
Prestige 652 ADSL Security Router
13.1 | Introduction.............................................................................................................................. | |
13.2 | Creating/Editing A Customized Service .................................................................................. | |
13.3 | Example DHCP Negotiation and Syslog Connection from the Internet .................................. | |
Chapter 14 Logs ......................................................................................................................................... | ||
14.1 | Log Screen ............................................................................................................................... | |
Chapter 15 Content Filtering.................................................................................................................... | ||
15.1 | Keyword................................................................................................................................... | |
15.2 | Schedule................................................................................................................................... | |
15.3 | Trusted ..................................................................................................................................... | |
15.4 | Logs.......................................................................................................................................... | |
Advanced Management................................................................................................................................... | IV | |
Chapter 16 Filter Configuration............................................................................................................... | ||
16.1 | About Filtering......................................................................................................................... | |
16.2 | Configuring a Filter Set............................................................................................................ | |
16.3 | Configuring a Filter Rule ......................................................................................................... | |
16.4 | Filter Types and NAT ............................................................................................................ | |
16.5 | Example Filter........................................................................................................................ | |
16.6 | Applying Filters and Factory Defaults ................................................................................... | |
Chapter 17 SNMP Configuration ............................................................................................................. | ||
17.1 | About SNMP............................................................................................................................ | |
17.2 | Supported MIBs ....................................................................................................................... | |
17.3 | SNMP Configuration ............................................................................................................... | |
17.4 | SNMP Traps............................................................................................................................. | |
Chapter 18 System Information and Diagnosis....................................................................................... | ||
18.1 | System Status ........................................................................................................................... | |
18.2 | System Information and Console Port Speed........................................................................... | |
18.3 | Log and Trace .......................................................................................................................... | |
18.4 | Diagnostic ................................................................................................................................ | |
18.5 | Command Interpreter Mode ..................................................................................................... | |
Chapter 19 Firmware and Configuration File Maintenance.................................................................. | ||
19.1 | Filename Conventions.............................................................................................................. | |
19.2 | Backup Configuration .............................................................................................................. | |
19.3 | Restore Configuration .............................................................................................................. | |
19.4 | Uploading Firmware and Configuration Files........................................................................ | |
Chapter 20 System Maintenance and Information ................................................................................. | ||
20.1 | Command Interpreter Mode ..................................................................................................... | |
20.2 | Call Control Support ................................................................................................................ | |
20.3 | Time and Date Setting.............................................................................................................. | |
Chapter 21 Remote Management ............................................................................................................. | ||
21.1 | About Telnet Configuration ..................................................................................................... | |
21.2 | Telnet Under NAT ................................................................................................................... |
Table of Contents | ix |