4
CHAPTER 8 MANAGEMENT ..........................................................................................................58
8.1
S
ETTINGS
.......................................................................................................................................58
8.1.1
Backup Settings...............................................................................................................58
8.1.2
Update Settings...............................................................................................................58
8.1.3
Restore Default ...............................................................................................................59
8.2
S
YSTEM
L
OG
.................................................................................................................................60
8.3
TR-069
C
LIENT
.............................................................................................................................61
8.4
I
NTERNET
T
IME
.............................................................................................................................63
8.5
A
CCESS
C
ONTROL
.........................................................................................................................63
8.5.1
Passwords.......................................................................................................................63
8.6
U
PDATE
S
OFTWARE
.......................................................................................................................64
8.7
S
AVE AND
R
EBOOT
........................................................................................................................65
APPENDIX A – FIREWALL...............................................................................................................66
APPENDIX B – PIN ASSIGNMENTS ...............................................................................................69
APPENDIX C – SPECIFICATIONS ..................................................................................................70
APPENDIX D – SSH CLIENT............................................................................................................72
APPENDIX E – WSC EXTERNAL REGISTRAR ...........................................................................73