306 3Com® VCX V7111 VoIP Gateway User GuideIn the example provided in Table 86 there is only one Index field. This is the simplest way tomark lines.In the example provided in Table 87 there are three Index fields. This more complicatedmethod is a result of the application it represents.Table PermissionsEach column has a 'permission' attribute that is applied to all instances in the column. Thispermission determines if and when a field can be modified. Several permissions can beapplied to each column.The following permissions are available: Read: The value of the field can be read. Write: The value of the field can be modified. Create: A value for the field must be provided at creation time (the default values, set toall fields, determine the initial values). Maintenance Write: The value of the field can only be modified when the entityrepresented by the line is in maintenance state (each table includes rules that determinewhen it is in maintenance state).In the example in Table 86 it is assumed that the columns User Name and User Passwordhave Read-Create permissions. The column Time Connected has a Read permission, andthe column Permissions has Read-Create-Maintenance Write permissions.Dynamic Tables vs. Static Tables Static Tables: Static tables do not support adding new lines or removing (deleting)existing lines. All lines in a Static table are pre-configured with default values. Users canonly modify the values of the existing lines. After reset, all lines in a Static table areavailable. Dynamic Tables: Dynamic tables support adding and removing lines. They are alwaysinitialized as empty tables with no lines. Users should add lines to a Dynamic table usingthe ini file or at run-time using the Embedded Web Server for example.Certain dynamic tables may initialize a line (or more) at start-up. If so, it is explainedin the specific table's documentation.Secret TablesA table is defined as a secret table if it contains at least a single secret data field or if itdepends on another secret table. A secret data field is a field that must not be revealed tothe user. For example, in the IPSec application, IPSec tables are defined as secret tables asthe IKE table contains a pre-shared key that must be concealed. Therefore, the SPD tablethat depends on the IKE table is defined as a secret table as well.