Prestige 334W User’s Guide

30.2.2 Configuring a TCP/IP Filter Rule ........................................................................................

30-6

30.2.3 Configuring a Generic Filter Rule......................................................................................

30-11

30.3

Example Filter ......................................................................................................................

30-13

30.4

Filter Types and NAT...........................................................................................................

30-15

30.5

Firewall Versus Filters .........................................................................................................

30-16

30.6

Applying a Filter ..................................................................................................................

30-16

30.6.1

Applying LAN Filters ........................................................................................................

30-17

30.6.2 Applying Remote Node Filters...........................................................................................

30-17

Chapter 31 SNMP Configuration .............................................................................................................

31-1

31.1

About SNMP...........................................................................................................................

31-1

31.2

Supported MIBs .....................................................................................................................

31-2

31.3

SNMP Configuration .............................................................................................................

31-2

31.4

SNMP Traps............................................................................................................................

31-4

Chapter 32 System Security ......................................................................................................................

32-1

32.1

System Security ......................................................................................................................

32-1

32.1.1

System Password..................................................................................................................

32-1

32.1.2 Configuring External RADIUS Server.................................................................................

32-1

32.1.3

802.1x...................................................................................................................................

32-3

Chapter 33 System Information and Diagnosis.......................................................................................

33-1

33.1

System Status ..........................................................................................................................

33-1

33.2

System Information................................................................................................................

33-3

33.2.1

System Information..............................................................................................................

33-3

33.2.2

Console Port Speed ..............................................................................................................

33-4

33.3

Log and Trace.........................................................................................................................

33-5

33.3.1

Syslog Logging ....................................................................................................................

33-5

33.3.2

Call-Triggering Packet .........................................................................................................

33-8

33.4

Diagnostic................................................................................................................................

33-9

33.4.1

WAN DHCP.......................................................................................................................

33-10

Chapter 34 Firmware and Configuration File Maintenance..................................................................

34-1

34.1

Filename Conventions............................................................................................................

34-1

34.2

Backup Configuration............................................................................................................

34-2

34.2.1

Backup Configuration ..........................................................................................................

34-3

34.2.2 Using the FTP Command from the Command Line.............................................................

34-3

34.2.3 Example of FTP Commands from the Command Line........................................................

34-4

34.2.4

GUI-based FTP Clients ........................................................................................................

34-4

34.2.5 TFTP and FTP over WAN Management Limitations ..........................................................

34-4

34.2.6 Backup Configuration Using TFTP .....................................................................................

34-5

34.2.7

TFTP Command Example....................................................................................................

34-5

34.2.8

GUI-based TFTP Clients......................................................................................................

34-6

34.3

Restore Configuration............................................................................................................

34-6

34.3.1

Restore Using FTP ...............................................................................................................

34-7

Table of Contents

xvii