Prestige 334W User’s Guide
34.3.2 Restore Using FTP Session Example.................................................................................... | ||
34.4 | Uploading Firmware and Configuration Files ..................................................................... | |
34.4.1 | Firmware File Upload........................................................................................................... | |
34.4.2 | Configuration File Upload .................................................................................................... | |
34.4.3 FTP File Upload Command from the DOS Prompt Example............................................. | ||
34.4.4 FTP Session Example of Firmware File Upload................................................................. | ||
34.4.5 | TFTP File Upload ............................................................................................................... | |
34.4.6 TFTP Upload Command Example...................................................................................... | ||
Chapter 35 System Maintenance............................................................................................................... | ||
35.1 | Command Interpreter Mode.................................................................................................. | |
35.1.1 | Command Syntax.................................................................................................................. | |
35.1.2 | Command Usage................................................................................................................... | |
35.2 | Call Control Support .............................................................................................................. | |
35.2.1 | Budget Management ............................................................................................................. | |
35.2.2 | Call History........................................................................................................................... | |
35.3 | Time and Date Setting ............................................................................................................ | |
35.3.1 | Resetting the Time ................................................................................................................ | |
Chapter 36 Remote Management.............................................................................................................. | ||
36.1 | Remote Management .............................................................................................................. | |
36.1.1 | Remote Management Limitations......................................................................................... | |
Chapter 37 Call Scheduling ....................................................................................................................... | ||
37.1 | Introduction to Call Scheduling............................................................................................. | |
SMT VPN/IPSec............................................................................................................................................. | IX | |
Chapter 38 VPN/IPSec Setup..................................................................................................................... | ||
38.1 | VPN/IPSec Overview.............................................................................................................. | |
38.2 | IPSec Summary Screen .......................................................................................................... | |
38.3 | IPSec Setup.............................................................................................................................. | |
38.4 | IKE Setup .............................................................................................................................. | |
38.5 | Manual Setup ........................................................................................................................ | |
38.5.1 | Active Protocol ................................................................................................................... | |
38.5.2 Security Parameter Index (SPI)........................................................................................... | ||
Chapter 39 SA Monitor .............................................................................................................................. | ||
39.1 | SA Monitor Overview ............................................................................................................. | |
39.2 | Using SA Monitor.................................................................................................................... | |
Appendices and Index .................................................................................................................................... | X | |
Appendix A PPPoE ...................................................................................................................................... | ||
Appendix B PPTP........................................................................................................................................ | ||
Appendix C NetBIOS Filter Commands ................................................................................................... | ||
Appendix D Log Descriptions..................................................................................................................... | ||
Appendix E Setting up Your Computer’s IP Address............................................................................... | ||
Appendix F Wireless LAN and IEEE 802.11 ............................................................................................. |
xviii | Table of Contents |