|
| Prestige 334W User’s Guide |
30.2.2 Configuring a TCP/IP Filter Rule ........................................................................................ | ||
30.2.3 Configuring a Generic Filter Rule...................................................................................... | ||
30.3 | Example Filter ...................................................................................................................... | |
30.4 | Filter Types and NAT........................................................................................................... | |
30.5 | Firewall Versus Filters ......................................................................................................... | |
30.6 | Applying a Filter .................................................................................................................. | |
30.6.1 | Applying LAN Filters ........................................................................................................ | |
30.6.2 Applying Remote Node Filters........................................................................................... | ||
Chapter 31 SNMP Configuration ............................................................................................................. | ||
31.1 | About SNMP........................................................................................................................... | |
31.2 | Supported MIBs ..................................................................................................................... | |
31.3 | SNMP Configuration ............................................................................................................. | |
31.4 | SNMP Traps............................................................................................................................ | |
Chapter 32 System Security ...................................................................................................................... | ||
32.1 | System Security ...................................................................................................................... | |
32.1.1 | System Password.................................................................................................................. | |
32.1.2 Configuring External RADIUS Server................................................................................. | ||
32.1.3 | 802.1x................................................................................................................................... | |
Chapter 33 System Information and Diagnosis....................................................................................... | ||
33.1 | System Status .......................................................................................................................... | |
33.2 | System Information................................................................................................................ | |
33.2.1 | System Information.............................................................................................................. | |
33.2.2 | Console Port Speed .............................................................................................................. | |
33.3 | Log and Trace......................................................................................................................... | |
33.3.1 | Syslog Logging .................................................................................................................... | |
33.3.2 | ||
33.4 | Diagnostic................................................................................................................................ | |
33.4.1 | WAN DHCP....................................................................................................................... | |
Chapter 34 Firmware and Configuration File Maintenance.................................................................. | ||
34.1 | Filename Conventions............................................................................................................ | |
34.2 | Backup Configuration............................................................................................................ | |
34.2.1 | Backup Configuration .......................................................................................................... | |
34.2.2 Using the FTP Command from the Command Line............................................................. | ||
34.2.3 Example of FTP Commands from the Command Line........................................................ | ||
34.2.4 | ||
34.2.5 TFTP and FTP over WAN Management Limitations .......................................................... | ||
34.2.6 Backup Configuration Using TFTP ..................................................................................... | ||
34.2.7 | TFTP Command Example.................................................................................................... | |
34.2.8 | ||
34.3 | Restore Configuration............................................................................................................ | |
34.3.1 | Restore Using FTP ............................................................................................................... |
Table of Contents | xvii |