNS and NTP Settings

  1. Navigate to Network > General.

  2. Enter the IP address(es) of your DNS server(s):

    • If you are using the AXS Guard appliance as a gateway to the Internet, enter the IP(s) of the DNS server(s) provided by your Internet Service Provider (ISP). Contact your ISP if you are unsure about the settings.

    • If you are using the AXS Guard appliance exclusively for authentication, enter the IP address(es) of the DNS server(s) in your LAN.

  3. Click on Add and Update to finish.

Network > General

General E-mail Settings

Content Scanning and E-mail Server Features are both enabled

Some company-wide e-mail settings must be configured so the AXS Guard e-mail system functions correctly. More information on these settings is available in the e-mail relay documentation, which is accessible via the Documentation button in the Administrator Tool.

To configure the AXS Guard e-mail system:

  1. Navigate to E-mail > Domains and click on Add New.

  2. Enter the domain as specified under System > General, using lower cases.

  3. Enter a description (optional) for the domain.

  4. Select local as the type.

  5. Save your configuration.

E-mail > Domains > Add New: with SMTP and E-mail Servers Features

Content Scanning Feature enabled, E-mail Server Feature disabled

The following instructions are only relevant if the AXS Guard Content Scanning Feature is enabled and the E-mail Server Feature is disabled (i.e. when a separate e-mail server is available in your secure LAN, e.g. a Microsoft Exchange Server).

  1. Navigate to E-mail > Domains and click on Add New.

  2. Enter the system domain as entered under System > General.

  3. Enter a description for the domain (optional field).

  4. Select Forwarded as the type.

  5. Select Unlisted computer in the Server Settings.

  6. Enter the hostname or IP address of the e-mail server in your secure LAN. The hostname must be resolvable.

  7. Enter the port number (Forward Port) and save your configuration.

E-mail > Domain > Add New: SMTP Only

Content Scanning and E-mail Server Features are both disabled

The following instructions are only relevant if the AXS Guard Content Scanning and E-mail Server Features are disabled. This scenario allows system e-mails to be transmitted to another MTA in the secure LAN or to the SMTP server of your ISP.

  1. Navigate to E-mail > Server.

  2. Enter the hostname or IP address of an SMTP relay server. The hostname must be resolvable.

  3. Save your configuration.

E-mail>General: SMTP and E-mail Disabled

Authentication Settings


The AXS Guard appliance can be used as a stand-alone authentication appliance or as a UTM appliance providing strong authentication and Internet security. It supports the following authentication features:

  • One-factor authentication and two-factor authentication, e.g. DIGIPASS Authentication.

  • Local and back-end authentication: credentials can be checked locally on the AXS Guard or via a back-end server in its network.

  • The AXS Guard can be installed as a RADIUS server, a RADIUS client or a combination of both.

  • The AXS Guard appliance can be synchronized with an LDAP back-end, such as a Microsoft Directory Server.

If you are using the DIGIPASS authentication and management functionalities of the AXS Guard appliance, you must set a Derivation Key before any DIGIPASS tokens can be imported and deployed. For detailed information about authentication, see the AXS Guard Authentication and Directory Services manuals.

Setting the Derivation Key

The derivation key is a string which consists of 16 ASCII characters used to encrypt or decrypt the AXS Guard DIGIPASS database. It provides physical security, in that access to the AXS Guard hard drive(s) alone is not sufficient to read DIGIPASS data.

The derivation key must be entered by an AXS Guard user with full administrative privileges or above before any DIGIPASS blob data can be imported. A derivation key can only be changed by a full system administrator or above.

  1. Log in to the AXS Guard appliance.

  2. Go to Authentication > DIGIPASS > General.

  3. Enter the Derivation Key as shown below, then save your settings.

Derivation Key

What’s Next?

Before further configuration of your appliance, you need to assess your organization’s security needs. To assist you, we briefly explain the AXS Guard policies and security levels in the following section.

The next steps to configure your AXS Guard appliance are to:

  1. Create users and groups (manually, or automatically using the directory service feature).

  2. Register servers on the AXS Guard (if needed).

  3. Set up authentication services.

  4. Configure other services on the AXS Guard.

Further information is available via the Documentation button in the administrator tool:

  • For more information on the above tasks, please refer to the document AXS Guard System Administration manual. This document also explains the structure of the Administrator Tool, backup & restore functions, update settings and various network features such as DHCP, NAT, DNS and Routing.

  • For more information on setting up authentication, please refer to the AXS Guard Authentication manual. This document explains how to set up local and back-end authentication using policies, rules and restrictions. It also provides detailed instructions on how to configure and use the AXS Guard RADIUS Server.

  • For in-depth information about each AXS Guard feature, see the appropriate feature manual.

