ZyXEL G-1000 v2 User’s Guide
15.3 Log and Trace ................................................................................................
116
15.3.1 Syslog Logging .....................................................................................
117
15.4 Diagnostic ......................................................................................................
Chapter 16
119
16.1 Filename Conventions ...................................................................................
16.2 Backup Configuration .....................................................................................
120
16.2.1 Backup Configuration Using FTP .........................................................
16.2.2 Using the FTP command from the DOS Prompt ..................................
121
16.2.3 Backup Configuration Using TFTP .......................................................
122
16.2.4 Example: TFTP Command ...................................................................
123
16.2.5 Backup Via Console Port ......................................................................
Chapter 17
125
17.1 Command Interpreter Mode ...........................................................................
17.2 Time and Date Setting ....................................................................................
126
17.3 Remote Management Setup ..........................................................................
127
17.3.1 Telnet ....................................................................................................
17.3.2 FTP .......................................................................................................
17.3.3 Web ......................................................................................................
17.3.4 Remote Management Setup .................................................................
128
17.3.5 Remote Management Limitations .........................................................
129
17.4 Remote Management and NAT ......................................................................
17.5 System Timeout .............................................................................................
130
Chapter 18
131
133
Brute-Force Password Guessing Protection.....................................................
135
Setting up Your Computer’s IP Address............................................................
137
149
153
14
Table of Contents