AXS Guard Security Concepts


To help you define your organization’s security needs, we briefly explain the AXS Guard policy-based system and the various levels at which policies can be applied. Explanations are included for appliances serving exclusively for authentication and for appliances also serving as a gateway to the Internet with features such as firewall, e-mail server, web access controls, etc.

Security Policies

Always use the strictest security for system-wide policies.

Authentication and other features such as firewall, e-mail and web access, are managed through security policies. Security policies consist of rules which govern the rights of users connected to your network, for example, whether a user must use a one-time password for authentication or is allowed to visit a given website. There are 4 types of policies:

  • System-wide policies are authentication-independent and apply to all users, computers and other devices connected to the appliance. These policies must be as restrictive as possible to avoid possible abuses on your network.

  • Computer policies are authentication-independent and are associated with a given IP in your network, e.g. to allow a server to connect to the Internet to perform automatic updates. Computer policies should be used sparingly and only in cases where user authentication is not possible.

  • Group policies are authentication-dependent and affect the members of a group, e.g. whether or not the members of a given group are allowed to connect to Facebook.

  • User policies are authentication-dependent and affect a single user, e.g. to override a group, computer or system-wide policy.

Rules, Policies and Application Levels

Policies For more information on policy assignment, see:

  • the AXS Guard System Administrator How To

  • the AXS Guard Authentication How To and

  • the feature-specific How To guides.

These documents can be accessed by clicking on the Documentation button in the appliance’s web-based administrator tool.

Security Levels System-wide policies are valid for all users who are physically connected to your network, e.g. guests and visitors. Ideally, nothing should be allowed at the system level.

Able recommends the implementation of user authentication. The illustration below shows the optimal implementation, with the levels (system, computer, groups and users) varying in terms of broadness of application (e.g. from everybody to a specific user) and restrictive powers (from very restrictive to less restrictive). Restrictions should be high for a large number of users, but can be reduced for a single authenticated user.

Restrictive Powers and Broadness of Application

With the web access feature, a security policy is referred to as an Access Control List (ACL).


A user is a person who:

  • is registered on the AXS Guard appliance under Users & Groups

  • has certain access rights based on security policies.

  • has an AXS Guard mailbox (if the e-mail server feature is enabled)

Users must be known on the AXS Guard and be a member of a group to be granted firewall and web access rights after authentication. Users automatically adopt access rights defined in their group, unless these rights are overruled and customized at the user level.


A group is a set of users who share common properties, e.g. HR, accounting, etc.

Users automatically adopt the access rights configured for their group, unless overruled at the user level.

The AXS Guard appliance has a default group. The following policies apply to the default group, depending on the features that are enabled on your AXS Guard appliance:

  • Web access rights: the default group is assigned the web access filter predef-no-porn, which allows access to all Internet sites, except pornographic sites.

  • E-mail rights: the default group is assigned the default e-mail policy, which allows users to send and receive e-mails, except those with potentially dangerous executable attachments or messages identified as spam. If the AXS Guard spam detection system identifies a message with a sufficiently high spam-rate, the message is deleted. If not, the message is only labeled as spam, but still delivered.

  • Firewall rights: the default group is assigned the sys-base firewall policy, which allows access to the AXS Guard DNS and Proxy services.


  • Without user authentication, anyone who has physical access to a computer in your network can potentially (ab)use your public IP address or other services in your network. Authentication is therefore strongly advised.

  • User and group-specific policies are only applied after successful authentication; system or computer policies require no authentication and should only be used where authentication is not possible or impractical.

  • Computers from which users authenticate do not need to be registered on the AXS Guard.

  • Registering a computer on the AXS Guard allow policies to be assigned to that computer. An unauthenticated user on a registered computer is assigned computer-level web access and firewall policies, based on that computer’s IP address.

  • If you are using the AXS Guard appliance as a gateway, firewall and web access policies should be configured to allow servers to access specific services in another network, for instance access to Microsoft updates on the Internet.

  • If you are using the AXS Guard appliance exclusively for authentication, a record needs to exist for every computer in your network that uses the AXS Guard RADIUS server.

The AXS Guard system-wide policy is automatically enforced for non-registered computers. For more information on computer registration, RADIUS and authentication please see the AXS Guard System Administration How To and AXS Guard Authentication How To.


Any user who is physically connected to the network and not registered on the AXS Guard appliance and whose computer is not registered on the AXS Guard appliance is assigned the system-wide policy.


Always use the strictest security for system-wide policies.


If you encounter a problem

If you encounter a problem with AXS Guard, follow the steps below:

  1. Check the troubleshooting section of the feature-specific manual.

  2. Check the knowledge base on this site for information about special configurations.

  3. If no solution is available in any of the above sources, contact your AXS Guard vendor.

Contact Information

(+32) 15-504-400